In this paper, we show that the recent robust watermarking scheme by Liu et al. is insecure and does not provide robustness. In particular, the embedding space where the watermark is located can be recovered, and therefore removed or overwritten. This means the scheme fails when used to provide robustness applications like proof of ownership and copyright protection. The conventional approach to judging the security of a scheme is that when it has been published for some time and yet no successful attacks exist, the scheme is taken to be a secure design; thus will be possibly implemented by researchers or the industry. It is therefore important to highlight these attacks otherwise the scheme may be implemented by people unaware that such at...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
The security of a watermarking scheme is mainly categorised as either robust or fragile. The former ...
AbstractOver the past several decades, digital information science has emerged to seek answers to th...
In most of the digital image watermarking schemes, it becomes a common practice to address security ...
[[abstract]]Recently, Lu et al. proposed a fragile watermarking scheme to prevent the quantization a...
International audienceThis paper presents yet another attempt towards robust and secure watermarking...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
We consider the security of a DWT-SVD robust watermarking scheme for images due to Ganic and Eskicio...
International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorith...
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against...
[[abstract]]With copyright protection in mind, the robustness property of a new scheme is always one...
Watermarking schemes for authentication purposes are characterized by three factors: security, resol...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
Digital image watermarking is widely used for copyright protection of digital information. The effec...
Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragil...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
The security of a watermarking scheme is mainly categorised as either robust or fragile. The former ...
AbstractOver the past several decades, digital information science has emerged to seek answers to th...
In most of the digital image watermarking schemes, it becomes a common practice to address security ...
[[abstract]]Recently, Lu et al. proposed a fragile watermarking scheme to prevent the quantization a...
International audienceThis paper presents yet another attempt towards robust and secure watermarking...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
We consider the security of a DWT-SVD robust watermarking scheme for images due to Ganic and Eskicio...
International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorith...
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against...
[[abstract]]With copyright protection in mind, the robustness property of a new scheme is always one...
Watermarking schemes for authentication purposes are characterized by three factors: security, resol...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
Digital image watermarking is widely used for copyright protection of digital information. The effec...
Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragil...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
The security of a watermarking scheme is mainly categorised as either robust or fragile. The former ...
AbstractOver the past several decades, digital information science has emerged to seek answers to th...