Next Article in Journal / Special Issue
TSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption
Previous Article in Journal
Botnet Detection Technology Based on DNS
Previous Article in Special Issue
A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing
Article Menu

Export Article

Open AccessReview
Future Internet 2017, 9(4), 56; doi:10.3390/fi9040056

Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images

School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China
*
Author to whom correspondence should be addressed.
Received: 28 August 2017 / Revised: 18 September 2017 / Accepted: 21 September 2017 / Published: 25 September 2017
(This article belongs to the Collection Information Systems Security)
View Full-Text   |   Download PDF [742 KB, uploaded 25 September 2017]   |  

Abstract

With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people’s attention. The fragile watermark for integrity authentication of image data and protection of copyright has become a hotspot. In the storage and transmission process, image data must be compressed to save network bandwidth. As a result, semi-fragile watermarking techniques, which can be used to distinguish common image processing operations from malicious tampering, are emerging. In this paper, semi-fragile watermarking algorithms for image authentication are surveyed. The basic principles and characteristics about semi-fragile watermarking algorithms are introduced, and several kinds of attack behaviors are also included. Aiming at several typical image-authentication algorithms, advantages and disadvantages are analyzed, and evaluation indexes of various algorithms are compared. Finally, we analyze the key points and difficulties in the study on semi-fragile watermarking algorithms, and the direction about future development is prospected. View Full-Text
Keywords: image watermarking; semi-fragile watermark; content authentication; tamper detection; recovery; evaluation indexes image watermarking; semi-fragile watermark; content authentication; tamper detection; recovery; evaluation indexes
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Yu, X.; Wang, C.; Zhou, X. Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images. Future Internet 2017, 9, 56.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top