Abstract
In this paper, we study the robustness of the proposed watermarking algorithm by Al-Nuaimy et al. (Digit Signal Process 21(6):764–779 2011) for audio signals which is based on singular value decomposition (SVD). It has been concluded that it is fundamentally flawed in its design, in that it falls to two ambiguity attacks where the extracted watermark is not the embedded one but determined by the reference watermark. In the first attack, when a watermarked audio signal is rewatermarked by an attacker’s watermark, this one can be easily extracted to claim ownership of the original audio signal. In the second attack, during the extracting process when an attacker uses the singular vectors of his watermark, he can extract the attacker’s watermark. Therefore, he can claim ownership of the watermarked audio signal. The experimental results prove that the proposed attacks create a false positive detection in watermark extraction. Therefore, Al-Nuaimy et al. algorithm cannot be used for security systems, data hiding and copyright protection.
Similar content being viewed by others
Notes
Massachusetts Institute of Technology, Sound Media MIT, https://sound.media.mit.edu/media.php.
Only 65536 samples of each audio signal is considered in simulation
References
Abdallah HA, Ghazy RA, Kasban H, Faragallah OS, Shaalan AA, Hadhoud MM, Dessouky MI, El-Fishawy NA, Alshebeili SA, El-Samie FEA (2014) Homomorphic image watermarking with a singular value decomposition algorithms. Inf Process Manag 50(6):909–923
Al-Nuaimy W, El-Bendary MA, Shafikb A, Shawki F, Abou-El-Azm A, El-Fishawy N, Elhalafawy SM, Diab SM, Sallam BM, El-Samie FEA, Kazemian H (2011) An SVD audio watermarking approach using chaotic encrypted images. Digit Signal Process 21(6):764–779
Attari AA, Shirazi AAB (2018) Robust audio watermarking algorithm based on DWT using Fibonacci numbers. Multimed Tools Applic 77(19):25607–25627
Charfeddine M, El’Arbi M, Amar CB (2014) A new DCT audio watermarking scheme based on preliminary MP3. Multimed Tools Appl 70(3):1521–1557
Dogan S, Tuncer T, Avci E, Gulten A (2011) A robust color image watermarking with singular value decomposition method. Adv Eng Softw 42(6):336–346
El-Gazar S, Abbas AM, El-Dolil S, El-Dokany IM, Dessouky MI, El-Rabaie E-SM, El-Samie FEA (2018) Efficient SVD speech watermarking with encrypted images. Int J Speech Technol 21(4):953–965
Fallahpour M, Megias D (2012) High capacity robust audio watermarking scheme based on fft and linear regression. Int J Innov Comput Inf Control 8(4):2477–2489
Gourrame K, Douzi H, Harba R, Riad R, Ros F, Amar M, Elhajji M (2019) A zero-bit Fourier image watermarking for print-cam process. Multimed Tools Applic 78(2):2621–2638
Guo J-M (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent 25(5):1149–1163
Guo J-M, Prasetyo H (2014) Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. Int J Electron Commun 68(9):816–834
Hannoun K, Hamiche H, Lahdir M, Laghrouche M, Kassim S (2018) A novel DWT domain watermarking scheme based on a discrete-time chaotic system. IFAC PapersOnLine 51(33):50–55
Lai C-C (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digital Signal Process 21(4):522–527
Lai C-C (2013) Corrigendum to “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm”. Digital Signal Process 23(4):1333
Li S, Zhang X (2019) Towards construction based data hiding: from secrets to fingerprint images. IEEE Trans Image Process 28(3):1482–1497
Li J-F, Wang H-X, Wu T, Sun X-M, Qian Q (2018) Norm ratio-based audio watermarking scheme in DWT domain. Multimed Tools Applic 77(12):14481–14497
Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform. Multimed Tools Appl 76 (20):20739–20753
Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156
Liao X, Guo S, Yin J, Li HWX, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10033–10050
Liu R, Tan T (2002) A SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121–128
Liu X, Wu Y, Shao Z, Wu J, Shu H (2018) Color image watermarking using a discrete trinion fourier transform. J Electron Imag 27(4):14
Liu J, Li J, Ma J, Sadiq N, Bhatti UA, Ai Y (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon Map. Appl Sci 9(4):23
Loukhaoukha K (2013) Comments on “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm”. Digit Signal Process 23 (4):1334
Loukhaoukha K, Chouinard J-Y (2010) On the security of ownership watermarking of digital images based on SVD decomposition. J Electr Imag 19(1):013007,9
Loukhaoukha K, Nabti M, Zebbiche K (2014) A robust SVD-based image watermarking using a multi-objective particle swarm optimization. Opto-Electron Rev 22(1):45–54
Loukhaoukha K, Refaey A, Zebbiche K (2016) Comments “On a robust color image watermarking with singular value decomposition method”. Adv Eng Softw 93C (3):44–46
Loukhaoukha K, Refaey A, Zebbiche K (2017) Ambiguity attacks on robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. J Electr Syst Inf Technol 4(3):359–368
Loukhaoukha K, Refaey A, Zebbiche K, Shami A (2018) Efficient and secure cryptosystem for fingerprint images in wavelet domain. Multimed Tools Appl 77 (8):9325–9339
Makbol NM, Khoo BE, Rassem TH, Loukhaoukha K (2017) A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inform Sci 417(4):381–400
Makbol NM, Khoo BE, Rassem TH (2018) Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain. Multimed Tools Applic 77(20):26845–26879
Moosazadeh M, Ekbatanifard G (2019) A new DCT-based robust image watermarking method using teaching-learning-Based optimization. J Inf Secur Applic 47:28–38
Muhammad N, Bibi N, Qasim I, Jahangir A, Mahmood Z (2018) Digital watermarking using Hall property image decomposition method. Pattern Anal Applic 21(4):997–1012
Musrrat A, Ahn CW (2015) Comments on “Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm”. Expert Syst Appl 42(5):2392–2394
Najafi E, Loukhaoukha K (2019) Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform. J Inf Secur Appl 44(1):144–156
Nouioua I, Amardjia N, Belilita S (2018) A novel blind and robust video watermarking technique in fast motion frames based on SVD and MR-SVD. Secur Commun Netw 2018:17
Ouyang J, Coatrieux G, Chen B, Shu H (2015) Color image watermarking based on quaternion fourier transform and improved uniform log-polar mapping. Comput Electr Eng 46:419–432
Run R-S, Horng S-J, Lai J-L, Kao T-W, Chen R-J (2012) An improved SVD based watermarking technique for copyright protection. Expert Syst Appl 39 (1):673–689
Rykaczewski R (2007) Comments on “an SVD-based watermarking scheme for protecting rightful ownership”. IEEE Trans Multimed 9(2):421–423
Shivani JLD, Senapati RK (2017) Robust image embedded watermarking using DCT and listless SPIHT. Fut Int 9(3):16
Tao J, Li S, Zhang X, Wang Z (2019) Towards robust image steganography. IEEE Trans Circ Syst Video Technol 29(2):594–600
Yavuz E, Telatar Z (2013) Comments on “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm”. Digital Signal Process 23 (4):1335–1336
Zhang XP, Li K (2005) Comments on “an SVD-based watermarking scheme for protecting rightful ownership”. IEEE Trans Multimed 7(3):593–594
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mehallegue, N., Loukhaoukha, K., Zebbiche, K. et al. Ambiguity attacks on SVD audio watermarking approach using chaotic encrypted images. Multimed Tools Appl 79, 2031–2045 (2020). https://doi.org/10.1007/s11042-019-08271-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08271-z