Skip to main content
Erschienen in: International Journal of Machine Learning and Cybernetics 7/2018

02.03.2017 | Original Article

Fragile watermarking schemes for image authentication: a survey

verfasst von: K. Sreenivas, V. Kamkshi Prasad

Erschienen in: International Journal of Machine Learning and Cybernetics | Ausgabe 7/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents a survey of fragile watermarking schemes for image authentication proposed in the past decade. The limited embedding capacity and extent of tampering are some of the important issues among other issues that drive the research in this area. Therefore we have presented in this survey the gist of the fragile watermarking schemes in just enough detail so that the reader may gain a fair idea of the issues, techniques adopted in general to address them and the comparison of results. The general frame work of the fragile watermarking system, different categories of attacks and parameters used to evaluate the schemes are presented in this survey. The comparative analysis and the quantitative comparison of basic schemes and their variations with improvements will help the researchers in quick review of the recent developments in this area.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
2.
Zurück zum Zitat Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39:1–46 Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39:1–46
3.
Zurück zum Zitat Han S-H, Chu C-H (2010) Content-based image authentication: current status, issues, and challenges. Int J Inf Secur 9:19–32CrossRef Han S-H, Chu C-H (2010) Content-based image authentication: current status, issues, and challenges. Int J Inf Secur 9:19–32CrossRef
4.
Zurück zum Zitat Lin ET, Delp EJ (1999) A review of fragile image watermarks, in proceedings of multimedia and security Workshop multimedia contents, 25–29 Lin ET, Delp EJ (1999) A review of fragile image watermarks, in proceedings of multimedia and security Workshop multimedia contents, 25–29
5.
Zurück zum Zitat Verma VS, Jha RK (2015) An overview of robust digital image watermarking. IETE Tech Rev 32(6):479–496CrossRef Verma VS, Jha RK (2015) An overview of robust digital image watermarking. IETE Tech Rev 32(6):479–496CrossRef
6.
Zurück zum Zitat Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601CrossRefMATH Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601CrossRefMATH
7.
Zurück zum Zitat Chang C-C, Fan Y-H, Tai W-L (2008) four-scanning attack on hierarchical digital watermarking method. Pattern Recognit 41:654–661CrossRefMATH Chang C-C, Fan Y-H, Tai W-L (2008) four-scanning attack on hierarchical digital watermarking method. Pattern Recognit 41:654–661CrossRefMATH
8.
Zurück zum Zitat Fridrich J, Goljan M (1999) Protection of digital images using self embedding, in Symposium on Content Security and Data Hiding in Digital Media. New Jersey Institute of Technology, Newark, NJ Fridrich J, Goljan M (1999) Protection of digital images using self embedding, in Symposium on Content Security and Data Hiding in Digital Media. New Jersey Institute of Technology, Newark, NJ
9.
Zurück zum Zitat He H, Chen F, Tai H-M, Kalker T, Zhang J (2012) Performance analysis of a block-neighbourhood-based self-recovery fragile watermarking scheme. IEEE Trans Inform Forens Secur 7(1):185–196CrossRef He H, Chen F, Tai H-M, Kalker T, Zhang J (2012) Performance analysis of a block-neighbourhood-based self-recovery fragile watermarking scheme. IEEE Trans Inform Forens Secur 7(1):185–196CrossRef
10.
Zurück zum Zitat He H-J, Zhang J-S, Tai H-M (2009) Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization, IH, LNCS 5806, pp. 132–145 He H-J, Zhang J-S, Tai H-M (2009) Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization, IH, LNCS 5806, pp. 132–145
11.
Zurück zum Zitat Lin PL, Hsieh C-K, Huang P-W (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognit 38:2519–2529CrossRef Lin PL, Hsieh C-K, Huang P-W (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognit 38:2519–2529CrossRef
12.
Zurück zum Zitat Lee T-Y, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recognit 41:3497–3506CrossRefMATH Lee T-Y, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recognit 41:3497–3506CrossRefMATH
13.
Zurück zum Zitat Li CL, Wang YH, Ma B, Zhang ZX (2011) A novel self-recovery fragile watermarking scheme based on dual redundant-ring structure. Comput Electr Eng 37(6):927–940CrossRef Li CL, Wang YH, Ma B, Zhang ZX (2011) A novel self-recovery fragile watermarking scheme based on dual redundant-ring structure. Comput Electr Eng 37(6):927–940CrossRef
14.
Zurück zum Zitat Xiao D, Shih FY (2012) An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and sub-block post-processing. Opt Commun 285:2596–2606CrossRef Xiao D, Shih FY (2012) An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and sub-block post-processing. Opt Commun 285:2596–2606CrossRef
15.
Zurück zum Zitat El’arbi M, Amar CB (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Image Process 8(11):619–626 El’arbi M, Amar CB (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Image Process 8(11):619–626
16.
Zurück zum Zitat Zhang X, Qian Z, Ren Y, Feng G (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inform Foren Secur 6(4):1223–1232CrossRef Zhang X, Qian Z, Ren Y, Feng G (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inform Foren Secur 6(4):1223–1232CrossRef
17.
Zurück zum Zitat Korus P, Dziech A (2013) Efficient method for content reconstruction with self-embedding. IEEE Trans Image Proc 22(3):1134–1147MathSciNetCrossRefMATH Korus P, Dziech A (2013) Efficient method for content reconstruction with self-embedding. IEEE Trans Image Proc 22(3):1134–1147MathSciNetCrossRefMATH
18.
Zurück zum Zitat Zhang J, Zhanga Q, Lvba H (2013) A novel image tamper localization and recovery algorithm based on watermarking technology. Optik 124:6367–6371 Zhang J, Zhanga Q, Lvba H (2013) A novel image tamper localization and recovery algorithm based on watermarking technology. Optik 124:6367–6371
19.
Zurück zum Zitat Dadkhah S, Manaf AA, Hori Y, Hassanien AE, Sadeghi S (2014) An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Proc Image Comm 29:1197–1210 Dadkhah S, Manaf AA, Hori Y, Hassanien AE, Sadeghi S (2014) An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Proc Image Comm 29:1197–1210
20.
Zurück zum Zitat Lee C-W, Tsai W-H (2012) Optimal pixel-level self-repairing authentication method for gray scale images under a mini-max criterion of distortion reduction. Opt Eng 51(5): 0570061–11 Lee C-W, Tsai W-H (2012) Optimal pixel-level self-repairing authentication method for gray scale images under a mini-max criterion of distortion reduction. Opt Eng 51(5): 0570061–11
21.
Zurück zum Zitat Qin C, Chang C-C, Chen K-N (2013) Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Process 93:933–946 Qin C, Chang C-C, Chen K-N (2013) Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Process 93:933–946
22.
Zurück zum Zitat Li C, Wang Y, Ma B, Zhang Z (2013) Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimed Tools Appl 64:757–776 Li C, Wang Y, Ma B, Zhang Z (2013) Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimed Tools Appl 64:757–776
23.
Zurück zum Zitat He H-J, Zhang J-S, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89:1557–1566 He H-J, Zhang J-S, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89:1557–1566
24.
Zurück zum Zitat Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image R 38:775–789 Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image R 38:775–789
25.
Zurück zum Zitat Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digit Signal Proc 21:278–286 Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digit Signal Proc 21:278–286
26.
Zurück zum Zitat Huo Y, He H, Chen F (2012) Alterable-capacity fragile watermarking scheme with restoration capability. Opt Commun 285:1759–1766CrossRef Huo Y, He H, Chen F (2012) Alterable-capacity fragile watermarking scheme with restoration capability. Opt Commun 285:1759–1766CrossRef
27.
28.
Zurück zum Zitat Qian Z, Feng G (2010) Inpainting assisted self recovery with decreased embedding data. IEEE Signal Process Lett 17(11):929–932CrossRef Qian Z, Feng G (2010) Inpainting assisted self recovery with decreased embedding data. IEEE Signal Process Lett 17(11):929–932CrossRef
29.
Zurück zum Zitat Liu K-C (2012) Colour image watermarking for tamper proofing and pattern-based recovery. IET Image Process 6(5):445–454 Liu K-C (2012) Colour image watermarking for tamper proofing and pattern-based recovery. IET Image Process 6(5):445–454
30.
Zurück zum Zitat Liu K-C (2014) Self-embedding watermarking scheme for colour images by bi-level moment-preserving technique. IET Image Process 8(6):363–372 Liu K-C (2014) Self-embedding watermarking scheme for colour images by bi-level moment-preserving technique. IET Image Process 8(6):363–372
31.
Zurück zum Zitat Wang M-S, Chen W-C (2007) A majority-voting based watermarking scheme for color image tamper detection and recovery. Comput Stand Interfac 29:561–570CrossRef Wang M-S, Chen W-C (2007) A majority-voting based watermarking scheme for color image tamper detection and recovery. Comput Stand Interfac 29:561–570CrossRef
33.
Zurück zum Zitat Zhang X, Wang S (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process Lett 14(10):727–730CrossRef Zhang X, Wang S (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process Lett 14(10):727–730CrossRef
34.
Zurück zum Zitat Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. Signal Process 89:675–679 Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. Signal Process 89:675–679
35.
Zurück zum Zitat Zhang X, Wang S, Qian Z, Feng G (2011) Self-embedding watermark with flexible restoration quality. Multimed Tools Appl 54:385–395 Zhang X, Wang S, Qian Z, Feng G (2011) Self-embedding watermark with flexible restoration quality. Multimed Tools Appl 54:385–395
36.
Zurück zum Zitat Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Proc 91:728–739 Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Proc 91:728–739
37.
Zurück zum Zitat Zhang X, Wang S, Qian Z, Feng G (2010) Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process 90:3026–3036 Zhang X, Wang S, Qian Z, Feng G (2010) Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process 90:3026–3036
38.
Zurück zum Zitat Zhang X, Wang S (2008) Fragile Watermarking With Error-Free Restoration Capability. IEEE Trans Multimed 10(8):1490–1499CrossRef Zhang X, Wang S (2008) Fragile Watermarking With Error-Free Restoration Capability. IEEE Trans Multimed 10(8):1490–1499CrossRef
39.
Zurück zum Zitat Hsu C-S, Tu S-F (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283:1737–1743CrossRef Hsu C-S, Tu S-F (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283:1737–1743CrossRef
40.
Zurück zum Zitat Chan CS, Chang CC (2007) An efficient image authentication method based on hamming code. Pattern Recognit 40(2):681–690CrossRefMATH Chan CS, Chang CC (2007) An efficient image authentication method based on hamming code. Pattern Recognit 40(2):681–690CrossRefMATH
41.
Zurück zum Zitat Chan C-S (2011) An image authentication method by applying Hamming code on rearranged bits. Pattern Recognit Lett 32:1679–1690CrossRef Chan C-S (2011) An image authentication method by applying Hamming code on rearranged bits. Pattern Recognit Lett 32:1679–1690CrossRef
42.
Zurück zum Zitat Changa C-C, Chen K-N, Leec C-F, Liu L-J (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84:1462–1470CrossRef Changa C-C, Chen K-N, Leec C-F, Liu L-J (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84:1462–1470CrossRef
43.
Zurück zum Zitat Qin C, Chang C-C, Chen P-Y (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92:1137–1150 Qin C, Chang C-C, Chen P-Y (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92:1137–1150
44.
Zurück zum Zitat Wang X, Zhang D, Guo X (2013) A novel image recovery method based on discrete cosine transform and matched blocks. Nonlinear Dyn 73:1945–1954 Wang X, Zhang D, Guo X (2013) A novel image recovery method based on discrete cosine transform and matched blocks. Nonlinear Dyn 73:1945–1954
45.
Zurück zum Zitat Li C, Zhang A, Liu Z, Liao L, Huang D (2015) Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication. Multimed Tools Appl 74:10581–10604 Li C, Zhang A, Liu Z, Liao L, Huang D (2015) Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication. Multimed Tools Appl 74:10581–10604
46.
Zurück zum Zitat Yeh FH, Lee GC (2006) Content-based watermarking in image authentication allowing remedying of tampered images. Opt Eng 45(7):0770041–10 Yeh FH, Lee GC (2006) Content-based watermarking in image authentication allowing remedying of tampered images. Opt Eng 45(7):0770041–10
47.
Zurück zum Zitat Qin C, Chang C-C, Hsu T-J (2013) Effective fragile watermarking for image authentication with high-quality recovery capability. KSII Trans Internet Inform Syst 7(11):2941–2956 Qin C, Chang C-C, Hsu T-J (2013) Effective fragile watermarking for image authentication with high-quality recovery capability. KSII Trans Internet Inform Syst 7(11):2941–2956
48.
Zurück zum Zitat Huo Y, He H, Chen F (2014) A Restorable Semi-fragile Watermarking Combined DCT with Interpolation, IWDW 2013, LNCS 8389, pp. 393–408 Huo Y, He H, Chen F (2014) A Restorable Semi-fragile Watermarking Combined DCT with Interpolation, IWDW 2013, LNCS 8389, pp. 393–408
50.
Zurück zum Zitat Pred RO, Vizireanu DN (2015) Watermarking-based image authentication robust to JPEG compression. Electr Lett 51(23):1873–1875 Pred RO, Vizireanu DN (2015) Watermarking-based image authentication robust to JPEG compression. Electr Lett 51(23):1873–1875
51.
Zurück zum Zitat Singh P, Agarwal S (2015) An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection. Multimed Tools Appl. doi:10.1007/s11042-015-2736-9 Singh P, Agarwal S (2015) An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection. Multimed Tools Appl. doi:10.​1007/​s11042-015-2736-9
52.
Zurück zum Zitat Rosales-Roldan L, Cedillo-Hernandez M, Nakano-Miyatake M, Perez-Meana H, Kurkoski B (2013) Watermarking-based image authentication with recovery capability using halftoning technique. Signal Process Image Comm 28:69–83 Rosales-Roldan L, Cedillo-Hernandez M, Nakano-Miyatake M, Perez-Meana H, Kurkoski B (2013) Watermarking-based image authentication with recovery capability using halftoning technique. Signal Process Image Comm 28:69–83
53.
Zurück zum Zitat He H, Zhang J, Tai H-M (2006) A wavelet-based fragile watermarking scheme for secure image authentication, IWDW 2006, LNCS 4283, pp. 422–432 He H, Zhang J, Tai H-M (2006) A wavelet-based fragile watermarking scheme for secure image authentication, IWDW 2006, LNCS 4283, pp. 422–432
54.
Zurück zum Zitat Chamlawi R, Khan A, Usman I (2010) Authentication and recovery of images using multiple watermarks. Comput Electr Eng 36:578–584CrossRefMATH Chamlawi R, Khan A, Usman I (2010) Authentication and recovery of images using multiple watermarks. Comput Electr Eng 36:578–584CrossRefMATH
55.
Zurück zum Zitat Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image R 22:87–200 Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image R 22:87–200
56.
Zurück zum Zitat Preda RO (2013) Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46:367–373CrossRef Preda RO (2013) Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46:367–373CrossRef
57.
Zurück zum Zitat Ullah R, Khan A, Malik AS (2013) Dual-purpose semi-fragile watermark: authentication and recovery of digital images. Comput Electr Eng 39:2019–2030CrossRef Ullah R, Khan A, Malik AS (2013) Dual-purpose semi-fragile watermark: authentication and recovery of digital images. Comput Electr Eng 39:2019–2030CrossRef
58.
Zurück zum Zitat Tsai M-J, Chien C-C (2008) Authentication and recovery for wavelet-based semi-fragile watermarking. Opt Eng 47(6):0670051–10 Tsai M-J, Chien C-C (2008) Authentication and recovery for wavelet-based semi-fragile watermarking. Opt Eng 47(6):0670051–10
59.
Zurück zum Zitat Li C-T, Si H (2007) Wavelet-based fragile watermarking scheme for image authentication. J Electr Imaging 16(1):0130091–10 Li C-T, Si H (2007) Wavelet-based fragile watermarking scheme for image authentication. J Electr Imaging 16(1):0130091–10
60.
Zurück zum Zitat Nguyen T-S, Chang C-C, Yang X-Q (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. Int J Electron Commun (AEÜ) 70:1055–1061CrossRef Nguyen T-S, Chang C-C, Yang X-Q (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. Int J Electron Commun (AEÜ) 70:1055–1061CrossRef
61.
Zurück zum Zitat Phadikar A, Maity SP, Mandal M (2012) Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images. J Vis Commun Image R 23:454–466 Phadikar A, Maity SP, Mandal M (2012) Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images. J Vis Commun Image R 23:454–466
62.
Zurück zum Zitat Yang C-W, Shen J-J (2010) Recover the tampered image based on VQ indexing. Signal Process 90:331–343 Yang C-W, Shen J-J (2010) Recover the tampered image based on VQ indexing. Signal Process 90:331–343
63.
Zurück zum Zitat Chuang J-C, Hu Y-C (2011) An adaptive image authentication scheme for vector quantization compressed image. J Vis Commun Image R 22:440–449 Chuang J-C, Hu Y-C (2011) An adaptive image authentication scheme for vector quantization compressed image. J Vis Commun Image R 22:440–449
64.
Zurück zum Zitat Wang S-S, Tsai S-L (2008) Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recognit 41:701–712CrossRefMATH Wang S-S, Tsai S-L (2008) Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recognit 41:701–712CrossRefMATH
65.
Zurück zum Zitat Patra JC, Karthika A, Bornand C (2010) A novel CRT-based watermarking technique for authentication of multimedia contents. Digit Signal Process 20:442–453 Patra JC, Karthika A, Bornand C (2010) A novel CRT-based watermarking technique for authentication of multimedia contents. Digit Signal Process 20:442–453
66.
Zurück zum Zitat Chen W-C, Wang M-S (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Systems Appl 36:1300–1307CrossRef Chen W-C, Wang M-S (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Systems Appl 36:1300–1307CrossRef
67.
Zurück zum Zitat Ghosal SK, Mandal JK (2014) Binomial transform based fragile watermarking for image authentication. J Inform Secur Appl 19:272–281 Ghosal SK, Mandal JK (2014) Binomial transform based fragile watermarking for image authentication. J Inform Secur Appl 19:272–281
68.
Zurück zum Zitat Lin P-Y, Lee J-S, Chang C-C (2011) Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans Multimed Comput Commun Appl 7(3):15 Lin P-Y, Lee J-S, Chang C-C (2011) Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans Multimed Comput Commun Appl 7(3):15
69.
Zurück zum Zitat Ho ATS, Zhu X, Shen J, Marziliano P (2008) Fragile watermarking based on encoding of the zeroes of the z–Transform. IEEE Trans Inform Foren Secur 3(3):567–569 Ho ATS, Zhu X, Shen J, Marziliano P (2008) Fragile watermarking based on encoding of the zeroes of the z–Transform. IEEE Trans Inform Foren Secur 3(3):567–569
Metadaten
Titel
Fragile watermarking schemes for image authentication: a survey
verfasst von
K. Sreenivas
V. Kamkshi Prasad
Publikationsdatum
02.03.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Machine Learning and Cybernetics / Ausgabe 7/2018
Print ISSN: 1868-8071
Elektronische ISSN: 1868-808X
DOI
https://doi.org/10.1007/s13042-017-0641-4

Weitere Artikel der Ausgabe 7/2018

International Journal of Machine Learning and Cybernetics 7/2018 Zur Ausgabe