Abstract
Recently, digital watermarking has become an important technique to preserve patients’ privacy in telemedicine applications. Since, medical information are highly sensitive, security of watermarked medical images becomes a critical issue in telemedicine applications. In this paper, two targeted attacks have been proposed against a key based color image watermarking scheme and also a non-key based one, in order to evaluate their security in telemedicine applications. The target schemes are SVD-based and QR-based color image watermarking algorithms, which their embedding procedures are quit the same. The proposed attacks exploit the prior knowledge of the watermarking algorithms to make changes in the exact embedding spaces. Thus, these changes would cause disruption in extraction procedure. Our experimental results show that the key based watermarking scheme is more secure than the non-key based one. This is because the proposed targeted attack needs to distort the key based watermarked images more than non-key based ones to remove the embedded watermarks. Our proposed targeted attacks also have more efficient performance in removing watermarks than other general attacks such as JPEG compression, Gaussian noise and etc. Finally, these attacks have been proposed to show the vulnerabilities of watermarking schemes in order to help the designers to implement more secure schemes.
Similar content being viewed by others
Notes
Singular Value Decomposition
Structural Similarity Index
Normalized Cross Correlation
References
Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik-Int J Light Electron Optics 125(1):428–434
Baker K (2005) Singular value decomposition tutorial. The Ohio State University
Calagna M, Guo H, Mancini LV, Jajodia S (2006) A robust watermarking system based on SVD compression. Proc 2006 ACM Sym Appl Comput, ACM: 1341–1347
Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography, Morgan Kaufmann
Huang F, Guan ZH (2004) A hybrid SVD-DCT watermarking method based on LPSNR. Pattern Recogn Lett 25(15):1769–1775
Lai CC (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284(4):938–944
Ling HC, Phan RC-W, Heng SH (2011) "On the security of a hybrid SVD-DCT watermarking method based on LPSNR," advances in image and video technology. Springer, Berlin Heidelberg, pp 257–266
Loukhaoukha K, Refaey A, Zebbiche K, Nabti M (2015) On the security of robust image watermarking algorithm based on discrete wavelet transform, discrete cosine transform and singular value decomposition. Int J Appl Math Info Sci: 1159–1166
Makbol NM, Khoo BE (2013) Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int J Electron Commun 67(2):102–112
Meerwald P, Koidl C, Uhl A (2009) Attack on “watermarking method based on significant difference of wavelet coefficient quantization”. IEEE Trans Multimed 11(5):1037–1041
Mehta R, Rajpal N (2013) A hybrid semi-blind gray scale image watermarking algorithm based on DWT-SVD using human visual system model. Contemp Comput (IC3), 2013 Sixth Int Conf. IEEE
Mehta S, Nallusamy R, Marawar RV, Prabhakaran B (2013) A study of DWT and SVD based watermarking algorithms for patient privacy in medical images. Healthcare Info (ICHI), 2013 IEEE Int Conf. IEEE
Mohan BC, Kumar S (2008) A robust image watermarking scheme using singular value decomposition. J Multimed 3(1):7–15
Nikbakht P, Mahdavi M (2015) Targeted watermark removal of a SVD-based image. IKT2015 7th Int Conf Info Knowledge Technol, IEEE
Nikbakht P, Mahdavi M (2015) Targeted dewatermarking of two non-blind SVD-based image watermarking schemes. Comput Knowledge Eng (ICCKE), 2015 5th Int Conf. IEEE
Pomponiu V, Cavagnino D (2011) Security analysis of SVD-based watermarking techniques. Int J Multimed Intell Sec 2(2):120–145
Rey C, Doërr G, Csurka G, Dugelay JL (2002) Toward generic image dewatermarking. Image Process. 2002. Proc. 2002 Int Conf IEEE 3
Rezazadeh S, Yazdi M (2006) A nonoblivious image watermarking system based on singular value decomposition and texture segmentation. Proc World Acad Sci, Eng Technol 13
Sadicoff M, Petrie MML (2004) .Digital watermark survey and classification. Sec LACCEI Int Latin Am Caribbean Conf Eng Technol
C. Song, S. Sudirman, M. Merabti and D. Llewellyn-Jones, (2010) Analysis of digital image watermark attacks. Consum Commun Netw Conf (CCNC), 2010 7th IEEE. IEEE
Song W, Hou JJ, Li ZH, Huang L (2011) Chaotic system and QR factorization based robust digital image watermarking algorithm. J Cent S Univ Technol 18:116–124
Su Q, Niu Y, Zou H, Liu X (2013) A blind dual color images watermarking based on singular value decomposition. Appl Math Comput 219(16):8455–8466
Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94:219–235
Sun S, Song W, Cong W (2009) DPCC and QR factorization-based color medical image authentication algorithm. Image Anal Signal Process, 2009. IASP 2009. Int Conf. IEEE
Voloshynovskiy S, Pereira S, Pun T, Eggers JJ, Su JK (2001) Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. Commun Mag, IEEE 39(8):118–126
Zhou X, Ma J, Du W (2013) SoW: a hybrid DWT-SVD based secured image watermarking. Sensor Netw Sec Technol Privacy Commun Syst (SNS & PCS), 2013 Int Conf. IEEE
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bideh, P.N., Mahdavi, M., Borujeni, S.E. et al. Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications. Multimed Tools Appl 77, 31713–31735 (2018). https://doi.org/10.1007/s11042-018-6218-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6218-8