Ambiguity attacks on SVD audio watermarking approach using chaotic encrypted images (original) (raw)
Abstract
In this paper, we study the robustness of the proposed watermarking algorithm by Al-Nuaimy et al. (Digit Signal Process 21(6):764–779 2011) for audio signals which is based on singular value decomposition (SVD). It has been concluded that it is fundamentally flawed in its design, in that it falls to two ambiguity attacks where the extracted watermark is not the embedded one but determined by the reference watermark. In the first attack, when a watermarked audio signal is rewatermarked by an attacker’s watermark, this one can be easily extracted to claim ownership of the original audio signal. In the second attack, during the extracting process when an attacker uses the singular vectors of his watermark, he can extract the attacker’s watermark. Therefore, he can claim ownership of the watermarked audio signal. The experimental results prove that the proposed attacks create a false positive detection in watermark extraction. Therefore, Al-Nuaimy et al. algorithm cannot be used for security systems, data hiding and copyright protection.
Access this article
Subscribe and save
- Starting from 10 chapters or articles per month
- Access and download chapters and articles from more than 300k books and 2,500 journals
- Cancel anytime View plans
Buy Now
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Instant access to the full article PDF.
Similar content being viewed by others
Notes
- Only 65536 samples of each audio signal is considered in simulation
References
- Abdallah HA, Ghazy RA, Kasban H, Faragallah OS, Shaalan AA, Hadhoud MM, Dessouky MI, El-Fishawy NA, Alshebeili SA, El-Samie FEA (2014) Homomorphic image watermarking with a singular value decomposition algorithms. Inf Process Manag 50(6):909–923
Google Scholar - Al-Nuaimy W, El-Bendary MA, Shafikb A, Shawki F, Abou-El-Azm A, El-Fishawy N, Elhalafawy SM, Diab SM, Sallam BM, El-Samie FEA, Kazemian H (2011) An SVD audio watermarking approach using chaotic encrypted images. Digit Signal Process 21(6):764–779
Google Scholar - Attari AA, Shirazi AAB (2018) Robust audio watermarking algorithm based on DWT using Fibonacci numbers. Multimed Tools Applic 77(19):25607–25627
Google Scholar - Charfeddine M, El’Arbi M, Amar CB (2014) A new DCT audio watermarking scheme based on preliminary MP3. Multimed Tools Appl 70(3):1521–1557
Google Scholar - Dogan S, Tuncer T, Avci E, Gulten A (2011) A robust color image watermarking with singular value decomposition method. Adv Eng Softw 42(6):336–346
Google Scholar - El-Gazar S, Abbas AM, El-Dolil S, El-Dokany IM, Dessouky MI, El-Rabaie E-SM, El-Samie FEA (2018) Efficient SVD speech watermarking with encrypted images. Int J Speech Technol 21(4):953–965
Google Scholar - Fallahpour M, Megias D (2012) High capacity robust audio watermarking scheme based on fft and linear regression. Int J Innov Comput Inf Control 8(4):2477–2489
Google Scholar - Gourrame K, Douzi H, Harba R, Riad R, Ros F, Amar M, Elhajji M (2019) A zero-bit Fourier image watermarking for print-cam process. Multimed Tools Applic 78(2):2621–2638
Google Scholar - Guo J-M (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent 25(5):1149–1163
Google Scholar - Guo J-M, Prasetyo H (2014) Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. Int J Electron Commun 68(9):816–834
Google Scholar - Hannoun K, Hamiche H, Lahdir M, Laghrouche M, Kassim S (2018) A novel DWT domain watermarking scheme based on a discrete-time chaotic system. IFAC PapersOnLine 51(33):50–55
Google Scholar - Lai C-C (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digital Signal Process 21(4):522–527
Google Scholar - Lai C-C (2013) Corrigendum to “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm”. Digital Signal Process 23(4):1333
Google Scholar - Li S, Zhang X (2019) Towards construction based data hiding: from secrets to fingerprint images. IEEE Trans Image Process 28(3):1482–1497
MathSciNet Google Scholar - Li J-F, Wang H-X, Wu T, Sun X-M, Qian Q (2018) Norm ratio-based audio watermarking scheme in DWT domain. Multimed Tools Applic 77(12):14481–14497
Google Scholar - Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform. Multimed Tools Appl 76 (20):20739–20753
Google Scholar - Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156
Google Scholar - Liao X, Guo S, Yin J, Li HWX, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10033–10050
Google Scholar - Liu R, Tan T (2002) A SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121–128
Google Scholar - Liu X, Wu Y, Shao Z, Wu J, Shu H (2018) Color image watermarking using a discrete trinion fourier transform. J Electron Imag 27(4):14
Google Scholar - Liu J, Li J, Ma J, Sadiq N, Bhatti UA, Ai Y (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon Map. Appl Sci 9(4):23
Google Scholar - Loukhaoukha K (2013) Comments on “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm”. Digit Signal Process 23 (4):1334
Google Scholar - Loukhaoukha K, Chouinard J-Y (2010) On the security of ownership watermarking of digital images based on SVD decomposition. J Electr Imag 19(1):013007,9
Google Scholar - Loukhaoukha K, Nabti M, Zebbiche K (2014) A robust SVD-based image watermarking using a multi-objective particle swarm optimization. Opto-Electron Rev 22(1):45–54
Google Scholar - Loukhaoukha K, Refaey A, Zebbiche K (2016) Comments “On a robust color image watermarking with singular value decomposition method”. Adv Eng Softw 93C (3):44–46
Google Scholar - Loukhaoukha K, Refaey A, Zebbiche K (2017) Ambiguity attacks on robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. J Electr Syst Inf Technol 4(3):359–368
Google Scholar - Loukhaoukha K, Refaey A, Zebbiche K, Shami A (2018) Efficient and secure cryptosystem for fingerprint images in wavelet domain. Multimed Tools Appl 77 (8):9325–9339
Google Scholar - Makbol NM, Khoo BE, Rassem TH, Loukhaoukha K (2017) A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inform Sci 417(4):381–400
Google Scholar - Makbol NM, Khoo BE, Rassem TH (2018) Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain. Multimed Tools Applic 77(20):26845–26879
Google Scholar - Moosazadeh M, Ekbatanifard G (2019) A new DCT-based robust image watermarking method using teaching-learning-Based optimization. J Inf Secur Applic 47:28–38
Google Scholar - Muhammad N, Bibi N, Qasim I, Jahangir A, Mahmood Z (2018) Digital watermarking using Hall property image decomposition method. Pattern Anal Applic 21(4):997–1012
MathSciNet Google Scholar - Musrrat A, Ahn CW (2015) Comments on “Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm”. Expert Syst Appl 42(5):2392–2394
Google Scholar - Najafi E, Loukhaoukha K (2019) Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform. J Inf Secur Appl 44(1):144–156
Google Scholar - Nouioua I, Amardjia N, Belilita S (2018) A novel blind and robust video watermarking technique in fast motion frames based on SVD and MR-SVD. Secur Commun Netw 2018:17
Google Scholar - Ouyang J, Coatrieux G, Chen B, Shu H (2015) Color image watermarking based on quaternion fourier transform and improved uniform log-polar mapping. Comput Electr Eng 46:419–432
Google Scholar - Run R-S, Horng S-J, Lai J-L, Kao T-W, Chen R-J (2012) An improved SVD based watermarking technique for copyright protection. Expert Syst Appl 39 (1):673–689
Google Scholar - Rykaczewski R (2007) Comments on “an SVD-based watermarking scheme for protecting rightful ownership”. IEEE Trans Multimed 9(2):421–423
Google Scholar - Shivani JLD, Senapati RK (2017) Robust image embedded watermarking using DCT and listless SPIHT. Fut Int 9(3):16
Google Scholar - Tao J, Li S, Zhang X, Wang Z (2019) Towards robust image steganography. IEEE Trans Circ Syst Video Technol 29(2):594–600
Google Scholar - Yavuz E, Telatar Z (2013) Comments on “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm”. Digital Signal Process 23 (4):1335–1336
Google Scholar - Zhang XP, Li K (2005) Comments on “an SVD-based watermarking scheme for protecting rightful ownership”. IEEE Trans Multimed 7(3):593–594
Google Scholar
Author information
Authors and Affiliations
- Development Research Center, Algiers, Algeria
Noureddine Mehallegue, Khaled Loukhaoukha & Khalil Zebbiche - School of Electronics, Electrical Engineering and Computer Science, Queen’s University, Belfast, UK
Noureddine Mehallegue & Khalil Zebbiche - Department of Electrical and Computer Engineering, Laval University, Quebec, Canada
Khaled Loukhaoukha - Electrical and Computer Engineering Department, Manhattan College, Riverdale, NY, USA
Ahmed Refaey - Institut National de Criminalistique et de Criminologie (INCC-GN), Bouchaoui, Algiers, Algeria
Mourad Djellab
Authors
- Noureddine Mehallegue
- Khaled Loukhaoukha
- Khalil Zebbiche
- Ahmed Refaey
- Mourad Djellab
Corresponding author
Correspondence toKhaled Loukhaoukha.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mehallegue, N., Loukhaoukha, K., Zebbiche, K. et al. Ambiguity attacks on SVD audio watermarking approach using chaotic encrypted images.Multimed Tools Appl 79, 2031–2045 (2020). https://doi.org/10.1007/s11042-019-08271-z
- Received: 08 November 2018
- Revised: 05 September 2019
- Accepted: 22 September 2019
- Published: 15 November 2019
- Version of record: 15 November 2019
- Issue date: January 2020
- DOI: https://doi.org/10.1007/s11042-019-08271-z