We consider the security of a DWT-SVD robust watermarking scheme for images due to Ganic and Eskicioglu. We show that although the scheme has been proven to be robust, it falls to ambiguity attacks, namely that both the image owner and an attacker can extract their watermarks from what appear to be originally watermarked images, causing an unresolveable dispute on the ownership claims of the image. The underlying problem is that the designers concentrated solely on robustness but overlooked the equally important issue of rightful ownership first defined by Graver et al. Without providing rightful ownership, a watermarking scheme cannot be used for proofs of ownership applications. To the best of our knowledge, these are first known attacks ...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
Digital watermarking has been proposed as a solution to the problem of copyright protection of multi...
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against...
Among emergent applications of digital watermarking are copyright protection and proof of ownership....
Two vulnerable attacks on the wavelet transform (WT) and Singular Value Decomposition (SVD) based im...
In this paper, we show that the recent robust watermarking scheme by Liu et al. is insecure and does...
Singular Value Decomposition (SVD) comprises many important mathematical properties that are useful ...
Today, we face different approaches to enhance the robustness of image watermarking schemes. Some of...
A zero-knowledge watermark detector allows an owner to prove to a verifier that an image in question...
Today, we face different approaches to enhance the robustness of image watermarking schemes. Some of...
[[abstract]]Recently, Lu et al. proposed a fragile watermarking scheme to prevent the quantization a...
International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorith...
[[abstract]]Watermarking is a data embedding technique widely used to protect rightful ownership of ...
Abstract—In a recent paper by Tan and Liu [1], a watermarking algo-rithm for digital images based on...
Although many watermarking schemes consider the case of universal verifiability, it is undesirable ...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
Digital watermarking has been proposed as a solution to the problem of copyright protection of multi...
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against...
Among emergent applications of digital watermarking are copyright protection and proof of ownership....
Two vulnerable attacks on the wavelet transform (WT) and Singular Value Decomposition (SVD) based im...
In this paper, we show that the recent robust watermarking scheme by Liu et al. is insecure and does...
Singular Value Decomposition (SVD) comprises many important mathematical properties that are useful ...
Today, we face different approaches to enhance the robustness of image watermarking schemes. Some of...
A zero-knowledge watermark detector allows an owner to prove to a verifier that an image in question...
Today, we face different approaches to enhance the robustness of image watermarking schemes. Some of...
[[abstract]]Recently, Lu et al. proposed a fragile watermarking scheme to prevent the quantization a...
International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorith...
[[abstract]]Watermarking is a data embedding technique widely used to protect rightful ownership of ...
Abstract—In a recent paper by Tan and Liu [1], a watermarking algo-rithm for digital images based on...
Although many watermarking schemes consider the case of universal verifiability, it is undesirable ...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
Digital watermarking has been proposed as a solution to the problem of copyright protection of multi...
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against...