2019
DOI: 10.1186/s13640-019-0462-3
|View full text |Cite
|
Sign up to set email alerts
|

A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability

Abstract: The rapid developments of storage technology and information exchange encourage the development of research in the field of information security. In the process of sending information, tamper and issues about data ownership may occur. The fragile watermarking is one technique that can overcome the problem, in which this technique exploits sensitivity to tamper with the inserted watermark components. Therefore, it is not tolerable to change even only one bit. Self-embedding can be defined as some important feat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 53 publications
(23 citation statements)
references
References 53 publications
0
23
0
Order By: Relevance
“…Authentication data can be generated using the parity check approach [11,12]. Parity bit checking is a straightforward watermarking approach [13].…”
Section: Parity Bitmentioning
confidence: 99%
“…Authentication data can be generated using the parity check approach [11,12]. Parity bit checking is a straightforward watermarking approach [13].…”
Section: Parity Bitmentioning
confidence: 99%
“…This has the advantage of low complexity and easy implementation, but not too strong to withstand affine transformations and some image processing attacks. However, the frequency domain scheme [5] usually makes it more difficult to see and provides resistance to too many common attacks. In the frequency domain watermarking scheme, the robustness and imperceptibility of the host picture are in the balance.…”
Section: Related Workmentioning
confidence: 99%
“…There are a number of self-embedding watermarking techniques that have been proposed [5]. Either uses fragile watermarking or robust watermarking techniques.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, digital signatures are often unable to locate or recover the manipulations of the critical images [5]- [7]. A common method to deal with these two issues is watermarking [2] which has been developed to provide ownership authentication and integrity verification for digital media [8]- [11]. In this method, some information is inserted inside the original media signal in order to verify the credibility of the content or identify the ownership [12]- [17].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, a good fragile watermarking should be easily affected by any feasible attack. The various types of tampering or common attacks which may be imposed on a watermarked image are as follows [2] [26]- [29]:…”
Section: A Introducing Tampering Attacksmentioning
confidence: 99%