首页 | 本学科首页   官方微博 | 高级检索  
     


Ambiguity attacks on SVD audio watermarking approach using chaotic encrypted images
Authors:Mehallegue  Noureddine  Loukhaoukha  Khaled  Zebbiche  Khalil  Refaey  Ahmed  Djellab  Mourad
Affiliation:1.Development Research Center, Algiers, Algeria
;2.School of Electronics, Electrical Engineering and Computer Science, Queen’s University, Belfast, UK
;3.Department of Electrical and Computer Engineering, Laval University, Quebec, Canada
;4.Electrical and Computer Engineering Department, Manhattan College, Riverdale, NY, USA
;5.Institut National de Criminalistique et de Criminologie (INCC-GN), Bouchaoui, Algiers, Algeria
;
Abstract:

In this paper, we study the robustness of the proposed watermarking algorithm by Al-Nuaimy et al. (Digit Signal Process 21(6):764–779 2011) for audio signals which is based on singular value decomposition (SVD). It has been concluded that it is fundamentally flawed in its design, in that it falls to two ambiguity attacks where the extracted watermark is not the embedded one but determined by the reference watermark. In the first attack, when a watermarked audio signal is rewatermarked by an attacker’s watermark, this one can be easily extracted to claim ownership of the original audio signal. In the second attack, during the extracting process when an attacker uses the singular vectors of his watermark, he can extract the attacker’s watermark. Therefore, he can claim ownership of the watermarked audio signal. The experimental results prove that the proposed attacks create a false positive detection in watermark extraction. Therefore, Al-Nuaimy et al. algorithm cannot be used for security systems, data hiding and copyright protection.

Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号