{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:22:24Z","timestamp":1760955744802,"version":"build-2065373602"},"reference-count":35,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T00:00:00Z","timestamp":1506297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61702303, No. 61201371"],"award-info":[{"award-number":["No. 61702303, No. 61201371"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Shandong Province, China","award":["No. ZR2017MF020, No. ZR2015PF004"],"award-info":[{"award-number":["No. ZR2017MF020, No. ZR2015PF004"]}]},{"name":"Research Award Fund for Outstanding Young and Middle-Aged Scientists of Shandong Province, China","award":["No. BS2013DX022"],"award-info":[{"award-number":["No. BS2013DX022"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people\u2019s attention. The fragile watermark for integrity authentication of image data and protection of copyright has become a hotspot. In the storage and transmission process, image data must be compressed to save network bandwidth. As a result, semi-fragile watermarking techniques, which can be used to distinguish common image processing operations from malicious tampering, are emerging. In this paper, semi-fragile watermarking algorithms for image authentication are surveyed. The basic principles and characteristics about semi-fragile watermarking algorithms are introduced, and several kinds of attack behaviors are also included. Aiming at several typical image-authentication algorithms, advantages and disadvantages are analyzed, and evaluation indexes of various algorithms are compared. Finally, we analyze the key points and difficulties in the study on semi-fragile watermarking algorithms, and the direction about future development is prospected.<\/jats:p>","DOI":"10.3390\/fi9040056","type":"journal-article","created":{"date-parts":[[2017,9,26]],"date-time":"2017-09-26T04:28:01Z","timestamp":1506400081000},"page":"56","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images"],"prefix":"10.3390","volume":"9","author":[{"given":"Xiaoyan","family":"Yu","sequence":"first","affiliation":[{"name":"School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0901-2492","authenticated-orcid":false,"given":"Chengyou","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1331-7379","authenticated-orcid":false,"given":"Xiao","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,9,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","volume":"6","author":"Cox","year":"1997","journal-title":"IEEE Trans. Image Process."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1579","DOI":"10.1109\/83.951542","article-title":"Multipurpose watermarking for image authentication and protection","volume":"10","author":"Lu","year":"2001","journal-title":"IEEE Trans. Image Process."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Lin, E.T., Podilchuk, C.I., and Delp, E.J. (2000, January 24\u201326). Detection of image alterations using semifragile watermarks. Proceedings of the SPIE\u2014Security and Watermarking of Multimedia Contents II, San Jose, CA, USA.","DOI":"10.1117\/12.384969"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.future.2014.07.001","article-title":"Cloud-based adaptive compression and secure management services for 3D healthcare data","volume":"43\u201344","author":"Castiglione","year":"2015","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/79.939835","article-title":"Digital watermarking: Algorithms and applications","volume":"18","author":"Podilchuk","year":"2001","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3976","DOI":"10.1109\/TSP.2005.855418","article-title":"Watermarking security: Theory and practice","volume":"53","author":"Cayre","year":"2005","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., and Memon, N. (2000, January 24\u201326). Further attacks on Yeung-Mintzer fragile watermarking scheme. Proceedings of the SPIE\u2014Security and Watermarking of Multimedia Contents II, San Jose, CA, USA.","DOI":"10.1117\/12.384997"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Wong, P.W., and Memon, N. (2000, January 24\u201326). Secret and public key authentication watermarking schemes that resist vector quantization attack. Proceedings of the SPIE\u2014Security and Watermarking of Multimedia Contents II, San Jose, CA, USA.","DOI":"10.1117\/12.384996"},{"key":"ref_9","first-page":"842","article-title":"A novel semi-fragile digital watermarking algorithm for image content authentication, localization and recovery","volume":"38","author":"Duan","year":"2010","journal-title":"Acta Electron. Sin."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Schlauweg, M., Pr\u00f6frock, D., M\u00fcller, E., and Palfner, T. (2005, January 1\u20133). Quantization-based semi-fragile public-key watermarking for secure image authentication. Proceedings of the SPIE\u2014Mathematics of Data\/Image Coding, Compression, and Encryption VIII, with Applications, San Diego, CA, USA.","DOI":"10.1117\/12.614054"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Xiao, J., and Wang, Y. (2008, January 12\u201314). A semi-fragile watermarking tolerant of Laplacian sharpening. Proceedings of the International Conference on Computer Science and Software Engineering, Wuhan, China.","DOI":"10.1109\/CSSE.2008.331"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"20","DOI":"10.3923\/itj.2010.20.26","article-title":"A semi-fragile watermarking algorithm using adaptive least significant bit substitution","volume":"9","author":"Yang","year":"2010","journal-title":"Inf. Technol. J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.aeue.2017.05.027","article-title":"Watermarking based image authentication and tamper detection algorithm using vector quantization approach","volume":"78","author":"Tiwari","year":"2017","journal-title":"AEU Int. J. Electron. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Al-Mualla, M.E. (2007, January 11\u201314). Content-adaptive semi-fragile watermarking for image authentication. Proceedings of the 14th IEEE International Conference on Electronics, Circuits and Systems, Marrakech, Morocco.","DOI":"10.1109\/ICECS.2007.4511225"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Ho, C.K., and Li, C.T. (2004, January 5\u20137). Semi-fragile watermarking scheme for authentication of JPEG images. Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, NV, USA.","DOI":"10.1109\/ITCC.2004.1286417"},{"key":"ref_16","first-page":"132","article-title":"New semi-fragile watermarking for JPEG image authentication","volume":"27","author":"Tian","year":"2007","journal-title":"J. Comput. Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1873","DOI":"10.1049\/el.2015.2522","article-title":"Watermarking-based image authentication robust to JPEG compression","volume":"51","author":"Preda","year":"2015","journal-title":"Electron. Lett."},{"key":"ref_18","unstructured":"Zhou, X., Duan, X.H., and Wang, D.X. (2004, January 5\u20137). A semi-fragile watermark scheme for image authentication. Proceedings of the 10th International Multimedia Modelling Conference, Brisbane, Australia."},{"key":"ref_19","first-page":"157","article-title":"Semi-fragile digital watermarking algorithm for JPEG2000 image authentication","volume":"32","author":"Zhang","year":"2004","journal-title":"Acta Electron. Sin."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1360\/jos170315","article-title":"A semi-fragile image watermarking resisting to JPEG","volume":"17","author":"Li","year":"2006","journal-title":"J. Softw."},{"key":"ref_21","first-page":"653","article-title":"Wavelet semi-fragile watermarking algorithm for image authentication","volume":"34","author":"Hu","year":"2006","journal-title":"Acta Electron. Sin."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1064","DOI":"10.1016\/j.jvcir.2013.12.017","article-title":"Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique","volume":"25","year":"2014","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.measurement.2012.07.010","article-title":"Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain","volume":"46","author":"Preda","year":"2013","journal-title":"Meas. J. Int. Meas. Confed."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Shefali, S., and Deshpande, S.M. (2007, January 13\u201315). Information security through semi-fragile watermarking. Proceedings of the International Conference on Computational Intelligence and Multimedia Applications, Sivakasi, Tamil Nadu, India.","DOI":"10.1109\/ICCIMA.2007.248"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/j.jvcir.2015.05.006","article-title":"A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization","volume":"30","author":"Qi","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Lin, C.Y., and Chang, S.F. (2000, January 24\u201326). Semi-fragile watermarking for authenticating JPEG visual content. Proceedings of the SPIE\u2014Security and Watermarking of Multimedia Contents II, San Jose, CA, USA.","DOI":"10.1117\/12.384968"},{"key":"ref_27","first-page":"1549","article-title":"Semi-fragile watermarking technology in DCT domain","volume":"28","author":"Zhong","year":"2005","journal-title":"J. Comput."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"9681","DOI":"10.1007\/s11042-016-3574-0","article-title":"Self-embedding watermarking scheme against JPEG compression with superior imperceptibility","volume":"76","author":"Chen","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_29","unstructured":"Tsai, M.J., and Chien, C.C. (2008, January 18\u201321). A wavelet-based semi-fragile watermarking with recovery mechanism. Proceedings of the IEEE International Symposium on Circuits and Systems, Seattle, WA, USA."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1817","DOI":"10.1007\/s11071-014-1777-3","article-title":"Tamper detection and self-recovery scheme by DWT watermarking","volume":"79","author":"Benrhouma","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"ref_31","first-page":"199","article-title":"Image authentication and recovery using wavelet-based dual watermarking","volume":"77","author":"Preda","year":"2015","journal-title":"UPB Sci. Bull."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"10581","DOI":"10.1007\/s11042-014-2188-7","article-title":"Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication","volume":"74","author":"Li","year":"2015","journal-title":"Multimed. Tools Appl."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1016\/j.jvcir.2012.01.005","article-title":"Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images","volume":"23","author":"Phadikar","year":"2012","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_34","first-page":"2174","article-title":"Image content authentication using pinned sine transform","volume":"14","author":"Ho","year":"2004","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"ref_35","first-page":"216","article-title":"Intelligent watermarking scheme for image authentication and recovery","volume":"8","author":"Ullah","year":"2017","journal-title":"Int. J. Adv. Comput. Sci. Appl."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/9\/4\/56\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:45:52Z","timestamp":1760208352000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/9\/4\/56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,25]]},"references-count":35,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2017,12]]}},"alternative-id":["fi9040056"],"URL":"https:\/\/doi.org\/10.3390\/fi9040056","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2017,9,25]]}}}