𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Tampering with a watermarking-based image authentication scheme

✍ Scribed by Raphael C.-W. Phan


Publisher
Elsevier Science
Year
2008
Tongue
English
Weight
163 KB
Volume
41
Category
Article
ISSN
0031-3203

No coin nor oath required. For personal study only.

✦ Synopsis


We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439--446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and information hiding in images, Pattern Recognition 37 (3) (2004) 475--486]. We show how the Chang et al. scheme still allows pixels to be tampered, and furthermore discuss why its ownership cannot be uniquely binding. Our results indicate that the scheme does not achieve its designed objectives of tamper detection and image ownership.


πŸ“œ SIMILAR VOLUMES


A watermarking-based image ownership and
✍ Chin-Chen Chang; Yih-Shin Hu; Tzu-Chuen Lu πŸ“‚ Article πŸ“… 2006 πŸ› Elsevier Science 🌐 English βš– 368 KB

Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and dete

A PCA-based watermarking scheme for tamp
✍ Qijun Zhao; Hongtao Lu πŸ“‚ Article πŸ“… 2005 πŸ› Elsevier Science 🌐 English βš– 161 KB

This paper presents a novel watermarking scheme for tamper-proof of web pages. It overwhelms existing methods of watermarking and Hash in that it does not increase the file size. Experimental results are promising.

A tamper-proof and lightweight authentic
✍ Ghaith Hammouri; ErdinΓ§ Γ–ztΓΌrk; Berk Sunar πŸ“‚ Article πŸ“… 2008 πŸ› Elsevier Science 🌐 English βš– 689 KB

## a b s t r a c t We present a tamper-proof and lightweight challenge-response authentication scheme, based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, which shows the scheme to be secure against passive attacks, provided that it is hard to learn a thr

Probability-based tampering detection sc
✍ Ching-Sheng Hsu; Shu-Fen Tu πŸ“‚ Article πŸ“… 2010 πŸ› Elsevier Science 🌐 English βš– 522 KB

In recent years, digital watermarking technology has been widely used for property rights protection and integrity authentication of digital images. Image integrity authentication is usually done by a fragile watermarking scheme. When authenticating image integrity, one must extract the embedded aut