Back to Search Start Over

Cryptanalysis of an improved fragile watermarking scheme

Authors :
Juan Andres Mucarquer
Safwan El Assad
Mirko Koscina
Daniel Caragata
Universidad Tecnica Federico Santa Maria [Valparaiso] (UTFSM)
Institut d'Électronique et des Technologies du numéRique (IETR)
Université de Nantes (UN)-Université de Rennes 1 (UR1)
Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes)
Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)
Université de Nantes (UN)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes)
Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)
Nantes Université (NU)-Université de Rennes 1 (UR1)
Source :
AEÜ-International Journal of Electronics and Communications / Archiv für Elektronik und Übertragungstechnik, AEÜ-International Journal of Electronics and Communications / Archiv für Elektronik und Übertragungstechnik, Elsevier, 2016, 70 (6), pp.777-785. ⟨10.1016/j.aeue.2016.03.001⟩, AEÜ-International Journal of Electronics and Communications / Archiv für Elektronik und Übertragungstechnik, 2016, 70 (6), pp.777-785. ⟨10.1016/j.aeue.2016.03.001⟩
Publication Year :
2016
Publisher :
Elsevier BV, 2016.

Abstract

International audience; This paper presents two attacks on Teng et al.'s fragile watermarking algorithm. Both attacksallow the attacker to apply valid watermarks on tampered images, therefore rendering thewatermarking scheme useless. The first attack uses the watermarked version of two chosenimages, and the second attack, a generalization of the first, uses a number of arbitrarywatermarked images. The paper also models the cryptanalysis process for the second attackusing Markov chains in order to demonstrate that the necessary number of images is relativelysmall for a high probability of successful attack. All the results that are presented in thispaper have been confirmed by a practical implementation.

Details

ISSN :
14348411
Volume :
70
Database :
OpenAIRE
Journal :
AEU - International Journal of Electronics and Communications
Accession number :
edsair.doi.dedup.....b97471abcdcf10efb58ce136910a6b21