H Nyeem, W Boles, C Boyd - Proceedings of the 6th International …, 2013 - eprints.qut.edu.au
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile
watermarking schemes. We consider vulnerabilities such as the exploitation of a weak …