Fragile watermarking schemes for image authentication: a survey

被引:0
作者
K. Sreenivas
V. Kamkshi Prasad
机构
[1] JNTUH,Department of CSE
来源
International Journal of Machine Learning and Cybernetics | 2018年 / 9卷
关键词
Fragile watermarking; Image security; Image authentication; Survey;
D O I
暂无
中图分类号
学科分类号
摘要
This paper presents a survey of fragile watermarking schemes for image authentication proposed in the past decade. The limited embedding capacity and extent of tampering are some of the important issues among other issues that drive the research in this area. Therefore we have presented in this survey the gist of the fragile watermarking schemes in just enough detail so that the reader may gain a fair idea of the issues, techniques adopted in general to address them and the comparison of results. The general frame work of the fragile watermarking system, different categories of attacks and parameters used to evaluate the schemes are presented in this survey. The comparative analysis and the quantitative comparison of basic schemes and their variations with improvements will help the researchers in quick review of the recent developments in this area.
引用
收藏
页码:1193 / 1218
页数:25
相关论文
共 76 条
[1]  
Rey C(2002)A survey of watermarking algorithms for image authentication EURASIP J Appl Signal Proc 9 19-32
[2]  
Dugelay J-L(2010)Content-based image authentication: current status, issues, and challenges Int J Inf Secur 32 479-496
[3]  
Han S-H(2015)An overview of robust digital image watermarking IETE Tech Rev 10 1593-1601
[4]  
Chu C-H(2001)Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Trans Image Process 41 654-661
[5]  
Verma VS(2008)four-scanning attack on hierarchical digital watermarking method Pattern Recognit 7 185189-2529
[6]  
Jha RK(2012)Performance analysis of a block-neighbourhood-based self-recovery fragile watermarking scheme IEEE Trans Inform Forens Secur 38 2519-3506
[7]  
Wong PW(2005)A hierarchical digital watermarking method for image tamper detection and recovery Pattern Recognit 41 3497-940
[8]  
Memon N(2008)Dual watermark for image tamper detection and recovery Pattern Recognit 37 927-2606
[9]  
Chang C-C(2011)A novel self-recovery fragile watermarking scheme based on dual redundant-ring structure Comput Electr Eng 285 2596-1232
[10]  
Fan Y-H(2012)An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and sub-block post-processing Opt Commun 6 1223-1766