Browse > Article
http://dx.doi.org/10.3745/JIPS.02.0082

Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery  

Wang, Chengyou (School of Mechanical, Electrical and Information Engineering, Shandong University)
Zhang, Heng (School of Mechanical, Electrical and Information Engineering, Shandong University)
Zhou, Xiao (School of Mechanical, Electrical and Information Engineering, Shandong University)
Publication Information
Journal of Information Processing Systems / v.14, no.2, 2018 , pp. 510-522 More about this Journal
Abstract
As the major source of information, digital images play an indispensable role in our lives. However, with the development of image processing techniques, people can optionally retouch or even forge an image by using image processing software. Therefore, the authenticity and integrity of digital images are facing severe challenge. To resolve this issue, the fragile watermarking schemes for image authentication have been proposed. According to different purposes, the fragile watermarking can be divided into two categories: fragile watermarking for tamper localization and fragile watermarking with recovery ability. The fragile watermarking for image tamper localization can only identify and locate the tampered regions, but it cannot further restore the modified regions. In some cases, image recovery for tampered regions is very essential. Generally, the fragile watermarking for image authentication and recovery includes three procedures: watermark generation and embedding, tamper localization, and image self-recovery. In this article, we make a review on self-embedding fragile watermarking methods. The basic model and the evaluation indexes of this watermarking scheme are presented in this paper. Some related works proposed in recent years and their advantages and disadvantages are described in detail to help the future research in this field. Based on the analysis, we give the future research prospects and suggestions in the end.
Keywords
Image Authentication and Self-recovery; Least Significant Bit (LSB); Peak Signal-to-Noise Ratio (PSNR); Self-embedding Fragile Watermarking;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 O. Benrhouma, H. Hermassi, and S. Belghith, "Tamper detection and self-recovery scheme by DWT watermarking," Nonlinear Dynamics, vol. 79, no. 3, pp. 1817-1833, 2015.   DOI
2 J. Fridrich and M. Goljan, "Images with self-correcting capabilities," in Proceedings of the International Conference on Image Processing, Kobe, Japan, 1999, pp. 792-796.
3 P. L. Lin, C. K. Hsieh, and P. W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 38, no. 12, pp. 2519-2529, 2005.   DOI
4 Y. F. Chang and W. L. Tai, "A block-based watermarking scheme for image tamper detection and self-recovery," Opto-Electronics Review, vol. 21, no. 2, pp. 182-190, 2013.
5 X. J. Tong, Y. Liu, M. Zhang, and Y. Chen, "A novel chaos-based fragile watermarking for image tampering detection and self-recovery," Signal Processing: Image Communication, vol. 28, no. 3, pp. 301-308, 2013.   DOI
6 F. Chen, H. H. He, H. M. Tai, and H. X. Wang, "Chaos-based self-embedding fragile watermarking with flexible watermark payload," Multimedia Tools and Applications, vol. 72, no. 1, pp. 41-56, 2014.   DOI
7 D. Singh and S. K. Singh, "Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability," Journal of Visual Communication and Image Representation, vol. 38, pp. 775-789, 2016.   DOI
8 S. Dadkhah, A. A. Manaf, Y. Hori, A. E. Hassanien, and S. Sadeghi, "An effective SVD-based image tampering detection and self-recovery using active watermarking," Signal Processing: Image Communication, vol. 29, no. 10, pp. 1197-1210, 2014.   DOI
9 X. P. Zhang, S. Z. Wang, Z. X. Qian, and G. R. Feng, "Reference sharing mechanism for watermark selfembedding," IEEE Transactions on Image Processing, vol. 20, no. 2, pp. 485-495, 2011.   DOI
10 T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008.   DOI
11 S. Som, S. Palit, K. Dey, D. Sarkar, J. Sarkar, and K. Sarkar, "A DWT-based digital watermarking scheme for image tamper detection, localization, and restoration," in Applied Computation and Security Systems. New Delhi, India: Springer, 2015, pp. 17-37.
12 F. Cao, B. W. An, J. W. Wang, D. P. Ye, and H. L. Wang, "Hierarchical recovery for tampered images based on watermark self-embedding," Displays, vol. 46, pp. 52-60, 2017.   DOI
13 C. Qin, P. Ji, X. P. Zhang, J. Dong, and J. W. Wang, "Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy," Signal Processing, vol. 138, pp. 280-293, 2017.   DOI
14 Z. X. Qian, G. R. Feng, X. P. Zhang, and S. Z. Wang, "Image self-embedding with high-quality restoration capability," Digital Signal Processing, vol. 21, no. 2, pp. 278-286, 2011.   DOI
15 Y. R. Huo, H. J. He, and F. Chen, "Alterable-capacity fragile watermarking scheme with restoration capability," Optics Communications, vol. 285, no. 7, pp. 1759-1766, 2012.   DOI
16 D. C. Lou and J. L. Liu, "Fault resilient and compression tolerant digital signature for image authentication," IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 31-39, 2000.   DOI
17 C. Qin, H. L. Wang, X. P. Zhang, and X. M. Sun, "Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode," Information Sciences, vol. 373, pp. 233-250, 2016.   DOI
18 R. Eswaraiah and E. S. Reddy, "A fragile ROI-based medical image watermarking technique with tamper detection and recovery," in Proceedings of the 4th International Conference on Communication Systems and Network Technologies, Bhopal, India, 2014, pp. 896-899.
19 S. C. Liew, S. W. Liew, and J. M. Zain, "Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication," Journal of Digital Imaging, vol. 26, no. 2, pp. 316-325, 2013.   DOI
20 C. L. Li, Y. H. Wang, B. Ma, and Z. X. Zhang, "Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme," Computer Standards and Interfaces, vol. 34, no. 4, pp. 367-379, 2012.   DOI
21 C. S. Lu and H. Y. M. Liao, "Structural digital signature for image authentication: an incidental distortion resistant scheme," IEEE Transactions on Multimedia, vol. 5, no. 2, pp. 161-173, 2003.   DOI
22 M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol. 9, no. 3, pp. 432-441, 2000.   DOI
23 H. Nyeem, W. Boles, and C. Boyd, "Digital image watermarking: its formal model, fundamental properties and possible attacks," EURASIP Journal on Advances in Signal Processing, vol. 2014, no. 1, pp. 1-22, 2014.   DOI
24 S. Bekkouch and K. M. Faraoun, "Robust and reversible image watermarking scheme using combined DCTDWT-SVD transforms," Journal of Information Processing Systems, vol. 11, no. 3, pp. 406-420, 2015.   DOI
25 K. Sreenivas and V. K. Prasad, "Fragile watermarking schemes for image authentication: a survey," International Journal of Machine Learning and Cybernetics, vol. 8, pp. 1-26, 2017.   DOI
26 J. Fridrich, M. Goljan, and N. Memon, "Cryptanalysis of the Yeung-Mintzer fragile watermarking technique," Journal of Electronic Imaging, vol. 11, no. 2, pp. 262-274, 2002.   DOI
27 C. C. Chang, Y. H. Fan, and W. L. Tai, "Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 2, pp. 654-661, 2008.   DOI
28 H. Zhang, C. Y. Wang, and X. Zhou, "Fragile watermarking based on LBP for blind tamper detection in images," Journal of Information Processing Systems, vol. 13, no. 2, pp. 385-399, 2017.   DOI
29 Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image quality assessment: from error visibility to structural similarity," IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600-612, 2004.   DOI
30 H. Zhang, C. Y. Wang, and X. Zhou, "Fragile watermarking for image authentication using the characteristic of SVD," Algorithms, vol. 10, no. 1, article no. 27, 2017.