{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:16:15Z","timestamp":1760242575525,"version":"build-2065373602"},"reference-count":26,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T00:00:00Z","timestamp":1511395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Imaging"],"abstract":"<jats:p>This paper presents a fragile watermarking algorithm`m for the protection of the integrity of color images with alpha channel. The system is able to identify modified areas with very high probability, even with small color or transparency changes. The main characteristic of the algorithm is the embedding of the watermark by modifying the alpha channel, leaving the color channels untouched and introducing a very small error with respect to the host image. As a consequence, the resulting watermarked images have a very high peak signal-to-noise ratio. The security of the algorithm is based on a secret key defining the embedding space in which the watermark is inserted by means of the Karhunen\u2013Lo\u00e8ve transform (KLT) and a genetic algorithm (GA). Its high sensitivity to modifications is shown, proving the security of the whole system.<\/jats:p>","DOI":"10.3390\/jimaging3040053","type":"journal-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T11:15:47Z","timestamp":1511435747000},"page":"53","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Alpha Channel Fragile Watermarking for Color Image Integrity Protection"],"prefix":"10.3390","volume":"3","author":[{"given":"Barbara","family":"Bonaf\u00e8","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Torino, Turin 10149, Italy"}]},{"given":"Marco","family":"Botta","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Torino, Turin 10149, Italy"}]},{"given":"Davide","family":"Cavagnino","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Torino, Turin 10149, Italy"}]},{"given":"Victor","family":"Pomponiu","sequence":"additional","affiliation":[{"name":"Agency for Science, Technology and Research, 1 Fusionopolis Way, Connexis, Singapore 487372, Singapore"}]}],"member":"1968","published-online":{"date-parts":[[2017,11,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","article-title":"Digital image forensics: A booklet for beginners","volume":"51","author":"Redi","year":"2011","journal-title":"Multimedia Tools Appl."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1007\/s11042-013-1405-0","article-title":"Feature extraction and local Zernike moments based geometric invariant watermarking","volume":"72","author":"Yuan","year":"2014","journal-title":"Multimedia Tools Appl."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.image.2016.03.007","article-title":"Geometrically invariant image watermarking based on fast Radial Harmonic Fourier Moments","volume":"45","author":"Wang","year":"2016","journal-title":"Signal Process. Image Commun."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., and Kalker, T. (2008). Digital Watermarking and Steganography, Morgan Kaufmann Publishers. [2nd ed.].","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"15:1","DOI":"10.1145\/2000486.2000489","article-title":"Protecting the content integrity of digital imagery with fidelity preservation","volume":"7","author":"Lin","year":"2011","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"29:1","DOI":"10.1145\/2568224","article-title":"Protecting the content integrity of digital imagery with fidelity preservation: An improved version","volume":"10","author":"Botta","year":"2014","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Hashmi, M.F., Shukla, R.J., and Keskar, A.G. (2014, January 15\u201317). Platform Independent Real Time Copyright Protection Embedding and Extraction Algorithms on Android and Embedded Framework. Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2014), Noida, India.","DOI":"10.1109\/ISSPIT.2014.7300586"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"953","DOI":"10.1007\/s11042-015-3010-x","article-title":"DCT based efficient fragile watermarking scheme for image authentication and restoration","volume":"76","author":"Singh","year":"2017","journal-title":"Multimedia Tools Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"5767","DOI":"10.1007\/s11042-014-1882-9","article-title":"Self-embedding fragile watermarking based on DCT and fast fractal coding","volume":"74","author":"Zhang","year":"2015","journal-title":"Multimedia Tools Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1117\/1.1426383","article-title":"Color image watermarking in the Karhunen-Loeve transform domain","volume":"11","author":"Barni","year":"2002","journal-title":"J. Electron. Imaging"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Dafas, P., and Stathaki, T. (2003, January 18\u201320). Digital image watermarking using block-based Karhunen-Loeve transform. Proceedings of the 3rd IEEE International Symposium on Image and Signal Processing and Analysis, Rome, Italy.","DOI":"10.1142\/9789812704337_0045"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Stanescu, D., Stratulat, M., Ciubotaru, B., Chiciudean, D., Cioarga, R.D., and Borca, D. (2007, January 17\u201318). Digital watermarking using Karhunen-Loeve transform. Proceedings of the 4th International Symposium on Applied Computational Intelligence and Informatics, Timisoara, Romania.","DOI":"10.1109\/SACI.2007.375507"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.sigpro.2015.07.018","article-title":"A Modular Framework for Color Image Watermarking","volume":"119","author":"Botta","year":"2016","journal-title":"Signal Process."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Sun, P., and Lu, H. (2009, January 18\u201320). Two efficient fragile web page watermarking schemes. Proceedings of the 5th International Conference on Information Assurance and Security, Xi\u2019an, China.","DOI":"10.1109\/IAS.2009.27"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1016\/j.patcog.2004.12.012","article-title":"A PCA-based watermarking scheme for tamper-proof of web pages","volume":"38","author":"Zhao","year":"2005","journal-title":"Pattern Recognit."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1317","DOI":"10.1109\/TIP.2014.2298980","article-title":"A compressive sensing based secure watermark detection and privacy preserving storage framework","volume":"23","author":"Wang","year":"2014","journal-title":"IEEE Trans. Image Process."},{"key":"ref_17","first-page":"120","article-title":"Security analysis of SVD-based watermarking techniques","volume":"2","author":"Pomponiu","year":"2011","journal-title":"Int. J. Multimedia Intell. Secur."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1016\/j.procs.2013.09.040","article-title":"Transparent digital watermark on drug\u2019s images","volume":"21","author":"Seetha","year":"2013","journal-title":"Procedia Comput. Sci."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1109\/TIP.2011.2159984","article-title":"A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability","volume":"21","author":"Lee","year":"2012","journal-title":"IEEE Trans. Image Process."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2010","DOI":"10.1016\/j.sigpro.2013.01.009","article-title":"A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding","volume":"93","author":"Lee","year":"2013","journal-title":"Signal Process."},{"key":"ref_21","unstructured":"Bandyopadhyay, P., Das, S., Chaudhuri, A., and Banerjee, M. (2012, January 30\u201331). A new invisible color image watermarking framework through alpha channel. Proceedings of the International Conference on Advance in Engineering, Science and Management (ICAESM 2012), Tamil Nadu, India."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","article-title":"Image hiding by optimal LSB substitution and genetic algorithm","volume":"34","author":"Wang","year":"2001","journal-title":"Pattern Recognit."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2806","DOI":"10.1016\/j.optcom.2009.04.034","article-title":"Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms","volume":"282","author":"Aslantas","year":"2009","journal-title":"Opt. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1049\/ip-vis:20020168","article-title":"Toward secure public key blockwise fragile authentication watermarking","volume":"148","author":"Barreto","year":"2002","journal-title":"IEE Proc. Vis. Image Signal Process."},{"key":"ref_25","unstructured":"(2017, September 26). Telegram.org. Available online: https:\/\/telegram.org\/blog\/stickers-meet-art-and-history."},{"key":"ref_26","unstructured":"(2017, September 26). Telegram.org. Available online: https:\/\/telegram.org\/blog\/moar-stickers."}],"container-title":["Journal of Imaging"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2313-433X\/3\/4\/53\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:50:56Z","timestamp":1760208656000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2313-433X\/3\/4\/53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,23]]},"references-count":26,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2017,12]]}},"alternative-id":["jimaging3040053"],"URL":"https:\/\/doi.org\/10.3390\/jimaging3040053","relation":{},"ISSN":["2313-433X"],"issn-type":[{"type":"electronic","value":"2313-433X"}],"subject":[],"published":{"date-parts":[[2017,11,23]]}}}