Cryptanalysis and Improvement of a Digital Watermarking Scheme Using Chaotic Map

Cryptanalysis and Improvement of a Digital Watermarking Scheme Using Chaotic Map

Musheer Ahmad, Hamed D. AlSharari
Copyright: © 2018 |Volume: 5 |Issue: 4 |Pages: 13
ISSN: 2334-4598|EISSN: 2334-4601|EISBN13: 9781522547044|DOI: 10.4018/IJRSDA.2018100104
Cite Article Cite Article

MLA

Ahmad, Musheer, and Hamed D. AlSharari. "Cryptanalysis and Improvement of a Digital Watermarking Scheme Using Chaotic Map." IJRSDA vol.5, no.4 2018: pp.61-73. http://doi.org/10.4018/IJRSDA.2018100104

APA

Ahmad, M. & AlSharari, H. D. (2018). Cryptanalysis and Improvement of a Digital Watermarking Scheme Using Chaotic Map. International Journal of Rough Sets and Data Analysis (IJRSDA), 5(4), 61-73. http://doi.org/10.4018/IJRSDA.2018100104

Chicago

Ahmad, Musheer, and Hamed D. AlSharari. "Cryptanalysis and Improvement of a Digital Watermarking Scheme Using Chaotic Map," International Journal of Rough Sets and Data Analysis (IJRSDA) 5, no.4: 61-73. http://doi.org/10.4018/IJRSDA.2018100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In the recent past, a new statistically efficient digital image watermarking scheme based on chaotic map was proposed. The authors of this watermarking scheme claimed under study that their scheme is efficient, secure, and highly robust against various attacks. However, the security analysis of the scheme unveils that it has serious inherent flaws. In this article, the shortcomings of the proposed watermarking scheme and cryptanalysis are presented to demonstrate that the scheme is not secure against the proposed attacks. Specifically, with the chosen host image and chosen watermarks, we can successfully recover the watermark from received watermarked image without having any knowledge of the secret key. The simulation analysis of the proposed cryptanalysis is provided to exemplify the proposed attack and lack of security of the anticipated watermarking scheme. In addition, an improved version is proposed to enhance the security performance of the watermarking scheme against possible attacks. The improved scheme tends to hold against attacks and statistical efficiency.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.