International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorithm. Both attacksallow the attacker to apply valid watermarks on tampered images, therefore rendering thewatermarking scheme useless. The first attack uses the watermarked version of two chosenimages, and the second attack, a generalization of the first, uses a number of arbitrarywatermarked images. The paper also models the cryptanalysis process for the second attackusing Markov chains in order to demonstrate that the necessary number of images is relativelysmall for a high probability of successful attack. All the results that are presented in thispaper have been confirmed by a practical implementation
In this paper, we show that the recent robust watermarking scheme by Liu et al. is insecure and does...
[[abstract]]In a recent paper presented by Lin et al., a block-based hierarchical watermarking algor...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...
International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorith...
[[abstract]]Recently, Lu et al. proposed a fragile watermarking scheme to prevent the quantization a...
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against...
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermark...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
Part 2: WorkshopInternational audienceDue to the wide variety of attacks and the difficulties of dev...
International audiencetIn this paper a new fragile watermarking algorithm is proposed that is built ...
This paper presents two fragile watermarking schemes for digital image authentication with tamper de...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
In this paper, we describe new and improved attacks on the authentication scheme previously proposed...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
Watermarking schemes for authentication purposes are characterized by three factors: security, resol...
In this paper, we show that the recent robust watermarking scheme by Liu et al. is insecure and does...
[[abstract]]In a recent paper presented by Lin et al., a block-based hierarchical watermarking algor...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...
International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorith...
[[abstract]]Recently, Lu et al. proposed a fragile watermarking scheme to prevent the quantization a...
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against...
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermark...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
Part 2: WorkshopInternational audienceDue to the wide variety of attacks and the difficulties of dev...
International audiencetIn this paper a new fragile watermarking algorithm is proposed that is built ...
This paper presents two fragile watermarking schemes for digital image authentication with tamper de...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
In this paper, we describe new and improved attacks on the authentication scheme previously proposed...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
Watermarking schemes for authentication purposes are characterized by three factors: security, resol...
In this paper, we show that the recent robust watermarking scheme by Liu et al. is insecure and does...
[[abstract]]In a recent paper presented by Lin et al., a block-based hierarchical watermarking algor...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...