On the security of chaos-based watermarking scheme for secure communication

3Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A new digital image watermarking scheme based on chaotic map was proposed to hide the sensitive information known as watermark. The authors claimed that the scheme is efficient, secure, and highly robust against various attacks. In this paper, the inherent security loopholes of the watermarking embedding and extraction processes are unveiled. The cryptanalysis of water-marking scheme is presented to demonstrate that the scheme is not robust and secure against the proposed attack. Specifically, with chosen host image and chosen watermarks, the successful recovery of securely embedded watermark from received watermarked image is possible without any knowledge of secret key. The simulation analysis of proposed cryptanalysis is provided to exemplify the proposed attack and lack of security of anticipated watermarking scheme.

Cite

CITATION STYLE

APA

Ahmad, M., & AlSharari, H. D. (2017). On the security of chaos-based watermarking scheme for secure communication. In Advances in Intelligent Systems and Computing (Vol. 515, pp. 313–321). Springer Verlag. https://doi.org/10.1007/978-981-10-3153-3_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free