Skip to main content

Table 3 Summarisation of some self-embedding fragile watermarking methods in the transform domain

From: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability

Watermarking approach

Watermark generation

Segmented block size (pixels)

Embedding technique

Watermark payload (bpp)

PSNR water-marked image (dB)

Attacks

PSNR of restored images (dB)

[41]Han 2013

Dual watermarking scheme:

Fragile: LSB, robust: DWT

2 × 2

LSB and DWT

2

N. A

General attack

N. A

[4] Chamlawi 2009

Recovery: image digest using the Huffman coding on IDCT coefficients

N. A

IDCT and IWT

N. A

38–44

Malicious and incidental attacks

NA

[54] Zhang 2018

Mean value of each overlapping

2X2

DWT

1–2

22–24

Cropping attacks

27–36

[55] Xin 2016

NA

8 × 8

DWT

N.A

44 dB

Malicious attacks

30 dB