Abstract
Watermarking techniques are widely used for image authentication and copyright protection. Weaknesses of the "A novel CRT-based watermarking technique for authentication of multimedia contents," [12] are analyzed in this study. 4 attacks are proposed to analysis of this method. These attacks are most significant bits, modulo number, tamper detection probability calculation and algorithm analysis attacks. The proposed attacks clearly show that the crt-based method is a data hiding method but this method is not used as image authentication method. The title of presented method in Ref. [12] include "authentication" but the authors of Ref. [12] evaluated their method in view of copyright protection. The fragile watermarking methods for image authentication should consist of watermark generation, watermark embedding, watermark extraction and tamper detection but Ref. [12] has no watermark generation, tamper detection and tampered area localization algorithms. The proposed attacks are demonstrated that Ref. [12] cannot be utilized as an image authentication method and Ref. [12] is not effectively coded.
Cite
CITATION STYLE
TUNCER, T. (2018). Analysis of CRT-based Watermarking Technique for Authentication of Multimedia Content. International Journal of Computer Network and Information Security, 10(6), 60–67. https://doi.org/10.5815/ijcnis.2018.06.06
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.