Watermarking approach | Watermark generation | Segmented block size (pixels) | Embedding technique | Watermark payload (bpp) | PSNR water-marked image (dB) | Attacks | PSNR of restored images (dB) |
---|---|---|---|---|---|---|---|
[2] Qin 2012 | Authentication bit: Hash calculation and folding operation Recovery bit: non-sub sampled contourlet transform (NSCT) | Authentication bit: 8 × 8 Restoration bit:32 × 32 | LSB Adaptive bit Allocation | 1 | 51 | Content-preserving manipulations. | 41–48 |
[38] Sreenivas 2016 | Authentication bit: Ex- OR operation Recovery bit: 7 different ways including block average intensity | 2 × 2 | LSB a chaotic map | 3 | 37 | Collage attack | 26–38 |
[5] Kiatpapan 2015 | Two identical down-sampled images embedded to upper and lower sections of LSB | 4 × 4 | LSB | 2 | NA | Collage attack | 19–26 |
[1] Singh 2016 | Authentication bit: longitudinal redundancy check (LRC) and the mean value of the pixels of the block Restoration bit: DCT and quantisation matrix | 2 × 2 | LSB | 3 | 37–39 | Object addition attacks, Object removal attacks, and Cropping | 30–43 |
[40] Dhole 2015 | Authentication bit: XOR operation Recovery bit: DCT | 8 × 8 | LSB | 2 | 34–38 | Vector quantisation (VQ), collage and quantisation attacks | 36–40 |
[6] Zhang 2011 | Authentication bit: Hash data Recovery n bit: average intensity | 8 × 8 | LSB | 3 | 37 | Content-tampering attack | 22–40 |
[7]Cao2017 | Authentication bit: Hash data Recovery bit: average intensity | 2 × 2 | LSB | 2 | 44 | VQ attack and collage attack. In | 46 |
[3] Chang 2013 | Authentication bit: LBP, Recovery bit: mean value of the pixels of the block | 3 × 3 | LSB | 2 | 44 | Collage attack VQ attack, constant–average attack | 44–68 |
[13] Doyoddorj 2017 | Authentication bit: OR operation Recovery bit: average intensity | NA | LSB | 3 | 44–45 | Malicious and incidental attacks | 29–32 |
[16] He 2012 | Authentication and Recovery bit: average intensity | 2 × 2 | LSB | 2 | 44 | Collage attack, content-preserving manipulations | 27–32 |
[24] Qin 2017 | Authentication bit: hash data Authentication and Recovery bit: average intensity | 3 × 3 | LSB overlapping embedding strategy | 2 | 42–44 | Collage attack | 33–38 |
[19] Li 2011 | Recovery bit: DCT, Quantisation | 8 × 8 | LSB | 2 | 44 | ES attack, collage attack and only-content-tampering attack | 45–51 |
[44] Zhang 2011 | Authentication bit: hash data Recovery bit: DCT | 8 × 8 | LSB | 3 | 37 | Tampered-block | 30 |
[45] Saeed 2015 | Authentication bit: MD5 hash algorithm Recovery bit: SPHIT | 3 × 3 | LSB | 3 | 37 | Malicious attacks | 35 |
[14] Lin, 2006 | Authentication bit: X-OR Operation Recovery bit: Average intensity of block | 2 × 2 | LSB | 3 | 37 | Cropped image | 28–50 |
[46] Haghighi 2018 | Authentication bit: X-OR operation Two recovery bit: lifting wavelet transform (LWT) and Stucki Kernel | 2 × 2 | LSB | 2 | 46 | Cropped image | 44–45 |
[47] Qin 2018 | Authentication bit: hash function Recovery bit: optimal iterative block truncation coding | 8 × 8 | LSB | 2 | 44 | Cropped image | 31 |
[48] Qin 2016 | Authentication bit: hash function Recovery Bit: Average intensity of block | 2 × 2 | LSB | 2 | 44 | Cropped image | 46 |
[49] Wu 2017 | Authentication bit: vector quantisation (VQ) Recovery bit: average intensity of block | 4 × 4 | LSB | 1 | 51 | Cropped image | 40 |