Next Article in Journal / Special Issue
TSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption
Previous Article in Journal
Botnet Detection Technology Based on DNS
Previous Article in Special Issue
A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing
Open AccessReview

Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images

School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China
*
Author to whom correspondence should be addressed.
Future Internet 2017, 9(4), 56; https://doi.org/10.3390/fi9040056
Received: 28 August 2017 / Revised: 18 September 2017 / Accepted: 21 September 2017 / Published: 25 September 2017
(This article belongs to the Collection Information Systems Security)
With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people’s attention. The fragile watermark for integrity authentication of image data and protection of copyright has become a hotspot. In the storage and transmission process, image data must be compressed to save network bandwidth. As a result, semi-fragile watermarking techniques, which can be used to distinguish common image processing operations from malicious tampering, are emerging. In this paper, semi-fragile watermarking algorithms for image authentication are surveyed. The basic principles and characteristics about semi-fragile watermarking algorithms are introduced, and several kinds of attack behaviors are also included. Aiming at several typical image-authentication algorithms, advantages and disadvantages are analyzed, and evaluation indexes of various algorithms are compared. Finally, we analyze the key points and difficulties in the study on semi-fragile watermarking algorithms, and the direction about future development is prospected. View Full-Text
Keywords: image watermarking; semi-fragile watermark; content authentication; tamper detection; recovery; evaluation indexes image watermarking; semi-fragile watermark; content authentication; tamper detection; recovery; evaluation indexes
Show Figures

Figure 1

MDPI and ACS Style

Yu, X.; Wang, C.; Zhou, X. Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images. Future Internet 2017, 9, 56.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop