Digital watermarking
CISP '08 Proceedings of the 2008 Congress on Image and Signal Processing, Vol. 2 - Volume 02
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Hierarchical watermarking for secure image authentication with localization
IEEE Transactions on Image Processing
Hi-index | 0.00 |
In this paper, the security of a fragile digital watermarking for image tamper detection and recovery proposed in Reference 1 is analyzed. It is shown that the secret key for watermark embedding and detection can be easily obtained by exhaustive search, while keeping the number of the necessary exhaustive searches small. Therefore, one may counterfeit watermarks successfully, resulting in incorrect authentication. The possible solutions for such problems are suggested in this paper.