Dual image-based reversible fragile watermarking scheme for tamper detection and localization
This study proposes an efficient dual image-based reversible fragile watermarking scheme (DI-RFWS) that can accurately detect and locate the tampering regions from an image. The proposed scheme embeds two secret bits in each host image (HI) pixel using a pixel readjustment strategy to obtain dual wa...
Saved in:
Published in | Pattern analysis and applications : PAA Vol. 26; no. 2; pp. 571 - 590 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
London
Springer London
01.05.2023
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This study proposes an efficient dual image-based reversible fragile watermarking scheme (DI-RFWS) that can accurately detect and locate the tampering regions from an image. The proposed scheme embeds two secret bits in each host image (HI) pixel using a pixel readjustment strategy to obtain dual watermarked images (WIs). The pixel readjustment strategy performs a maximum modification of ± 1 to the non-boundary pixels of an image based on the watermark information. The results of the study suggest that in addition to reversibility, the proposed scheme offers triple objective of high capacity, better perceptual transparency, and robustness. Experimental results also show that the proposed scheme achieves a superior peak signal-to-noise ratio (PSNR) of above 52 dB for both the WIs. Further, the proposed scheme can efficiently detect and locate the tampering regions from an image with a high true positive rate, low false positive and negative rate for various tampering rates. Additionally, the proposed scheme shows superior resistance against various intentional and unintentional attacks. |
---|---|
AbstractList | This study proposes an efficient dual image-based reversible fragile watermarking scheme (DI-RFWS) that can accurately detect and locate the tampering regions from an image. The proposed scheme embeds two secret bits in each host image (HI) pixel using a pixel readjustment strategy to obtain dual watermarked images (WIs). The pixel readjustment strategy performs a maximum modification of ± 1 to the non-boundary pixels of an image based on the watermark information. The results of the study suggest that in addition to reversibility, the proposed scheme offers triple objective of high capacity, better perceptual transparency, and robustness. Experimental results also show that the proposed scheme achieves a superior peak signal-to-noise ratio (PSNR) of above 52 dB for both the WIs. Further, the proposed scheme can efficiently detect and locate the tampering regions from an image with a high true positive rate, low false positive and negative rate for various tampering rates. Additionally, the proposed scheme shows superior resistance against various intentional and unintentional attacks. This study proposes an efficient dual image-based reversible fragile watermarking scheme (DI-RFWS) that can accurately detect and locate the tampering regions from an image. The proposed scheme embeds two secret bits in each host image (HI) pixel using a pixel readjustment strategy to obtain dual watermarked images (WIs). The pixel readjustment strategy performs a maximum modification of ± 1 to the non-boundary pixels of an image based on the watermark information. The results of the study suggest that in addition to reversibility, the proposed scheme offers triple objective of high capacity, better perceptual transparency, and robustness. Experimental results also show that the proposed scheme achieves a superior peak signal-to-noise ratio (PSNR) of above 52 dB for both the WIs. Further, the proposed scheme can efficiently detect and locate the tampering regions from an image with a high true positive rate, low false positive and negative rate for various tampering rates. Additionally, the proposed scheme shows superior resistance against various intentional and unintentional attacks. |
Author | Patro, Pramoda Sahu, Gupteswar Sahu, Aditya Kumar Nayak, Soumya Ranjan Sahu, Monalisa |
Author_xml | – sequence: 1 givenname: Aditya Kumar orcidid: 0000-0003-4257-0688 surname: Sahu fullname: Sahu, Aditya Kumar email: adityasahu.cse@gmail.com, s_adityakumar@av.amrita.edu organization: Amrita School of Computing, Amaravati Campus, Amrita Vishwa Vidyapeetham – sequence: 2 givenname: Monalisa surname: Sahu fullname: Sahu, Monalisa organization: Department of CSE, School of Engineering and Technology, GIET University – sequence: 3 givenname: Pramoda surname: Patro fullname: Patro, Pramoda organization: Department of Engineering Mathematics, College of Engineering, Koneru Lakshmaiah Education Foundation – sequence: 4 givenname: Gupteswar surname: Sahu fullname: Sahu, Gupteswar organization: Department of Electronics and Communication Engineering, Raghu Engineering College – sequence: 5 givenname: Soumya Ranjan surname: Nayak fullname: Nayak, Soumya Ranjan organization: School of Computer Engineering, KIIT Deemed to be University |
BookMark | eNp9kE1LAzEQhoNUsK3-AU8Lnlcnye6me5T6CQUvCl4kzCaz69b9qMlW0V9v2oqCBy-ZIXmfyfBM2KjrO2LsmMMpB1BnPpxJEoMQMXAOodtjY55IGas0fRz99Ak_YBPvlwBSSjEbs6eLNTZR3WJFcYGebOTojZyvi4ai0mFVh_qOA7kW3UvdVZE3z9SGt95FA7YrcpGlgcxQ912EnY2a3mBTf-Lm4pDtl9h4OvquU_ZwdXk_v4kXd9e38_NFbCTPhziBMrFkVVbmFsqsIDICE8VRWBBFgqkAaXNly4xMkRvgmSUwJkWhhESu5JSd7OauXP-6Jj_oZb92XfhSixlwxQVP85Ca7VLG9d47KrWph-2eg8O60Rz0RqbeydRBpt7K1BBQ8QdduSDNffwPyR3kQ7iryP1u9Q_1BVX6in8 |
CitedBy_id | crossref_primary_10_1007_s43926_023_00050_5 crossref_primary_10_1007_s11042_023_16976_5 crossref_primary_10_1007_s11082_024_07367_7 crossref_primary_10_1016_j_compeleceng_2025_110072 crossref_primary_10_1016_j_jestch_2023_101586 crossref_primary_10_3390_electronics12041065 crossref_primary_10_1016_j_jvcir_2024_104299 crossref_primary_10_1371_journal_pone_0297632 crossref_primary_10_1109_LSP_2024_3440176 crossref_primary_10_3390_app13127009 crossref_primary_10_1007_s13369_023_08298_3 crossref_primary_10_3389_frai_2024_1414122 crossref_primary_10_1016_j_sigpro_2023_109196 crossref_primary_10_3390_electronics12051222 crossref_primary_10_1080_1206212X_2024_2389477 crossref_primary_10_3390_math11071730 crossref_primary_10_1007_s00034_024_02814_y crossref_primary_10_1016_j_cosrev_2024_100679 crossref_primary_10_2478_amns_2025_0018 crossref_primary_10_3390_electronics12030535 crossref_primary_10_1371_journal_pone_0308265 crossref_primary_10_1007_s10044_023_01159_7 crossref_primary_10_1016_j_jksuci_2023_101755 crossref_primary_10_1016_j_jksuci_2023_101636 crossref_primary_10_1080_1206212X_2024_2380650 crossref_primary_10_1038_s41598_025_94080_4 crossref_primary_10_1007_s00530_024_01332_w crossref_primary_10_1007_s11042_024_18351_4 crossref_primary_10_1016_j_isci_2024_110821 crossref_primary_10_3390_math11143134 crossref_primary_10_1007_s11042_024_19517_w crossref_primary_10_1007_s11517_023_02982_0 |
Cites_doi | 10.1007/s13042-017-0641-4 10.1007/s13042-015-0455-1 10.1007/s11042-012-1332-5 10.1007/s12652-021-03365-9 10.1002/spy2.59 10.3390/electronics10080932 10.1007/s12652-019-01500-1 10.1016/j.patrec.2005.09.006 10.1016/j.eswa.2007.11.018 10.1007/s11045-018-0597-x 10.1016/j.jss.2011.02.029 10.3390/app10196854 10.1109/TMM.2020.3006415 10.3390/info11020110 10.1016/j.patcog.2008.05.009 10.1007/s11042-017-5222-8 10.1007/s11042-015-2786-z 10.1007/s40998-017-0021-9 10.1016/j.neucom.2021.07.051 10.1016/j.eswa.2019.113157 10.1007/s11042-016-3897-x 10.1007/s11042-019-08144-5 10.1016/j.cose.2016.11.016 10.18178/ijmlc.2020.10.2.932 10.1016/j.jksuci.2018.0 10.1016/j.dsp.2017.08.009 10.1016/j.procs.2018.05.009 10.1007/s13735-018-0147-1 10.1007/s12652-018-1158-8 10.1007/s11042-018-7128-5 10.1016/j.image.2012.12.003 10.1016/j.aeue.2015.10.006 10.1145/3078971.3078974 10.1109/ICIP.1998.723526 |
ContentType | Journal Article |
Copyright | The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2022. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. |
Copyright_xml | – notice: The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2022. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. |
DBID | AAYXX CITATION |
DOI | 10.1007/s10044-022-01104-0 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Applied Sciences Computer Science |
EISSN | 1433-755X |
EndPage | 590 |
ExternalDocumentID | 10_1007_s10044_022_01104_0 |
GroupedDBID | -59 -5G -BR -EM -Y2 -~C .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 203 29O 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5VS 67Z 6NX 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACSNA ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFGCZ AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BDATZ BGNMA BSONS CAG COF CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EIOEI EJD ESBYG F5P FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X I~Z J-C J0Z J9A JBSCW JCJTX JZLTJ KDC KOV LAS LLZTM M4Y MA- N2Q N9A NB0 NPVJJ NQJWS NU0 O9- O93 O9J OAM P2P P9O PF0 PT4 PT5 QOS R89 R9I RIG RNI ROL RPX RSV RZK S16 S1Z S27 S3B SAP SCO SDH SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7X Z81 Z83 Z88 ZMTXR ~A9 AAPKM AAYXX ABBRH ABDBE ABFSG ACSTC ADHKG ADKFA AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION ABRTQ |
ID | FETCH-LOGICAL-c319t-40f4ded76f9d0f6beec2a471a2d02b4a5203d97df6ecb9c016de0cc5a2723a173 |
IEDL.DBID | U2A |
ISSN | 1433-7541 |
IngestDate | Mon Jul 14 07:47:51 EDT 2025 Tue Jul 01 01:15:18 EDT 2025 Thu Apr 24 23:00:23 EDT 2025 Fri Feb 21 02:44:14 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Keywords | Reversibility Tamper detection and localization Fragile watermarking Peak signal-to-noise ratio |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c319t-40f4ded76f9d0f6beec2a471a2d02b4a5203d97df6ecb9c016de0cc5a2723a173 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-4257-0688 |
PQID | 2801712159 |
PQPubID | 2043691 |
PageCount | 20 |
ParticipantIDs | proquest_journals_2801712159 crossref_citationtrail_10_1007_s10044_022_01104_0 crossref_primary_10_1007_s10044_022_01104_0 springer_journals_10_1007_s10044_022_01104_0 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2023-05-01 |
PublicationDateYYYYMMDD | 2023-05-01 |
PublicationDate_xml | – month: 05 year: 2023 text: 2023-05-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | London |
PublicationPlace_xml | – name: London – name: Heidelberg |
PublicationTitle | Pattern analysis and applications : PAA |
PublicationTitleAbbrev | Pattern Anal Applic |
PublicationYear | 2023 |
Publisher | Springer London Springer Nature B.V |
Publisher_xml | – name: Springer London – name: Springer Nature B.V |
References | Kumar, Singh, Kumar (CR6) 2018; 77 Chang, Hu, Lu (CR8) 2006; 27 Prasad, Pal (CR15) 2020; 79 Chen, Wang (CR10) 2009; 36 Sahu (CR37) 2021 Trivedy, Pal (CR25) 2017; 41 Tong, Liu, Zhang, Chen (CR14) 2013; 28 Zhou, Yu, Wang, Wu, Luo, Sun (CR20) 2016; 70 Deeba, Kun, Dharejo, Langah, Memon (CR30) 2020; 10 CR12 CR11 Ansari, Pant, Ahn (CR17) 2016; 7 Kandi, Mishra, Gorthi (CR34) 2017; 65 Phan (CR9) 2008; 41 Bal, Nayak, Sarkar (CR24) 2018 Pal, Jana, Bhaumik (CR23) 2019; 2 Belferdi, Behloul, Noui (CR22) 2019; 30 Agarwal, Singh, Singh (CR2) 2019; 78 Korus (CR3) 2017; 71 Chen, He, Tai, Wang (CR16) 2014; 72 Gull, Loan, Parah, Sheikh, Bhat (CR26) 2020; 11 Li, Wang, Barni (CR27) 2021; 461 Chen, Fan, Chao (CR32) 2021; 10 Sreenivas, Prasad (CR4) 2018; 9 Zhong, Huang, Mastorakis, Shih (CR36) 2020; 23 Ahmadi, Norouzi, Karimi, Samavi, Emami (CR28) 2020; 146 CR29 Wang, Wu, Zhang, Yao (CR33) 2020; 2020 Nagai, Uchida, Sakazawa, Satoh (CR35) 2018; 7 Begum, Uddin (CR1) 2020; 11 Benrhouma, Hermassi, Abd El-Latif, Belghith (CR19) 2016; 75 Walton (CR7) 1995; 20 Chang, Chen, Lee, Liu (CR13) 2011; 84 Sinha, Singh, Gupta, Singh (CR21) 2018; 132 Lee, Seo, Kim (CR31) 2020; 10 Mohanarathinam, Kamalraj, Venkatesan, Ravi, Manikandababu (CR5) 2020; 11 Nazari, Sharif, Mollaeefar (CR18) 2017; 76 O Benrhouma (1104_CR19) 2016; 75 SN Bal (1104_CR24) 2018 1104_CR29 S Walton (1104_CR7) 1995; 20 H Kandi (1104_CR34) 2017; 65 F Deeba (1104_CR30) 2020; 10 WC Chen (1104_CR10) 2009; 36 X Tong (1104_CR14) 2013; 28 A Mohanarathinam (1104_CR5) 2020; 11 IA Ansari (1104_CR17) 2016; 7 X Zhong (1104_CR36) 2020; 23 W Belferdi (1104_CR22) 2019; 30 N Agarwal (1104_CR2) 2019; 78 RCW Phan (1104_CR9) 2008; 41 F Chen (1104_CR16) 2014; 72 M Nazari (1104_CR18) 2017; 76 P Pal (1104_CR23) 2019; 2 P Korus (1104_CR3) 2017; 71 M Ahmadi (1104_CR28) 2020; 146 Y Nagai (1104_CR35) 2018; 7 M Begum (1104_CR1) 2020; 11 S Sinha (1104_CR21) 2018; 132 CC Chang (1104_CR13) 2011; 84 J Wang (1104_CR33) 2020; 2020 CC Chang (1104_CR8) 2006; 27 Y Li (1104_CR27) 2021; 461 C Kumar (1104_CR6) 2018; 77 AK Sahu (1104_CR37) 2021 JE Lee (1104_CR31) 2020; 10 S Prasad (1104_CR15) 2020; 79 W Zhou (1104_CR20) 2016; 70 S Gull (1104_CR26) 2020; 11 YP Chen (1104_CR32) 2021; 10 K Sreenivas (1104_CR4) 2018; 9 1104_CR11 1104_CR12 S Trivedy (1104_CR25) 2017; 41 |
References_xml | – volume: 9 start-page: 1193 issue: 7 year: 2018 end-page: 1218 ident: CR4 article-title: Fragile watermarking schemes for image authentication: a survey publication-title: Int J Mach Learn Cybern doi: 10.1007/s13042-017-0641-4 – volume: 7 start-page: 1225 issue: 6 year: 2016 end-page: 1239 ident: CR17 article-title: SVD based fragile watermarking scheme for tamper localization and self-recovery publication-title: Int J Mach Learn Cybern doi: 10.1007/s13042-015-0455-1 – volume: 72 start-page: 41 issue: 1 year: 2014 end-page: 56 ident: CR16 article-title: Chaos-based self-embedding fragile watermarking with flexible watermark payload publication-title: Multimedia Tools Appl doi: 10.1007/s11042-012-1332-5 – year: 2021 ident: CR37 article-title: A logistic map based blind and fragile watermarking for tamper detection and localization in images publication-title: J Ambient Intell Humaniz Comput doi: 10.1007/s12652-021-03365-9 – volume: 2 start-page: e59 issue: 2 year: 2019 ident: CR23 article-title: Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image publication-title: Secur Privacy doi: 10.1002/spy2.59 – volume: 10 start-page: 932 issue: 8 year: 2021 ident: CR32 article-title: WMNet: a lossless watermarking technique using deep learning for medical image authentication publication-title: Electronics doi: 10.3390/electronics10080932 – volume: 11 start-page: 3221 year: 2020 end-page: 3229 ident: CR5 article-title: Digital watermarking schemes for image security: a review publication-title: J Ambient Intell Humaniz Comput doi: 10.1007/s12652-019-01500-1 – ident: CR12 – volume: 2020 start-page: 22 issue: 4 year: 2020 end-page: 31 ident: CR33 article-title: Watermarking in deep neural networks via error back-propagation publication-title: Electron Imaging – volume: 27 start-page: 439 issue: 5 year: 2006 end-page: 446 ident: CR8 article-title: A watermarking-based image ownership and tampering authentication scheme publication-title: Pattern Recogn Lett doi: 10.1016/j.patrec.2005.09.006 – volume: 36 start-page: 1300 year: 2009 end-page: 1307 ident: CR10 article-title: A fuzzy c-means clustering-based fragile watermarking scheme for image authentication publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2007.11.018 – volume: 30 start-page: 1093 issue: 3 year: 2019 end-page: 1112 ident: CR22 article-title: A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration publication-title: Multidimens Syst Signal Process doi: 10.1007/s11045-018-0597-x – volume: 84 start-page: 1462 issue: 9 year: 2011 end-page: 1470 ident: CR13 article-title: A secure fragile watermarking scheme based on chaos-and-hamming code publication-title: J Syst Softw doi: 10.1016/j.jss.2011.02.029 – ident: CR29 – volume: 10 start-page: 6854 issue: 19 year: 2020 ident: CR31 article-title: Convolutional neural network-based digital image watermarking adaptive to the resolution of image and watermark publication-title: Appl Sci doi: 10.3390/app10196854 – volume: 23 start-page: 1951 year: 2020 end-page: 1961 ident: CR36 article-title: An automated and robust image watermarking scheme based on deep neural networks publication-title: IEEE Trans Multimedia doi: 10.1109/TMM.2020.3006415 – volume: 11 start-page: 110 issue: 2 year: 2020 ident: CR1 article-title: Digital image watermarking schemes: a review publication-title: Information doi: 10.3390/info11020110 – volume: 41 start-page: 3493 issue: 11 year: 2008 end-page: 3496 ident: CR9 article-title: Tampering with a watermarking-based image authentication scheme publication-title: Pattern Recogn doi: 10.1016/j.patcog.2008.05.009 – volume: 77 start-page: 3597 issue: 3 year: 2018 end-page: 3622 ident: CR6 article-title: A recent survey on image watermarking schemes and its application in e-governance publication-title: Multimedia Tools Appl doi: 10.1007/s11042-017-5222-8 – volume: 75 start-page: 8695 issue: 14 year: 2016 end-page: 8718 ident: CR19 article-title: Chaotic watermark for blind forgery detection in images publication-title: Multimedia Tools Appl doi: 10.1007/s11042-015-2786-z – volume: 41 start-page: 103 issue: 2 year: 2017 end-page: 113 ident: CR25 article-title: A logistic map-based fragile watermarking scheme of digital images with tamper detection publication-title: Iran J Sci Technol Trans Electr Eng doi: 10.1007/s40998-017-0021-9 – volume: 461 start-page: 171 year: 2021 end-page: 193 ident: CR27 article-title: A survey of deep neural network watermarking techniques publication-title: Neurocomputing doi: 10.1016/j.neucom.2021.07.051 – volume: 146 start-page: 113157 year: 2020 ident: CR28 article-title: ReDMark: framework for residual diffusion watermarking based on deep networks publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2019.113157 – volume: 76 start-page: 16107 issue: 15 year: 2017 end-page: 16123 ident: CR18 article-title: An improved method for digital image fragile watermarking based on chaotic maps publication-title: Multimedia Tools Appl doi: 10.1007/s11042-016-3897-x – volume: 79 start-page: 1673 issue: 3 year: 2020 end-page: 1705 ident: CR15 article-title: A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy publication-title: Multimedia Tools Appl doi: 10.1007/s11042-019-08144-5 – volume: 65 start-page: 247 year: 2017 end-page: 268 ident: CR34 article-title: Exploring the learning capabilities of convolutional neural networks for robust image watermarking publication-title: Comput Secur doi: 10.1016/j.cose.2016.11.016 – volume: 20 start-page: 18 issue: 4 year: 1995 end-page: 26 ident: CR7 article-title: Information authentication for a slippery new age publication-title: Dr Dobb’s J – volume: 10 start-page: 277 issue: 2 year: 2020 end-page: 282 ident: CR30 article-title: Digital watermarking using deep neural network publication-title: Int J Mach Learn Comput doi: 10.18178/ijmlc.2020.10.2.932 – year: 2018 ident: CR24 article-title: On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching publication-title: J King Saud Univ Comput Inf Sci doi: 10.1016/j.jksuci.2018.0 – volume: 71 start-page: 1 year: 2017 end-page: 26 ident: CR3 article-title: Digital image integrity—a survey of protection and verification schemes publication-title: Digital Signal Process doi: 10.1016/j.dsp.2017.08.009 – ident: CR11 – volume: 132 start-page: 557 year: 2018 end-page: 562 ident: CR21 article-title: Authentication and tamper detection in tele-medicine using zero watermarking publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2018.05.009 – volume: 7 start-page: 3 issue: 1 year: 2018 end-page: 16 ident: CR35 article-title: Digital watermarking for deep neural networks publication-title: Int J Multimedia Inf Retr doi: 10.1007/s13735-018-0147-1 – volume: 11 start-page: 1799 issue: 5 year: 2020 end-page: 1808 ident: CR26 article-title: An efficient watermarking scheme for tamper detection and localization of medical images publication-title: J Ambient Intell Humaniz Comput doi: 10.1007/s12652-018-1158-8 – volume: 78 start-page: 8603 issue: 7 year: 2019 end-page: 8633 ident: CR2 article-title: Survey of robust and imperceptible watermarking publication-title: Multimedia Tools Appl doi: 10.1007/s11042-018-7128-5 – volume: 28 start-page: 301 issue: 3 year: 2013 end-page: 308 ident: CR14 article-title: A novel chaos-based fragile watermarking for image tampering detection and self-recovery publication-title: Signal Process Image Commun doi: 10.1016/j.image.2012.12.003 – volume: 70 start-page: 77 issue: 1 year: 2016 end-page: 84 ident: CR20 article-title: Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images publication-title: AEU Int J Electron Commun doi: 10.1016/j.aeue.2015.10.006 – volume: 28 start-page: 301 issue: 3 year: 2013 ident: 1104_CR14 publication-title: Signal Process Image Commun doi: 10.1016/j.image.2012.12.003 – volume: 7 start-page: 3 issue: 1 year: 2018 ident: 1104_CR35 publication-title: Int J Multimedia Inf Retr doi: 10.1007/s13735-018-0147-1 – volume: 65 start-page: 247 year: 2017 ident: 1104_CR34 publication-title: Comput Secur doi: 10.1016/j.cose.2016.11.016 – volume: 20 start-page: 18 issue: 4 year: 1995 ident: 1104_CR7 publication-title: Dr Dobb’s J – volume: 10 start-page: 277 issue: 2 year: 2020 ident: 1104_CR30 publication-title: Int J Mach Learn Comput doi: 10.18178/ijmlc.2020.10.2.932 – volume: 79 start-page: 1673 issue: 3 year: 2020 ident: 1104_CR15 publication-title: Multimedia Tools Appl doi: 10.1007/s11042-019-08144-5 – volume: 10 start-page: 6854 issue: 19 year: 2020 ident: 1104_CR31 publication-title: Appl Sci doi: 10.3390/app10196854 – volume: 11 start-page: 110 issue: 2 year: 2020 ident: 1104_CR1 publication-title: Information doi: 10.3390/info11020110 – volume: 7 start-page: 1225 issue: 6 year: 2016 ident: 1104_CR17 publication-title: Int J Mach Learn Cybern doi: 10.1007/s13042-015-0455-1 – volume: 30 start-page: 1093 issue: 3 year: 2019 ident: 1104_CR22 publication-title: Multidimens Syst Signal Process doi: 10.1007/s11045-018-0597-x – volume: 23 start-page: 1951 year: 2020 ident: 1104_CR36 publication-title: IEEE Trans Multimedia doi: 10.1109/TMM.2020.3006415 – volume: 72 start-page: 41 issue: 1 year: 2014 ident: 1104_CR16 publication-title: Multimedia Tools Appl doi: 10.1007/s11042-012-1332-5 – ident: 1104_CR11 – volume: 10 start-page: 932 issue: 8 year: 2021 ident: 1104_CR32 publication-title: Electronics doi: 10.3390/electronics10080932 – volume: 75 start-page: 8695 issue: 14 year: 2016 ident: 1104_CR19 publication-title: Multimedia Tools Appl doi: 10.1007/s11042-015-2786-z – volume: 36 start-page: 1300 year: 2009 ident: 1104_CR10 publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2007.11.018 – volume: 71 start-page: 1 year: 2017 ident: 1104_CR3 publication-title: Digital Signal Process doi: 10.1016/j.dsp.2017.08.009 – volume: 77 start-page: 3597 issue: 3 year: 2018 ident: 1104_CR6 publication-title: Multimedia Tools Appl doi: 10.1007/s11042-017-5222-8 – volume: 146 start-page: 113157 year: 2020 ident: 1104_CR28 publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2019.113157 – ident: 1104_CR29 doi: 10.1145/3078971.3078974 – year: 2018 ident: 1104_CR24 publication-title: J King Saud Univ Comput Inf Sci doi: 10.1016/j.jksuci.2018.0 – volume: 461 start-page: 171 year: 2021 ident: 1104_CR27 publication-title: Neurocomputing doi: 10.1016/j.neucom.2021.07.051 – volume: 41 start-page: 103 issue: 2 year: 2017 ident: 1104_CR25 publication-title: Iran J Sci Technol Trans Electr Eng doi: 10.1007/s40998-017-0021-9 – volume: 11 start-page: 1799 issue: 5 year: 2020 ident: 1104_CR26 publication-title: J Ambient Intell Humaniz Comput doi: 10.1007/s12652-018-1158-8 – year: 2021 ident: 1104_CR37 publication-title: J Ambient Intell Humaniz Comput doi: 10.1007/s12652-021-03365-9 – volume: 132 start-page: 557 year: 2018 ident: 1104_CR21 publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2018.05.009 – volume: 11 start-page: 3221 year: 2020 ident: 1104_CR5 publication-title: J Ambient Intell Humaniz Comput doi: 10.1007/s12652-019-01500-1 – volume: 78 start-page: 8603 issue: 7 year: 2019 ident: 1104_CR2 publication-title: Multimedia Tools Appl doi: 10.1007/s11042-018-7128-5 – volume: 9 start-page: 1193 issue: 7 year: 2018 ident: 1104_CR4 publication-title: Int J Mach Learn Cybern doi: 10.1007/s13042-017-0641-4 – volume: 84 start-page: 1462 issue: 9 year: 2011 ident: 1104_CR13 publication-title: J Syst Softw doi: 10.1016/j.jss.2011.02.029 – volume: 76 start-page: 16107 issue: 15 year: 2017 ident: 1104_CR18 publication-title: Multimedia Tools Appl doi: 10.1007/s11042-016-3897-x – volume: 70 start-page: 77 issue: 1 year: 2016 ident: 1104_CR20 publication-title: AEU Int J Electron Commun doi: 10.1016/j.aeue.2015.10.006 – volume: 2 start-page: e59 issue: 2 year: 2019 ident: 1104_CR23 publication-title: Secur Privacy doi: 10.1002/spy2.59 – volume: 27 start-page: 439 issue: 5 year: 2006 ident: 1104_CR8 publication-title: Pattern Recogn Lett doi: 10.1016/j.patrec.2005.09.006 – volume: 2020 start-page: 22 issue: 4 year: 2020 ident: 1104_CR33 publication-title: Electron Imaging – volume: 41 start-page: 3493 issue: 11 year: 2008 ident: 1104_CR9 publication-title: Pattern Recogn doi: 10.1016/j.patcog.2008.05.009 – ident: 1104_CR12 doi: 10.1109/ICIP.1998.723526 |
SSID | ssj0033328 |
Score | 2.4813418 |
Snippet | This study proposes an efficient dual image-based reversible fragile watermarking scheme (DI-RFWS) that can accurately detect and locate the tampering regions... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 571 |
SubjectTerms | Computer Science Pattern Recognition Pixels Signal to noise ratio Theoretical Advances Watermarking |
Title | Dual image-based reversible fragile watermarking scheme for tamper detection and localization |
URI | https://link.springer.com/article/10.1007/s10044-022-01104-0 https://www.proquest.com/docview/2801712159 |
Volume | 26 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JSwMxFA7aXry4i9VacvCmgZkksx2LthZFTxbqQYZMFhHqVKZT_Pu-pBmrooK3IdvhveR9XyZvQejUhFkRx4kgHOCOcBFpkiqZEi0Dbhgzhrls-7d38WjMryfRxAeFzRtv9-ZJ0lnqT8FuAefEep9bzIKvddSO7N0ddvGY9hv7yxhzFVWBCDCSRDz0oTI_r_EVjlYc89uzqEOb4Tba9DQR95d63UFrutxFW54yYn8g59DUVGVo2vbQ4-UCZj6_gKEgFqMUtlmaKtj6U41NJZ7ADuA34Uyy-1GO4YKrX6BvVuFaAI2usNK1c9EqsSgVdnjn4zX30Xg4uL8YEV9EgUg4XTXcDw1XWiWxyVRg4kJrSQUgkqAqoAUohwZMZYkysZZFJoEBKh1IGQmaUCbChB2gVjkr9SHCRciUNNQY-1jJwiINpQG6IDRgnOFcdlDYyDKXPsO4LXQxzVe5ka38c5B_7uSfBx109jHndZlf48_R3UZFuT9r85ymNucPUJesg84bta26f1_t6H_Dj9GGrTW_9HbsolZdLfQJMJK66KF2_-rhZtBzG_Ed0orYcA |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV05T8MwFLagDLBwIwoFPLCBpcR2c4wVUBUoTK3UBUWOD4TUpihNxd_n2XUoIEBii3wN79nv-xy_A6FzE6Z5FMWCcIA7wkVbk0TJhGgZcMOYMcxl2394jHpDfjdqj3xQ2Kz2dq-fJJ2l_hTsFnBOrPe5xSz4WkVrQAYS68g1pJ3a_jLGXEVVIAKMxG0e-lCZn9f4CkdLjvntWdShTXcbbXqaiDsLve6gFV3soi1PGbE_kDNoqqsy1G176Ol6DjNfJmAoiMUohW2WphK2_lhjU4pnsAP4TTiT7H6UY7jg6gn0TUtcCaDRJVa6ci5aBRaFwg7vfLzmPhp2bwZXPeKLKBAJp6uC-6HhSqs4MqkKTJRrLakARBJUBTQH5dCAqTRWJtIyTyUwQKUDKduCxpSJMGYHqFFMC32IcB4yJQ01xj5WsjBPQmmALggNGGc4l00U1rLMpM8wbgtdjLNlbmQr_wzknzn5Z0ETXXzMeV3k1_hzdKtWUebP2iyjic35A9QlbaLLWm3L7t9XO_rf8DO03hs89LP-7eP9MdqwdecXno8t1KjKuT4BdlLlp24zvgNf09nP |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JSwMxFA5aQby4i9WqOXjT4EySznIs1lK34sFCLzJksojQTst0in_fl3TGVlHB25Dt8F7yvi-TtyB0bvw4DYJQEA5wR7hoahIpGREtPW4YM4a5bPuPvaDb53eD5mApit95u1dPkvOYBpulKSuuJspcLQW-eZwT64lu8Qu-VtEamGPf7us-bVW2mDHmqqsCKWAkbHK_DJv5eY2v0LTgm9-eSB3ydLbRZkkZcWuu4x20orNdtFXSR1wezik0VRUaqrY99NKewcy3ERgNYvFKYZuxKYdjMNTY5OIVbAJ-F848u5_mGC67egR94xwXAih1jpUunLtWhkWmsMO-MnZzH_U7N8_XXVIWVCASRFPAXdFwpVUYmFh5Jki1llQAOgmqPJqCoqjHVBwqE2iZxhLYoNKelE1BQ8qEH7IDVMvGmT5EOPWZkoYaYx8umZ9GvjRAHYQGvDOcyzryK1kmssw2boteDJNFnmQr_wTknzj5J14dXXzOmcxzbfw5ulGpKCnP3TShkc3_AzQmrqPLSm2L7t9XO_rf8DO0_tTuJA-3vftjtGFL0M-dIBuoVuQzfQJEpUhP3V78ABrb3gs |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Dual+image-based+reversible+fragile+watermarking+scheme+for+tamper+detection+and+localization&rft.jtitle=Pattern+analysis+and+applications+%3A+PAA&rft.au=Sahu%2C+Aditya+Kumar&rft.au=Sahu%2C+Monalisa&rft.au=Patro%2C+Pramoda&rft.au=Sahu%2C+Gupteswar&rft.date=2023-05-01&rft.pub=Springer+London&rft.issn=1433-7541&rft.eissn=1433-755X&rft.volume=26&rft.issue=2&rft.spage=571&rft.epage=590&rft_id=info:doi/10.1007%2Fs10044-022-01104-0&rft.externalDocID=10_1007_s10044_022_01104_0 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1433-7541&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1433-7541&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1433-7541&client=summon |