Volume 9, Issue 9 (September 2022), Pages: 127-135
----------------------------------------------
Original Research Paper
Improvement of a hamming code and logistic-map based pixel-level active forgery detection scheme
Author(s): Oussama Benrhouma *
Affiliation(s):
Faculty of Computer and Information Systems, Islamic University of Madinah, Madinah, Saudi Arabia
Full Text - PDF XML
* Corresponding Author.
Corresponding author's ORCID profile: https://orcid.org/0000-0002-4540-3650
Digital Object Identifier:
https://doi.org/10.21833/ijaas.2022.09.016
Abstract:
In this paper, we present an improvement of a previously proposed watermarking scheme. We proved in a previous work that the scheme suffers from security flaws and we exploited those flaws to attack the scheme resulting in the revelation of the secret keys used in the embedding process. With possession of the keys watermarked images could be manipulated without being detected by the extraction scheme. In this paper, we propose an improvement of the scheme to cover the security flaws in the scheme. This work falls into the context of improving the design of security systems taking into consideration the different cryptanalysis techniques.
© 2022 The Authors. Published by IASE.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords: Cryptanalysis, Improvement, Watermarking tamper, Detection, Chaotic functions, Forgery localization
Article History: Received 3 April 2022, Received in revised form 17 June 2022, Accepted 17 June 2022
Acknowledgment
The authors would like to thank the deanship of research at the Islamic University of Madinah for supporting this research.
Compliance with ethical standards
Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Citation:
Benrhouma O (2022). Improvement of a hamming code and logistic-map based pixel-level active forgery detection scheme. International Journal of Advanced and Applied Sciences, 9(9): 127-135
Permanent Link to this page
Figures
Fig. 1 Fig. 2 Fig. 3 Fig. 4 Fig. 5 Fig. 6 Fig. 7 Fig. 8
Tables
Table 1 Table 2 Table 3
----------------------------------------------
References (26)
- Benrhouma O (2022). Cryptanalysis of a hamming code and logistic-map based pixel-level active forgery detection scheme. International Journal of Advanced Computer Science and Applications, 13(2): 663-668. https://doi.org/10.14569/IJACSA.2022.0130278 [Google Scholar]
- Benrhouma O, Hermassi H, and Belghith S (2015). Tamper detection and self-recovery scheme by DWT watermarking. Nonlinear Dynamics, 79(3): 1817-1833. https://doi.org/10.1007/s11071-014-1777-3 [Google Scholar]
- Benrhouma O, Hermassi H, and Belghith S (2017). Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme. Multimedia Tools and Applications, 76(20): 21133-21156. https://doi.org/10.1007/s11042-016-4054-2 [Google Scholar]
- Benrhouma O, Hermassi H, El-Latif A, Ahmed A, and Belghith S (2016). Chaotic watermark for blind forgery detection in images. Multimedia Tools and Applications, 75(14): 8695-8718. https://doi.org/10.1007/s11042-015-2786-z [Google Scholar]
- Botta M, Cavagnino D, and Pomponiu V (2015). A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection. AEU-International Journal of Electronics and Communications, 69(1): 242-245. https://doi.org/10.1016/j.aeue.2014.09.004 [Google Scholar]
- Bravo-Solorio S, Calderon F, Li CT, and Nandi AK (2018). Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digital Signal Processing, 73: 83-92. https://doi.org/10.1016/j.dsp.2017.11.005 [Google Scholar]
- Celik MU, Sharma G, Saber E, and Tekalp AM (2002). Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing, 11(6): 585-595. https://doi.org/10.1109/TIP.2002.1014990 [Google Scholar] PMid:18244657
- Chang EC, Kankanhalli MS, Guan X, Huang Z, and Wu Y (2003). Robust image authentication using content based compression. Multimedia Systems, 9(2): 121-130. https://doi.org/10.1007/s00530-003-0083-6 [Google Scholar]
- Di Martino F and Sessa S (2012). Fragile watermarking tamper detection with images compressed by fuzzy transform. Information Sciences, 195: 62-90. https://doi.org/10.1016/j.ins.2012.01.014 [Google Scholar]
- Fridrich J, Goljan M, and Baldoza AC (2000). New fragile authentication watermark for images. In the International Conference on Image Processing, IEEE, Vancouver, Canada: 446-449. https://doi.org/10.1109/ICIP.2000.900991 [Google Scholar]
- Ghadirli HM, Nodehi A, and Enayatifar R (2019). An overview of encryption algorithms in color images. Signal Processing, 164: 163-185. https://doi.org/10.1016/j.sigpro.2019.06.010 [Google Scholar]
- Haghighi BB, Taherinia AH, and Mohajerzadeh AH (2019). TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA. Information Sciences, 486: 204-230. https://doi.org/10.1016/j.ins.2019.02.055 [Google Scholar]
- Kaur G, Agarwal R, and Patidar V (2020). Chaos based multiple order optical transform for 2D image encryption. Engineering Science and Technology, an International Journal, 23(5): 998-1014. https://doi.org/10.1016/j.jestch.2020.02.007 [Google Scholar]
- Li M, Zhang J, and Wen W (2014). Cryptanalysis and improvement of a binary watermark-based copyright protection scheme for remote sensing images. Optik, 125(24): 7231-7234. https://doi.org/10.1016/j.ijleo.2014.07.130 [Google Scholar]
- Lin CY and Chang SF (2001). A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits and Systems for Video Technology, 11(2): 153-168. https://doi.org/10.1109/76.905982 [Google Scholar]
- Lu W, Lu H, and Chung FL (2006). Robust digital image watermarking based on subsampling. Applied Mathematics and Computation, 181(2): 886-893. https://doi.org/10.1016/j.amc.2006.02.012 [Google Scholar]
- Molina-Garcia J, Garcia-Salgado BP, Ponomaryov V, Reyes-Reyes R, Sadovnychiy S, and Cruz-Ramos C (2020). An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Processing: Image Communication, 81: 115725. https://doi.org/10.1016/j.image.2019.115725 [Google Scholar]
- Prasad S and Pal AK (2020). Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking. Multimedia Tools and Applications, 79(29): 20897-20928. https://doi.org/10.1007/s11042-020-08715-x [Google Scholar]
- Shahadi HI, Thahab AT, and Farhan HR (2020). A novel robust approach for image copyright protection based on concentric rectangles. Journal of King Saud University-Computer and Information Sciences, 34(4), 1263-1274. https://doi.org/10.1016/j.jksuci.2020.06.006 [Google Scholar]
- Shojanazeri H, Wan Adnan WA, Syed Ahmad SM, and Rahimipour S (2017). Authentication of images using Zernike moment watermarking. Multimedia Tools and Applications, 76(1): 577-606. https://doi.org/10.1007/s11042-015-3018-2 [Google Scholar]
- Simitopoulos D, Koutsonanos DE, and Strintzis MG (2003). Robust image watermarking based on generalized radon transformations. IEEE Transactions on Circuits and Systems for Video Technology, 13(8): 732-745. https://doi.org/10.1109/TCSVT.2003.815947 [Google Scholar]
- Singh N and Sinha A (2009). Optical image encryption using Hartley transform and logistic map. Optics Communications, 282(6): 1104-1109. https://doi.org/10.1016/j.optcom.2008.12.001 [Google Scholar]
- Tang CW and Hang HM (2003). A feature-based robust digital image watermarking scheme. IEEE Transactions on Signal Processing, 51(4): 950-959. https://doi.org/10.1109/TSP.2003.809367 [Google Scholar]
- Teng L, Wang X, and Wang X (2013). Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU-International Journal of Electronics and Communications, 67(6): 540-547. https://doi.org/10.1016/j.aeue.2012.12.001 [Google Scholar]
- Xie EY, Li C, Yu S, and Lü J (2017). On the cryptanalysis of Fridrich's chaotic image encryption scheme. Signal Processing, 132: 150-154. https://doi.org/10.1016/j.sigpro.2016.10.002 [Google Scholar]
- Yu C, Li J, Li X, Ren X, and Gupta BB (2018). Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimedia Tools and Applications, 77(4): 4585-4608. https://doi.org/10.1007/s11042-017-4637-6 [Google Scholar]
|