This paper describes an effective attack on a lossless authentication watermarking scheme [Fridrich et. al 2001]. Given sufficient number of pairs of stego-images and its coverimages, an attacker can obtain the data (e.g., random walk sequence, lookup table) generated from a secret key. With these data, the attacker can easily forge authentic images. The experiment demonstrates this attack is very efficient to the lossless watermarking scheme. To avoid such attack, we modify the process of lookup table generation so that the table is variable with the content of the cover-image. Keywords: Cover-image attack, lossless authentication watermarking (LAW)
[[abstract]]Digital watermarking has been proposed to solve the ownership problem and prevent variou...
In recent years, Steganography and Steganalysis are two important areas of research that involve a n...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against...
International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorith...
In this paper, we describe new and improved attacks on the authentication scheme previously proposed...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
[[abstract]]In recent decades, many watermarking schemes for tamper detection and tampered image rec...
Abstract- With the tremendous expansion of the Internet and multimedia technologies in the recent pa...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermark...
Although many watermarking schemes consider the case of universal verifiability, it is undesirable ...
This paper presents two fragile watermarking schemes for digital image authentication with tamper de...
Abstract:- Digital copyright protection has attracted a great spectrum of studies. One of the optimi...
[[abstract]]Recently, Lu et al. proposed a fragile watermarking scheme to prevent the quantization a...
[[abstract]]Digital watermarking has been proposed to solve the ownership problem and prevent variou...
In recent years, Steganography and Steganalysis are two important areas of research that involve a n...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against...
International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorith...
In this paper, we describe new and improved attacks on the authentication scheme previously proposed...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
[[abstract]]In recent decades, many watermarking schemes for tamper detection and tampered image rec...
Abstract- With the tremendous expansion of the Internet and multimedia technologies in the recent pa...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermark...
Although many watermarking schemes consider the case of universal verifiability, it is undesirable ...
This paper presents two fragile watermarking schemes for digital image authentication with tamper de...
Abstract:- Digital copyright protection has attracted a great spectrum of studies. One of the optimi...
[[abstract]]Recently, Lu et al. proposed a fragile watermarking scheme to prevent the quantization a...
[[abstract]]Digital watermarking has been proposed to solve the ownership problem and prevent variou...
In recent years, Steganography and Steganalysis are two important areas of research that involve a n...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...