Skip to main content
Log in

Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper analyses the security of an effective SVD-based image tampering detection and self-recovery scheme that has been recently proposed by S. Dadkhah et al. Some errors in the embedding/extraction processes are underlined and an attack against this scheme is demonstrated. The theoretical and experimental results show that the proposed scheme is not secure. Finally, an improvement of the scheme is proposed to enhance its security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Arnold V, Avez A (1968) Ergodic problems of classical mechanics. Benjamin, New York, p 564

    Google Scholar 

  2. Aslantas V, Ozer S, Ozturk S (2009) Improving the performance of dct-based fragile watermarking using intelligent optimization algorithms. Opt Commun 282:2806–2817

    Article  Google Scholar 

  3. Bao J, Yang Q (2012) Period of the discrete arnold cat map and general cat map. Nonlin Dyn 70:1365–1375

    Article  MathSciNet  MATH  Google Scholar 

  4. Benrhouma O, Hermassi H, El-Latif AAA, Belghith S (2015) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl:1–24

  5. Bhatnagar G, Raman B (2011) A new robust reference logo watermarking scheme. Multimed Tools Appl 52:621–640

    Article  Google Scholar 

  6. Botta M, Cavagnino D, Pomponiu V (2015) A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection. AEU - Int J Electron Commun 69(1):242–245

    Article  Google Scholar 

  7. Chang CC, Hu YS, LU TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27:439–446

    Article  Google Scholar 

  8. Dadkhah S, Manaf AA, Hori Y, Hassanien AE, Sadeghi S (2014) An effective svd-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29(10):1197–1210

    Article  Google Scholar 

  9. Dyson F, Falk H (1992) Period of a discrete cat mapping. Am Math Mon 99 (7):603–614

    Article  MathSciNet  MATH  Google Scholar 

  10. Kerckhoffs A (1883) La cryptographie militaire. J des Sciences Militaires 9:5–38

    Google Scholar 

  11. Li M, Zhang J, Wen W (2014) Cryptanalysis and improvement of a binary watermark-based copyright protection scheme for remote sensing images. Optik - Int J Light Electron Opt 125(24):7231–7234

    Article  Google Scholar 

  12. Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forens Secur 10(3):507–518

    Article  Google Scholar 

  13. Oussama B, Houcemeddine H, Safya B (2015) Tamper detection and self-recovery scheme by dwt watermarking. Nonlin Dyn 79(3):1817–1833

    Article  Google Scholar 

  14. Peterson G (1997) Arnold’s cat map. http://online.redwoods.cc.ca.us/instruct/darnold/laproj/Fall97/Gabe/catmap.pdf

  15. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Article  Google Scholar 

  16. Qin C, Chang C-C, Chen P-Y (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150

    Article  Google Scholar 

  17. Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on smvq and image inpainting. IEEE Trans Image Process 23(3):969–978

    Article  MathSciNet  Google Scholar 

  18. Qin C, Chang C-C, Hsu T-J (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tools Appl 74(15):5861–5872

    Article  Google Scholar 

  19. Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789

    Article  Google Scholar 

  20. Teng L, Wang X, Wang X (2013) Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU - Int J Electron Commun 67 (6):540–547

    Article  Google Scholar 

  21. Wang X, Pang K, Zhou X, Zhou Y, Li L, Xue J (2015) A visual model-based perceptual image hash for content authentication. IEEE Trans Inf Forens Secur 10(7):1336–1349

    Article  Google Scholar 

  22. Wu XY, Guan ZH (2007) A novel digital watermark algorithm based on chaotic maps. Phys Lett A 365:403–406

    Article  Google Scholar 

  23. Zhang X, Wang S (2008) Fragile watermarking with error-free restoration capability. IEEE Trans Multimed 10(8):1490–1499

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Houcemeddine Hermassi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Benrhouma, O., Hermassi, H. & Belghith, S. Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme. Multimed Tools Appl 76, 21133–21156 (2017). https://doi.org/10.1007/s11042-016-4054-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4054-2

Keywords

Navigation