You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

1 October 2023

Robust Blind Image Watermarking Using Coefficient Differences of Medium Frequency between Inter-Blocks

,
,
and
1
School of Department of Electronic Information and Computer Engineering, The Engineering & Technical College, Chengdu University of Technology, Leshan 614000, China
2
School of Cyberspace Security, Hainan University, Haikou 570228, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Recent Developments and Applications of Image Watermarking, 2nd Edition

Abstract

The existing discrete cosine transform (DCT) differential quantization robust watermarking has poor robustness against JPEG compression, cropping, and combined attacks. To improve such issues, a pair of adjacent block coefficients are selected to reduce the offset and improve the robustness of the watermarking. Firstly, at adjacent positions of neighboring blocks, the differences of medium frequency coefficients are calculated, and then the differences are used to divide regions. Experimental results show that this method is more robust to various attacks than the existing DCT differential quantization robust watermarking. The accuracy of watermark extraction under a JPEG compression attack increased by 2%, while the error rates of watermark extraction under a cropping attack and a combination attack decreased by 4.4% and 9%.

1. Introduction

The promotion of digitization spreads multimedia widely, which inevitably leads to the problem of copyright infringement. Compared with other copyright protection objects, digital images spread rapidly in the network and are more vulnerable to attacks. The types of attacks can be divided into malicious attacks, such as cropping and rotation, and inevitably non-malicious attacks, such as noise and compression. Effective technologies are needed to resist these attacks. Therefore, digital watermarking has been invented to effectively protect the security of digital images, accurately locate the area of malicious tampering, and resist attacks.
The quality of watermarking mainly depends on its robustness, vulnerability, capacity, and imperceptibility [1,2]. Digital watermarking can be divided into two main categories according to embedding methods: spatial domain watermarking [3,4,5,6,7] and frequency domain watermarking [8,9,10,11,12,13,14,15,16,17,18]. The former is to embed a watermark directly into the host image pixels, and the most classic algorithm is the LSB (least significant bit) method [19,20,21,22,23,24]. Although this technique has lower computational complexity and higher image quality, it has poor robustness and it is vulnerable to attacks. Frequency domain watermarking is mainly designed to improve the robustness of watermarking, where modifying a single coefficient in the spatial domain brings about changes in all pixels corresponding to an image block [25,26,27,28,29,30,31,32,33,34,35,36,37]. The host image is transformed through the use of SVD (Singular Value Decomposition), IWT (Integer Wavelet Transform), DCT, etc. [10,11,12,13,14,15,16,17].
SVD is divided into quantization index modulation (QIM) and relative modulation (RM), but it cannot fully extract the embedding watermark, for there is information loss after the transform. Hu et al. [10] proposed a hybrid modulation, integrating QIM and RM, to completely extract the watermark without attacks. The advantage is that the watermark can be recovered well when the JPEG and cropping attacks are less than 25%. The disadvantages are that the embedding process is complicated, and the time complexity is high. The image quality evaluated using the peak signal-to-noise ratio (PSNR) is 38.5 dB, which is lower than the acceptable value of 40 dB [2].
IWT divides a signal into four frequency subbands. Low-frequency subbands contain abundant information, where the information embedding will reduce the image quality. High-frequency subbands contain less information, but information embedding will lead to poor robustness. Therefore, researchers have put forward a series of hybrid transform-based methods [11,12,13]. Salehnia et al. [11] combined LWT and SVD to improve the incomplete watermark extraction of SVD and the poor robustness of WT (wavelet transforms). They embedded the watermark into three subbands of the first-level LWT. This method reduces the extraction error rate and improves the robustness under the attacks of JPEG, noise, and cropping. To further improve the robustness, Sinhal et al. [12] performed DCT on the low-frequency subbands after a wavelet transform, embedded information into DCT coefficients, and applied a neural network to accelerate the embedding speed. It has higher robustness under JPEG and noise attacks, but the PSNR is less than 40 dB. The methods based on DCT inter-block coefficient difference [14,15,16,17] effectively guarantee a PSNR greater than 40 dB and improve robustness under compression and hybrid attacks. Both SVD-based and WT-based methods have their own disadvantages: (1) An SVD-based method cannot extract a watermark accurately without attacks; (2) WT-based methods divide the subbands into low, medium, and high frequencies. When the watermark is embedded in low frequency, PSNR is not ideal, and the robustness is weak in medium and high frequency.
DCT-based watermarking is superior to other methods in terms of accuracy, imperceptibility, and robustness. The method, based on the DCT inter-block coefficient difference, can effectively ensure imperceptibility and increase robustness against compression and hybrid attacks. The literature [14,15,16,17] uses the method of quantizing DCT inter-block coefficient difference to embed watermarks, but the selected coefficients and quantized regions can be further optimized and improve the robustness.
The rest of the paper is organized as follows. Section 2 describes the state of the art of the existing schemes and the improvement idea of our scheme. Section 3 illustrates our method in detail. Section 4 gives the experimental results and comparisons to prove the effectiveness and superiority of our scheme. Section 5 concludes this paper.

3. Proposed Method

The proposed embedding method is based on the DCT coefficient differences. The watermark is embedded according to the predefined rules and the difference offsets. The watermark is extracted according to the region where the differences are located.
This paper compares the deficiencies of previous methods and puts forward some selection rules in terms of inter-block adjacency, difference regions, and offset coefficients.
Selection of inter-block adjacency: The adjacency used in [14] is UD, where each DCT block is the block in the next row. The selected adjacency in [15] is LR and RL (right to left), and the selection of a UD block is used for the connecting part of two rows; please refer to the location indicated by RD and LD in Figure 2. The selected adjacencies in [16] are LR, UD, RL, and DU (down to up), as shown in Figure 3. A 16 × 16 block is divided into four 8×8 sub-blocks to fully consider the correlation between image blocks. The rules of adjacency selection used in this paper also follow the rules in [16].
Figure 2. Arrangement of DCT blocks 1.
Figure 3. Arrangement of DCT blocks2.
Selection of difference regions: The difference partition in [15,16] is set to five regions; watermark bits are embedded in different regions. It can be concluded that Region 3 is not used for embedding. The difference between the coefficients of the same position of adjacent blocks is very small. Thus, most of the difference is within Region 3. This means that all differences need to be modified, and increasing the number and amount of difference offsets will reduce the robustness of the watermark. As a result, the proposed method reduces the difference regions to four, and embeds watermark bits into Region 1, 3 and Region 2, 4, which can reduce the number and the value of offsets and improve the robustness of the watermarking. The rule of partitioning is shown in Figure 4.
Figure 4. Modification of coefficient for embedding a watermark bit.
Selection of offset coefficients: Adjacent blocks in [15,16] are selected as separate medium-frequency coefficients, which will inevitably cause the iterative influence of coefficient offset in watermark embedding, increase the reference coefficient offset and offset amplitude, and also affect the robustness and imperceptibility of the watermarking scheme. In this paper, two adjacent coefficients in the same block are selected as the correction and the reference coefficients, respectively, so as to eliminate the influence caused by iterative offset coefficients and improve the robustness.

3.1. Embedding Process

Step1: subtract the original image pixel value by 128, and limit the pixel size to the range of [ 128 , 128 ] .
Step2: Divide the image size of H × W into 8 × 8 non-overlapping blocks.
Step3: Perform DCT on each 8 × 8 block, and denote the block matrix as B P , Q , where P, Q represents the position of the block in the image.
Step4: Find the four relationships from LR, RD (rightmost to down), RL, DU according to the selection rule of inter-block adjacency, C is the next block of B P , Q .
LR: C = RD: C = RL: C = B P , Q 1 DU: C = B P 1 , Q
Step5: Calculate the difference between adjacent blocks by Equation (1).
Diff = B P , Q x 1 , y 1 C x 2 , y 2
Step6: Calculate the difference by B P , Q . The DC, M e d B P , Q is the median value of the first nine low-frequency zig-zag-ordered AC coefficients. The scale factor to calculate the difference each time of the offset M( B P , Q ) is found by using Equation (2).
M B P , Q = abs Z × DC B P , Q Med B P , Q DC B P , Q
Step7: Embed the binary watermark map into the difference according to the corresponding position, and iterate the offset by the offset. After each offset, the diff is recalculated by using Equations (3) and (4).
Embedding bit.
0 B P , Q x 1 , y 1 + M B P , Q T 2 d i f f T + E B P , Q x 1 , y 1 M B P , Q E d i f f T 2 B P , Q x 1 , y 1 + M B P , Q d i f f T + E
Embedding bit.
1 B P , Q x 1 , y 1 M B P , Q d i f f T E B P , Q x 1 , y 1 + M B P , Q T / 2 d i f f E B P , Q x 1 , y 1 M B P , Q d i f f T / 2
Step8: Generate all the image blocks by using step4 to step7.
Step9: Perform inverse DCT operation on all blocks; all pixels are added by 128 to generate a watermark image.
For the overall embedding framework of the watermark, the overall steps are shown in the following Figure 5: I represents the original image, W represents the binary watermark image, and I’ represents the embedded watermark image. The quantization and encryption methods used for embedding have been discussed in the previous text.
Figure 5. Watermark embedding flowchart.

3.2. Extraction Process

Step1: Subtract the original image pixel value by 128, and the pixel size is limited to the range of −128 to 128.
Step2: Divide the H × W size image into 8 × 8 non-overlapping blocks.
Step3: Perform DCT on each 8 × 8 block, denote the block matrix as B P , Q , where P, Q represents the position of the block in the image.
Step4: According to the selection rule of inter-block adjacency, find the four relationships from LR, RD, RL, DU. C is the next block of B P , Q .
Step5: Calculate the difference between adjacent blocks, extract the watermark according to the partition threshold T, difference region 1, 3 extract watermark bits0, difference region 2, 4 extract watermark bits1.

3.3. Embedding and Extraction of Color Image Watermark

In this experiment, the RGB color channels are divided into three planes, namely R, G, and B. Each plane is regarded as a separate gray scale image, and the watermark is embedded into each plane separately. In the RGB channels, we use the same key and binary watermark.

4. Experimental Results

This experiment tests the robustness and imperceptibility of watermarking by various attacks. Figure 5 shows the original images and the watermarked images, which are labelled as the Lena, Airplane, and Peppers images. The size of each original image is 512 × 512 and the binary watermark is 64 × 64.
Mean square error (MSE) is used to calculate the difference between the original image and the watermark image. PSNR is used to evaluate the quality of the watermark image. Normalized correlation (NC) and bit error rate (BER) are used as the measures of accuracy for the binary watermark extracted from the watermarked image. The definitions of PSNR, NC, and BER are as follows:
PSNR: This is the most important and commonly used image quality assessment. If I denotes the original image and I w denotes the watermarked image, the PSNR is defined by Equation (5).
PSNR = 10 log 10 255 2 MSE
MSE is defined in Equation (6).
MSE = i = 1 W j = 1 H I ( i , j ) - I w ( i , j ) 2
where W and H are the width and height of the image, respectively, I ( i , j ) are the original pixel values, and I w i , j are the original pixel values. MSE indicates the difference between the original image and the watermarked image, and the PSNR value evaluates the imperceptibility of the watermarked image, so MSE is as small as possible and PSNR is as large as possible.
NC: This is used to evaluate the watermark. NC is defined in Equation (7).
NC = i j W i , j × W x i , j i j W ( i , j ) 2
where W is the watermarked image, W x is the image that the watermark is extracted from, and (i,j) is the position of the watermark pixels in the image. Larger NC values indicate that the extracted watermark is more similar to the original watermark, which means the robustness is higher.
BER: This is defined as the ratio of the number of erroneous watermark bits to the total number of embedded bits. The lower the BER, the more robust the watermark is to attacks. The BER is defined in Equation (8).
BER = j = 1 n B j B x ( j ) × 100
where n is the total number of embedded watermarked bits, B j is the original watermarked bits, and B x ( j ) is the extracted watermark bits.
In this experiment, the tests of payload, imperceptibility, and robustness are performed on different gray and color images. The scheme is compared with existing DCT inter-block difference watermarking, and the results show that the scheme outperforms existing watermarking techniques in terms of imperceptibility and robustness. In addition, it is able to provide high-quality watermarked images.

4.1. Non-Attack Watermark Extraction

Different offsets E have various effects on the imperceptibility and robustness of the image. Figure 6a shows the effect of the offset from E = 5 to E = 20 on the PSNR.
Figure 6. PSNR comparison of Lena watermark images under different values of E. (a) PSNR under different values of E using proposed method; (b) PSNR under different methods using the same values of E [15,16].
Figure 6b is used to compare the imperceptibility of the present experimental method with the two current methods based on the difference between DCT blocks, and it can be clearly seen that the proposed method and the methods of [15,16] are accurate when extracting the watermark without attacks. The imperceptibility of the proposed method is higher than that in [15,16] when the offset E = 12. For this, two coefficients are chosen to eliminate the effect of iteration to improve the image quality and increase the robustness. However, in the following experiments, to achieve the best balance between imperceptibility and robustness, E = 14 is used in single and hybrid attacks. In order to compare with the methods of [15,16] under as similar conditions as possible, the E value of JPEG compression attack is changed to 20.
The I, I′, and W′ in Figure 7 represent the original image, watermark image, extracted binary watermark, and corresponding PSNR, NC, and BER, respectively. It indicates that the watermark can be extracted losslessly without attack.
Figure 7. PSNR experimental results.

4.2. Robustness Analysis after a Single Attack

In this section, single attacks such as cropping, JPEG, noise, histogram equalization, and sharpening are performed on the watermarked image to test the robustness and whether the watermark can be extracted under the attacks.

4.2.1. Watermark Extraction after Crop Attack

Figure 8 shows an image with a 10% crop in the center; the BER of the extracted watermark is 1.03%. Figure 8 shows the Lena image with 25% cropping of the image (in different regions: top left, top right, bottom left, bottom right) with an average BER of 2.40%. It also shows the Lena image with 50% bottom crop and a BER of 4.71% for the extracted watermark. The results of the cropping attack experiments show that the method can extract the watermark under a cropping attack, and the robustness of the proposed method is compared with robustness under a cropping attack (Lena image) proposed in schemes [15,16] and shown in Figure 9; the proposed method has a lower BER of about 36% compared to scheme [15] and about 4.4% compared to scheme [16].
Figure 8. Cropped Lena images in six different regions.
Figure 9. BER comparison of different cropping methods [15,16].

4.2.2. Watermark Extraction after JPEG Attack

JPEG is a standard compression technique used to minimize image storage requirements and to reduce the bandwidth required for transmission. In our work, we use JPEG compression for the watermarked Lena image with different quality factors (Q = 90 to 40). In methods [15,16], they have changed the offset threshold E = 12 to E = 20 in the process of embedding in order to increase the robustness under JPEG attack and reduce the invisibility of the watermarked image. Our experiment also performs a JPEG attack with E = 20 and outperforms the previous schemes in terms of PSNR, NC, and BER. As Figure 10 shows, when the JPEG compression quality factor Q is at 90 to 60, the proposed scheme can extract binary watermarking without loss with NC = 1 and BER = 0. As shown in Figure 11, our method can still extract watermarks when the Q values are 50 and 40.
Figure 10. After JPEG compression (Q = 90 − 60) and extracted watermarks.
Figure 11. After JPEG compression (Q = 50 − 40) and extracted watermarks.
Table 1 shows that the proposed scheme can extract the watermark accurately when the quality factor Q is from 60 to 90, while [15,16] cannot extract it with a minor JPEG compression of Q = 90 and Q = 70. In addition, ref. [17] extracts the watermark accurately with Q from 90 to 70, but the NC values are lower than the proposed scheme with Q = 60 to 40.
Table 1. NC Comparisons under JPEG compression with various QF.

4.2.3. Watermark Extraction after Noise and Other Attacks

The proposed method was tested via noise addition, sharpening, histogram equalization, and median filtering. The detailed results for the various attacks are listed as shown in Figure 12.
Figure 12. Comparisons for a variety of attacks.
Salt and Pepper noise: The watermarked image is affected by salt and pepper noise with noise density = 0.01.
Gaussian noise: After adding Gaussian noise 0.001 with zero mean and variance.
Sharpening: The watermarked Lena image after sharpening.
Histogram equalization: The watermarked Lena image after histogram equalization.
Median filtering: The Lena image with the extracted watermark is filtered using a median filter of size 3 × 3.
The comparison of the experimental results is shown in Figure 13 and Table 2, which indicates that the proposed method is generally better than those in the literature [15,16]. The comprehensive watermarking performance of this experimental method after a single attack is higher than that of [15,16], with a 3.9% improvement in BER and 16% improvement in PSNR compared to scheme [15] after a single attack, and a slight improvement in BER and PSNR compared to scheme [16] after a single attack.
Figure 13. NC comparisons for a variety of attacks [15,16].
Table 2. Comparisons after noise and other attacks.

4.3. Robustness Analysis after Combined Attacks

This proposed method is robust not only against a single attack but also against 2–3 hybrid attacks. The experimental results under six mixed attacks are shown in Figure 14 and Figure 15. It can be seen that BER is greatly improved compared to scheme [15], with a combined improvement of 9%.
Figure 14. BER comparison with various combined attacks. (a): salt and pepper noise and median filter; (b) histogram equalization, sharpening and scaling; (c) histogram equalization and scaling; (d) degree rotation and crop by 25% on the left; (e) 5-degree rotation, 25% crop on the upper left, and histogram equalization; (f) 5-degree rotation, upper left 25% crop, and sharpening.
Figure 15. BER comparison with various combined attacks. (a): salt and pepper noise and median filter; (b) histogram equalization, sharpening and scaling; (c) histogram equalization and scaling; (d) degree rotation and crop by 25% on the left; (e) 5-degree rotation, 25% crop on the upper left, and histogram equalization; (f) 5-degree rotation, upper left 25% crop, and sharpening [15].

5. Conclusions

A robust watermarking method based on DCT inter-block coefficient difference is proposed in this paper. A pair of coefficients in an 8 × 8 DCT block is selected, and the coefficients are slightly changed and offset to a prescribed interval by the adjacent inter-block relations. The proposed method improves the accuracy and robustness of watermarking, which is mainly reflected in the following four aspects. Under the crop attack, BER is about 36% better than [15] and about 4.4% better than [16]. Under JPEG compression above QF = 60, the scheme extracts the watermark accurately and BER = 0. Under the hybrid attack, the average BER is about 9% better than [15]. Under the attacks of noise, histogram equalization, sharpening, and median filter, BER, in comparison with the literature [15], is increased by 3.9%, and the PSNR is increased by 16%, which is also slightly higher than [16]. From the above experimental data, it can be concluded that our scheme has better robustness compared with the existing DCT differential quantization robust watermarking schemes. The existing scheme only targets traditional robust attacks, and the subsequent research on the method’s resistance to adversarial attacks will be based on [38,39].

Author Contributions

Conceptualization, B.Z. and X.Z.; methodology, B.Z. and X.Z.; validation, B.Z. and T.Z.; writing—original draft preparation, B.Z.; writing—review and editing, X.Z.; visualization, B.Z. and X.F. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (No. 62362025) and the Hainan Province Key R & D plan project (No. ZDYF2022GXJS224).

Data Availability Statement

Data Availability The datasets generated during and/or analyzed during the current study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

List of Abbreviations

DCTDiscrete Cosine Transform
SVDSingular Value Decomposition
IWTInteger Wavelet Transform
WTWavelet Transforms
LWTLifting Wavelet Transform
QIMQuantization Index Modulation
RMRelative Modulation
JPEGJoint Photographic Experts Group
PSNRPeak Signal-to-Noise Ratio
NCNormalized Correlation
BERBit Error Ratio
DCDirect Current
ACAlternating Current

References

  1. Lu, T.-C.; Vo, T.N. Reversible steganography techniques: A survey. In Digital Media Steganography; Elsevier: Amsterdam, The Netherlands, 2020; pp. 189–213. [Google Scholar]
  2. Ray, A.; Roy, S. Recent trends in image watermarking techniques for copyright protection: A survey. Int. J. Multimed. Inf. Retr. 2020, 9, 249–270. [Google Scholar] [CrossRef]
  3. Qin, C.; Ji, P.; Zhang, X.; Dong, J.; Wang, J. Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 2017, 138, 280–293. [Google Scholar] [CrossRef]
  4. Wang, W.; Ye, J.; Wang, T. Reversible data hiding scheme based on significant-bit-difference expansion. IET Image Process. 2017, 11, 1002–1014. [Google Scholar] [CrossRef]
  5. Kumar, R.; Jung, K.-H. Robust reversible data hiding scheme based on two-layer embedding strategy. Inf. Sci. 2020, 512, 96–107. [Google Scholar] [CrossRef]
  6. Li, X.; Li, J.; Li, B.; Yang, B. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 2013, 93, 198–205. [Google Scholar] [CrossRef]
  7. Peng, F.; Li, X.; Yang, B. Improved PVO-based reversible data hiding. Digit. Signal Process. 2014, 25, 255–265. [Google Scholar] [CrossRef]
  8. Molina-Garcia, J.; Garcia-Salgado, B.P.; Ponomaryov, V.; Reyes-Reyes, R.; Sadovnychiy, S.; Cruz-Ramos, C. An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process. Image Commun. 2019, 81, 115725. [Google Scholar] [CrossRef]
  9. Bolourian Haghighi, B.; Taherinia, A.H.; Monsefi, R. An effective semi-fragile watermarking method for image authentication based on lifting wavelet transform and feed-forward neural network. Cogn. Comput. 2020, 12, 863–890. [Google Scholar] [CrossRef]
  10. Hu, H.T.; Hsu, L.Y.; Chou, H.H. An improved SVD-based blind color image watermarking algorithm with mixed modulation incorporated. Inf. Sci. 2020, 519, 161–182. [Google Scholar] [CrossRef]
  11. Salehnia, T.; Fathi, A. Fault tolerance in LWT-SVD based image watermarking systems using three module redundancy technique. Expert Syst. Appl. 2021, 179, 115058. [Google Scholar] [CrossRef]
  12. Sinhal, R.; Jain, D.K.; Ansari, I.A. Machine learning based blind color image watermarking scheme for copyright protection. Pattern Recognit. Lett. 2021, 145, 171–177. [Google Scholar] [CrossRef]
  13. Li, Z.; Zhang, H.; Liu, X.; Wang, C.; Wang, X. Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT. Digit. Signal Process. 2021, 115, 103062. [Google Scholar] [CrossRef]
  14. Das, C.; Panigrahi, S.; Sharma, V.K.; Mahapatra, K. A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU-Int. J. Electron. Commun. 2014, 68, 244–253. [Google Scholar] [CrossRef]
  15. Parah, S.A.; Sheikh, J.A.; Loan, N.A.; Bhat, G.M. Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit. Signal Process. 2016, 53, 11–24. [Google Scholar] [CrossRef]
  16. Ko, H.-J.; Huang, C.-T.; Horng, G.; Wang, S.-J. Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Inf. Sci. 2020, 517, 128–147. [Google Scholar] [CrossRef]
  17. Kamili, A.; Hurrah, N.N.; Parah, S.A.; Bhat, G.M.; Muhammad, K. DWFCAT: Dual watermarking framework for industrial image authentication and tamper localization. IEEE Trans. Ind. Inform. 2020, 17, 5108–5117. [Google Scholar] [CrossRef]
  18. Zhou, X.; Ma, Y.; Zhang, Q.; Mohammed, M.A.; Damaševičius, R. A reversible watermarking system for medical color images: Balancing capacity, imperceptibility, and robustness. Electronics 2021, 10, 1024. [Google Scholar] [CrossRef]
  19. Hemida, O.; He, H. A self-recovery watermarking scheme based on block truncation coding and quantum chaos map. Multimed. Tools Appl. 2020, 79, 18695–18725. [Google Scholar] [CrossRef]
  20. Shehab, A.; Elhoseny, M.; Muhammad, K.; Sangaiah, A.K.; Yang, P.; Huang, H.; Hou, G. Secure and robust fragile watermarking scheme for medical images. IEEE Access 2018, 6, 10269–10278. [Google Scholar] [CrossRef]
  21. Bhalerao, S.; Ansari, I.A.; Kumar, A. A secure image watermarking for tamper detection and localization. J. Ambient Intell. Humaniz. Comput. 2021, 12, 1057–1068. [Google Scholar] [CrossRef]
  22. Rhayma, H.; Makhloufi, A.; Hamam, H.; Hamida, A.B. Semi-fragile watermarking scheme based on perceptual hash function (PHF) for image tampering detection. Multimed. Tools Appl. 2021, 80, 26813–26832. [Google Scholar] [CrossRef]
  23. Raj, N.R.N.; Shreelekshmi, R. A survey on fragile watermarking based image authentication schemes. Multimed. Tools Appl. 2021, 80, 19307–19333. [Google Scholar] [CrossRef]
  24. Huang, L.; Kuang, D.; Li, C.-L.; Zhuang, Y.-J.; Duan, S.-H.; Zhou, X.-Y. A self-embedding secure fragile watermarking scheme with high quality recovery. J. Vis. Commun. Image Represent. 2022, 83, 103437. [Google Scholar] [CrossRef]
  25. Qi, W.F.; Zhang, T.; Guo, Z.M. Reversible data hiding using multiple histogram modification and dynamic programming. IEEE Trans. Inf. Forensics Secur. 2019, 10, 1109. [Google Scholar]
  26. Liu, X.-L.; Lin, C.-C.; Yuan, S.-M. Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans. Circuits Syst. Video Technol. 2016, 28, 1047–1055. [Google Scholar] [CrossRef]
  27. Guo, J.; Zheng, P.; Huang, J. Secure watermarking scheme against watermark attacks in the encrypted domain. J. Vis. Commun. Image Represent. 2015, 30, 125–135. [Google Scholar] [CrossRef]
  28. Ansari, I.A.; Pant, M.; Ahn, C.W. SVD based fragile watermarking scheme for tamper localization and self-recovery. Int. J. Mach. Learn. Cybern. 2016, 7, 1225–1239. [Google Scholar] [CrossRef]
  29. Swaraja, K.; Meenakshi, K.; Kora, P. An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed. Signal Process. Control 2020, 55, 101665. [Google Scholar]
  30. Prasad, S.; Pal, A.K. Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking. Multimed. Tools Appl. 2020, 79, 20897–20928. [Google Scholar] [CrossRef]
  31. Lee, C.-F.; Shen, J.-J.; Chen, Z.-R.; Agrawal, S. Self-embedding authentication watermarking with effective tampered location detection and high-quality image recovery. Sensors 2019, 19, 2267. [Google Scholar] [CrossRef]
  32. Feng, B.; Li, X.; Jie, Y.; Guo, C.; Fu, H. A Novel semi-fragile digital watermarking scheme for scrambled image authentication and restoration. Mob. Netw. Appl. 2020, 25, 82–94. [Google Scholar] [CrossRef]
  33. Rakhmawati, L.; Wirawan, W.; Suwadi, S. A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP J. Image Video Process. 2019, 2019, 61. [Google Scholar] [CrossRef]
  34. Prasad, S.; Pal, A.K. A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed. Tools Appl. 2020, 79, 1673–1705. [Google Scholar] [CrossRef]
  35. Botta, M.; Cavagnino, D.; Pomponiu, V. Reversible fragile watermarking for multichannel images with high redundancy channels. Multimed. Tools Appl. 2020, 79, 26427–26445. [Google Scholar] [CrossRef]
  36. Gong, X.; Chen, L.; Yu, F.; Zhao, X.; Wang, S. A secure image authentication scheme based on dual fragile watermark. Multimed. Tools Appl. 2020, 79, 18071–18088. [Google Scholar] [CrossRef]
  37. Duan, S.; Wang, H.; Liu, Y.; Huang, L.; Zhou, X. A novel comprehensive watermarking scheme for color images. Secur. Commun. Netw. 2020, 2020, 8840779. [Google Scholar] [CrossRef]
  38. Machado, G.R.; Silva, E.; Goldschmidt, R.R. Adversarial Machine Learning in Image Classification: A Survey Towards the Defender’s Perspective. ACM Comput. Surv. (CSUR) 2021, 55, 1–38. [Google Scholar] [CrossRef]
  39. Song, Z.; Zhang, Z.; Zhang, K.; Luo, W.; Fan, Z.; Ren, W.; Lu, J. Robust Single Image Reflection Removal Against Adversarial Attacks. In Proceedings of the 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Vancouver, BC, Canada, 18–22 June 2023. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.