Advertisement

A Survey of Semi-fragile Watermarking Authentication

  • Chin-Feng Lee
  • Jau-Ji Shen
  • Fang-Wei Hsu
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 109)

Abstract

In order to improve security and detection of tampered area, in the meantime be able to resist common image processing operation such as: JPEG, Gaussian Filter or other compression techniques, semi-fragile watermarking technology are considered to be the solution. This paper investigate four different kinds of semi-fragile watermarking method based upon discrete wavelet transformation (DWT), discrete cosine transformation (DCT) and vector quantization (VQ) in image authentication. Four methods will be analyzed in different aspects, including the characteristic of methods, comparison of image quality and false detection rate.

Keywords

Image authentication Semi-fragile watermarking Tamper detection 

Notes

Acknowledgments

This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grants MOST 106-2221-E-324-006-MY2.

References

  1. 1.
    Benrhouma, O., Hermassi, H., Belghith, S.: Tamper detection and self-recovery scheme by DWT watermarking. Nonlinear Dyn 79(3), 1817–1833 (2015)CrossRefGoogle Scholar
  2. 2.
    Li, C., Zhang, A., Liu, Z., Liao, L., Huang, D.: Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication. Multimed. Tools Appl. 74(23), 10581–10604 (2015)CrossRefGoogle Scholar
  3. 3.
    Chen, F., He, H., Huo, Y.: Self-embedding watermarking scheme against JPEG compression with superior imperceptibility. Multimed. Tools Appl. 76(7), 9681–9712 (2017)CrossRefGoogle Scholar
  4. 4.
    Tiwari, A., Sharma, M., Tamrakar, R.K.: Watermarking based image authentication and tamper detection algorithm using vector quantization approach. AEU-Int. J. Electr. Commun. 78, 114–123 (2017)CrossRefGoogle Scholar
  5. 5.
    Bao, J., Yang, Q.: Period of the discrete Arnold cat map and general cat map. Nonlinear Dyn. 70(2), 1365–1375 (2012)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Zhang, J., Tian, L., Tai, H.M.: A new watermarking method based on chaotic maps. In: 2004 IEEE International Conference on Multimedia and Expo, ICME 2004 (2004)Google Scholar
  7. 7.
    Ahmed, N., Natarajan, T., Rao, K.R.: Discrete cosine transform. IEEE Trans. Comput. 100(1), 90–93 (1974)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Yoo, J.C., Han, T.H.: Fast normalized cross-correlation. Circuits Syst. Signal Process. 28(6), 819 (2009)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Information ManagementChaoyang University of TechnologyTaichungTaiwan
  2. 2.Department of Management Information SystemsNational Chung Hsing UniversityTaichungTaiwan

Personalised recommendations