Authenticated Contradictions from Desynchronized Provenance and Watermarking
arXiv:2603.02378v2 Announce Type: replace-cross
Abstract: Cryptographic provenance standards such as C2PA and invisible watermarking are positioned as complementary defenses for content authentication, yet the two verification layers are technically i…