Counterfeiting attacks on block-wise dependent fragile watermarking schemes

H Nyeem, W Boles, C Boyd - … of the 6th International Conference on …, 2013 - dl.acm.org
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile
watermarking schemes. We consider vulnerabilities such as the exploitation of a weak …

Image content dependent semi-fragile watermarking with localized tamper detection

S Hosseini, M Mahdavi - arXiv preprint arXiv:2106.14150, 2021 - arxiv.org
Content-independent watermarks and block-wise independency can be considered as
vulnerabilities in semi-fragile watermarking methods. In this paper to achieve the objectives …

Cryptanalysis of an improved fragile watermarking scheme

D Caragata, JA Mucarquer, M Koscina… - AEU-International Journal …, 2016 - Elsevier
This paper presents two attacks on Teng et al.'s fragile watermarking algorithm. Both attacks
allow the attacker to apply valid watermarks on tampered images, therefore rendering the …

[PDF][PDF] An improved secure semi-fragile watermarking based on LBP and Arnold transform

H Zhang, C Wang, X Zhou - Journal of Information Processing …, 2017 - koreascience.kr
In this paper, we analyze a recently proposed semi-fragile watermarking scheme based on
local binary pattern (LBP) operators, and note that it has a fundamental flaw in the design. In …

A quadratic-residue-based fragile watermarking scheme

CC Chang, KN Chen, ZH Wang… - 2009 ISECS International …, 2009 - ieeexplore.ieee.org
A new fragile watermarking scheme for image authentication and location of areas that have
been tampered with is proposed in this paper. Based on a quadratic-residue theorem, the …

Block-chain based fragile watermarking scheme with superior localization

HJ He, JS Zhang, HM Tai - … Hiding: 10th International Workshop, IH 2008 …, 2008 - Springer
This paper proposes a block-chain based fragile watermarking scheme to address the issue
of security and accuracy of tamper localization. The relationship between the security …

[PDF][PDF] Public-key inter-block dependence fragile watermarking for image authentication using continued fraction

CC Chang, WC Wu, YC Hu - INFORMATICA-LJUBLJANA-, 2004 - informatica.si
In this paper, a novel fragile watermarking scheme based on the continued fraction
technique is proposed. The goal of this scheme is to verify the integrity of a watermarked …

Fragile watermarking based on robust hidden information

XP Zhang, SZ Wang - Journal of Shanghai University (English Edition), 2003 - Springer
Block-wise fragile watermarks can be used to reveal maliciously tampered areas in
multimedia products. However a forged content containing a cloned fragile watermark can …

A secure image authentication scheme based on dual fragile watermark

X Gong, L Chen, F Yu, X Zhao, S Wang - Multimedia Tools and …, 2020 - Springer
Both security and tamper localization are essential for fragile watermarking techniques.
Embedded fragile watermark should be sensitive enough to cover images. But high …

One-dimensional neighborhood forming strategy for fragile watermarking

CT Li, FM Yang - Journal of Electronic Imaging, 2003 - spiedigitallibrary.org
It is recognized that block-wise dependence is a key requirement for fragile watermarking
schemes to thwart vector quantization attack. It has also been proved that dependence with …