scholarly journals Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images

2017 ◽  
Vol 9 (4) ◽  
pp. 56 ◽  
Author(s):  
◽  
◽  
2018 ◽  
Vol 5 (2) ◽  
pp. 69-94
Author(s):  
K R Chetan ◽  
S Nirmala

A novel adaptive semi-fragile watermarking scheme for tamper detection and recovery of digital images is proposed in this paper. This scheme involves embedding of content and chroma watermarks generated from the first level Discrete Curvelet Transform (DCLT) coarse coefficients. Embedding is performed by quantizing the first level coarse DCLT coefficients of the input image and amount of quantization is intelligently decided based on the energy contribution of the coefficients. During watermark extraction, a tampered matrix is generated by comparing the feature similarity index value between each block of extracted and generated watermarks. The tampered objects are subsequently identified and an intelligent report is formed based on their severity classes. The recovery of the tampered objects is performed using the generated DCLT coefficients from luminance and chrominance components of the watermarked image. Results reveal that the proposed method outperforms existing method in terms of tamper detection and recovery of digital images.


2013 ◽  
Vol 13 (02) ◽  
pp. 1340002 ◽  
Author(s):  
DURGESH SINGH ◽  
SHIVENDRA SHIVANI ◽  
SUNEETA AGARWAL

This paper suggests an efficient fragile watermarking scheme for image content authentication along with altered region restoration capability. In this scheme, image is divided into nonoverlapping blocks of size 2 × 2 and for each block, eight bits for image content recovery data and four bits for authentication data from five most significant bits (MSBs) of each pixel, are generated. These 12 bits are embedded into the least significant bits (LSBs) of the pixels which are placed in its corresponding mapping block. At the receiver end by comparing the recalculated and extracted authentication data, the tampered blocks can easily be identified and using recovery data, one can easily restore the tampered block. Results of experiments demonstrate that the proposed scheme is effective enough for alteration detection as well as tamper recovery of the image.


2013 ◽  
Vol 401-403 ◽  
pp. 1772-1775
Author(s):  
Hui Fen Huang

For existing airspace fragile authentication watermarking algorithm positioning accuracy and security issues, this paper presents a fully-fragile watermarking based on chaos for the integrity of the image content authentication and tamper localization. The algorithm uses the original image block, the calculation of each pixel in the image block high-bit gray value as the image feature watermark information. The chaotic sequence is encrypted and determines the position of the watermark bit is embedded watermark information, tampering with the positioning accuracy of an image block of 2 × 2 pixels. Experimental results show that the algorithm is simple, safe, with good practice.


Sign in / Sign up

Export Citation Format

Share Document