In this paper we show that a recently proposed fragile watermarking scheme by Rawat et al. does not detect and localize tampering, therefore cannot be used for authentication applications. The problem lies in that the scheme embeds an authentication code into the LSBs of pixels without taking into consideration the image content. To overcome this issue the authentication should be combined with the first seven bits of the image pixels, and in this paper a revision in this sense is proposed.

A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection

BOTTA, Marco;CAVAGNINO, Davide;POMPONIU, VICTOR
2015-01-01

Abstract

In this paper we show that a recently proposed fragile watermarking scheme by Rawat et al. does not detect and localize tampering, therefore cannot be used for authentication applications. The problem lies in that the scheme embeds an authentication code into the LSBs of pixels without taking into consideration the image content. To overcome this issue the authentication should be combined with the first seven bits of the image pixels, and in this paper a revision in this sense is proposed.
2015
69
1
242
245
Fragile watermarking; Content authentication; Security
Marco Botta; Davide Cavagnino; Victor Pomponiu
File in questo prodotto:
File Dimensione Formato  
rev2_manuscript_4aperto.pdf

Open Access dal 01/03/2017

Tipo di file: POSTPRINT (VERSIONE FINALE DELL’AUTORE)
Dimensione 481.8 kB
Formato Adobe PDF
481.8 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2318/152373
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 24
  • ???jsp.display-item.citation.isi??? 15
social impact