phan3.pdf (95.11 kB)

Tampering with a watermarking-based image authentication scheme

Download (95.11 kB)
journal contribution
posted on 01.03.2011, 17:26 by Raphael C.-W. Phan
We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439–446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and information hiding in images, Pattern Recognition 37 (3) (2004) 475–486]. We show how the Chang et al. scheme still allows pixels to be tampered, and furthermore discuss why its ownership cannot be uniquely binding. Our results indicate that the scheme does not achieve its designed objectives of tamper detection and image ownership.

History

School

  • Mechanical, Electrical and Manufacturing Engineering

Citation

PHAN, R.C.-W., 2008. Tampering with a watermarking-based image authentication scheme. Pattern Recognition, 41 (11), pp. 3493-3496

Publisher

© Elsevier

Version

AM (Accepted Manuscript)

Publication date

2008

ISSN

0031-3203

Language

en

Exports