In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer [1]. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and...
Digital watermarking has become an accepted technology for enabling multimedia protection schemes. O...
[[abstract]]In recent decades, many watermarking schemes for tamper detection and tampered image rec...
[[abstract]]Digital watermarking has been proposed to solve the ownership problem and prevent variou...
International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorith...
Abstract:- Digital copyright protection has attracted a great spectrum of studies. One of the optimi...
[[abstract]]Recently, Lu et al. proposed a fragile watermarking scheme to prevent the quantization a...
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against...
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermark...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
Although many watermarking schemes consider the case of universal verifiability, it is undesirable ...
A new fragile logo watermarking scheme is proposed for public authentication and integrity verificat...
This paper describes an effective attack on a lossless authentication watermarking scheme [Fridrich ...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
Watermarking schemes for authentication purposes are characterized by three factors: security, resol...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...
Digital watermarking has become an accepted technology for enabling multimedia protection schemes. O...
[[abstract]]In recent decades, many watermarking schemes for tamper detection and tampered image rec...
[[abstract]]Digital watermarking has been proposed to solve the ownership problem and prevent variou...
International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorith...
Abstract:- Digital copyright protection has attracted a great spectrum of studies. One of the optimi...
[[abstract]]Recently, Lu et al. proposed a fragile watermarking scheme to prevent the quantization a...
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against...
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermark...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
Although many watermarking schemes consider the case of universal verifiability, it is undesirable ...
A new fragile logo watermarking scheme is proposed for public authentication and integrity verificat...
This paper describes an effective attack on a lossless authentication watermarking scheme [Fridrich ...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
Watermarking schemes for authentication purposes are characterized by three factors: security, resol...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...
Digital watermarking has become an accepted technology for enabling multimedia protection schemes. O...
[[abstract]]In recent decades, many watermarking schemes for tamper detection and tampered image rec...
[[abstract]]Digital watermarking has been proposed to solve the ownership problem and prevent variou...