Skip to main content

A Survey of Semi-fragile Watermarking Authentication

  • Conference paper
  • First Online:

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 109))

Abstract

In order to improve security and detection of tampered area, in the meantime be able to resist common image processing operation such as: JPEG, Gaussian Filter or other compression techniques, semi-fragile watermarking technology are considered to be the solution. This paper investigate four different kinds of semi-fragile watermarking method based upon discrete wavelet transformation (DWT), discrete cosine transformation (DCT) and vector quantization (VQ) in image authentication. Four methods will be analyzed in different aspects, including the characteristic of methods, comparison of image quality and false detection rate.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Benrhouma, O., Hermassi, H., Belghith, S.: Tamper detection and self-recovery scheme by DWT watermarking. Nonlinear Dyn 79(3), 1817–1833 (2015)

    Article  Google Scholar 

  2. Li, C., Zhang, A., Liu, Z., Liao, L., Huang, D.: Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication. Multimed. Tools Appl. 74(23), 10581–10604 (2015)

    Article  Google Scholar 

  3. Chen, F., He, H., Huo, Y.: Self-embedding watermarking scheme against JPEG compression with superior imperceptibility. Multimed. Tools Appl. 76(7), 9681–9712 (2017)

    Article  Google Scholar 

  4. Tiwari, A., Sharma, M., Tamrakar, R.K.: Watermarking based image authentication and tamper detection algorithm using vector quantization approach. AEU-Int. J. Electr. Commun. 78, 114–123 (2017)

    Article  Google Scholar 

  5. Bao, J., Yang, Q.: Period of the discrete Arnold cat map and general cat map. Nonlinear Dyn. 70(2), 1365–1375 (2012)

    Article  MathSciNet  Google Scholar 

  6. Zhang, J., Tian, L., Tai, H.M.: A new watermarking method based on chaotic maps. In: 2004 IEEE International Conference on Multimedia and Expo, ICME 2004 (2004)

    Google Scholar 

  7. Ahmed, N., Natarajan, T., Rao, K.R.: Discrete cosine transform. IEEE Trans. Comput. 100(1), 90–93 (1974)

    Article  MathSciNet  Google Scholar 

  8. Yoo, J.C., Han, T.H.: Fast normalized cross-correlation. Circuits Syst. Signal Process. 28(6), 819 (2009)

    Article  Google Scholar 

Download references

Acknowledgments

This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grants MOST 106-2221-E-324-006-MY2.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jau-Ji Shen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lee, CF., Shen, JJ., Hsu, FW. (2019). A Survey of Semi-fragile Watermarking Authentication. In: Pan, JS., Ito, A., Tsai, PW., Jain, L. (eds) Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2018. Smart Innovation, Systems and Technologies, vol 109. Springer, Cham. https://doi.org/10.1007/978-3-030-03745-1_33

Download citation

Publish with us

Policies and ethics