Security evaluation of generalized patchwork algorithm, from cryptanalytic viewpoint

Tanmoy Kanti Das, Hyoung Joong Kim, Subhamoy Maitra

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In this paper we present a cryptanalysis of the generalized patchwork algorithm under the assumption that the attacker possesses only a single copy of the watermarked image. In the scheme, watermark is inserted by modifying randomly chosen DCT values in each block of the original image. Towards the attack we first fit low degree polynomials (which minimize the mean square error) on the data available from each block of the watermarked content. Then we replace the corresponding DCT data of the attacked image by the available data from the polynomials to construct an attacked image. The technique nullifies the modification achieved during watermark embedding. Experimental results show that recovery of the watermark becomes difficult after the attack.

Original languageEnglish
Title of host publicationKnowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Proceedings
PublisherSpringer Verlag
Pages1240-1247
Number of pages8
ISBN (Print)3540288945, 9783540288947
DOIs
Publication statusPublished - 2005
Event9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005 - Melbourne, Australia
Duration: 2005 Sep 142005 Sep 16

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3681 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005
CountryAustralia
CityMelbourne
Period05/9/1405/9/16

Keywords

  • Cryptanalysis
  • Digital Watermarking
  • Discrete Cosine Transform
  • Information Security
  • Multimedia Systems

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Security evaluation of generalized patchwork algorithm, from cryptanalytic viewpoint'. Together they form a unique fingerprint.

  • Cite this

    Das, T. K., Kim, H. J., & Maitra, S. (2005). Security evaluation of generalized patchwork algorithm, from cryptanalytic viewpoint. In Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Proceedings (pp. 1240-1247). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3681 LNAI). Springer Verlag. https://doi.org/10.1007/11552413_177