A distributed detection framework for Steganalysis
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
The first 50 years of electronic watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Cellular Automata Based Authentication (CAA)
ACRI '01 Proceedings of the 5th International Conference on Cellular Automata for Research and Industry
Secure hybrid robust watermarking resistant against tampering and copy attack
Signal Processing - Special section: Security of data hiding technologies
Fragile image watermarking using a gradient image for improved localization and security
Pattern Recognition Letters
Image authentication based on digital signature and semi-fragile watermarking
Journal of Computer Science and Technology
A majority-voting based watermarking scheme for color image tamper detection and recovery
Computer Standards & Interfaces
Public Authentication of 3D Mesh Models
WI '06 Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence
The first 50 years of electronic watermarking
EURASIP Journal on Applied Signal Processing
Image content authentication using pinned sine transform
EURASIP Journal on Applied Signal Processing
Methods for image authentication: a survey
Multimedia Tools and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
Expert Systems with Applications: An International Journal
Copyright protection protocols for copyright protection issues
WSEAS Transactions on Computer Research
Block-Chain Based Fragile Watermarking Scheme with Superior Localization
Information Hiding
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Neighbor-Aided Authentication Watermarking Based on a Chaotic System with Feedback
IEICE - Transactions on Information and Systems
Quasi-commutative watermarking and encryption for secure media content distribution
Multimedia Tools and Applications
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
EURASIP Journal on Advances in Signal Processing
Improvement to a semi-fragile watermarking scheme against a proposed counterfeiting attack
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
On the security of a fragile digital image watermarking scheme
GVE '07 Proceedings of the IASTED International Conference on Graphics and Visualization in Engineering
Security analysis on "A chaotic fragile watermarking technique with precise localization"
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Technical Communication: Authentication and recovery of images using multiple watermarks
Computers and Electrical Engineering
A fragile watermarking scheme protecting originator's rights for multimedia service
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Tracing stateful pirate decoders
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A novel public key self-embedding fragile watermarking technique for image authentication
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Information Sciences: an International Journal
Multimedia Tools and Applications
Protecting the content integrity of digital imagery with fidelity preservation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Self-embedding watermark with flexible restoration quality
Multimedia Tools and Applications
A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure
Computers and Electrical Engineering
A secure and robust wavelet-based hashing scheme for image authentication
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
Curvelet transform for image authentication
RSKT'06 Proceedings of the First international conference on Rough Sets and Knowledge Technology
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Reversible fragile watermarking for 2-D vector map authentication with localization
Computer-Aided Design
Alteration-locating authentication watermarking for binary images
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Secure tamper localization in binary document image authentication
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV
Computer Standards & Interfaces
Fragile watermarking tamper detection with images compressed by fuzzy transform
Information Sciences: an International Journal
A wavelet-based fragile watermarking scheme for secure image authentication
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
On the music content authentication
Proceedings of the 20th ACM international conference on Multimedia
Digital Image Authentication: A Review
International Journal of Digital Library Systems
A secure semi-fragile self-recoverable watermarking algorithm using group-based wavelet quantization
PCM'12 Proceedings of the 13th Pacific-Rim conference on Advances in Multimedia Information Processing
Fast communication: Analyzing and removing SureSign watermark
Signal Processing
Multi-block dependency based fragile watermarking scheme for fingerprint images protection
Multimedia Tools and Applications
Counterfeiting attacks on block-wise dependent fragile watermarking schemes
Proceedings of the 6th International Conference on Security of Information and Networks
Reversible fragile watermarking for locating tampered blocks in 2D vector maps
Multimedia Tools and Applications
Multimedia Tools and Applications
Hi-index | 0.02 |
We describe a class of attacks on certain block-based oblivious watermarking schemes. We show that oblivious watermarking techniques that embed information into a host image in a block-wise independent fashion are vulnerable to a counterfeiting attack. Specifically, given a watermarked image, one can forge the watermark it contains into another image without knowing the secret key used for watermark insertion and in some cases even without explicitly knowing the watermark. We demonstrate successful implementations of this attack on a few watermarking techniques that have been proposed in the literature. We also describe a possible solution to this problem of block-wise independence that makes our attack computationally intractable