Volume 6 - Issue 6
A new hierarchical digital image authentication method for tamper detection and recovery against microdotting attacks
Abstract
It is a trend to develop an image authentication technique with the capability of not only localizing tampered areas but also remedying with a rough approximation to damaged areas. In this paper, the security of the image authentication technique with tamper localization and remedy proposed by Lin et al. is analyzed. As image authentication has been an essential mechanism in multimedia security, the false alarm is absolutely not negligible. By microdotting attacks, Lin et al.'s scheme is not secure as claimed since the watermarked image can be successfully modified by adjusting the pixel value without perception of verifier. The experimental results given by some counter examples are conducted to show the security weakness does exist. In order to benefit the valuable advantages of Lin et al.'s scheme, it is worthwhile to propose an improved scheme based on one-way hash function to enhance security. According to this find, an improved version, simply modifying Lin et al.'s scheme a little, is proposed to guarantee the security, in which all valuable advantages in Lin et al.'s scheme are preserved.
Paper Details
PaperID: 77956965744
Author's Name: Chen, T., Chiu, C.
Volume: Volume 6
Issues: Issue 6
Keywords: Image authentication, Tamper detection, Tamper remedy, Watermarking
Year: 2010
Month: June
Pages: 1705 - 1715