On the Security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR

  • Huo-Chong Ling
  • Raphael C. -W. Phan
  • Swee-Huay Heng
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7087)

Abstract

Watermarking schemes allow a cover image to be embedded with a watermark, for diverse applications including proof of ownership and covert communication. In this paper, we present attacks on watermarking scheme proposed by Huang and Guan. This scheme is hybrid singular value decomposition (SVD) based scheme in the sense that they employ both SVD and other techniques for watermark embedding and extraction. By attacks, we mean that we show how the designers’ security claim, related to proof of ownership application can be invalidated. Our results are the first known attacks on this hybrid SVD-based watermarking scheme.

Keywords

singular value decomposition watermarking attacks proof of ownership ambiguity discrete cosine transform 

References

  1. 1.
    Andrews, H.C., Patterson, C.L.: Singular Value Decomposition(SVD) Image Coding. IEEE Trans. Commun. 24(4), 425–432 (1976)CrossRefGoogle Scholar
  2. 2.
    Aslantas, V.: A Singular-Value Decomposition-Based Image Watermarking using Genetic Algorithm. AEU - Int. J. Electron. Commun. 62(5), 386–394 (2008)CrossRefGoogle Scholar
  3. 3.
    Chang, C.C., Tsai, P., Lin, C.C.: SVD-Based Image Watermarking Scheme. Pattern Recognit. Lett. 26, 1577–1586 (2005)CrossRefGoogle Scholar
  4. 4.
    Chang, C.C., Hu, Y.S., Lin, C.C.: A Digital Watermarking Scheme Based on Singular Value Decomposition. In: Chen, B., Paterson, M., Zhang, G. (eds.) ESCAPE 2007. LNCS, vol. 4614, pp. 82–93. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  5. 5.
    Chang, C.C., Lin, C.C., Hu, Y.S.: An SVD Oriented Watermark Embedding Scheme with High Qualities for the Restored Images. Int. J. Innov. Comput. Inf. Control. 3(2), 609–620 (2007)Google Scholar
  6. 6.
    Ganic, E., Eskicioglu, A.M.: Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies. In: 2004 Workshop on Multimedia and Security, pp. 166–174. ACM, Magdeburg (2004)CrossRefGoogle Scholar
  7. 7.
    Ganic, E., Eskicioglu, A.M.: Robust Embedding of Visual Watermarks using Discrete Wavelet Transform and Singular Value Decomposition. J. Electron. Imaging. 14(4), 43004 (2005)CrossRefGoogle Scholar
  8. 8.
    Ghazy, R., El-Fishawy, N., Hadhoud, M., Dessouky, M., El-Samie, F.: An Efficient Block-by-Block SVD-Based Image Watermarking Scheme. Ubiquitous Comput. Commun. J. 2(5), 1–9 (2007)Google Scholar
  9. 9.
    Huang, F., Guan, Z.H.: A Hybrid SVD-DCT Watermarking Method Based on LPSNR. Pattern Recognit. Lett. 25, 1769–1775 (2004)CrossRefGoogle Scholar
  10. 10.
    Lai, C.C.: A Digital Watermarking Scheme Based on Singular Value Decomposition and Tiny Genetic Algorithm. Digital Signal Processing 21(4), 522–527 (2011)CrossRefGoogle Scholar
  11. 11.
    Lagzian, S., Soryani, M., Fathy, M.: A New Robust Watermarking Scheme Based on RDWT-SVD. Int. J. Intell. Inf. Process. 2(1), 22–29 (2011)Google Scholar
  12. 12.
    Liu, R., Tan, T.: An SVD-Based Watermarking Scheme for Protecting Rightful Ownership. IEEE Trans. Multimedia. 4(1), 121–128 (2002)CrossRefGoogle Scholar
  13. 13.
    Mohammad, A.A., Alhaj, A., Shaltaf, S.: An Improved SVD-Based Watermarking Scheme for Protecting Rightful Ownership. Signal Processing 88, 2158–2180 (2008)CrossRefMATHGoogle Scholar
  14. 14.
    Zhang, X.P., Li, K.: Comments on “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”. IEEE Trans. Multimedia. 7(2), 593–594 (2005)CrossRefGoogle Scholar
  15. 15.
    Rykaczewski, R.: Comments on “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”. IEEE Trans. Multimedia. 9(2), 421–423 (2007)CrossRefGoogle Scholar
  16. 16.
    Ling, H.C., Phan, R.C.W., Heng, S.H.: Analysis on the Improved SVD-Based Watermarking Scheme. In: Kim, T.H., Adeli, H. (eds.) AST/UCMA/ISA/ACN 2010. LNCS, vol. 6059, pp. 143–149. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  17. 17.
    Ling, H.C., Phan, R.C.W., Heng, S.H.: Attacks on SVD-Based Watermarking Schemes. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol. 5075, pp. 83–91. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  18. 18.
    Ling, H.C., Heng, S.H., Goi, B.M.: Attacks on a Block Based SVD Watermarking Scheme. In: 6th Int. Conf. Inf. Technol.: New Generations (ITNG 2009), Las Vegas, Nevada, vol. 1-3, pp. 371–375 (2009)Google Scholar
  19. 19.
    Ting, G.C.W.: Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme. In: Won, D., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 378–388. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  20. 20.
    Xiao, L., Wei, Z., Ye, J.: Comments on “Robust Embedding of Visual Watermarks using Discrete Wavelet Transform and Singular Value Decomposition” and Theorectical Analysis. J. Electron. Imaging. 17(4), 40501 (2005)CrossRefGoogle Scholar
  21. 21.
    Xing, Y., Tan, J.: Mistakes in the Paper Entitled “A Singular-Value Decomposition-Based Image Watermarking using Genetic Algorithm”. AEU - Int. J. Electron. Commun. 64(1), 80–81 (2010)CrossRefGoogle Scholar
  22. 22.
    Peitgen, H.O., Jurgens, H., Saupe, D.: Chaos and Fractals: New Frontiers of Science. Springer, New York (1992)CrossRefMATHGoogle Scholar
  23. 23.
    Huang, F.: A New General Transparency Model for Block-Based Watermarking Method. Int. J. of Network Secur. 7(2), 235–239 (2008)MathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Huo-Chong Ling
    • 1
  • Raphael C. -W. Phan
    • 2
  • Swee-Huay Heng
    • 1
  1. 1.Research Group of Cryptography and Information Security, Centre for Multimedia Security and Signal ProcessingMultimedia UniversityMalaysia
  2. 2.Loughborough UniversityUnited Kingdom

Personalised recommendations