Security evaluation of generalized patchwork algorithm, from cryptanalytic viewpoint

Tanmoy Kanti Das, Hyong Joong Kim, Subhamoy Maitra

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In this paper we present a cryptanalysis of the generalized patchwork algorithm under the assumption that the attacker possesses only a single copy of the watermarked image. In the scheme, watermark is inserted by modifying randomly chosen DCT values in each block of the original image. Towards the attack we first fit low degree polynomials (which minimize the mean square error) on the data available from each block of the watermarked content. Then we replace the corresponding DCT data of the attacked image by the available data from the polynomials to construct an attacked image. The technique nullifies the modification achieved during watermark embedding. Experimental results show that recovery of the watermark becomes difficult after the attack.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages1240-1247
Number of pages8
Volume3681 LNAI
Publication statusPublished - 2005
Externally publishedYes
Event9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005 - Melbourne, Australia
Duration: 2005 Sep 142005 Sep 16

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3681 LNAI
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005
CountryAustralia
CityMelbourne
Period05/9/1405/9/16

Fingerprint

Watermark
Polynomials
Evaluation
Mean square error
Attack
Recovery
Polynomial
Cryptanalysis
Minimise
Experimental Results

Keywords

  • Cryptanalysis
  • Digital Watermarking
  • Discrete Cosine Transform
  • Information Security
  • Multimedia Systems

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Das, T. K., Kim, H. J., & Maitra, S. (2005). Security evaluation of generalized patchwork algorithm, from cryptanalytic viewpoint. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3681 LNAI, pp. 1240-1247). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3681 LNAI).

Security evaluation of generalized patchwork algorithm, from cryptanalytic viewpoint. / Das, Tanmoy Kanti; Kim, Hyong Joong; Maitra, Subhamoy.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3681 LNAI 2005. p. 1240-1247 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3681 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Das, TK, Kim, HJ & Maitra, S 2005, Security evaluation of generalized patchwork algorithm, from cryptanalytic viewpoint. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 3681 LNAI, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3681 LNAI, pp. 1240-1247, 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005, Melbourne, Australia, 05/9/14.
Das TK, Kim HJ, Maitra S. Security evaluation of generalized patchwork algorithm, from cryptanalytic viewpoint. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3681 LNAI. 2005. p. 1240-1247. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Das, Tanmoy Kanti ; Kim, Hyong Joong ; Maitra, Subhamoy. / Security evaluation of generalized patchwork algorithm, from cryptanalytic viewpoint. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3681 LNAI 2005. pp. 1240-1247 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{b3d8a413f473496ebbf89176c518d308,
title = "Security evaluation of generalized patchwork algorithm, from cryptanalytic viewpoint",
abstract = "In this paper we present a cryptanalysis of the generalized patchwork algorithm under the assumption that the attacker possesses only a single copy of the watermarked image. In the scheme, watermark is inserted by modifying randomly chosen DCT values in each block of the original image. Towards the attack we first fit low degree polynomials (which minimize the mean square error) on the data available from each block of the watermarked content. Then we replace the corresponding DCT data of the attacked image by the available data from the polynomials to construct an attacked image. The technique nullifies the modification achieved during watermark embedding. Experimental results show that recovery of the watermark becomes difficult after the attack.",
keywords = "Cryptanalysis, Digital Watermarking, Discrete Cosine Transform, Information Security, Multimedia Systems",
author = "Das, {Tanmoy Kanti} and Kim, {Hyong Joong} and Subhamoy Maitra",
year = "2005",
language = "English",
isbn = "3540288945",
volume = "3681 LNAI",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "1240--1247",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Security evaluation of generalized patchwork algorithm, from cryptanalytic viewpoint

AU - Das, Tanmoy Kanti

AU - Kim, Hyong Joong

AU - Maitra, Subhamoy

PY - 2005

Y1 - 2005

N2 - In this paper we present a cryptanalysis of the generalized patchwork algorithm under the assumption that the attacker possesses only a single copy of the watermarked image. In the scheme, watermark is inserted by modifying randomly chosen DCT values in each block of the original image. Towards the attack we first fit low degree polynomials (which minimize the mean square error) on the data available from each block of the watermarked content. Then we replace the corresponding DCT data of the attacked image by the available data from the polynomials to construct an attacked image. The technique nullifies the modification achieved during watermark embedding. Experimental results show that recovery of the watermark becomes difficult after the attack.

AB - In this paper we present a cryptanalysis of the generalized patchwork algorithm under the assumption that the attacker possesses only a single copy of the watermarked image. In the scheme, watermark is inserted by modifying randomly chosen DCT values in each block of the original image. Towards the attack we first fit low degree polynomials (which minimize the mean square error) on the data available from each block of the watermarked content. Then we replace the corresponding DCT data of the attacked image by the available data from the polynomials to construct an attacked image. The technique nullifies the modification achieved during watermark embedding. Experimental results show that recovery of the watermark becomes difficult after the attack.

KW - Cryptanalysis

KW - Digital Watermarking

KW - Discrete Cosine Transform

KW - Information Security

KW - Multimedia Systems

UR - http://www.scopus.com/inward/record.url?scp=33745323216&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745323216&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33745323216

SN - 3540288945

SN - 9783540288947

VL - 3681 LNAI

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 1240

EP - 1247

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -