Security analysis of a self-embedding fragile image watermark scheme

12/31/2018
by   Xinhui Gong, et al.
0

Recently, a self-embedding fragile watermark scheme based on reference-bits interleaving and adaptive selection of embedding mode is proposed. Reference bits are derived from the scrambled MSB bits of a cover image, and then are combined with authentication bits to form the watermark bits for LSB embedding. We find this scheme has a feature of block independence of embedding watermark such that it is vulnerable to a collage attack. In addition, because the generation of authentication bits via hash function operations is not related to secret keys, we can apply a multiple stego-image attack on this scheme and the cost of acquiring all the permutation relations (i.e., equivalent permutation keys) of l· b^2 watermark bits of all blocks is about (l· b^2)! for the embedding mode (m, l), where m MSB layers of a cover image are used for generating reference bits and l LSB layers for embedding watermark, and b× b is the size of image block. The simulation results and the statistical results demonstrate our analysis is effective.

READ FULL TEXT
research
07/08/2023

Attacking (EC)DSA scheme with ephemeral keys sharing specific bits

In this paper, we present a deterministic attack on (EC)DSA signature sc...
research
12/19/2009

Secure Watermarking Scheme for Color Image Using Intensity of Pixel and LSB Substitution

In this paper a novel spatial domain LSB based watermarking scheme for c...
research
01/16/2021

A Novel Local Binary Pattern Based Blind Feature Image Steganography

Steganography methods in general terms tend to embed more and more secre...
research
08/31/2017

A secure blind watermarking scheme based on DCT domain of the scrambled image

This paper investigates a secure blind watermarking scheme. The main ide...
research
03/07/2020

Securing LSB embedding against structural steganalysis

This work explores the extent to which LSB embedding can be made secure ...
research
01/25/2022

Image Fragile Watermarking Algorithm Based on Deneighborhood Mapping

To address the security risk caused by fixed offset mapping and the limi...
research
08/06/2019

An Efficient JPEG Steganographic Scheme Design Using Domain Transformation of Embedding Cost

Although the recently proposed JPEG steganography using Block embedding ...

Please sign up or login with your details

Forgot password? Click here to reset