Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery


Chengyou Wang, Heng Zhang, Xiao Zhou, Journal of Information Processing Systems Vol. 14, No. 2, pp. 510-522, Apr. 2018  

10.3745/JIPS.02.0082
Keywords: Image Authentication and Self-recovery, Least Significant Bit (LSB), Peak Signal-to-Noise Ratio (PSNR), Self-embedding Fragile Watermarking
Fulltext:

Abstract

As the major source of information, digital images play an indispensable role in our lives. However, with the development of image processing techniques, people can optionally retouch or even forge an image by using image processing software. Therefore, the authenticity and integrity of digital images are facing severe challenge. To resolve this issue, the fragile watermarking schemes for image authentication have been proposed. According to different purposes, the fragile watermarking can be divided into two categories: fragile watermarking for tamper localization and fragile watermarking with recovery ability. The fragile watermarking for image tamper localization can only identify and locate the tampered regions, but it cannot further restore the modified regions. In some cases, image recovery for tampered regions is very essential. Generally, the fragile watermarking for image authentication and recovery includes three procedures: watermark generation and embedding, tamper localization, and image self-recovery. In this article, we make a review on self-embedding fragile watermarking methods. The basic model and the evaluation indexes of this watermarking scheme are presented in this paper. Some related works proposed in recent years and their advantages and disadvantages are described in detail to help the future research in this field. Based on the analysis, we give the future research prospects and suggestions in the end.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Wang, C., Zhang, H., & Zhou, X. (2018). Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery. Journal of Information Processing Systems, 14(2), 510-522. DOI: 10.3745/JIPS.02.0082.

[IEEE Style]
C. Wang, H. Zhang, X. Zhou, "Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery," Journal of Information Processing Systems, vol. 14, no. 2, pp. 510-522, 2018. DOI: 10.3745/JIPS.02.0082.

[ACM Style]
Chengyou Wang, Heng Zhang, and Xiao Zhou. 2018. Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery. Journal of Information Processing Systems, 14, 2, (2018), 510-522. DOI: 10.3745/JIPS.02.0082.