performance of the proposed technique was due to
the two level thresholding scheme of NHS and
tamper detection map to identify the tampered
portions in the watermark image.
REFERENCES
H. Kang, and J. H. Park, “ A semi-fragile watermarking
using JND ,” in Proceedings of the Pacific Rim
Workshop on Digital Steganography (STEG 2003),
2003,pp. 127–131.
Y. P. Hu, and D. Z. Han, “ Using two semi-fragile
watermarks for image authentication,” in Proceedings
of the Fourth International Conference on Machine
Learning and Cybernetics, Guangzhou, China, 2005,
pp. 5484–5489.
H. Liu, J. Lin, and J. Huang, “Image authentication using
content based watermark,” in Proceedings of IEEE
International Symposium on Circuits and Systems,
Kobe, Japan, 2005, pp. 4014–4017.
H. Yang, and X. Sun, “ Semi-fragile watermarking for
image authentication and tamper detection using HVS
model,” in Proceedings of International Conference
on Multimedia and Ubiquitous Engineering, Seoul,
South Korea ,2007,pp. 1112–1117.
R. O. Preda, “Semi-fragile watermarking for image
authentication with sensitive tamper localization in the
wavelet domain,” Measurement, vol.46, no.1, pp.367–
373, January 2013.
M. J. Tsai, and C. C. Chien, “A wavelet-based semi-
fragile watermarking with recovery mechanism,” in
Proceedings of the IEEE International Symposium on
Circuits and Systems, Seattle, WA, USA, 2008, pp.
3033–3036.
R. O. Preda, I. Marcu, and A. Ciobanu, “Image
authentication and recovery using wavelet-based dual
watermarking ,” UPB Science Bulletin, Series C,
vol.77, no.4,pp.199–212,2015.
A. Tiwari, M. Sharma, and R.K. Tamrakar,
“Watermarking based image authentication and
tamper detection algorithm using vector quantization
approach,” AEU -International Journal of Electronics
and Communications, vol.78, pp.114–123, August
2017.
O. Benrhouma, H. Hermassi, and S. Belghith, “Tamper
detection and self-recovery scheme by DWT
watermarking,” Nonlinear Dynamics, vol.79, no.3,
pp.1817-1833,February 2015.
X. Qi, and X. Xin, “A quantization-based semi-fragile
watermarking scheme for image content
authentication,” Journal of Visual Communication and
Image Representation, vol.22, no.2, pp.187–200,
February 2011.
C. C. Lai, “A digital watermarking scheme based on
singular value decomposition and tiny genetic
algorithm,” Digital Signal Processing, vol.21, no. 4,
pp.522–527, July 2011.
Z. M. Lu, D. G. Xu, and S. H. Sun, “ Multipurpose image
watermarking algorithm based on multistage vector
quantization,” IEEE Transactions on Image
Processing, vol.14, no.6, pp. 822–831, June 2005.
S. Voloshynovskiy, S. Pereira, T. Pun, J.J. Eggers, and
J.K.Su, “Attacks on digital watermarks: classification,
estimation based attacks and benchmarks,” IEEE
Communications Magazine., 2001, 39 (8), 118–126,
August 2001.
H. Shen, and B. Chen, “From single watermark to dual
watermark: a new approach for image watermarking,”
Computers & Electrical Engineering, vol.38, no.5,
pp.1310–1324, September 2012.
C. Li, A. Zhang, Z. Liu, L. Liao, and D. Huang, “Semi-
fragile self-recoverable watermarking algorithm based
on wavelet group quantization and double
authentication,”
Multimedia Tools and Applications,
vol.74, no.23, pp.10581–10604, December 2015.
Z. Zhang, C. Wang, and X. Zhou, “Image watermarking
scheme based on DWT-DCT and SSVD,”
International Journal of security and its applications,
vol.10, no.10, pp. 191-206, October 2016.
H. Shojanazeri, W. A. W. Adnan, S. M. S. Ahmad, and S.
Rahimipour, “Authentication of images using Zernike
moment watermarking,” Multimedia Tools and
Applications,vol.76 , no.1, pp.577–606, January 2017.