A Survey of Transform Domain based Semifragile Watermarking Schemes for Image Authentication

被引:0
作者
Tiwari, A. [1 ]
Sharma, M. [2 ]
机构
[1] Chhatrapati Shivaji Institute of Technology, Durg
[2] Bhilai Institute of Technology, Durg
关键词
Content recovery; Image authentication; Robustness; Semifragile watermarking; Tamper detection;
D O I
10.1007/s40031-012-0021-0
中图分类号
学科分类号
摘要
Image authentication is key research area for researchers’ world over due to its important function in multimedia content authentication. Hence it’s essential to check integrity of images before it can be put to use, in some applications such as medical, military and quality control images. In order to protect authenticity of images many approaches have been proposed, semifragile watermarking scheme is found useful in most of the practical applications. The aim of this paper is to present survey and comparison of transform domain based semifragile watermarking techniques for image authentication. Different transform domain methods used for semifragile watermark embedding are compared based on peak signal to noise ratio and mean square error. Comparative study reflects that selection of methods and parameters are application specific. Furthermore important requirements for an effective image authentication algorithm are also discussed. © 2013, The Institution of Engineers (India).
引用
收藏
页码:185 / 191
页数:6
相关论文
共 31 条
[1]  
Cox I.J., Miller M.I., The first 50 years of electronic watermarking, Appl. Signal Process., 2, pp. 126-132, (2002)
[2]  
Zheng-ding T., The survey of digital watermarking based image authentication techniques, In Proceedings of IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 1556-1559, (2002)
[3]  
Fei C.H., Kwong H., A hypothesis testing approach to semifragile watermark-based authentication, IEEE Trans. Inf. Forensics Secur., 4, 2, pp. 479-492, (2009)
[4]  
Abdel Aziz B., Performance analysis of a content authentication semifragile watermark, In Proceedings of IEEE International Conference, pp. 2055-2058, (2003)
[5]  
Hsin Chang W., Chang L.-W., Semifragile watermarking for image authentication, localization, and recovery using tchebichef moments, Proceedings of IEEE International Conference on Security, 1, pp. 749-754, (2010)
[6]  
Ekici O., Comparative evaluation of semi fragile watermarking algorithms, Electron. Imaging., 13, pp. 209-216, (2004)
[7]  
Bo L., A new semifragile watermarking algorithm for image authentication, in Proceedings of International Conference of World Congress on Intelligent Control and Automation, Chongqing, pp. 5928-5932, (2008)
[8]  
Liang X., Liang W., Zhang W., Reversible semifragile authentication watermark, In Proceedings of IEEE International Conference on Multimedia and Expo, Beijing, pp. 2122-2125, (2007)
[9]  
Ni Z., Shi Y.Q., Ansari N., Su W., Reversible data hiding, IEEE Trans. Circuits Syst. Video Technol., 16, pp. 354-361, (2006)
[10]  
Piva A., Caldelli R., Semifragile watermarking for still images authentication and content recovery, International Workshop on Image Analysis for Multimedia Interactive Services, Lisboa, pp. 511-515, (2004)