Dual image-based reversible fragile watermarking scheme for tamper detection and localization

This study proposes an efficient dual image-based reversible fragile watermarking scheme (DI-RFWS) that can accurately detect and locate the tampering regions from an image. The proposed scheme embeds two secret bits in each host image (HI) pixel using a pixel readjustment strategy to obtain dual wa...

Full description

Saved in:
Bibliographic Details
Published inPattern analysis and applications : PAA Vol. 26; no. 2; pp. 571 - 590
Main Authors Sahu, Aditya Kumar, Sahu, Monalisa, Patro, Pramoda, Sahu, Gupteswar, Nayak, Soumya Ranjan
Format Journal Article
LanguageEnglish
Published London Springer London 01.05.2023
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This study proposes an efficient dual image-based reversible fragile watermarking scheme (DI-RFWS) that can accurately detect and locate the tampering regions from an image. The proposed scheme embeds two secret bits in each host image (HI) pixel using a pixel readjustment strategy to obtain dual watermarked images (WIs). The pixel readjustment strategy performs a maximum modification of ± 1 to the non-boundary pixels of an image based on the watermark information. The results of the study suggest that in addition to reversibility, the proposed scheme offers triple objective of high capacity, better perceptual transparency, and robustness. Experimental results also show that the proposed scheme achieves a superior peak signal-to-noise ratio (PSNR) of above 52 dB for both the WIs. Further, the proposed scheme can efficiently detect and locate the tampering regions from an image with a high true positive rate, low false positive and negative rate for various tampering rates. Additionally, the proposed scheme shows superior resistance against various intentional and unintentional attacks.
AbstractList This study proposes an efficient dual image-based reversible fragile watermarking scheme (DI-RFWS) that can accurately detect and locate the tampering regions from an image. The proposed scheme embeds two secret bits in each host image (HI) pixel using a pixel readjustment strategy to obtain dual watermarked images (WIs). The pixel readjustment strategy performs a maximum modification of ± 1 to the non-boundary pixels of an image based on the watermark information. The results of the study suggest that in addition to reversibility, the proposed scheme offers triple objective of high capacity, better perceptual transparency, and robustness. Experimental results also show that the proposed scheme achieves a superior peak signal-to-noise ratio (PSNR) of above 52 dB for both the WIs. Further, the proposed scheme can efficiently detect and locate the tampering regions from an image with a high true positive rate, low false positive and negative rate for various tampering rates. Additionally, the proposed scheme shows superior resistance against various intentional and unintentional attacks.
This study proposes an efficient dual image-based reversible fragile watermarking scheme (DI-RFWS) that can accurately detect and locate the tampering regions from an image. The proposed scheme embeds two secret bits in each host image (HI) pixel using a pixel readjustment strategy to obtain dual watermarked images (WIs). The pixel readjustment strategy performs a maximum modification of ± 1 to the non-boundary pixels of an image based on the watermark information. The results of the study suggest that in addition to reversibility, the proposed scheme offers triple objective of high capacity, better perceptual transparency, and robustness. Experimental results also show that the proposed scheme achieves a superior peak signal-to-noise ratio (PSNR) of above 52 dB for both the WIs. Further, the proposed scheme can efficiently detect and locate the tampering regions from an image with a high true positive rate, low false positive and negative rate for various tampering rates. Additionally, the proposed scheme shows superior resistance against various intentional and unintentional attacks.
Author Patro, Pramoda
Sahu, Gupteswar
Sahu, Aditya Kumar
Nayak, Soumya Ranjan
Sahu, Monalisa
Author_xml – sequence: 1
  givenname: Aditya Kumar
  orcidid: 0000-0003-4257-0688
  surname: Sahu
  fullname: Sahu, Aditya Kumar
  email: adityasahu.cse@gmail.com, s_adityakumar@av.amrita.edu
  organization: Amrita School of Computing, Amaravati Campus, Amrita Vishwa Vidyapeetham
– sequence: 2
  givenname: Monalisa
  surname: Sahu
  fullname: Sahu, Monalisa
  organization: Department of CSE, School of Engineering and Technology, GIET University
– sequence: 3
  givenname: Pramoda
  surname: Patro
  fullname: Patro, Pramoda
  organization: Department of Engineering Mathematics, College of Engineering, Koneru Lakshmaiah Education Foundation
– sequence: 4
  givenname: Gupteswar
  surname: Sahu
  fullname: Sahu, Gupteswar
  organization: Department of Electronics and Communication Engineering, Raghu Engineering College
– sequence: 5
  givenname: Soumya Ranjan
  surname: Nayak
  fullname: Nayak, Soumya Ranjan
  organization: School of Computer Engineering, KIIT Deemed to be University
BookMark eNp9kE1LAzEQhoNUsK3-AU8Lnlcnye6me5T6CQUvCl4kzCaz69b9qMlW0V9v2oqCBy-ZIXmfyfBM2KjrO2LsmMMpB1BnPpxJEoMQMXAOodtjY55IGas0fRz99Ak_YBPvlwBSSjEbs6eLNTZR3WJFcYGebOTojZyvi4ai0mFVh_qOA7kW3UvdVZE3z9SGt95FA7YrcpGlgcxQ912EnY2a3mBTf-Lm4pDtl9h4OvquU_ZwdXk_v4kXd9e38_NFbCTPhziBMrFkVVbmFsqsIDICE8VRWBBFgqkAaXNly4xMkRvgmSUwJkWhhESu5JSd7OauXP-6Jj_oZb92XfhSixlwxQVP85Ca7VLG9d47KrWph-2eg8O60Rz0RqbeydRBpt7K1BBQ8QdduSDNffwPyR3kQ7iryP1u9Q_1BVX6in8
CitedBy_id crossref_primary_10_1007_s43926_023_00050_5
crossref_primary_10_1007_s11042_023_16976_5
crossref_primary_10_1007_s11082_024_07367_7
crossref_primary_10_1016_j_compeleceng_2025_110072
crossref_primary_10_1016_j_jestch_2023_101586
crossref_primary_10_3390_electronics12041065
crossref_primary_10_1016_j_jvcir_2024_104299
crossref_primary_10_1371_journal_pone_0297632
crossref_primary_10_1109_LSP_2024_3440176
crossref_primary_10_3390_app13127009
crossref_primary_10_1007_s13369_023_08298_3
crossref_primary_10_3389_frai_2024_1414122
crossref_primary_10_1016_j_sigpro_2023_109196
crossref_primary_10_3390_electronics12051222
crossref_primary_10_1080_1206212X_2024_2389477
crossref_primary_10_3390_math11071730
crossref_primary_10_1007_s00034_024_02814_y
crossref_primary_10_1016_j_cosrev_2024_100679
crossref_primary_10_2478_amns_2025_0018
crossref_primary_10_3390_electronics12030535
crossref_primary_10_1371_journal_pone_0308265
crossref_primary_10_1007_s10044_023_01159_7
crossref_primary_10_1016_j_jksuci_2023_101755
crossref_primary_10_1016_j_jksuci_2023_101636
crossref_primary_10_1080_1206212X_2024_2380650
crossref_primary_10_1038_s41598_025_94080_4
crossref_primary_10_1007_s00530_024_01332_w
crossref_primary_10_1007_s11042_024_18351_4
crossref_primary_10_1016_j_isci_2024_110821
crossref_primary_10_3390_math11143134
crossref_primary_10_1007_s11042_024_19517_w
crossref_primary_10_1007_s11517_023_02982_0
Cites_doi 10.1007/s13042-017-0641-4
10.1007/s13042-015-0455-1
10.1007/s11042-012-1332-5
10.1007/s12652-021-03365-9
10.1002/spy2.59
10.3390/electronics10080932
10.1007/s12652-019-01500-1
10.1016/j.patrec.2005.09.006
10.1016/j.eswa.2007.11.018
10.1007/s11045-018-0597-x
10.1016/j.jss.2011.02.029
10.3390/app10196854
10.1109/TMM.2020.3006415
10.3390/info11020110
10.1016/j.patcog.2008.05.009
10.1007/s11042-017-5222-8
10.1007/s11042-015-2786-z
10.1007/s40998-017-0021-9
10.1016/j.neucom.2021.07.051
10.1016/j.eswa.2019.113157
10.1007/s11042-016-3897-x
10.1007/s11042-019-08144-5
10.1016/j.cose.2016.11.016
10.18178/ijmlc.2020.10.2.932
10.1016/j.jksuci.2018.0
10.1016/j.dsp.2017.08.009
10.1016/j.procs.2018.05.009
10.1007/s13735-018-0147-1
10.1007/s12652-018-1158-8
10.1007/s11042-018-7128-5
10.1016/j.image.2012.12.003
10.1016/j.aeue.2015.10.006
10.1145/3078971.3078974
10.1109/ICIP.1998.723526
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2022. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2022. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
DBID AAYXX
CITATION
DOI 10.1007/s10044-022-01104-0
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
Computer Science
EISSN 1433-755X
EndPage 590
ExternalDocumentID 10_1007_s10044_022_01104_0
GroupedDBID -59
-5G
-BR
-EM
-Y2
-~C
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
203
29O
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5VS
67Z
6NX
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFO
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACSNA
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFGCZ
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BDATZ
BGNMA
BSONS
CAG
COF
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EIOEI
EJD
ESBYG
F5P
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
J9A
JBSCW
JCJTX
JZLTJ
KDC
KOV
LAS
LLZTM
M4Y
MA-
N2Q
N9A
NB0
NPVJJ
NQJWS
NU0
O9-
O93
O9J
OAM
P2P
P9O
PF0
PT4
PT5
QOS
R89
R9I
RIG
RNI
ROL
RPX
RSV
RZK
S16
S1Z
S27
S3B
SAP
SCO
SDH
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7X
Z81
Z83
Z88
ZMTXR
~A9
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
ABRTQ
ID FETCH-LOGICAL-c319t-40f4ded76f9d0f6beec2a471a2d02b4a5203d97df6ecb9c016de0cc5a2723a173
IEDL.DBID U2A
ISSN 1433-7541
IngestDate Mon Jul 14 07:47:51 EDT 2025
Tue Jul 01 01:15:18 EDT 2025
Thu Apr 24 23:00:23 EDT 2025
Fri Feb 21 02:44:14 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Keywords Reversibility
Tamper detection and localization
Fragile watermarking
Peak signal-to-noise ratio
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-40f4ded76f9d0f6beec2a471a2d02b4a5203d97df6ecb9c016de0cc5a2723a173
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-4257-0688
PQID 2801712159
PQPubID 2043691
PageCount 20
ParticipantIDs proquest_journals_2801712159
crossref_citationtrail_10_1007_s10044_022_01104_0
crossref_primary_10_1007_s10044_022_01104_0
springer_journals_10_1007_s10044_022_01104_0
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2023-05-01
PublicationDateYYYYMMDD 2023-05-01
PublicationDate_xml – month: 05
  year: 2023
  text: 2023-05-01
  day: 01
PublicationDecade 2020
PublicationPlace London
PublicationPlace_xml – name: London
– name: Heidelberg
PublicationTitle Pattern analysis and applications : PAA
PublicationTitleAbbrev Pattern Anal Applic
PublicationYear 2023
Publisher Springer London
Springer Nature B.V
Publisher_xml – name: Springer London
– name: Springer Nature B.V
References Kumar, Singh, Kumar (CR6) 2018; 77
Chang, Hu, Lu (CR8) 2006; 27
Prasad, Pal (CR15) 2020; 79
Chen, Wang (CR10) 2009; 36
Sahu (CR37) 2021
Trivedy, Pal (CR25) 2017; 41
Tong, Liu, Zhang, Chen (CR14) 2013; 28
Zhou, Yu, Wang, Wu, Luo, Sun (CR20) 2016; 70
Deeba, Kun, Dharejo, Langah, Memon (CR30) 2020; 10
CR12
CR11
Ansari, Pant, Ahn (CR17) 2016; 7
Kandi, Mishra, Gorthi (CR34) 2017; 65
Phan (CR9) 2008; 41
Bal, Nayak, Sarkar (CR24) 2018
Pal, Jana, Bhaumik (CR23) 2019; 2
Belferdi, Behloul, Noui (CR22) 2019; 30
Agarwal, Singh, Singh (CR2) 2019; 78
Korus (CR3) 2017; 71
Chen, He, Tai, Wang (CR16) 2014; 72
Gull, Loan, Parah, Sheikh, Bhat (CR26) 2020; 11
Li, Wang, Barni (CR27) 2021; 461
Chen, Fan, Chao (CR32) 2021; 10
Sreenivas, Prasad (CR4) 2018; 9
Zhong, Huang, Mastorakis, Shih (CR36) 2020; 23
Ahmadi, Norouzi, Karimi, Samavi, Emami (CR28) 2020; 146
CR29
Wang, Wu, Zhang, Yao (CR33) 2020; 2020
Nagai, Uchida, Sakazawa, Satoh (CR35) 2018; 7
Begum, Uddin (CR1) 2020; 11
Benrhouma, Hermassi, Abd El-Latif, Belghith (CR19) 2016; 75
Walton (CR7) 1995; 20
Chang, Chen, Lee, Liu (CR13) 2011; 84
Sinha, Singh, Gupta, Singh (CR21) 2018; 132
Lee, Seo, Kim (CR31) 2020; 10
Mohanarathinam, Kamalraj, Venkatesan, Ravi, Manikandababu (CR5) 2020; 11
Nazari, Sharif, Mollaeefar (CR18) 2017; 76
O Benrhouma (1104_CR19) 2016; 75
SN Bal (1104_CR24) 2018
1104_CR29
S Walton (1104_CR7) 1995; 20
H Kandi (1104_CR34) 2017; 65
F Deeba (1104_CR30) 2020; 10
WC Chen (1104_CR10) 2009; 36
X Tong (1104_CR14) 2013; 28
A Mohanarathinam (1104_CR5) 2020; 11
IA Ansari (1104_CR17) 2016; 7
X Zhong (1104_CR36) 2020; 23
W Belferdi (1104_CR22) 2019; 30
N Agarwal (1104_CR2) 2019; 78
RCW Phan (1104_CR9) 2008; 41
F Chen (1104_CR16) 2014; 72
M Nazari (1104_CR18) 2017; 76
P Pal (1104_CR23) 2019; 2
P Korus (1104_CR3) 2017; 71
M Ahmadi (1104_CR28) 2020; 146
Y Nagai (1104_CR35) 2018; 7
M Begum (1104_CR1) 2020; 11
S Sinha (1104_CR21) 2018; 132
CC Chang (1104_CR13) 2011; 84
J Wang (1104_CR33) 2020; 2020
CC Chang (1104_CR8) 2006; 27
Y Li (1104_CR27) 2021; 461
C Kumar (1104_CR6) 2018; 77
AK Sahu (1104_CR37) 2021
JE Lee (1104_CR31) 2020; 10
S Prasad (1104_CR15) 2020; 79
W Zhou (1104_CR20) 2016; 70
S Gull (1104_CR26) 2020; 11
YP Chen (1104_CR32) 2021; 10
K Sreenivas (1104_CR4) 2018; 9
1104_CR11
1104_CR12
S Trivedy (1104_CR25) 2017; 41
References_xml – volume: 9
  start-page: 1193
  issue: 7
  year: 2018
  end-page: 1218
  ident: CR4
  article-title: Fragile watermarking schemes for image authentication: a survey
  publication-title: Int J Mach Learn Cybern
  doi: 10.1007/s13042-017-0641-4
– volume: 7
  start-page: 1225
  issue: 6
  year: 2016
  end-page: 1239
  ident: CR17
  article-title: SVD based fragile watermarking scheme for tamper localization and self-recovery
  publication-title: Int J Mach Learn Cybern
  doi: 10.1007/s13042-015-0455-1
– volume: 72
  start-page: 41
  issue: 1
  year: 2014
  end-page: 56
  ident: CR16
  article-title: Chaos-based self-embedding fragile watermarking with flexible watermark payload
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-012-1332-5
– year: 2021
  ident: CR37
  article-title: A logistic map based blind and fragile watermarking for tamper detection and localization in images
  publication-title: J Ambient Intell Humaniz Comput
  doi: 10.1007/s12652-021-03365-9
– volume: 2
  start-page: e59
  issue: 2
  year: 2019
  ident: CR23
  article-title: Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image
  publication-title: Secur Privacy
  doi: 10.1002/spy2.59
– volume: 10
  start-page: 932
  issue: 8
  year: 2021
  ident: CR32
  article-title: WMNet: a lossless watermarking technique using deep learning for medical image authentication
  publication-title: Electronics
  doi: 10.3390/electronics10080932
– volume: 11
  start-page: 3221
  year: 2020
  end-page: 3229
  ident: CR5
  article-title: Digital watermarking schemes for image security: a review
  publication-title: J Ambient Intell Humaniz Comput
  doi: 10.1007/s12652-019-01500-1
– ident: CR12
– volume: 2020
  start-page: 22
  issue: 4
  year: 2020
  end-page: 31
  ident: CR33
  article-title: Watermarking in deep neural networks via error back-propagation
  publication-title: Electron Imaging
– volume: 27
  start-page: 439
  issue: 5
  year: 2006
  end-page: 446
  ident: CR8
  article-title: A watermarking-based image ownership and tampering authentication scheme
  publication-title: Pattern Recogn Lett
  doi: 10.1016/j.patrec.2005.09.006
– volume: 36
  start-page: 1300
  year: 2009
  end-page: 1307
  ident: CR10
  article-title: A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2007.11.018
– volume: 30
  start-page: 1093
  issue: 3
  year: 2019
  end-page: 1112
  ident: CR22
  article-title: A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration
  publication-title: Multidimens Syst Signal Process
  doi: 10.1007/s11045-018-0597-x
– volume: 84
  start-page: 1462
  issue: 9
  year: 2011
  end-page: 1470
  ident: CR13
  article-title: A secure fragile watermarking scheme based on chaos-and-hamming code
  publication-title: J Syst Softw
  doi: 10.1016/j.jss.2011.02.029
– ident: CR29
– volume: 10
  start-page: 6854
  issue: 19
  year: 2020
  ident: CR31
  article-title: Convolutional neural network-based digital image watermarking adaptive to the resolution of image and watermark
  publication-title: Appl Sci
  doi: 10.3390/app10196854
– volume: 23
  start-page: 1951
  year: 2020
  end-page: 1961
  ident: CR36
  article-title: An automated and robust image watermarking scheme based on deep neural networks
  publication-title: IEEE Trans Multimedia
  doi: 10.1109/TMM.2020.3006415
– volume: 11
  start-page: 110
  issue: 2
  year: 2020
  ident: CR1
  article-title: Digital image watermarking schemes: a review
  publication-title: Information
  doi: 10.3390/info11020110
– volume: 41
  start-page: 3493
  issue: 11
  year: 2008
  end-page: 3496
  ident: CR9
  article-title: Tampering with a watermarking-based image authentication scheme
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2008.05.009
– volume: 77
  start-page: 3597
  issue: 3
  year: 2018
  end-page: 3622
  ident: CR6
  article-title: A recent survey on image watermarking schemes and its application in e-governance
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-017-5222-8
– volume: 75
  start-page: 8695
  issue: 14
  year: 2016
  end-page: 8718
  ident: CR19
  article-title: Chaotic watermark for blind forgery detection in images
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-015-2786-z
– volume: 41
  start-page: 103
  issue: 2
  year: 2017
  end-page: 113
  ident: CR25
  article-title: A logistic map-based fragile watermarking scheme of digital images with tamper detection
  publication-title: Iran J Sci Technol Trans Electr Eng
  doi: 10.1007/s40998-017-0021-9
– volume: 461
  start-page: 171
  year: 2021
  end-page: 193
  ident: CR27
  article-title: A survey of deep neural network watermarking techniques
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2021.07.051
– volume: 146
  start-page: 113157
  year: 2020
  ident: CR28
  article-title: ReDMark: framework for residual diffusion watermarking based on deep networks
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2019.113157
– volume: 76
  start-page: 16107
  issue: 15
  year: 2017
  end-page: 16123
  ident: CR18
  article-title: An improved method for digital image fragile watermarking based on chaotic maps
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-016-3897-x
– volume: 79
  start-page: 1673
  issue: 3
  year: 2020
  end-page: 1705
  ident: CR15
  article-title: A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-019-08144-5
– volume: 65
  start-page: 247
  year: 2017
  end-page: 268
  ident: CR34
  article-title: Exploring the learning capabilities of convolutional neural networks for robust image watermarking
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2016.11.016
– volume: 20
  start-page: 18
  issue: 4
  year: 1995
  end-page: 26
  ident: CR7
  article-title: Information authentication for a slippery new age
  publication-title: Dr Dobb’s J
– volume: 10
  start-page: 277
  issue: 2
  year: 2020
  end-page: 282
  ident: CR30
  article-title: Digital watermarking using deep neural network
  publication-title: Int J Mach Learn Comput
  doi: 10.18178/ijmlc.2020.10.2.932
– year: 2018
  ident: CR24
  article-title: On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching
  publication-title: J King Saud Univ Comput Inf Sci
  doi: 10.1016/j.jksuci.2018.0
– volume: 71
  start-page: 1
  year: 2017
  end-page: 26
  ident: CR3
  article-title: Digital image integrity—a survey of protection and verification schemes
  publication-title: Digital Signal Process
  doi: 10.1016/j.dsp.2017.08.009
– ident: CR11
– volume: 132
  start-page: 557
  year: 2018
  end-page: 562
  ident: CR21
  article-title: Authentication and tamper detection in tele-medicine using zero watermarking
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2018.05.009
– volume: 7
  start-page: 3
  issue: 1
  year: 2018
  end-page: 16
  ident: CR35
  article-title: Digital watermarking for deep neural networks
  publication-title: Int J Multimedia Inf Retr
  doi: 10.1007/s13735-018-0147-1
– volume: 11
  start-page: 1799
  issue: 5
  year: 2020
  end-page: 1808
  ident: CR26
  article-title: An efficient watermarking scheme for tamper detection and localization of medical images
  publication-title: J Ambient Intell Humaniz Comput
  doi: 10.1007/s12652-018-1158-8
– volume: 78
  start-page: 8603
  issue: 7
  year: 2019
  end-page: 8633
  ident: CR2
  article-title: Survey of robust and imperceptible watermarking
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-018-7128-5
– volume: 28
  start-page: 301
  issue: 3
  year: 2013
  end-page: 308
  ident: CR14
  article-title: A novel chaos-based fragile watermarking for image tampering detection and self-recovery
  publication-title: Signal Process Image Commun
  doi: 10.1016/j.image.2012.12.003
– volume: 70
  start-page: 77
  issue: 1
  year: 2016
  end-page: 84
  ident: CR20
  article-title: Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images
  publication-title: AEU Int J Electron Commun
  doi: 10.1016/j.aeue.2015.10.006
– volume: 28
  start-page: 301
  issue: 3
  year: 2013
  ident: 1104_CR14
  publication-title: Signal Process Image Commun
  doi: 10.1016/j.image.2012.12.003
– volume: 7
  start-page: 3
  issue: 1
  year: 2018
  ident: 1104_CR35
  publication-title: Int J Multimedia Inf Retr
  doi: 10.1007/s13735-018-0147-1
– volume: 65
  start-page: 247
  year: 2017
  ident: 1104_CR34
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2016.11.016
– volume: 20
  start-page: 18
  issue: 4
  year: 1995
  ident: 1104_CR7
  publication-title: Dr Dobb’s J
– volume: 10
  start-page: 277
  issue: 2
  year: 2020
  ident: 1104_CR30
  publication-title: Int J Mach Learn Comput
  doi: 10.18178/ijmlc.2020.10.2.932
– volume: 79
  start-page: 1673
  issue: 3
  year: 2020
  ident: 1104_CR15
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-019-08144-5
– volume: 10
  start-page: 6854
  issue: 19
  year: 2020
  ident: 1104_CR31
  publication-title: Appl Sci
  doi: 10.3390/app10196854
– volume: 11
  start-page: 110
  issue: 2
  year: 2020
  ident: 1104_CR1
  publication-title: Information
  doi: 10.3390/info11020110
– volume: 7
  start-page: 1225
  issue: 6
  year: 2016
  ident: 1104_CR17
  publication-title: Int J Mach Learn Cybern
  doi: 10.1007/s13042-015-0455-1
– volume: 30
  start-page: 1093
  issue: 3
  year: 2019
  ident: 1104_CR22
  publication-title: Multidimens Syst Signal Process
  doi: 10.1007/s11045-018-0597-x
– volume: 23
  start-page: 1951
  year: 2020
  ident: 1104_CR36
  publication-title: IEEE Trans Multimedia
  doi: 10.1109/TMM.2020.3006415
– volume: 72
  start-page: 41
  issue: 1
  year: 2014
  ident: 1104_CR16
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-012-1332-5
– ident: 1104_CR11
– volume: 10
  start-page: 932
  issue: 8
  year: 2021
  ident: 1104_CR32
  publication-title: Electronics
  doi: 10.3390/electronics10080932
– volume: 75
  start-page: 8695
  issue: 14
  year: 2016
  ident: 1104_CR19
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-015-2786-z
– volume: 36
  start-page: 1300
  year: 2009
  ident: 1104_CR10
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2007.11.018
– volume: 71
  start-page: 1
  year: 2017
  ident: 1104_CR3
  publication-title: Digital Signal Process
  doi: 10.1016/j.dsp.2017.08.009
– volume: 77
  start-page: 3597
  issue: 3
  year: 2018
  ident: 1104_CR6
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-017-5222-8
– volume: 146
  start-page: 113157
  year: 2020
  ident: 1104_CR28
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2019.113157
– ident: 1104_CR29
  doi: 10.1145/3078971.3078974
– year: 2018
  ident: 1104_CR24
  publication-title: J King Saud Univ Comput Inf Sci
  doi: 10.1016/j.jksuci.2018.0
– volume: 461
  start-page: 171
  year: 2021
  ident: 1104_CR27
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2021.07.051
– volume: 41
  start-page: 103
  issue: 2
  year: 2017
  ident: 1104_CR25
  publication-title: Iran J Sci Technol Trans Electr Eng
  doi: 10.1007/s40998-017-0021-9
– volume: 11
  start-page: 1799
  issue: 5
  year: 2020
  ident: 1104_CR26
  publication-title: J Ambient Intell Humaniz Comput
  doi: 10.1007/s12652-018-1158-8
– year: 2021
  ident: 1104_CR37
  publication-title: J Ambient Intell Humaniz Comput
  doi: 10.1007/s12652-021-03365-9
– volume: 132
  start-page: 557
  year: 2018
  ident: 1104_CR21
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2018.05.009
– volume: 11
  start-page: 3221
  year: 2020
  ident: 1104_CR5
  publication-title: J Ambient Intell Humaniz Comput
  doi: 10.1007/s12652-019-01500-1
– volume: 78
  start-page: 8603
  issue: 7
  year: 2019
  ident: 1104_CR2
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-018-7128-5
– volume: 9
  start-page: 1193
  issue: 7
  year: 2018
  ident: 1104_CR4
  publication-title: Int J Mach Learn Cybern
  doi: 10.1007/s13042-017-0641-4
– volume: 84
  start-page: 1462
  issue: 9
  year: 2011
  ident: 1104_CR13
  publication-title: J Syst Softw
  doi: 10.1016/j.jss.2011.02.029
– volume: 76
  start-page: 16107
  issue: 15
  year: 2017
  ident: 1104_CR18
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-016-3897-x
– volume: 70
  start-page: 77
  issue: 1
  year: 2016
  ident: 1104_CR20
  publication-title: AEU Int J Electron Commun
  doi: 10.1016/j.aeue.2015.10.006
– volume: 2
  start-page: e59
  issue: 2
  year: 2019
  ident: 1104_CR23
  publication-title: Secur Privacy
  doi: 10.1002/spy2.59
– volume: 27
  start-page: 439
  issue: 5
  year: 2006
  ident: 1104_CR8
  publication-title: Pattern Recogn Lett
  doi: 10.1016/j.patrec.2005.09.006
– volume: 2020
  start-page: 22
  issue: 4
  year: 2020
  ident: 1104_CR33
  publication-title: Electron Imaging
– volume: 41
  start-page: 3493
  issue: 11
  year: 2008
  ident: 1104_CR9
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2008.05.009
– ident: 1104_CR12
  doi: 10.1109/ICIP.1998.723526
SSID ssj0033328
Score 2.4813418
Snippet This study proposes an efficient dual image-based reversible fragile watermarking scheme (DI-RFWS) that can accurately detect and locate the tampering regions...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 571
SubjectTerms Computer Science
Pattern Recognition
Pixels
Signal to noise ratio
Theoretical Advances
Watermarking
Title Dual image-based reversible fragile watermarking scheme for tamper detection and localization
URI https://link.springer.com/article/10.1007/s10044-022-01104-0
https://www.proquest.com/docview/2801712159
Volume 26
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JSwMxFA7aXry4i9VacvCmgZkksx2LthZFTxbqQYZMFhHqVKZT_Pu-pBmrooK3IdvhveR9XyZvQejUhFkRx4kgHOCOcBFpkiqZEi0Dbhgzhrls-7d38WjMryfRxAeFzRtv9-ZJ0lnqT8FuAefEep9bzIKvddSO7N0ddvGY9hv7yxhzFVWBCDCSRDz0oTI_r_EVjlYc89uzqEOb4Tba9DQR95d63UFrutxFW54yYn8g59DUVGVo2vbQ4-UCZj6_gKEgFqMUtlmaKtj6U41NJZ7ADuA34Uyy-1GO4YKrX6BvVuFaAI2usNK1c9EqsSgVdnjn4zX30Xg4uL8YEV9EgUg4XTXcDw1XWiWxyVRg4kJrSQUgkqAqoAUohwZMZYkysZZFJoEBKh1IGQmaUCbChB2gVjkr9SHCRciUNNQY-1jJwiINpQG6IDRgnOFcdlDYyDKXPsO4LXQxzVe5ka38c5B_7uSfBx109jHndZlf48_R3UZFuT9r85ymNucPUJesg84bta26f1_t6H_Dj9GGrTW_9HbsolZdLfQJMJK66KF2_-rhZtBzG_Ed0orYcA
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV05T8MwFLagDLBwIwoFPLCBpcR2c4wVUBUoTK3UBUWOD4TUpihNxd_n2XUoIEBii3wN79nv-xy_A6FzE6Z5FMWCcIA7wkVbk0TJhGgZcMOYMcxl2394jHpDfjdqj3xQ2Kz2dq-fJJ2l_hTsFnBOrPe5xSz4WkVrQAYS68g1pJ3a_jLGXEVVIAKMxG0e-lCZn9f4CkdLjvntWdShTXcbbXqaiDsLve6gFV3soi1PGbE_kDNoqqsy1G176Ol6DjNfJmAoiMUohW2WphK2_lhjU4pnsAP4TTiT7H6UY7jg6gn0TUtcCaDRJVa6ci5aBRaFwg7vfLzmPhp2bwZXPeKLKBAJp6uC-6HhSqs4MqkKTJRrLakARBJUBTQH5dCAqTRWJtIyTyUwQKUDKduCxpSJMGYHqFFMC32IcB4yJQ01xj5WsjBPQmmALggNGGc4l00U1rLMpM8wbgtdjLNlbmQr_wzknzn5Z0ETXXzMeV3k1_hzdKtWUebP2iyjic35A9QlbaLLWm3L7t9XO_rf8DO03hs89LP-7eP9MdqwdecXno8t1KjKuT4BdlLlp24zvgNf09nP
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JSwMxFA5aQby4i9WqOXjT4EySznIs1lK34sFCLzJksojQTst0in_fl3TGVlHB25Dt8F7yvi-TtyB0bvw4DYJQEA5wR7hoahIpGREtPW4YM4a5bPuPvaDb53eD5mApit95u1dPkvOYBpulKSuuJspcLQW-eZwT64lu8Qu-VtEamGPf7us-bVW2mDHmqqsCKWAkbHK_DJv5eY2v0LTgm9-eSB3ydLbRZkkZcWuu4x20orNdtFXSR1wezik0VRUaqrY99NKewcy3ERgNYvFKYZuxKYdjMNTY5OIVbAJ-F848u5_mGC67egR94xwXAih1jpUunLtWhkWmsMO-MnZzH_U7N8_XXVIWVCASRFPAXdFwpVUYmFh5Jki1llQAOgmqPJqCoqjHVBwqE2iZxhLYoNKelE1BQ8qEH7IDVMvGmT5EOPWZkoYaYx8umZ9GvjRAHYQGvDOcyzryK1kmssw2boteDJNFnmQr_wTknzj5J14dXXzOmcxzbfw5ulGpKCnP3TShkc3_AzQmrqPLSm2L7t9XO_rf8DO0_tTuJA-3vftjtGFL0M-dIBuoVuQzfQJEpUhP3V78ABrb3gs
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Dual+image-based+reversible+fragile+watermarking+scheme+for+tamper+detection+and+localization&rft.jtitle=Pattern+analysis+and+applications+%3A+PAA&rft.au=Sahu%2C+Aditya+Kumar&rft.au=Sahu%2C+Monalisa&rft.au=Patro%2C+Pramoda&rft.au=Sahu%2C+Gupteswar&rft.date=2023-05-01&rft.pub=Springer+London&rft.issn=1433-7541&rft.eissn=1433-755X&rft.volume=26&rft.issue=2&rft.spage=571&rft.epage=590&rft_id=info:doi/10.1007%2Fs10044-022-01104-0&rft.externalDocID=10_1007_s10044_022_01104_0
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1433-7541&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1433-7541&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1433-7541&client=summon