Structural digital signature for image authentication: an incidental distortion resistant scheme
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Fragile image watermarking using a gradient image for improved localization and security
Pattern Recognition Letters
A watermarking-based image ownership and tampering authentication scheme
Pattern Recognition Letters
IEEE Transactions on Multimedia
Hidden digital watermarks in images
IEEE Transactions on Image Processing
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Multipurpose watermarking for image authentication and protection
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Hierarchical watermarking for secure image authentication with localization
IEEE Transactions on Image Processing
Multipurpose image watermarking algorithm based on multistage vector quantization
IEEE Transactions on Image Processing
Lossless watermarking for image authentication: a new framework and an implementation
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Security of an ill-posed operator for image authentication
IEEE Transactions on Circuits and Systems for Video Technology
Tampering with a watermarking-based image authentication scheme
Pattern Recognition
Recover the tampered image based on VQ indexing
Signal Processing
Dual digital watermarking for internet media based on hybrid strategies
IEEE Transactions on Circuits and Systems for Video Technology
Grouping strategies for promoting image quality of watermarking on the basis of vector quantization
Journal of Visual Communication and Image Representation
Information Sciences: an International Journal
An image authentication method by applying Hamming code on rearranged bits
Pattern Recognition Letters
A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure
Computers and Electrical Engineering
Intelligent reversible watermarking and authentication: Hiding depth map information for 3D cameras
Information Sciences: an International Journal
Self-recovery fragile watermarking scheme with variable watermark payload
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Counterfeiting attacks on block-wise dependent fragile watermarking schemes
Proceedings of the 6th International Conference on Security of Information and Networks
Self-embedding fragile watermarking scheme combined average with VQ encoding
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.03 |
In a recent paper presented by Lin et al., a block-based hierarchical watermarking algorithm for digital images is proposed. It adopts parity check and the intensity-relation check to conduct the experiment of image tamper detection. Their experimental results indicate that the precision of tamper detection and localization is 99.6% and 100% after level-2 and level-3 inspections, respectively. The proposed attacks demonstrate that this watermarking algorithm is fundamentally flawed in that the attacker can tamper a watermarked image easily without being detected. In this paper, a four-scanning attack aimed to Lin et al.'s watermarking method is presented to create tampered images. Furthermore, in case they use encryption to protect their 3-tuple-watermark, we proposed a blind attack to tamper watermarked images without being detected. Experimental results are given to support and enhance our conclusions, and demonstrate that our attacks are successful in tampering watermarked images.