cs.CR, cs.CV, cs.MM, eess.IV

Authenticated Contradictions from Desynchronized Provenance and Watermarking

arXiv:2603.02378v2 Announce Type: replace-cross
Abstract: Cryptographic provenance standards such as C2PA and invisible watermarking are positioned as complementary defenses for content authentication, yet the two verification layers are technically i…