Analysis of CRT-based Watermarking Technique for Authentication of Multimedia Content

  • TUNCER T
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Watermarking techniques are widely used for image authentication and copyright protection. Weaknesses of the "A novel CRT-based watermarking technique for authentication of multimedia contents," [12] are analyzed in this study. 4 attacks are proposed to analysis of this method. These attacks are most significant bits, modulo number, tamper detection probability calculation and algorithm analysis attacks. The proposed attacks clearly show that the crt-based method is a data hiding method but this method is not used as image authentication method. The title of presented method in Ref. [12] include "authentication" but the authors of Ref. [12] evaluated their method in view of copyright protection. The fragile watermarking methods for image authentication should consist of watermark generation, watermark embedding, watermark extraction and tamper detection but Ref. [12] has no watermark generation, tamper detection and tampered area localization algorithms. The proposed attacks are demonstrated that Ref. [12] cannot be utilized as an image authentication method and Ref. [12] is not effectively coded.

Cite

CITATION STYLE

APA

TUNCER, T. (2018). Analysis of CRT-based Watermarking Technique for Authentication of Multimedia Content. International Journal of Computer Network and Information Security, 10(6), 60–67. https://doi.org/10.5815/ijcnis.2018.06.06

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free