Skip to main content

Advertisement

Log in

Ambiguity attacks on SVD audio watermarking approach using chaotic encrypted images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we study the robustness of the proposed watermarking algorithm by Al-Nuaimy et al. (Digit Signal Process 21(6):764–779 2011) for audio signals which is based on singular value decomposition (SVD). It has been concluded that it is fundamentally flawed in its design, in that it falls to two ambiguity attacks where the extracted watermark is not the embedded one but determined by the reference watermark. In the first attack, when a watermarked audio signal is rewatermarked by an attacker’s watermark, this one can be easily extracted to claim ownership of the original audio signal. In the second attack, during the extracting process when an attacker uses the singular vectors of his watermark, he can extract the attacker’s watermark. Therefore, he can claim ownership of the watermarked audio signal. The experimental results prove that the proposed attacks create a false positive detection in watermark extraction. Therefore, Al-Nuaimy et al. algorithm cannot be used for security systems, data hiding and copyright protection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. Massachusetts Institute of Technology, Sound Media MIT, https://sound.media.mit.edu/media.php.

  2. Only 65536 samples of each audio signal is considered in simulation

References

  1. Abdallah HA, Ghazy RA, Kasban H, Faragallah OS, Shaalan AA, Hadhoud MM, Dessouky MI, El-Fishawy NA, Alshebeili SA, El-Samie FEA (2014) Homomorphic image watermarking with a singular value decomposition algorithms. Inf Process Manag 50(6):909–923

    Google Scholar 

  2. Al-Nuaimy W, El-Bendary MA, Shafikb A, Shawki F, Abou-El-Azm A, El-Fishawy N, Elhalafawy SM, Diab SM, Sallam BM, El-Samie FEA, Kazemian H (2011) An SVD audio watermarking approach using chaotic encrypted images. Digit Signal Process 21(6):764–779

    Google Scholar 

  3. Attari AA, Shirazi AAB (2018) Robust audio watermarking algorithm based on DWT using Fibonacci numbers. Multimed Tools Applic 77(19):25607–25627

    Google Scholar 

  4. Charfeddine M, El’Arbi M, Amar CB (2014) A new DCT audio watermarking scheme based on preliminary MP3. Multimed Tools Appl 70(3):1521–1557

    Google Scholar 

  5. Dogan S, Tuncer T, Avci E, Gulten A (2011) A robust color image watermarking with singular value decomposition method. Adv Eng Softw 42(6):336–346

    Google Scholar 

  6. El-Gazar S, Abbas AM, El-Dolil S, El-Dokany IM, Dessouky MI, El-Rabaie E-SM, El-Samie FEA (2018) Efficient SVD speech watermarking with encrypted images. Int J Speech Technol 21(4):953–965

    Google Scholar 

  7. Fallahpour M, Megias D (2012) High capacity robust audio watermarking scheme based on fft and linear regression. Int J Innov Comput Inf Control 8(4):2477–2489

    Google Scholar 

  8. Gourrame K, Douzi H, Harba R, Riad R, Ros F, Amar M, Elhajji M (2019) A zero-bit Fourier image watermarking for print-cam process. Multimed Tools Applic 78(2):2621–2638

    Google Scholar 

  9. Guo J-M (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent 25(5):1149–1163

    Google Scholar 

  10. Guo J-M, Prasetyo H (2014) Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. Int J Electron Commun 68(9):816–834

    Google Scholar 

  11. Hannoun K, Hamiche H, Lahdir M, Laghrouche M, Kassim S (2018) A novel DWT domain watermarking scheme based on a discrete-time chaotic system. IFAC PapersOnLine 51(33):50–55

    Google Scholar 

  12. Lai C-C (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digital Signal Process 21(4):522–527

    Google Scholar 

  13. Lai C-C (2013) Corrigendum to “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm”. Digital Signal Process 23(4):1333

    Google Scholar 

  14. Li S, Zhang X (2019) Towards construction based data hiding: from secrets to fingerprint images. IEEE Trans Image Process 28(3):1482–1497

    MathSciNet  Google Scholar 

  15. Li J-F, Wang H-X, Wu T, Sun X-M, Qian Q (2018) Norm ratio-based audio watermarking scheme in DWT domain. Multimed Tools Applic 77(12):14481–14497

    Google Scholar 

  16. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform. Multimed Tools Appl 76 (20):20739–20753

    Google Scholar 

  17. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156

    Google Scholar 

  18. Liao X, Guo S, Yin J, Li HWX, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10033–10050

    Google Scholar 

  19. Liu R, Tan T (2002) A SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121–128

    Google Scholar 

  20. Liu X, Wu Y, Shao Z, Wu J, Shu H (2018) Color image watermarking using a discrete trinion fourier transform. J Electron Imag 27(4):14

    Google Scholar 

  21. Liu J, Li J, Ma J, Sadiq N, Bhatti UA, Ai Y (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon Map. Appl Sci 9(4):23

    Google Scholar 

  22. Loukhaoukha K (2013) Comments on “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm”. Digit Signal Process 23 (4):1334

    Google Scholar 

  23. Loukhaoukha K, Chouinard J-Y (2010) On the security of ownership watermarking of digital images based on SVD decomposition. J Electr Imag 19(1):013007,9

    Google Scholar 

  24. Loukhaoukha K, Nabti M, Zebbiche K (2014) A robust SVD-based image watermarking using a multi-objective particle swarm optimization. Opto-Electron Rev 22(1):45–54

    Google Scholar 

  25. Loukhaoukha K, Refaey A, Zebbiche K (2016) Comments “On a robust color image watermarking with singular value decomposition method”. Adv Eng Softw 93C (3):44–46

    Google Scholar 

  26. Loukhaoukha K, Refaey A, Zebbiche K (2017) Ambiguity attacks on robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. J Electr Syst Inf Technol 4(3):359–368

    Google Scholar 

  27. Loukhaoukha K, Refaey A, Zebbiche K, Shami A (2018) Efficient and secure cryptosystem for fingerprint images in wavelet domain. Multimed Tools Appl 77 (8):9325–9339

    Google Scholar 

  28. Makbol NM, Khoo BE, Rassem TH, Loukhaoukha K (2017) A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inform Sci 417(4):381–400

    Google Scholar 

  29. Makbol NM, Khoo BE, Rassem TH (2018) Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain. Multimed Tools Applic 77(20):26845–26879

    Google Scholar 

  30. Moosazadeh M, Ekbatanifard G (2019) A new DCT-based robust image watermarking method using teaching-learning-Based optimization. J Inf Secur Applic 47:28–38

    Google Scholar 

  31. Muhammad N, Bibi N, Qasim I, Jahangir A, Mahmood Z (2018) Digital watermarking using Hall property image decomposition method. Pattern Anal Applic 21(4):997–1012

    MathSciNet  Google Scholar 

  32. Musrrat A, Ahn CW (2015) Comments on “Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm”. Expert Syst Appl 42(5):2392–2394

    Google Scholar 

  33. Najafi E, Loukhaoukha K (2019) Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform. J Inf Secur Appl 44(1):144–156

    Google Scholar 

  34. Nouioua I, Amardjia N, Belilita S (2018) A novel blind and robust video watermarking technique in fast motion frames based on SVD and MR-SVD. Secur Commun Netw 2018:17

    Google Scholar 

  35. Ouyang J, Coatrieux G, Chen B, Shu H (2015) Color image watermarking based on quaternion fourier transform and improved uniform log-polar mapping. Comput Electr Eng 46:419–432

    Google Scholar 

  36. Run R-S, Horng S-J, Lai J-L, Kao T-W, Chen R-J (2012) An improved SVD based watermarking technique for copyright protection. Expert Syst Appl 39 (1):673–689

    Google Scholar 

  37. Rykaczewski R (2007) Comments on “an SVD-based watermarking scheme for protecting rightful ownership”. IEEE Trans Multimed 9(2):421–423

    Google Scholar 

  38. Shivani JLD, Senapati RK (2017) Robust image embedded watermarking using DCT and listless SPIHT. Fut Int 9(3):16

    Google Scholar 

  39. Tao J, Li S, Zhang X, Wang Z (2019) Towards robust image steganography. IEEE Trans Circ Syst Video Technol 29(2):594–600

    Google Scholar 

  40. Yavuz E, Telatar Z (2013) Comments on “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm”. Digital Signal Process 23 (4):1335–1336

    Google Scholar 

  41. Zhang XP, Li K (2005) Comments on “an SVD-based watermarking scheme for protecting rightful ownership”. IEEE Trans Multimed 7(3):593–594

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khaled Loukhaoukha.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mehallegue, N., Loukhaoukha, K., Zebbiche, K. et al. Ambiguity attacks on SVD audio watermarking approach using chaotic encrypted images. Multimed Tools Appl 79, 2031–2045 (2020). https://doi.org/10.1007/s11042-019-08271-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08271-z

Keywords

Navigation