S Hosseini, M Mahdavi - arXiv preprint arXiv:2106.14150, 2021 - arxiv.org
Content-independent watermarks and block-wise independency can be considered as vulnerabilities in semi-fragile watermarking methods. In this paper to achieve the objectives …
This paper presents two attacks on Teng et al.'s fragile watermarking algorithm. Both attacks allow the attacker to apply valid watermarks on tampered images, therefore rendering the …
H Zhang, C Wang, X Zhou - Journal of Information Processing …, 2017 - koreascience.kr
In this paper, we analyze a recently proposed semi-fragile watermarking scheme based on local binary pattern (LBP) operators, and note that it has a fundamental flaw in the design. In …
A new fragile watermarking scheme for image authentication and location of areas that have been tampered with is proposed in this paper. Based on a quadratic-residue theorem, the …
HJ He, JS Zhang, HM Tai - … Hiding: 10th International Workshop, IH 2008 …, 2008 - Springer
This paper proposes a block-chain based fragile watermarking scheme to address the issue of security and accuracy of tamper localization. The relationship between the security …
CC Chang, WC Wu, YC Hu - INFORMATICA-LJUBLJANA-, 2004 - informatica.si
In this paper, a novel fragile watermarking scheme based on the continued fraction technique is proposed. The goal of this scheme is to verify the integrity of a watermarked …
XP Zhang, SZ Wang - Journal of Shanghai University (English Edition), 2003 - Springer
Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can …
X Gong, L Chen, F Yu, X Zhao, S Wang - Multimedia Tools and …, 2020 - Springer
Both security and tamper localization are essential for fragile watermarking techniques. Embedded fragile watermark should be sensitive enough to cover images. But high …
CT Li, FM Yang - Journal of Electronic Imaging, 2003 - spiedigitallibrary.org
It is recognized that block-wise dependence is a key requirement for fragile watermarking schemes to thwart vector quantization attack. It has also been proved that dependence with …