In this paper we show that a recently proposed fragile watermarking scheme by Rawat et al. does not detect and localize tampering, therefore cannot be used for authentication applications. The problem lies in that the scheme embeds an authentication code into the LSBs of pixels without taking into consideration the image content. To overcome this issue the authentication should be combined with the first seven bits of the image pixels, and in this paper a revision in this sense is proposed.
A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection
BOTTA, Marco;CAVAGNINO, Davide;POMPONIU, VICTOR
2015-01-01
Abstract
In this paper we show that a recently proposed fragile watermarking scheme by Rawat et al. does not detect and localize tampering, therefore cannot be used for authentication applications. The problem lies in that the scheme embeds an authentication code into the LSBs of pixels without taking into consideration the image content. To overcome this issue the authentication should be combined with the first seven bits of the image pixels, and in this paper a revision in this sense is proposed.File in questo prodotto:
File | Dimensione | Formato | |
---|---|---|---|
rev2_manuscript_4aperto.pdf
Open Access dal 01/03/2017
Tipo di file:
POSTPRINT (VERSIONE FINALE DELL’AUTORE)
Dimensione
481.8 kB
Formato
Adobe PDF
|
481.8 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.