Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images

With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people’s attention. The fragile watermark for integrity authentication of image data and protection of copyright has become a hotspot. In the storage and transmission process, image data must be compressed to save network bandwidth. As a result, semi-fragile watermarking techniques, which can be used to distinguish common image processing operations from malicious tampering, are emerging. In this paper, semi-fragile watermarking algorithms for image authentication are surveyed. The basic principles and characteristics about semi-fragile watermarking algorithms are introduced, and several kinds of attack behaviors are also included. Aiming at several typical image-authentication algorithms, advantages and disadvantages are analyzed, and evaluation indexes of various algorithms are compared. Finally, we analyze the key points and difficulties in the study on semi-fragile watermarking algorithms, and the direction about future development is prospected.

[1]  Alfredo De Santis,et al.  Cloud-based adaptive compression and secure management services for 3D healthcare data , 2015, Future Gener. Comput. Syst..

[2]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[3]  Liao Jian-ming A Novel Semi-fragile Digital Watermarking Algorithm for Image Content Authentication,Localization and Recovery , 2010 .

[4]  Chang-Tsun Li,et al.  Semi-fragile watermarking scheme for authentication of JPEG images , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[5]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[6]  S. Shefali,et al.  Information Security through Semi-Fragile Watermarking , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[7]  Ying Wang,et al.  A Semi-fragile Watermarking Tolerant of Laplacian Sharpening , 2008, 2008 International Conference on Computer Science and Software Engineering.

[8]  Li Chun,et al.  A Semi-Fragile Image Watermarking Resisting to JPEG , 2006 .

[9]  Nasir D. Memon,et al.  Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.

[10]  Yong Liang Guan,et al.  Image Content Authentication Using Pinned Sine Transform , 2004, EURASIP J. Adv. Signal Process..

[11]  Zhoufeng Liu,et al.  Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication , 2014, Multimedia Tools and Applications.

[12]  Xing Xin,et al.  A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization , 2015, J. Vis. Commun. Image Represent..

[13]  Fan Chen,et al.  Self-embedding watermarking scheme against JPEG compression with superior imperceptibility , 2017, Multimedia Tools and Applications.

[14]  Radu Ovidiu Preda,et al.  Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain , 2013 .

[15]  Safya Belghith,et al.  Tamper detection and self-recovery scheme by DWT watermarking , 2015 .

[16]  Manisha Sharma,et al.  Watermarking based image authentication and tamper detection algorithm using vector quantization approach , 2017 .

[17]  Amit Phadikar,et al.  Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images , 2012, J. Vis. Commun. Image Represent..

[18]  Xingming Sun,et al.  A Semi-Fragile Watermarking Algorithm using Adaptive Least Significant Bit Substitution , 2010 .

[19]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[20]  Mohammed E. Al-Mualla Content-Adaptive Semi-Fragile Watermarking for Image Authentication , 2007, 2007 14th IEEE International Conference on Electronics, Circuits and Systems.

[21]  Min-Jen Tsai,et al.  A wavelet-based semi-fragile watermarking with recovery mechanism , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[22]  Nasir D. Memon,et al.  Further attacks on Yeung-Mintzer fragile watermarking scheme , 2000, Electronic Imaging.

[23]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[24]  Edward J. Delp,et al.  Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..

[25]  Rafi Ullah,et al.  Intelligent Watermarking Scheme for image Authentication and Recovery , 2017 .

[26]  Torsten Palfner,et al.  Quantization-based semi-fragile public-key watermarking for secure image authentication , 2005, SPIE Optics + Photonics.

[27]  Hazem Al-Otum,et al.  Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique , 2014, J. Vis. Commun. Image Represent..

[28]  Xiang Zhou,et al.  A semifragile watermark scheme for image authentication , 2004, 10th International Multimedia Modelling Conference, 2004. Proceedings..

[29]  Radu Ovidiu PREDA,et al.  IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING , 2015 .

[30]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[31]  D. N. Vizireanu,et al.  Watermarking-based image authentication robust to JPEG compression , 2015 .