Skip to main content
Log in

A survey on fragile watermarking based image authentication schemes

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Ensuring the image content authentication is a necessity need when images are used as supporting evidence in critical applications such as law enforcement, medical diagnosis, news reporting, and forensic investigation. Fragile watermarking is an effective solution for ensuring image content authentication. This paper presents a survey on fragile watermarking schemes for tamper localization and self-recovery. The characteristics and general framework are included to get an overview of these schemes. A brief review and comparison of various fragile watermarking schemes along with their merits and limitations are also given. The observations drawn from the comparative study are included to aid further research in this area. In addition to this, experimental evaluation of state-of-the-art tamper localization and self-recovery schemes in terms of watermarked image quality, tamper localization accuracy, and recovery capability is carried out.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Ansari IA, Pant M, Ahn CW (2015) Svd based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7 (6):1225–1239

    Article  Google Scholar 

  2. Azeroual A, Afdel K (2017) Real-time image tamper localization based on fragile watermarking and faber-schauder wavelet. AEU-Int J Electron Commun 79:207–218

    Article  Google Scholar 

  3. Benrhouma O, Hermassi H, Belghith S (2017) Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme. Multimed Tools Appl 76(20):21,133–21,156

    Article  Google Scholar 

  4. Bravo-Solorio S, Calderon F, Li C, Nandi AK (2018) Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digit Sig Process 73:83–92

    Article  MathSciNet  Google Scholar 

  5. Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11(6):585–595

    Article  Google Scholar 

  6. Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470

    Article  Google Scholar 

  7. Chang CC, Fan YH, Tai WL (2008) Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 41(2):654–661

    Article  MATH  Google Scholar 

  8. Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27(5):439–446

    Article  Google Scholar 

  9. Dadkhah S, Manaf AA, Hori Y, Hassanien AE, Sadeghi S (2014) An effective svd-based image tampering detection and self-recovery using active watermarking. Sig Process Image Commun 29(10):1197–1210

    Article  Google Scholar 

  10. Fridrich J (2002) Security of fragile authentication watermarks with localization. In: Security and watermarking of multimedia contents IV. International society for optics and photonics, vol 4675, pp 691–700

  11. Fridrich J, Goljan M (1999) Images with self-correcting capabilities. In: Proceedings 1999 international conference on image processing 1999. ICIP 99, vol 3. IEEE, pp 792–796

  12. Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the yeung-mintzer fragile watermarking technique. J Electron Imaging 11(2):262–275

    Article  Google Scholar 

  13. Geetha R, Geetha S (2020) Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique. Multimed Tools Appl 79:1–22

    Article  Google Scholar 

  14. Gonzalez R, Woods R, Eddins S (2020) Image databases. http://www.imageprocessingplace.com. Accessed on August

  15. Gul E, Ozturk S (2019) A novel hash function based fragile watermarking method for image integrity. Multimed Tools Appl 78:1–18

    Article  Google Scholar 

  16. Gull S, Loan NA, Parah SA, Sheikh JA, Bhat G (2018) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Humaniz Comput 11:1–10

    Google Scholar 

  17. Haghighi BB, Taherinia AH, Harati A (2018) Trlh: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique. J Vis Commun Image Represent 50:49–64

    Article  Google Scholar 

  18. He H, Chen F, Tai HM, Kalker T, Zhang J (2012) Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans Inform Forensic Secur 7(1):185–196

    Article  Google Scholar 

  19. He H, Zhang J (2012) Cryptanalysis on majority-voting based self-recovery watermarking scheme. Telecommun Syst 49(2):231–238

    Article  Google Scholar 

  20. He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Sig Process 89 (8):1557–1566

    Article  MATH  Google Scholar 

  21. Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441

    Article  Google Scholar 

  22. Hong W, Chen M, Chen TS (2017) An efficient reversible image authentication method using improved pvo and lsb substitution techniques. Sig Process Image Commun 58:111–122

    Article  Google Scholar 

  23. Hsu CS, Tu SF (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283(9):1737–1743

    Article  Google Scholar 

  24. Huang SC, Jiang CF (2012) A color image authentication and recovery method using block truncation code embedding. J Mar Sci Technol 20(1):49–55

    Article  MathSciNet  Google Scholar 

  25. Kim C, Shin D, Yang CN (2018) Self-embedding fragile watermarking scheme to restoration of a tampered image using ambtc. Pers Ubiquit Comput 22 (1):11–22

    Article  Google Scholar 

  26. Korus P, Dziech A (2013) Efficient method for content reconstruction with self-embedding. IEEE Trans Image Process 22(3):1134–1147

    Article  MathSciNet  MATH  Google Scholar 

  27. Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506

    Article  MathSciNet  MATH  Google Scholar 

  28. Li C, Wang Y, Ma B, Zhang Z (2013) Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimed Tools Appl 64(3):757–776

    Article  Google Scholar 

  29. Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognit 38 (12):2519–2529

    Article  Google Scholar 

  30. Neena Raj NR, Shreelekshmi R (2018) Blockwise fragile watermarking schemes for tamper localization in digital images. In: International conference on control, communication, and computing (IC4). IEEE, pp 441–446

  31. Neena Raj NR, Shreelekshmi R (2019) Security analysis of hash based fragile watermarking scheme for image integrity. In: 2019 2nd international conference on intelligent computing, instrumentation and control technologies (ICICICT), vol 1. IEEE, pp 651–654

  32. Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214–230

    Article  Google Scholar 

  33. Phan RCW (2008) Tampering with a watermarking-based image authentication scheme. Pattern Recogn 41(11):3493–3496

    Article  MATH  Google Scholar 

  34. Prasad S, Pal AK (2020) Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking. Multimed Tools Appl 79(29):20897–20928

    Article  Google Scholar 

  35. Prasad S, Pal AK (2020) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 79(3):1673–1705

    Article  Google Scholar 

  36. Qin C, Ji P, Chang CC, Dong J, Sun X (2018) Non-uniform watermark sharing based on optimal iterative btc for image tampering recovery. IEEE Multimed 25(3):36–48

    Article  Google Scholar 

  37. Qin C, Wang H, Zhang X, Sun X (2016) Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inform Sci 373:233–250

    Article  Google Scholar 

  38. Rajput V, Ansari IA (2019) Image tamper detection and self-recovery using multiple median watermarking. Multimed Tools Appl 79:1–17

    Google Scholar 

  39. Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU-Int J Electron Commun 65(10):840–847

    Article  Google Scholar 

  40. Sarreshtedari S, Akhaee MA (2015) A source-channel coding approach to digital image protection and self-recovery. IEEE Trans Image Process 24 (7):2266–2277

    Article  MathSciNet  MATH  Google Scholar 

  41. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278

    Article  Google Scholar 

  42. Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789

    Article  Google Scholar 

  43. Singh D, Singh SK (2017) Dct based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):953–977

    Article  Google Scholar 

  44. Singh D, Singh SK (2019) Block truncation coding based effective watermarking scheme for image authentication with recovery capability. Multimed Tools Appl 78(4):4197–4215

    Article  Google Scholar 

  45. Sreenivas K, Prasad VK (2018) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern 9(7):1193–1218

    Article  Google Scholar 

  46. Tai WL, Liao ZJ (2018) Image self-recovery with watermark self-embedding. Signal Process Image Commun 65:11–25

    Article  Google Scholar 

  47. Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Sig Process Image Commun 28(3):301–308

    Article  Google Scholar 

  48. Walton S (1995) Image authentication for a slippery new age. Dr Dobb’s J 20(4):18–26

    Google Scholar 

  49. Wang MS, Chen WC (2007) A majority-voting based watermarking scheme for color image tamper detection and recovery. Comput Stand Interfaces 29 (5):561–570

    Article  Google Scholar 

  50. Wang C, Zhang H, Zhou X (2018) A self-recovery fragile image watermarking with variable watermark capacity. Appl Sci 8(4):548

    Article  Google Scholar 

  51. Wong PW (1998) A public key watermark for image verification and authentication. In: Proceedings international conference on image processing (ICIP), vol 1, IEEE, pp 455–459

  52. Wong PW (1998) A watermark for image integrity and ownership verification. In: PICS, pp 374–379

  53. Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601

    Article  MATH  Google Scholar 

  54. Yeung MM, Mintzer F (1997) An invisible watermarking technique for image verification. In: Proceedings international conference on image processing (ICIP), vol 2. IEEE, pp 680–683

  55. Zhang X, Wang S (2008) Fragile watermarking with error-free restoration capability. IEEE Trans Multimed 10(8):1490–1499

    Article  Google Scholar 

  56. Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495

    Article  MathSciNet  MATH  Google Scholar 

  57. (2020) The cvg-ugr image database. http://decsai.ugr.es/cvg/dbimagenes, Accessed on August

Download references

Acknowledgements

Authors extend gratitude to the Department of Higher Education, Government of Kerala, for granting the research fellowship.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. R. Neena Raj.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Raj, N.R.N., Shreelekshmi, R. A survey on fragile watermarking based image authentication schemes. Multimed Tools Appl 80, 19307–19333 (2021). https://doi.org/10.1007/s11042-021-10664-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10664-y

Keywords

Navigation