Skip to main content

Table 2 Summary of some self-embedding fragile watermarking methods in the spatial domain

From: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability

Watermarking approach

Watermark generation

Segmented block size (pixels)

Embedding technique

Watermark payload (bpp)

PSNR water-marked image (dB)

Attacks

PSNR of restored images (dB)

[2] Qin 2012

Authentication bit: Hash calculation and folding operation

Recovery bit: non-sub sampled contourlet transform (NSCT)

Authentication bit: 8 × 8

Restoration bit:32 × 32

LSB

Adaptive bit Allocation

1

51

Content-preserving manipulations.

41–48

[38] Sreenivas 2016

Authentication bit: Ex- OR operation

Recovery bit: 7 different ways including block average intensity

2 × 2

LSB a chaotic map

3

37

Collage attack

26–38

[5] Kiatpapan 2015

Two identical down-sampled images embedded to upper and lower sections of LSB

4 × 4

LSB

2

NA

Collage attack

19–26

[1] Singh 2016

Authentication bit:

longitudinal redundancy check (LRC) and the mean value of the pixels of the block

Restoration bit: DCT and quantisation matrix

2 × 2

LSB

3

37–39

Object addition attacks, Object removal attacks, and Cropping

30–43

[40] Dhole 2015

Authentication bit: XOR operation Recovery bit: DCT

8 × 8

LSB

2

34–38

Vector quantisation (VQ), collage and quantisation attacks

36–40

[6] Zhang 2011

Authentication bit: Hash data

Recovery n bit: average intensity

8 × 8

LSB

3

37

Content-tampering attack

22–40

[7]Cao2017

Authentication bit: Hash data

Recovery bit: average intensity

2 × 2

LSB

2

44

VQ attack and collage attack. In

46

[3] Chang 2013

Authentication bit: LBP,

Recovery bit: mean value of the pixels of the block

3 × 3

LSB

2

44

Collage attack

VQ attack, constant–average attack

44–68

[13] Doyoddorj 2017

Authentication bit: OR operation

Recovery bit: average intensity

NA

LSB

3

44–45

Malicious and incidental attacks

29–32

[16] He 2012

Authentication and Recovery bit: average intensity

2 × 2

LSB

2

44

Collage attack, content-preserving manipulations

27–32

[24] Qin 2017

Authentication bit: hash data

Authentication and Recovery bit: average intensity

3 × 3

LSB overlapping embedding strategy

2

42–44

Collage attack

33–38

[19] Li 2011

Recovery bit: DCT, Quantisation

8 × 8

LSB

2

44

ES attack, collage attack and only-content-tampering attack

45–51

[44] Zhang 2011

Authentication bit: hash data

Recovery bit: DCT

8 × 8

LSB

3

37

Tampered-block

30

[45] Saeed 2015

Authentication bit: MD5 hash algorithm

Recovery bit: SPHIT

3 × 3

LSB

3

37

Malicious attacks

35

[14] Lin, 2006

Authentication bit: X-OR Operation

Recovery bit: Average intensity of block

2 × 2

LSB

3

37

Cropped image

28–50

[46] Haghighi 2018

Authentication bit: X-OR operation

Two recovery bit: lifting wavelet transform (LWT) and Stucki Kernel

2 × 2

LSB

2

46

Cropped image

44–45

[47] Qin 2018

Authentication bit: hash function

Recovery bit: optimal iterative block truncation coding

8 × 8

LSB

2

44

Cropped image

31

[48] Qin 2016

Authentication bit: hash function

Recovery Bit: Average intensity of block

2 × 2

LSB

2

44

Cropped image

46

[49] Wu 2017

Authentication bit: vector quantisation (VQ)

Recovery bit: average intensity of block

4 × 4

LSB

1

51

Cropped image

40