Abstract

In this paper, we analyze the security of a fragile watermarking scheme for tamper detection in images recently proposed by S. Prasad et al. The chaotic functions are used in the scheme to exploit its pseudo-random behavior and its sensibility to initial condition and control parameter, but despite that, security flaws have been spotted and cryptanalysis of the scheme is conducted. Experimental results shows that the scheme could not withstand the attack and watermarked images were manipulated without triggering any alarm in the extraction scheme. In this paper, two different approaches of attacks are demonstrated and conducted to break the scheme. This work falls into the context of improving the quality of the designed cryptographic schemes taking into account several cryptanalysis techniques.

Highlights

  • INTRODUCTIONNowadays we are living in the era of technology, and with a huge leap of internet technology the advancement is going faster and faster thanks to the easy and fast exchange of information, this makes led to the emergence of powerful software and hardware

  • Receiver is typically whoever possesses the secret key(s) to extract the watermark, and despite that the schemes are protected by secret key(s), successful attacks on these schemes has been conducted and the watermarks has been removed without possession of the key(s) [33], [34], [35], [36], [37]

  • Prasad et al [1], security flaws have been spotted in the scheme and two different types of attacks are performed and we were able to modify the image without being detected by the detection scheme, an improvement of the scheme is proposed to cover the security problems

Read more

Summary

INTRODUCTION

Nowadays we are living in the era of technology, and with a huge leap of internet technology the advancement is going faster and faster thanks to the easy and fast exchange of information, this makes led to the emergence of powerful software and hardware. The amount of data exchanged via the internet is huge, multimedia contents represent a big percentage of these files, and with the presence of powerful and easy to use software the manipulation of these files became easier. The work presented by the cryptanalysts helped improving the quality of the future proposed security schemes. In this context w analyze the security of a recently proposed fragile watermarking scheme by S. Prasad et al [1], security flaws have been spotted in the scheme and two different types of attacks are performed and we were able to modify the image without being detected by the detection scheme, an improvement of the scheme is proposed to cover the security problems.

THE SCHEME UNDER STUDY
Authentication Watermark Generation and Embedding
Extraction and Tamper Detection
Online Attack
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call