Journal of Systems Engineering and Electronics ›› 2009, Vol. 31 ›› Issue (5): 1204-1208.

Previous Articles     Next Articles

Security analysis and improvement on a fragile image watermarking

SANG Jun, XIANG Hong, HU Hai-bo, FU Li, CAI Bin   

  1. School of Software Engineering, Chongqing Univ., Chongqing 400044, China
  • Received:2008-01-17 Revised:2008-02-18 Online:2009-05-20 Published:2010-01-03

Abstract: The security of a fragile digital watermarking scheme for image tamper detection and recovery is analyzed.The watermarking scheme divides an image into non-overlapping blocks,generates the authentication watermark for the blocks with comparison and parity check between the average intensities and embeds them into their own blocks.Also,the recovery information of another block is embedded into each block,which makes the scheme can resist an vector quantization(VQ) attack,while recover the image to a certain degree when some blocks are tampered.It is indicated that since the method for watermark generation and embedding is too simple,while the key space for watermark embedding is too small,the watermark-embedding key can be obtained easily with exhaustive searches.Therefore,one may counterfeit watermark and lead incorrect authentication.The security of the scheme is effectively improved by using chaotic modulation and permutation to the embedded watermark and making a expansion for the key space.

CLC Number: 

[an error occurred while processing this directive]