A Review On Digital Image Watermarking With Cryptosystem Techniques

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings
  • Advanced Search
  • Journal List
  • Springer Nature - PMC COVID-19 Collection
  • PMC10161187

Logo of phenaturepg

Advances in medical image watermarking: a state of the art review

Solihah gull.

Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006 India

Shabir A. Parah

Associated data.

Data can not be made available due to Intuition policy.

Watermarking has been considered to be a potent and persuasive gizmo for its application in healthcare setups that work online, especially in the current COVID-19 scenario. The security and protection of medical image data from various manipulations that take place over the internet is a topic of concern that needs to be addressed. A detailed review of security and privacy protection using watermarking has been presented in this paper. Watermarking of medical images helps in the protection of image content, authentication of Electronic Patient Record (EPR), and integrity verification. At first, we discuss the various prerequisites of medical image watermarking systems, followed by the classification of Medical Image Watermarking Techniques (MIWT) that include state-of-the-art. We have classified MIWT’s into four broader classes for providing better understanding of medical image watermarking. The existing schemes have been presented along with their cons so that the reader may be able to grasp the shortcomings of the technique in order to develop novel techniques proving the inevitability of the presented review. Further, various evaluation parameters along with potential challenges pertaining to medical image watermarking systems have been discussed to provide a deep insight into this research area.

Introduction

The emergence of modern technologies including IoT, IoMT, cloud computing, telemedicine, and other secluded health setups have overtaken conventional healthcare. Sharing of digital medical images over the cloud or internet is taking place in huge amounts resulting in increased active and passive attacks on this data. Manipulation, snooping, deletion, copying, and other unauthorized access to medical data have increased by a huge amount [ 7 , 8 , 59 , 60 , 83 , 88 , 96 ]. The variation in medical image data along with the patient’s confidential data may lead to adverse effects. Yet there is an alarming increase in patient information-related thefts, even though it has been enlisted among the severe crimes. This has led the attention of various researchers towards enhancing the security of medical images. Various techniques have been developed for the secure communication of medical images along with the data being hidden within these images [ 19 , 25 , 49 ]. The main aim is that no person other than the two parties should be able to extricate the confidential message from the image. For such a purpose various data-hiding approaches like steganography, cryptography, fingerprinting, and digital watermarking have been proposed [ 8 , 19 , 20 , 25 , 49 , 93 ]. The pros and cons of these methods have been presented in Table ​ Table1 1 .

Pros and Cons of Cryptography, Steganography, and Watermarking

Among these methods watermarking is found to be a cogent tool for medical image watermarking [ 25 ]. Watermarking of medical images refers to the hiding of digital marks that may be either the hospital logo or Electronic Patient Information (EPI) [ 96 ]. This logo helps in checking the integrity of the cover image and helps in the recognition of ownership conflicts. Although image watermarking methods have developed several years before, still medical image watermarking is found to be more interesting because of its high applicability in today’s world. A lot of research has been carried out pertaining to watermarking of images yet is medical image watermarking is a new field with enormous pertinence. Over the years some review papers have been published concerning medical image watermarking. These have been presented in Table ​ Table2 2 and have different applications. Nyeem et al. [ 54 ] have presented a review of medical image watermarking techniques pertaining to security and privacy. Tripathi and Tripathi [ 87 ] have reviewed and compared the various watermarking schemes for applicability to medical images. It has discussed the various issues with classical watermarking that need to be considered before implementation in medical images. Qasim et al. [ 59 ] have presented an analysis of various medical image watermarking techniques to evaluate the robustness and precincts of these techniques. Thabit [ 84 ] has presented a review of medical image watermarking techniques specifically pertaining to authenticity verification. The review papers cited above and in Table ​ Table2 2 have not classified the Medical Image Watermarking Techniques in a broader spectrum and have just chosen to remain specific to a particular application. In this review, we have classified the medical image watermarking techniques into four broader classes and have provided the shortcoming of the literature for the readers to propose novel techniques by overcoming the potential challenges incurred in the already existing schemes. The earlier existing papers presenting the review of medical image watermarking techniques have not considered authentication, integration, and verification, although it is an important domain of medical image watermarking. Therefore there is a need for the updated review paper so as to fill the gap and shortage in the already existing literature. This will help the readers to quickly grasp the idea of existing literature and the shortcomings that need to be worked on for making the remote and online healthcare system more secure, convenient, and most importantly reliable.

Summary of various review papers for medical image watermarking

The rest of the paper is organized as follows. Section 2 presents the prerequisites for medical image watermarking techniques followed by the general framework of digital image watermarking in Section 3 . Section 4 presents applications of medical image watermarking techniques while Section 5 presents watermarking techniques for medical images. Section 6 gives the classification of medical image watermarking techniques based on domains. Further, Sections 7 and 8 present the State of the art watermarking techniques for medical images and assessment of watermarked medical images respectively. Section 9 presents the potential issues and challenges while the paper concludes in section 10 .

Prerequisites for Medical Image Watermarking Techniques

There are several prerequisites for medical image watermarking. These have been depicted in Fig. ​ Fig.1 1 .

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig1_HTML.jpg

Pre-requisites of medical image watermarking system

Image fidelity

It is a parameter that is used for the calculation of similarity between the original medical image and watermarked medical image [ 20 , 88 , 95 ]. The watermark should be embedded in the host medical image in a way that it (watermark) is not perceptible to the Human Visual System (HVS) and maintains the quality of the host image. This indicates that HVS should be unable to distinguish between the watermarked medical image and the original medical image. Image fidelity is one of the major properties a watermarking system should have, especially for medical image watermarking systems, where the slightest variation may cause the wrong diagnosis. Therefore, medical image watermarking systems should tend to keep the perceptivity as high as possible.

Image robustness

Robustness is the ability of the medical image watermarking system to withstand various signal processing and geometric attacks [ 89 ]. Since these images are susceptible to attacks including intentional as well as unintentional attacks, there is a requirement to check the robustness of the watermark against these attacks. Even though all medical image watermarking techniques need not be robust, some may be fragile. Fragile watermarks are those that neither resists intentional nor intentional attacks.

Image payload

It is the amount of data bits that can be obscured within the medical image without affecting/ degrading its quality. The payload can be embedded either to secure the image using a watermark or to send the message along with the image while maintaining its perceptual quality [ 9 ].

Image security

The medical image watermarking algorithm is said to be secure if the intruder is not able to extract the information embedded within the image [ 1 ]. Security of medical image is of prime importance due to the presence of crucial data including patient information, insurance information, and health-related information. This is usually obtained by the use of encryption keys with large key space while embedding and extracting the medical image watermark.

Watermark invisibility

Imperceptivity or watermark invisibility is the measure of similarity between the cover medical image (CMI) and the Watermarked Medical Image (WMI). It is the measure for the level of invisibility of the watermark in WMI and can be calculated as Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Metric (SSIM) [ 50 , 88 ].

Reversibility

The reversibility is of paramount importance in the case of medical images since the slightest variation in medical image data may cause misdiagnosis leading to life-threatening consequences. Even after embedding the watermark or hiding data within the image, we can reconstruct the original image if the method is reversible. Although the watermarked image is not distortionless, the recovered image is distortion-free [ 26 , 69 ].

Computational complexity

The complexity of the algorithm is determined by the time taken for its execution i.e., the time required for embedding and extraction of medical images. Medical image watermarking algorithms being mostly real-time, need to be efficient and computationally less complex [ 25 ].

Reliability

The MIWT needs to maintain the integrity, confidentiality, and authenticity of the data. This factor helps in gaining the trustworthiness of the patients over the electronic healthcare setup. Integrity ensures that the medical image data has not been manipulated or modified. Confidentiality ensures that only the authorized person has the access to the medical image data while authenticity ensures that the received medical image data is correct and authentic [ 57 ].

Further, we present the evaluation parameters and applications of various prerequisites in tabular form (Table ​ (Table3 3 ).

Evaluation parameters and their applications for MIWT

The general framework for digital image watermarking system

Digital watermarking is the method for hiding data in digital media. The watermark is hidden imperceptibly such that it can be used later for the identification and validation of data.

Basic elements of watermarking approaches

There are three basic components included in various watermarking approaches and these include:

  • Generation of watermark

The watermark generation may vary for different applications according to specified properties and preferred objectives. Figure ​ Figure2 2 depicts the process of generation of watermarking.

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig2_HTML.jpg

Generation of the watermark

  • b) Hiding of watermark

Once the watermark is generated, it is hidden within the image to generate the watermarked image using a data hiding key. Figure ​ Figure3 3 depicts the process of hiding the watermark.

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig3_HTML.jpg

Process of hiding the watermark

  • iii) Extraction of watermark

At the receiver end, the process of extraction is done by performing a reverse information-hiding algorithm along with the use of the key. Figure ​ Figure4 4 depicts the process of extraction of the watermark.

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig4_HTML.jpg

Process of extraction of the watermark

Basic components of medical image watermarking system

Section 3.1 described the general components of watermarking system. In this section, we introduce various other components required for MIWT. Figure ​ Figure5 5 shows the components of medical image watermarking systems. These include:

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig5_HTML.jpg

  • Generation of the medical image

Various methods including Computed Tomography Scan (CT), X-Rays, Magnetic Resonance Imaging (MRI), and other modalities have been developed in order to deliver better healthcare services to patients. It has helped doctors in proper diagnosis and hence is most commonly used. Medical images are collected according to the requirements of the patient. Once these images are generated, they can be used for diagnosis [ 12 ].

  • b) Storage of medical image

After the generation of medical images, there is a need to store these medical images [ 64 ].

  • iii) Data embedding and generation of authentication information

The EHI simultaneously with the authentication data is embedded within the medical image. After embedding this data in the medical image, we obtain a watermarked medical image that can be used for authentication prior to diagnosis [ 25 ].

  • iv) Communication networks

The watermarked medical image is sent over an insecure communication network for remote doctor’s advice or a second opinion.

  • e) Receipt of medical image

The medical image sent over communication networks is received via different devices including personal computers, smartphones, etc.

  • f) Data extraction and verification of authenticity

On reception of the medical image, the data including patient information and authentication bits need to be extracted to verify the authenticity of the medical image. This is an important part of MIWT since unverified images may lead to wrong diagnosis and loss of patient information [ 25 ].

  • g) Sharing for diagnosis

On verification of the medical image, it is shared with the doctor for diagnosis and required treatment.

Applications of MIWT’s

For safeguarding and securing medical images against various malicious attacks, watermarking plays an important role. The various applications of MIWT’s include:

  • Providence of EHR

The EHR’s are embedded within the medical images for protecting their confidentiality. In region-based methods, this confidential information is embedded in Non-Region of Interest (NROI) in order to save the Region of Interest (ROI) from any degradation.

  • b) Providence of medical prescription

Medical professionals these days tend to store and share medical prescriptions. These electronic prescriptions can be shared with other remote doctors for their opinion. It has made electronic healthcare cost-effective and easily accessible.

  • iii) Providence of sensitive data

MIWT’s tend to secure patient information like insurance information, patient identity, patient payment information, etc. this information needs to be protected and secured since privacy, confidentiality, and trustworthiness are main necessities for MIWT’s.

  • iv) Providence of medical image

An enormous amount of medical image data is generated in healthcare centers due to the gaining speed of electronic healthcare setups. This data is sent over the insecure channels for remote diagnosis and further monitoring of the patient. Various image modalities include CT scans, MRIs, ultrasonography, echocardiography, radiography, and functional MRI. The MIWT’s should be designed in a way that should conceal the information with nominal distortion.

Watermarking techniques for medical images

Watermarking is considered to be the best solution for protecting EPR’s containing sensitive patient information while the transmission of medical images [ 4 , 16 , 18 , 21 , 36 , 38 ]. The fact that transmission over insecure channels leads to the stealing of biomedical images, has become a substantial concern for various researchers. This data is usually at risk of being manipulated intentionally or unintentionally. Further, the data can undergo various malicious attacks that may cause a loss of trustworthiness in the newly developed medical image communication system. Watermarking has been considered to be the best solution for the authentication and protection of medical images and EPR’s containing sensitive patient information while transmitting insecure channels.

Medical image authentication can be performed using the following two methods (Fig. ​ (Fig.6 6 ).

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig6_HTML.jpg

Methods of medical image authentication techniques

Image-based watermark embedding

A logo or a watermark containing patient information is used for the validation of medical images [ 25 ]. This image can be encrypted prior to data embedding so that it cannot be decrypted other than a person who has the decryption keys.

The process of image-based watermarking is shown in Fig. ​ Fig.7 7 .

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig7_HTML.jpg

Process of image-based watermarking

Self-generated watermark embedding

For authentication of medical images, a watermark required to authenticate the medical image data is generated from the image itself [ 70 , 82 ]. This makes the watermarking algorithm dynamic in nature since the watermark is different for different images. The watermark can also be encrypted and embedded using a security key to obtain the watermarked image. The process of self-generated watermark embedding is shown in Fig. ​ Fig.8 8 .

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig8_HTML.jpg

Process of self-generated watermark embedding

The watermarking techniques for image authentication can be either block-based [ 11 , 25 ] or pixel-based [ 94 , 97 ]. Pixel-based algorithms show higher accuracy because of the fact that in the block-based method, the presence of even a single altered pixel in the block leads to the declaration of the whole block as invalid. The authentication watermark can be further utilized for tamper detection, localization, and recovery (Fig. ​ (Fig.9 9 ).

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig9_HTML.jpg

Utilization of Medical image authentication watermarking

Over years, various medical image authentication techniques have been presented [ 6 , 10 , 66 , 76 , 96 ] with different motives including tamper detection, tamper localization, and tamper recovery [ 22 , 75 ]. The techniques developed for watermarking medical images should take image quality as a priority because distortion in these images can be fatal. These techniques should be computationally efficient as they have real-time applications. Watermarking techniques for Medical Image Authentication (WTMIA) are either region-based [ 46 ] or whole image based [ 25 ]. In the region-based method, there is the division of the medical image into ROI and NROI [ 69 ]. ROI contains the major portion of concern for diagnosis and hence needs to be accurate. For such a purpose, many watermarking techniques do not consider ROI for watermarking or data hiding. Also, many reversible data-hiding techniques have been developed for embedding watermark in ROI. The reversible watermarking techniques have the ability to reconstruct the lossless image at the receiver making it an efficient method for medical image watermarking.

For various WTMIA, there is always a trade-off. On increasing the data (i.e., detecting, localizing, and recovering the tamper), there will be a decrease in perceptual quality. In such a case, region-based watermarking plays a significant role wherein tamper detection, localization, and recovery of ROI is a priority. This decreases the number of bits being embedded within the image there are some cases the whole image is important for diagnosis by a remote doctor.

Classification of MIWT’s based on domains

The MIWT’s can be classified into two groups based on domain. These are discussed in the following subsections.

Spatial domain techniques

The spatial domain techniques for MIW modify the pixel intensity values of the medical image directly [ 57 ]. These techniques are computationally efficient, simple, and provide a higher payload. Spatial domain techniques provide the above-mentioned advantages but at the same time have several disadvantages. These techniques do not survive certain attacks. Also, the discovery of the watermarking techniques used for embedding can easily give access to the unauthorized user to obtain and alter the embedded watermark. Figure ​ Figure10 10 a shows the general flow diagram for spatial domain watermark embedding and Fig. ​ Fig.10 10 b shows watermark extraction.

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig10_HTML.jpg

a The general flow diagram for spatial domain watermark embedding. b The general flow diagram for spatial domain watermark extraction

  • Least Significant Bit Substitution (LSB)

It is one the oldest and yet simple methods for watermarking in the spatial domain. It is done by embedding the watermark in LSB [ 74 ]. The watermark is encoded before embedding. To embed the encoded bits, the pixel values are converted to the binary form and the rightmost bit of every pixel is replaced by the encoded watermark bits. After the replacement of LSB, the binary value image pixel is converted back to the decimal value image pixel. This has been illustrated in Fig. ​ Fig.11 11 a. Further, the flow graph for LSB substitution has been shown in Fig. ​ Fig.11 11 b.

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig11_HTML.jpg

a LSB substitution in image pixels. b Flow graph for LSB substitution

  • b) Modification of image histogram

Histogram modification is another spatial domain technique that has been used for data hiding in the medical image [ 69 ]. This scheme makes use of peak bins to embed data in a histogram. This method is easy to implement, yet its embedding capacity is restricted to a number of maximum or peak points that are available.

  • iii) Local Binary Patterns

LBT is the spatial domain technique that makes use of the difference value between the central pixel and other pixels. It segments the image into non-overlapping blocks before calculating the differences. Then, embedding is done in these pixels according to the rules given in [ 91 ].

Transform domain techniques

Transform domain techniques generate the transform coefficients once they are applied to medical images. These coefficients are used for embedding the data. The most commonly used transform domain techniques include Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DFW). The general flow graph for data embedding and extraction in the transform domain is presented in Fig. ​ Fig.12 12 a and ​ and12 12 b respectively. At first, the image is transformed using a specific transformation. Then embedding is carried in the coefficients of the transform domain. The embedded data can be the authentication data or a logo required for verification of the medical image. After embedding the data, the image is transformed back to its original form for obtaining the watermarked image. At the receiver, extraction of the embedded data along with the generation of authentication data is carried out to validate the image. If the generated data is similar to that of embedded data, then the algorithm is terminated and the image is considered to be valid else tamper detection, localization, and recovery are carried out to obtain the tamper-corrected image.

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig12_HTML.jpg

a The general flow diagram for transform domain watermark embedding. b The general flow diagram for transform domain watermark extraction and authentication

These transform domain techniques have been discussed as under:

  • Discrete Fourier Transform

It is the most approachable technique for the conversion of medical image from the spatial domain to the transform domain [ 76 ]. It decomposes the Medical image into sine and cosine forms. It has the ability to provide resistance against various geometrical attacks. Let f t ( k ,  l ) represent the image with dimensions P×Q, k = 0, 1, 2, …, (P-1) and l = 0, 1, 2, …, (Q-1). The DFT and Inverse DFT (IDFT) can be calculated using the following formulas

Here  F T ( u ,  v ) is DFT coefficient with u = 0, 1, 2, …, P-1 and v = 0, 1, 2, …, Q-1. DFT composes the image into amplitude part and Phase part. The amplitude part is used for watermark embedding since it contains a lesser amount of information in it and helps in the reduction of image distortion.

  • b) Discrete Cosine Transform

DCT provides an attractive and efficient image transformation that maps linearly and the n-dimensional vector to n number of coefficients. It divides the image into three different frequency components: Low-Frequency Component (LFC), Middle-Frequency Component (MFC), and High-Frequency Component (HFC). The highest amount of energy is compressed LFC [ 73 ]. DCT has higher robustness towards JPEG compression but shows a lag in resistance toward the geometric attacks including cropping, rotation, scaling, etc. the DCT and its inverse have been shown in the following equations.

Here p and q are the block size and f T ( x ,  y ) represents the original image pixel, C T ( u ,  v ) is the transform domain coefficient and β ( u ) and β ( v ) is calculated as

  • iii) Discrete Wavelet Transform

DWT is the most efficient and commonly used transform domain technique. Due to the multi-resolution properties, it provides accurate spatial localization. It decomposes the image into four sub-bands including Low Low (LL), Low High (LH), High Low (HL), and High High (HH) as shown in Fig. ​ Fig.13. 13 . LL sub-band contains the most significant information regarding the image details while other sub-bands contain the detail that is missed in LL sub-band. Further, DWT offers the decomposition of LL sub-band hierarchically [ 13 , 86 ]. The energy in the case of DWT is calculated using the following equations.

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig13_HTML.jpg

Decomposition of the sub-bands in DWT

Here N represents the number of levels considered for decomposition, P N and Q N represent image dimensions and I C gives the coefficients of the current sub-bands.

Further, we present the pros and cons of the spatial domain and transform domain techniques for the readers to get better discernment for choosing the domain of watermarking according to their requirements (Table ​ (Table4 4 ).

Pros and Cons of Spatial domain and Transform domain techniques

State of the Art watermarking techniques for medical image

Classical watermarking techniques for medical images.

Classical watermarking or conventional watermarking takes whole image into consideration for watermarking. In medical images, distortion is not feasible and no radiologist may accept a distorted image for diagnosis. It may lead to wrong diagnosis leading to an increase in research pertaining to reversible data hiding (RDH). RDH has the capability to restore the original image from the image in which data is hidden. Figure ​ Figure14 14 a shows the classical approach for embedding data while Fig. ​ Fig.14 14 b shows the extraction process.

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig14_HTML.jpg

a Classical approach for data embedding in medical images. b Classical approach for data extraction in medical images

The state-of-the-art techniques along with evaluation parameters, pros, and cons of classical watermarking techniques for medical image watermarking have been presented in Table ​ Table5 5  [ 14 , 25 , 27 , 33 , 47 , 48 , 56 , 66 , 71 , 86 ].

Evaluation Parameters, Pros, and Cons of classical watermarking techniques for medical image watermarking

Reversible watermarking for medical images

Embedding data into an image may lead to distortion of the image when compared to the original image. This distortion may lead to the wrong diagnosis and may prove fatal for the patient’s health. For such a purpose, reversible data-hiding techniques have been developed. These techniques can reconstruct the original image along with the embedded data accurately. Figure ​ Figure15 15 a shows the framework for data embedding in reversible watermarking techniques for medical images and Fig. ​ Fig.15 15 b shows the data extraction and reconstruction of the original image after the extraction of hidden data.

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig15_HTML.jpg

a Embedding stage for reversible data hiding. b Extraction and reconstruction stage of reversible data hiding

The state-of-the-art techniques along with evaluation parameters, pros, and cons of reversible watermarking techniques for medical image watermarking have been presented in Table ​ Table6 6  [ 24 , 26 , 29 , 32 , 34 , 40 , 43 , 52 , 53 , 67 , 92 ].

Evaluation Parameters, Pros, and Cons of Reversible data hiding techniques for medical image watermarking

Region-based watermarking techniques for medical images

Medical images can be divided into two regions namely ROI and NROI. ROI contains the important region for diagnosis purpose while the region other than ROI mostly contains black background which has no significance for diagnosis [ 69 ]. Usually, ROI is not preferred for data hiding since it contains significant information and its distortion is not acceptable. There are several methods that use NROI for hiding data but these methods have certain shortcomings. In this method, the amount of data to be embedded is determined by the size of the NROI. Further, it does not protect ROI from various malicious attacks. Also, these methods can only be implemented if NROI is present. Figure ​ Figure16 16 a and ​ and16 16 b show the data embedding and extraction in the case of region-based methods.

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig16_HTML.jpg

a Embedding stage for region-based watermarking techniques. b Extraction stage for region-based watermarking techniques

The state-of-the-art techniques along with evaluation parameters, pros, and cons of the region-based watermarking techniques for medical image watermarking have been presented in Table ​ Table7 7  [ 2 , 17 , 35 , 42 , 45 , 55 , 62 , 74 , 77 , 80 ].

Evaluation Parameters, Pros, and Cons of Region-based watermarking techniques for medical image watermarking

Authentication-based watermarking techniques for medical images

Authentication of images is a part of watermarking schemes. The authentication watermarking techniques for medical images (AWTMI) can perform operations including Medical Image Tamper Detection (MITD), Medical Image Tamper Localization (MITL), Medical Image Tamper Recovery (MITR), and EHR embedding (Fig. ​ (Fig.17). 17 ). MITD can be done using a logo, generating the data using a hash function for ROI or whole image, the identity of patients or doctors, medical image features, etc.

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig17_HTML.jpg

MITL is usually done by generating the average of each block of the image, using a logo, etc. MITR can be ROI-based or whole image based. It is usually done by considering the image pixels directly. Recovery of images increases image payload due to the fact that recovery of the image requires more data. The data is either generated from the average of each block or by using compression methods. EHR contains information related to the patient including patient identity, medical prescription, insurance information, payment information, etc. these watermarks are embedded either in the spatial domain (pixel domain) or in the transform domain in a medical image [ 15 , 25 ]. The two main processes included in the watermarking process are watermark embedding and extraction as discussed earlier. Depending on the applicability of watermarking, the process of embedding and extraction is carried out. If we require only the detection of tamper in medical images, once detected the algorithm is terminated else the algorithm goes on till it performs the function of localizing and recovering the tamper. Most of the MIAT applied in the spatial domain use LSB substitution, difference expansion, exclusive OR, or chaotic key for watermarking. Spatial domain techniques make use of DCT, DWT, and others. Further, the watermarking domain can be selected on the basis of the required application.

Figure ​ Figure18 18 a and 18 b show the framework for data embedding and extraction in authentication-based watermarking schemes. The state-of-the-art techniques along with evaluation parameters, pros, and cons of authentication-based watermarking techniques for medical image watermarking have been presented in Table ​ Table8 8  [ 30 , 41 , 44 , 51 , 61 , 63 , 68 , 79 , 81 , 85 ]. Further in Table ​ Table9 we 9  we present the comparative analysis of several existing schemes in terms of PSNR, SSIM, and computational complexity.

An external file that holds a picture, illustration, etc.
Object name is 11042_2023_15396_Fig18_HTML.jpg

a Embedding in authentication based watermarking schemes. b Extraction in authentication-based watermarking schemes

Evaluation Parameters, Pros, and Cons of Authentication-based watermarking techniques for medical image watermarking

Evaluation Parameters for various techniques presented in the review

Evaluation parameters for MIWT’s

For the evaluation of MIWT, various metrics can be calculated in order to determine the degree of distortion of the watermarked image. Also, the extracted watermark can be tested for its accuracy.

Assessment of watermarked medical Images

Various parameters including Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), and Structural Similarity Index Matrices (SSIM) can be calculated for the estimation of distortion among the original and watermarked image. For an image (O) of size P×Q and watermarked image O W , the above-mentioned parameters are calculated as under:

  • Mean Square Error

MSE can be calculated among O and O W using the following equation [ 50 ].

  • b) Structural Similarity Index Metrics

SSIM gives the measure of correspondence among the images O and O W . It can be calculated using an equation [ 90 ].

In the above equations, μ O , μ OW are local means, σ 0 , σ 0 W are standard deviations and σ OOW is the cross-covariance between the two images O and O W . On default selection of exponents and E 3 , the equation is reframed as under

  • iii) Peak Signal to Noise Ratio

PSNR is the measure of visual quality distortion among the two images O and O W . A high value of PSNR depicts higher visual similarity between the images [ 6 ]. PSNR is calculated using the following equation.

PSNR is determined in terms of decibels (dB)

A high PSNR value indicates better perceptual quality. A PSNR value of 100 dB indicates no distortion. PSNR value of above 40 dB is acceptable for medical images. SSIM close to 1 indicates better image similarity. BER value close to 0 indicates lesser distortion among the original and watermarked image.

Assessment of extracted watermarked

To verify the reliability of the extracted watermark, various parameters can be evaluated. Let ‘L’ be the embedded logo or watermark and L’ be the extracted watermark, following are the various metrics calculated for assessment of extracted watermark.

  • Correlation coefficient (CR)

CR is used to analyze the correspondence between L and L’. Its value ranges from 0 to 1 and it is calculated using the following equation [ 31 ].

  • b) Bit Error Rate (BER)

BER is the metric that gives the measure of wrongly extracted bits in binary sequence [ 28 ]. Lower BER depicts the efficiency of the embedding algorithm. BER is calculated as

  • iii) Accuracy Rate (AR)

AR is metric that gives the measure of correctly extracted bits in a binary sequence [ 28 ]. The higher the value of AR, the better is the embedding algorithm. It can be calculated using the following equation.

Assessment of embedding capacity

Embedding capacity or payload refers to the total number of binary data that can be embedded in the medical image using a particular watermarking algorithm. The payload can be calculated using the following equation.

Assessment of False Positive and False Negative Rates

In authentication-based watermarking schemes, classification on the basis of erroneous detection of pixels as tampered or non-tampered is done. False Positive Rates give the number of pixels erroneously detected as non-tampered whereas False Negative Rates (FNR) give the number of pixels erroneously detected as tampered. Further, the Tamper Detection Rate (TDR) gives the proportion of pixels sensed as tampered to the overall tampered pixels.

Potential issues and challenges

Plenty of research has been carried out for watermarking in medical images. Various methods have been developed for the purpose of medical image authentication. Yet, there are potential issues and challenges that limit the practicality of health-related watermarking systems. This can be attributed to the fact that a trade-off always exists amid the necessities of watermarking systems (i.e., perceptivity, payload, security, robustness). It is not possible to accomplish these requirements altogether. For such a purpose, the medical image watermarking system should be able to attain a better trade-off among the above-given requirements. The potential issues and challenges of medical image watermarking techniques observed from the above-mentioned schemes have been summarized below

  • Medical image watermarking systems should attain better trade-offs among perceptivity, payload, and robustness.
  • These techniques have real-time applications, therefore should be computationally efficient.
  • Reversible data hiding is found to be an efficient technique in medical images, due to its ability to reconstruct the original cover at the receiver.
  • Compression techniques can be used for the enhancement of image payload while reducing storage requirements.
  • Several methods in medical image watermarking are able to detect tampered regions, but only a few are able to reconstruct these regions.
  • The time requirements for embedding/encryption, extracting/ decryption, and image reconstruction need to be considered because the process altogether should not be time-consuming.
  • For enhancing the security of medical images and EHI encryption algorithms can be used. However, there is a need to consider other parameters that depict the efficiency of the system.
  • On developing the medical image watermarking system, it should be evaluated for its performance on various image processing and geometric attacks.
  • In ROI and NROI-based watermarking techniques, there is a possibility of the absence of NROI. Even if the NROI is present its size depicts the amount of data that can be hidden in the image.
  • To ensure reliability and perceptual quality, almost every method makes use of two benchmarks namely PSNR and SSIM. Yet, there is a need for considering clinically relevant information in order to provide an accurate diagnosis. Therefore, the addition of benchmarks that access the watermarking system clinically to enhance its relevance and credibility should be considered.

Conclusions

Medical image watermarking is taking a lead in the present world and has the latency to provide an appreciable solution for various applications of e-healthcare. The challenges do not only include confidentiality but also include the prevention of manipulations because of authorized or unauthorized users, so that trust may be built in the e-healthcare setups. Several medical image watermarking techniques have been developed in spatial and transform domains with a different applicability. This paper presents a compendious survey of various medical image watermarking techniques using classical methods, reversible data hiding, ROI-based watermarking, and authentication-based watermarking. Further, various prerequisites along with the general framework of medical image watermarking and its capabilities have been discussed. We have presented the critical review in tabular form for various notable medical image watermarking schemes. The aim of this survey is to help future researchers to propose medical image watermarking techniques that might address the potential issues and challenges in e-healthcare setups. Furthermore, these techniques can be collaborated with machine learning algorithms [ 5 , 65 , 78 ] for providing better security.

List of Abbreviations

Data availability

Declarations.

The authors have no relevant financial or non-financial interests to disclose.

The authors have no competing interests to declare that are relevant to the content of this article.

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

The authors have no financial or proprietary interests in any material discussed in this article.

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Advances in medical image watermarking: a state of the art review

Affiliation.

  • 1 Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006 India.
  • PMID: 37362709
  • PMCID: PMC10161187
  • DOI: 10.1007/s11042-023-15396-9

Watermarking has been considered to be a potent and persuasive gizmo for its application in healthcare setups that work online, especially in the current COVID-19 scenario. The security and protection of medical image data from various manipulations that take place over the internet is a topic of concern that needs to be addressed. A detailed review of security and privacy protection using watermarking has been presented in this paper. Watermarking of medical images helps in the protection of image content, authentication of Electronic Patient Record (EPR), and integrity verification. At first, we discuss the various prerequisites of medical image watermarking systems, followed by the classification of Medical Image Watermarking Techniques (MIWT) that include state-of-the-art. We have classified MIWT's into four broader classes for providing better understanding of medical image watermarking. The existing schemes have been presented along with their cons so that the reader may be able to grasp the shortcomings of the technique in order to develop novel techniques proving the inevitability of the presented review. Further, various evaluation parameters along with potential challenges pertaining to medical image watermarking systems have been discussed to provide a deep insight into this research area.

Keywords: Authentication; Electronic Patient Record; Medical Images; Security; Watermarking.

© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023, Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Search code, repositories, users, issues, pull requests...

Provide feedback.

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly.

To see all available qualifiers, see our documentation .

  • Notifications

This repository contains the official implementation of the research paper, "MobileCLIP: Fast Image-Text Models through Multi-Modal Reinforced Training" CVPR 2024

apple/ml-mobileclip

Folders and files, repository files navigation, mobileclip: fast image-text models through multi-modal reinforced training.

This is the official repository of

MobileCLIP: Fast Image-Text Models through Multi-Modal Reinforced Training . (CVPR 2024) Pavan Kumar Anasosalu Vasu, Hadi Pouransari, Fartash Faghri, Raviteja Vemulapalli, Oncel Tuzel.

Accuracy vs latency figure.

  • Our smallest variant MobileCLIP-S0 obtains similar zero-shot performance as OpenAI 's ViT-B/16 model while being 4.8x faster and 2.8x smaller.
  • MobileCLIP-S2 obtains better avg zero-shot performance than SigLIP 's ViT-B/16 model while being 2.3x faster and 2.1x smaller, and trained with 3x less seen samples.
  • MobileCLIP-B (LT) attains zero-shot ImageNet performance of 77.2% which is significantly better than recent works like DFN and SigLIP with similar architectures or even OpenAI's ViT-L/14@336 .

To download pretrained checkpoints follow the code snippet below

Getting Started

For easy adoption, our model has similar API as open_clip models. To use our model, follow the code snippet below

To reproduce results, we provide script to perform zero-shot evaluation on ImageNet-1k dataset. To evaluate on all the 38 datasets, please follow instructions in datacomp .

Please refer to Open CLIP Results to compare with other models.

Note: MobileCLIP-B(LT) is trained for 300k iterations with constant learning rate schedule and 300k iterations with cosine learning rate schedule.

If you found this code useful, please cite the following paper:

Acknowledgements

Our codebase is built using multiple opensource contributions, please see ACKNOWLEDGEMENTS for more details.

Code of conduct

  • Python 99.4%

Help | Advanced Search

Computer Science > Computer Vision and Pattern Recognition

Title: a self-supervised cnn for image watermark removal.

Abstract: Popular convolutional neural networks mainly use paired images in a supervised way for image watermark removal. However, watermarked images do not have reference images in the real world, which results in poor robustness of image watermark removal techniques. In this paper, we propose a self-supervised convolutional neural network (CNN) in image watermark removal (SWCNN). SWCNN uses a self-supervised way to construct reference watermarked images rather than given paired training samples, according to watermark distribution. A heterogeneous U-Net architecture is used to extract more complementary structural information via simple components for image watermark removal. Taking into account texture information, a mixed loss is exploited to improve visual effects of image watermark removal. Besides, a watermark dataset is conducted. Experimental results show that the proposed SWCNN is superior to popular CNNs in image watermark removal.

Submission history

Access paper:.

  • Download PDF
  • HTML (experimental)
  • Other Formats

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

Image splicing forgery detection: A review

  • Published: 16 March 2024

Cite this article

  • Ritesh Kumari   ORCID: orcid.org/0009-0002-2062-2440 1 &
  • Hitendra Garg 1  

Image splicing forgery is a prevalent form of digital image manipulation where various portions from one or multiple images are combined to create a deceptive image that appears genuine. Detecting image splicing forgery is crucial for verifying the authenticity of an image. Image splicing forgery detection has grown significantly in recent years, with numerous detection approaches proposed in the literature. This paper presents a comprehensive survey and classification of existing image splicing forgery detection approaches, focusing on 2014 to 2023. This study reviews 88 research papers on splicing in the context of image forgery detection. A generalized structure is introduced, outlining the typical stages involved in the detection process. The paper thoroughly reviews the literature, providing an overview of both hand-crafted and advanced detection approaches researchers propose. Benchmark datasets are identified, including their limitations. The objective is to provide a clear and comprehensive understanding of image splicing forgery detection for researchers and practitioners interested in this area. This survey is a valuable resource, offering insights into the field’s current state and highlighting areas for future research and development.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

research paper on image watermarking

Data Availability

It is not applicable to this article as no datasets were generated or analyzed during the current study.

Rep. Paul A. Gosar tweets fake image of Obama with the Iranian President - The Washington Post. [Online]. Available: https://www.washingtonpost.com/politics/2020/01/06/gop-congressman-tweeted-fake-image-obama-with-iranian-president-they-never-met/ . Accessed 4 Oct 2023

Farid H (2009) Image forgery detection. IEEE Signal Process Mag 26(2):16–25. https://doi.org/10.1109/MSP.2008.931079

Article   ADS   Google Scholar  

Mahdian B, Saic S (2010) A bibliography on blind methods for identifying image forgery. Signal Process Image Commun 25(6):389–399. https://doi.org/10.1016/j.image.2010.05.003

Article   Google Scholar  

Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: A survey. Digit Investig 10(3):226–245. https://doi.org/10.1016/j.diin.2013.04.007

Qureshi MA, Deriche M (2015) A bibliography of pixel-based blind image forgery detection techniques. Signal Process Image Commun 39:46–74. https://doi.org/10.1016/j.image.2015.08.008

Panda S, Mishra M (2018) Passive techniques of digital image forgery detection: developments and challenges. In: Advances in Electronics, Communication and Computing: ETAEERE-2016 (pp 281–290). Springer Singapore. https://doi.org/10.1007/978-981-10-4765-7_29

Meena KB, Tyagi V (2019) Image forgery detection: survey and future directions. Data, Engineering and Applications: 2:163–194. https://doi.org/10.1007/978-981-13-6351-1_14

Barad ZJ, Goswami MM (2020) Image forgery detection using deep learning: a survey. In: 2020 6th international conference on advanced computing and communication systems (ICACCS) (pp 571–576). IEEE. https://doi.org/10.1109/ICACCS48705.2020.9074408

Kaur G, Singh N, Kumar M (2023) Image forgery techniques: a review. Artif Intell Rev 56(2):1577–1625. https://doi.org/10.1007/s10462-022-10211-7

Geradts Z, Filius N, Ruifrok A (2020) Interpol review of imaging and video 2016–2019. Forensic Sci Int Synergy 2:540–562. https://doi.org/10.1016/j.fsisyn.2020.01.017

Article   PubMed   Google Scholar  

Asghar K, Habib Z, Hussain M (2017) Copy-move and splicing image forgery detection and localization techniques: a review. Aust J Forensic Sci 49(3):281–307. https://doi.org/10.1080/00450618.2016.1153711

Zanardelli M, Guerrini F, Leonardi R, Adami N (2023) Image forgery detection: a survey of recent deep-learning approaches. Multimed Tools Appl 82(12):17521–17566. https://doi.org/10.1007/s11042-022-13797-w

Sharma P, Kumar M, Sharma H (2023) Comprehensive analyses of image forgery detection methods from traditional to deep learning approaches: an evaluation. Multimed Tools Appl 82(12):18117–18150. https://doi.org/10.1007/s11042-022-13808-w

Cozzolino D, Poggi G, Verdoliva L (2015) Splicebuster: a new blind image splicing detector. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS) (pp 1–6). IEEE. https://doi.org/10.1109/WIFS.2015.7368565

Kumari R, Garg H (2023) An Image Copy-Move Forgery Detection based on SURF and Fourier-Mellin Transforms. In: 2023 International Conference on Artificial Intelligence and Smart Communication (AISC) (pp 515–519). IEEE. https://doi.org/10.1109/AISC56616.2023.10085429

Kumari R, Garg H, Chawla S (2023) Two-Stage Model for Copy-Move Forgery Detection. In: Computational Intelligence for Engineering and Management Applications: Select Proceedings of CIEMA 2022 (pp 831–844). Singapore: Springer Nature Singapore. https://doi.org/10.1007/978-981-19-8493-8_62

2017 Iranian presidential election, Wikipedia. Jun. 01, 2023. Accessed: Oct. 04, 2023. [Online]. Available: https://en.wikipedia.org/w/index.php?title=2017_Iranian_presidential_election&oldid=1158014944

Yang B, Sun X, Chen X, Zhang J, Li X (2015) Exposing photographic splicing by detecting the inconsistencies in shadows. Comput J 58(4):588–600. https://doi.org/10.1093/comjnl/bxu146

Bahrami K, Kot AC, Li L, Li H (2015) Blurred image splicing localization by exposing blur type inconsistency. IEEE Trans Inf Forensics Secur 10(5):999–1009. https://doi.org/10.1109/TIFS.2015.2394231

Rao MP, Rajagopalan AN, Seetharaman G (2014) Harnessing motion blur to unveil splicing. IEEE Trans Inf Forensics Secur 9(4):583–595. https://doi.org/10.1109/TIFS.2014.2302895

Kakar P, Sudha N, Ser W (2011) Exposing digital image forgeries by detecting discrepancies in motion blur. IEEE Trans Multimed 13(3):443–452. https://doi.org/10.1109/TMM.2011.2121056

Diallo B, Urruty T, Bourdon P, Fernandez-Maloigne C (2020) Robust forgery detection for compressed images using CNN supervision. Forensic Sci Int Rep 2:100112. https://doi.org/10.1016/j.fsir.2020.100112

Liu Q, Sung AH (2009) A new approach for JPEG resize and image splicing detection. In: Proceedings of the First ACM workshop on Multimedia in forensics (pp 43–48). https://doi.org/10.1145/1631081.1631092

Kwon M-J, Nam S-H, Yu I-J, Lee H-K, Kim C (2022) Learning JPEG compression artifacts for image manipulation detection and localization. Int J Comput Vis 130(8):1875–1895. https://doi.org/10.1007/s11263-022-01617-5

Kwon MJ, Yu IJ, Nam SH, Lee HK (2021) CAT-Net: Compression artifact tracing network for detection and localization of image splicing. In: Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (pp. 375–384). https://doi.org/10.1109/WACV48630.2021.00042

Zhu N, Shen J, Niu X (2019) Double JPEG compression detection based on noise-free DCT coefficients mixture histogram model. Symmetry 11(9):1119. https://doi.org/10.3390/sym11091119

Armas Vega EA, Gonzalez Fernandez E, Sandoval Orozco AL, Garcia Villalba LJ (2020) Passive image forgery detection based on the demosaicing algorithm and JPEG compression. IEEE Access 8:11815–11823. https://doi.org/10.1109/ACCESS.2020.2964516

Park CW, Moon YH, Eom IK (2021) Image tampering localization using demosaicing patterns and singular value based prediction residue. IEEE Access 9:91921–91933. https://doi.org/10.1109/ACCESS.2021.3091161

Wang W, Dong J, Tan T (2009) Effective image splicing detection based on image chroma. In 2009 16th IEEE International Conference on Image Processing (ICIP), Cairo, Egypt: IEEE 1257–1260. https://doi.org/10.1109/ICIP.2009.5413549

Chen Y, Retraint F, Qiao T (2022) Image splicing forgery detection using simplified generalized noise model. Signal Process Image Commun 107:116785. https://doi.org/10.1016/j.image.2022.116785

Pun C-M, Liu B, Yuan X-C (2016) Multi-scale noise estimation for image splicing forgery detection. J Vis Commun Image Represent 38:195–206. https://doi.org/10.1016/j.jvcir.2016.03.005

Liu B, Pun C-M (2020) Locating splicing forgery by adaptive-SVD noise estimation and vicinity noise descriptor. Neurocomputing 387:172–187. https://doi.org/10.1016/j.neucom.2019.12.105

Julliand T, Nozick V, Talbot H (2015) Automated image splicing detection from noise estimation in raw images. In: 6th International Conference on Imaging for Crime Prevention and Detection (ICDP-15) (pp. 1–6). IET. https://doi.org/10.1049/ic.2015.0111

Jalab HA, Alqarni MA, Ibrahim RW, Ali Almazroi A (2022) A novel pixel’s fractional mean-based image enhancement algorithm for better image splicing detection. J King Saud Univ - Sci 34(2):101805. https://doi.org/10.1016/j.jksus.2021.101805

Moghaddasi Z, Jalab HA, Noor RMd (2019) Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients. Neural Comput Appl 31(11):7867–7877. https://doi.org/10.1007/s00521-018-3586-y

Kaur N, Jindal N, Singh K (2021) Efficient hybrid passive method for the detection and localization of copy-move and spliced images. Turk J Electr Eng Comput Sci 29(2):561–582. https://doi.org/10.3906/elk-2001-138

Sheng H, Shen X, Shi Z (2018) Image Splicing Detection Based on the Q-Markov Features. In: Advances in Multimedia Information Processing–PCM 2018: 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part II 19 (pp. 453–464). Springer International Publishing. https://doi.org/10.1007/978-3-030-00767-6_42

Gani G, Qadir F (2020) A robust copy-move forgery detection technique based on discrete cosine transform and cellular automata. J Inf Secur Appl 54:102510. https://doi.org/10.1016/j.jisa.2020.102510

Mehta R, Aggarwal K, Koundal D, Alhudhaif A, Polat K (2021) Markov features based DTCWS algorithm for online image forgery detection using ensemble classifier in the pandemic. Expert Syst Appl 185:115630. https://doi.org/10.1016/j.eswa.2021.115630

Jaiprakash SP, Desai MB, Prakash CS, Mistry VH, Radadiya KL (2020) Low dimensional DCT and DWT feature based model for detection of image splicing and copy-move forgery. Multimed Tools Appl 79(39):29977–30005. https://doi.org/10.1007/s11042-020-09415-2

Zhao X, Wang S, Li S, Li J (2015) Passive image-splicing detection by a 2-D noncausal markov model. IEEE Trans Circuits Syst Video Technol 25(2):185–199. https://doi.org/10.1109/TCSVT.2014.2347513

Korde SA, Nagtode SA (2019) Splicing Detection Technique Based on the Key-Point. In: 2019 IEEE 5th International Conference for Convergence in Technology (I2CT) (pp 1–4). IEEE. https://doi.org/10.1109/I2CT45611.2019.9033538

Chen C, Ni J, Shen Z, Shi YQ (2017) Blind forensics of successive geometric transformations in digital images using spectral method: theory and applications. IEEE Trans Image Process 26(6):2811–2824. https://doi.org/10.1109/TIP.2017.2682963

Article   ADS   MathSciNet   PubMed   Google Scholar  

OdabaşYıldırım E, Ulutaş G (2019) Augmented features to detect image splicing on SWT domain. Expert Syst Appl 131:81–93. https://doi.org/10.1016/j.eswa.2019.04.036

Chen H, Zhao C, Shi Z, Zhu F (2018) An image splicing localization algorithm based on SLIC and image features. In: Advances in Multimedia Information Processing–PCM 2018: 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part III 19 (pp 608–618). Springer International Publishing. https://doi.org/10.1007/978-3-030-00764-5_56

Meena KB, Tyagi V (2020) A copy-move image forgery detection technique based on tetrolet transform. J Inf Secur Appl 52:102481. https://doi.org/10.1016/j.jisa.2020.102481

Siddiqi MH et al (2021) Image splicing-based forgery detection using discrete wavelet transform and edge weighted local binary patterns. Secur Commun Netw 2021:e4270776. https://doi.org/10.1155/2021/4270776

Zhang Y, Zhao C, Pi Y, Li S, Wang S (2015) Image-splicing forgery detection based on local binary patterns of DCT coefficients. Secur Commun Netw 8(14):2386–2395. https://doi.org/10.1002/sec.721

Rhee KH (2020) Detection of spliced image forensics using texture analysis of median filter residual. IEEE Access 8:103374–103384. https://doi.org/10.1109/ACCESS.2020.2999308

Jalab H, Subramaniam T, Ibrahim R, Kahtan H, Noor N (2019) New texture descriptor based on modified fractional entropy for digital image splicing forgery detection. Entropy 21(4):371. https://doi.org/10.3390/e21040371

Article   ADS   MathSciNet   PubMed   PubMed Central   Google Scholar  

Moghaddasi Z, Jalab HA, Md Noor R, Aghabozorgi S (2014) Improving RLRN image splicing detection with the use of PCA and Kernel PCA. Sci World J 2014:1–10. https://doi.org/10.1155/2014/606570

Jaiswal AK, Srivastava R (2020) A technique for image splicing detection using hybrid feature set. Multimed Tools Appl 79(17–18):11837–11860. https://doi.org/10.1007/s11042-019-08480-6

Farooq S, Yousaf MH, Hussain F (2017) A generic passive image forgery detection scheme using local binary pattern with rich models. Comput Electr Eng 62:459–472. https://doi.org/10.1016/j.compeleceng.2017.05.008

Dua S, Singh J, Parthasarathy H (2020) Image forgery detection based on statistical features of block DCT coefficients. Procedia Comput Sci 171:369–378. https://doi.org/10.1016/j.procs.2020.04.038

Zhang Z, Kang J, Ren Y (2008) An effective algorithm of image splicing detection. In: 2008 international conference on computer science and software engineering (Vol. 1, pp 1035–1039). IEEE. https://doi.org/10.1109/CSSE.2008.1621

Jayan TJ, Sethu PS (2018) Estimation of Spliced Images in Photographs. In: 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) (pp 248–252). IEEE. https://doi.org/10.1109/ICOEI.2018.8553823

Sai Prasanna GV, Pavani K, Kumar Singh M (2022) Spliced images detection by using Viola-Jones algorithms method. Mater Today Proc 51:924–927. https://doi.org/10.1016/j.matpr.2021.06.300

Niyishaka P, Bhagvati C (2021) Image splicing detection technique based on Illumination-Reflectance model and LBP. Multimed Tools Appl 80(2):2161–2175. https://doi.org/10.1007/s11042-020-09707-7

Hakimi F, Hariri M, GharehBaghi F (2015) Image splicing forgery detection using local binary pattern and discrete wavelet transform. In: 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI) (pp 1074–1077). IEEE. https://doi.org/10.1109/KBEI.2015.7436195

Hakimi F, Zanjan I, Hariri I (2015) Image-splicing forgery detection based on improved lbp and k-nearest neighbors algorithm. Electronics Information & Planning 3(0304–9876):7

Ibrahim SJ, Noor M (2019) Improved image splicing forgery detection by combination of conformable focus measures and focus measure operators applied on obtained redundant discrete wavelet transform coefficients. Symmetry 11(11):1392. https://doi.org/10.3390/sym11111392

Peng B, Wang W, Dong J, Tan T (2018) Image forensics based on planar contact constraints of 3D objects. IEEE Trans Inf Forensics Secur 13(2):377–392. https://doi.org/10.1109/TIFS.2017.2752728

Kim D-H, Lee H-Y (2017) Image manipulation detection using convolutional neural network. Int J Appl Eng Res 12(21):11640–11646

Google Scholar  

Wei Y, Wang Z, Xiao B, Liu X, Yan Z, Ma J (2020) Controlling neural learning network with multiple scales for image splicing forgery detection. ACM Trans Multimed Comput Commun Appl 16(4):1–124. https://doi.org/10.1145/3408299

Sharaff A, Singhal M, Chouradiya A, Gupta P (2023) An empirical analysis of deep ensemble approach on COVID-19 and tuberculosis X-ray images. Int J Biom 15(3–4):459–479

Patel B, Sharaff A (2023) Automatic Rice Plant’s disease diagnosis using gated recurrent network. Multimed Tools Appl 82(19):28997–29016. https://doi.org/10.1007/s11042-023-14980-3

Kadam K, Ahirrao DS, Kotecha DK, Sahu S (2021) Detection and localization of multiple image splicing using mobilenet V1. Arxiv 9:162499. https://doi.org/10.48550/arXiv.2108.09674

Zeng P, Tong L, Liang Y, Zhou N, Wu J (2022) Multitask image splicing tampering detection based on attention mechanism. Mathematics 10(20):1–13

Passos LA, Jodas D, da Costa KAP, Júnior LAS, Colombo D, Papa JP (2022) A review of deep learning-based approaches for deepfake content detection. arxiv. [Online]. Available: http://arxiv.org/abs/2202.06095 . Accessed 4 Oct 2023

Abd El-Latif EI, Taha A, Zayed HH (2020) A passive approach for detecting image splicing based on deep learning and wavelet transform. Arab J Sci Eng 45(4):3379–3386. https://doi.org/10.1007/s13369-020-04401-0

Abhishek, Jindal N (2021) Copy move and splicing forgery detection using deep convolution neural network, and semantic segmentation. Multimed Tools Appl 80(3):3571–3599. https://doi.org/10.1007/s11042-020-09816-3

Rao Y, Ni J, Zhao H (2020) Deep learning local descriptor for image splicing detection and localization. IEEE Access 8:25611–25625. https://doi.org/10.1109/ACCESS.2020.2970735

Almawas L, Alotaibi A, Kurdi H (2020) Comparative performance study of classification models for image-splicing detection. Procedia Comput Sci 175:278–285. https://doi.org/10.1016/j.procs.2020.07.041

Wang J, Ni Q, Liu G, Luo X, Jha SKR (2020) Image splicing detection based on convolutional neural network with weight combination strategy. J Inf Secur Appl 54:102523. https://doi.org/10.1016/j.jisa.2020.102523

Sun Y, Ni R, Zhao Y (2022) ET: Edge-enhanced transformer for image splicing detection. IEEE Signal Process Lett 29:1232–1236. https://doi.org/10.1109/LSP.2022.3172617

Chen B, Qi X, Wang Y, Zheng Y, Shim HJ, Shi Y-Q (2018) An improved splicing localization method by fully convolutional networks. IEEE Access 6:69472–69480. https://doi.org/10.1109/ACCESS.2018.2880433

Bappy JH, Simons C, Nataraj L, Manjunath BS, Roy-Chowdhury AK (2019) Hybrid LSTM and encoder-decoder architecture for detection of image forgeries. IEEE Trans Image Process 28(7):3286–3300. https://doi.org/10.1109/TIP.2019.2895466

Peng J, Li Y, Liu C, Gao X (2023) The circular U-Net with attention gate for image splicing forgery detection. Electronics 12(6):1451. https://doi.org/10.3390/electronics12061451

Ding H, Chen L, Tao Q, Fu Z, Dong L, Cui X (2023) DCU-Net: a dual-channel U-shaped network for image splicing forgery detection. Neural Comput Appl 35(7):5015–5031. https://doi.org/10.1007/s00521-021-06329-4

Xiao B, Wei Y, Bi X, Li W, Ma J (2020) Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering. Inf Sci 511:172–191. https://doi.org/10.1016/j.ins.2019.09.038

Article   MathSciNet   Google Scholar  

Nath S, Naskar R (2021) Automated image splicing detection using deep CNN-learned features and ANN-based classifier. Signal Image Video Process 15(7):1601–1608. https://doi.org/10.1007/s11760-021-01895-5

Ahmed B, Gulliver TA, Alzahir S (2020) Image splicing detection using mask-RCNN. Signal Image Video Process 14(5):1035–1042. https://doi.org/10.1007/s11760-020-01636-0

Bi X, Wei Y, Xiao B, Li W (2019) RRU-Net: The ringed residual U-Net for image splicing forgery detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (pp 30–39). https://doi.org/10.1109/CVPRW.2019.00010

Ben Aissa F, Hamdi M, Zaied M, Mejdoub M (2023) An overview of GAN-DeepFakes detection: proposal, improvement, and evaluation. Multimed Tools Appl 1–23. https://doi.org/10.1007/s11042-023-16761-4

Remya Revi K, Vidya KR, Wilscy M (2021) Detection of deepfake images created using generative adversarial networks: a review. In: Second International Conference on Networks and Advances in Computational Technologies: NetACT 19 (pp 25–35). Springer International Publishing. https://doi.org/10.1007/978-3-030-49500-8_3

Isola P, Zhu JY, Zhou T, Efros AA (2017) Image-to-image translation with conditional adversarial networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition (pp 1125–1134). https://doi.org/10.1109/CVPR.2017.632

Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434. https://doi.org/10.48550/arXiv.1511.06434

Mao X, Li Q, Xie H, Lau RY, Wang Z, Paul Smolley S (2017) Least squares generative adversarial networks. In: Proceedings of the IEEE international conference on computer vision (pp 2794–2802)

Brock A, Donahue J, Simonyan K (2018) Large scale GAN training for high fidelity natural image synthesis. arXiv preprint arXiv:1809.11096. https://doi.org/10.48550/arXiv.1809.11096

Karras T, Aila T, Laine S, Lehtinen J (2017) Progressive growing of gans for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196. https://arxiv.org/abs/1710.10196v3

Kniaz VV, Knyaz V, Remondino F (2019) The point where reality meets fantasy: Mixed adversarial generators for image splice detection. In Advances in Neural Information Processing Systems, Curran Associates, Inc. Accessed: Sep. 20, 2023. [Online]. Available: https://proceedings.neurips.cc/paper/2019/hash/98dce83da57b0395e163467c9dae521b-Abstract.html

Bi X, Zhang Z, Xiao B (2021) Reality transform adversarial generators for image splicing forgery detection and localization. In: proceedings of the IEEE/CVF international conference on computer vision (pp 14294–14303). https://doi.org/10.1109/ICCV48922.2021.01403

Liu Y, Zhu X, Zhao X, Cao Y (2019) Adversarial learning for constrained image splicing detection and localization based on atrous convolution. IEEE Trans Inf Forensics Secur 14(10):2551–2566. https://doi.org/10.1109/TIFS.2019.2902826

Liu Y, Zhao X (2020) Constrained image splicing detection and localization with attention-aware encoder-decoder and atrous convolution. IEEE Access 8:6729–6741. https://doi.org/10.1109/ACCESS.2019.2963745

Columbia Image Splicing Detection Evaluation Dataset. Accessed: Sep. 19, 2023. [Online]. Available: https://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm

Dong J, Wang W, Tan T (2013) CASIA image tampering detection evaluation database. In 2013 IEEE China Summit and International Conference on Signal and Information Processing 422–426. https://doi.org/10.1109/ChinaSIP.2013.6625374

Papers with Code - CASIA V2 Dataset. Accessed: Oct. 04, 2023. [Online]. Available: https://paperswithcode.com/dataset/casia-v2

Open Media Forensics Challenge. NIST, Aug. 2016, Accessed: Oct. 04, 2023. [Online]. Available: https://www.nist.gov/itl/iad/mig/open-media-forensics-challenge

Media Forensics Challenge 2018 NIST, Jul. 2017, Accessed: Oct. 04, 2023. [Online]. Available: https://www.nist.gov/itl/iad/mig/media-forensics-challenge-2018

Guan H et al (2019) MFC Datasets: Large-scale benchmark datasets for media forensic challenge evaluation. NIST Accessed: Oct. 04, 2023. [Online]. Available: https://www.nist.gov/publications/mfc-datasets-large-scale-benchmark-datasets-media-forensic-challenge-evaluation

COCO - Common Objects in Context. Accessed: Oct. 04, 2023. [Online]. Available: https://cocodataset.org/#home

Lin T-Y et al (2014) Microsoft COCO: Common Objects in Context. In Computer Vision – ECCV 2014, D. Fleet, T. Pajdla, B. Schiele, and T. Tuytelaars, Eds., in Lecture Notes in Computer Science. Cham: Springer International Publishing 740–755. https://doi.org/10.1007/978-3-319-10602-1_48

Papers with Code - PS-Battles Dataset. Accessed: Oct. 04, 2023. [Online]. Available: https://paperswithcode.com/dataset/ps-battles

The Berkeley Segmentation Dataset and Benchmark. Accessed: Oct. 04, 2023. [Online]. Available: https://www2.eecs.berkeley.edu/Research/Projects/CS/vision/bsds/

About LibRaw | LibRaw. Accessed: Oct. 04, 2023. [Online]. Available: https://www.libraw.org/about

Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854. https://doi.org/10.1109/TIFS.2012.2218597

Gloe T, Böhme R (2010) The ‘Dresden Image Database’ for benchmarking digital image forensics. In Proceedings of the 2010 ACM Symposium on Applied Computing, Sierre Switzerland: ACM, 1584–1590. https://doi.org/10.1145/1774088.1774427

Carvalho T, Faria FA, Pedrini H, Torres da RS, Rocha A (2016) Illuminant-based transformed spaces for image forensics. IEEE Trans Inf Forensics Secur 11(4):720–733. https://doi.org/10.1109/TIFS.2015.2506548

de Carvalho TJ, Riess C, Angelopoulou E, Pedrini H, de Rezende Rocha A (2013) Exposing digital image forgeries by illumination color classification. IEEE Trans Inf Forensics Secur 8(7):1182–1194. https://doi.org/10.1109/TIFS.2013.2265677

Download references

Author information

Authors and affiliations.

GLA, University, Mathura, Uttar Pradesh, 281406, India

Ritesh Kumari & Hitendra Garg

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Ritesh Kumari .

Ethics declarations

Competing interests.

The authors declare that they have no conflict of interest.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Kumari, R., Garg, H. Image splicing forgery detection: A review. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18801-z

Download citation

Received : 25 July 2023

Revised : 05 October 2023

Accepted : 24 February 2024

Published : 16 March 2024

DOI : https://doi.org/10.1007/s11042-024-18801-z

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Image forgery detection
  • Image forensic
  • Deep learning
  • Find a journal
  • Publish with us
  • Track your research

IMAGES

  1. (PDF) Image Watermarking Method Base on DWT-DCT-SVD

    research paper on image watermarking

  2. (PDF) A Combined Scheme in Reversible Digital Image Watermarking

    research paper on image watermarking

  3. (PDF) Lossless watermarking technique for copyright protection of high

    research paper on image watermarking

  4. A Quantum Image Watermarking Scheme Based on Two-Bit Superposition

    research paper on image watermarking

  5. (PDF) Digital Image Watermarking: A Survey

    research paper on image watermarking

  6. (PDF) A Review on Digital Image Watermarking Techniques

    research paper on image watermarking

VIDEO

  1. How to apply watermark in ms word #computer #education #msword #watermark #shorts

  2. How to apply watermark in all pages of pdf using photoshop

  3. hand rolling paper gluing and watermarking machine cigarette rolling paper machine

  4. Image Processing Course in 2 hours

  5. Watermark is watermarking! #minwon #meanie #wonwoo #mingyu #gda2024 #carat #delulu #seventeen

  6. Automatic Watermarking Using Adobe Photoshop (Tutorial)

COMMENTS

  1. (PDF) Digital Image Watermarking Techniques: A Review

    This paper gives details of standard watermarking system frameworks and lists some standard requirements that are used in designing watermarking techniques for several distinct applications. The ...

  2. A Brief, In-Depth Survey of Deep Learning-Based Image Watermarking

    This paper presents a comprehensive survey of deep learning-based image watermarking; this technique entails the invisible embedding and extraction of watermarks within a cover image, aiming for a seamless combination of robustness and adaptability. We navigate the complex landscape of this interdisciplinary domain, linking historical foundations, current innovations, and prospective developments.

  3. PDF Deep Learning based Image Watermarking: A Brief Survey

    provides a survey of image watermarking based on deep learning, Section4explores potential research avenues for the future, and Section5draws a conclusion. 2 Preliminaries 2.1 Traditional Image Watermarking Image watermarking is a technique for embedding watermark data into an image.

  4. A comprehensive survey on robust image watermarking

    The remainder of this paper is organized as follows. Section 2 describes the properties of digital watermarking. Section 3 presents recent techniques on popular natural images based on handcraft features, and several works on two new image forms and one transmission technique are given in Section 4.In Section 5, we introduce the watermarking techniques based on various learning frameworks.

  5. Digital image watermarking using deep learning

    At present, watermarking techniques play an important role in protecting digital images. To date, many classical watermarking schemes have been developed to protect images based on spatial and transform domains. However, classical watermarking schemes are less resilient to many attacks. Recently, deep learning-based watermarking made a significant contribution to image content security and ...

  6. Robust Image Watermarking Theories and Techniques: A Review

    Download : Download full-size image Figure 4. (b): three-level wavelet transform of the image. 8. Geometric invariant watermarking. Watermarking algorithms robust to the geometrical distortions have been the focus of research [81].Several approaches to this problem include exhaustive search, synchronization pattern/template, invariant domain and implicit synchronization using image features ...

  7. A Comprehensive Review on Digital Image Watermarking

    Download a PDF of the paper titled A Comprehensive Review on Digital Image Watermarking, by Shweta Wadhera and 3 other authors. Download PDF Abstract: The advent of the Internet led to the easy availability of digital data like images, audio, and video. Easy access to multimedia gives rise to the issues such as content authentication, security ...

  8. PDF arXiv:2308.04603v3 [cs.MM] 29 Oct 2023

    To this end, this paper presents a comprehensive survey of cutting-edge deep learning-based image watermarking techniques, which serves as a reference for the state-of-the-art in deep learning-based image watermarking, summarizing key research directions and envisioning future studies in the domain. 2.

  9. Survey paper A comprehensive survey on robust image watermarking

    A comprehensive survey on image watermarking schemes in different domains. • Introduction of schemes for new digital medias and geometric invariant watermarking. • Explanation of various learning-based watermarking and schemes for deep model. • Discussion and future directions have been given in the field of image watermarking.

  10. Digital Image Watermarking Techniques Using Machine Learning—A

    Digital watermarking is the process of incorporation into the digital media, e.g. text, image, audio and video of data termed a watermark that allows a later detection or extraction of watermark to claim the object [ 18 ]. A digital watermarking technique incorporates information into a document or media directly.

  11. Digital Image Watermarking Techniques: A Review

    Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Based on the desired applications, several suitable watermarking techniques have been developed to mitigate this concern. However, it is tough to ...

  12. Digital watermarking techniques for image security: a review

    The image watermarking techniques could be classified as below. The classification of Image watermarking techniques were shown in Fig. 5.The image watermarking techniques were classified into three categories, the first one was based on domain, the second one was based on perception and the third one was based on type of documents used in watermarking process.

  13. A Review On Digital Image Watermarking With Cryptosystem Techniques

    Digital image watermarking is the act of embedding a watermark into an image for the purpose of protection. However, it is still possible to remove or impair the watermark, whether by intentional or non-intentional attacks. ... This paper aims to review on some of the techniques used by recent researchers for secure, robust and imperceptible ...

  14. Advances in medical image watermarking: a state of the art review

    A logo or a watermark containing patient information is used for the validation of medical images [ 25 ]. This image can be encrypted prior to data embedding so that it cannot be decrypted other than a person who has the decryption keys. The process of image-based watermarking is shown in Fig. 7. Fig. 7.

  15. An image watermarking scheme: combining the transform domain and deep

    This paper proposes a novel image watermarking scheme with the following two processes. In the embedding process, the cover image is subjected to NSCT to obtain the properties of multi-scale and directional characteristics and fed to DWT which decomposes the contourlet image into various sub-bands. ... He has published more than 20 research ...

  16. Robust Image Watermarking based on Cross-Attention and Invariant Domain

    Image watermarking involves embedding and extracting watermarks within a cover image, with deep learning approaches emerging to bolster generalization and robustness. Predominantly, current methods employ convolution and concatenation for watermark embedding, while also integrating conceivable augmentation in the training process. This paper explores a robust image watermarking methodology by ...

  17. (PDF) Digital Image Watermarking: An Overview

    For image watermarking, the Stirmark package is the most popular benchmark, and the best current algorithms perform well against it. ... Over the past few years a number of research papers about ...

  18. (PDF) A Study on Digital Watermarking Techniques

    This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data.

  19. Medical image watermarking: a survey on applications ...

    Reviews on standard benchmark for medical image watermarking were pioneered by [] in 2007 where the authors presented more requirements than the fundamental ones such as robustness, imperceptibility, capacity, and tamper detection.Moreover, other related requirements were proposed continuously by the likes of [10, 17, 18].The paper surveys five years reviews sourced from SCOPUS and Google ...

  20. Advances in medical image watermarking: a state of the art review

    Abstract. Watermarking has been considered to be a potent and persuasive gizmo for its application in healthcare setups that work online, especially in the current COVID-19 scenario. The security and protection of medical image data from various manipulations that take place over the internet is a topic of concern that needs to be addressed.

  21. [2401.04247] Robust Image Watermarking using Stable Diffusion

    Watermarking images is critical for tracking image provenance and claiming ownership. With the advent of generative models, such as stable diffusion, able to create fake but realistic images, watermarking has become particularly important, e.g., to make generated images reliably identifiable. Unfortunately, the very same stable diffusion technology can remove watermarks injected using existing ...

  22. Digital image and video watermarking: methodologies, attacks

    In recent years, internet technology has grown in advance, and multimedia data-sharing growth rates have skyrocketed. As a result, protecting multimedia data in digital networks has become a significant problem. Multimedia data such as audio, text, video, and image are highly used as a data-sharing communication system which demands security, particularly in image and video. Digital ...

  23. MobileCLIP: Fast Image-Text Models through Multi-Modal ...

    This repository contains the official implementation of the research paper, "MobileCLIP: Fast Image-Text Models through Multi-Modal Reinforced Training" CVPR 2024 License. View license 292 stars 8 forks Branches Tags Activity. Star Notifications Code; Pull requests 1; Security; Insights apple/ml-mobileclip. This commit does not belong to any ...

  24. (PDF) Application of invisible image watermarking

    Watermarking is a technique commonly used to mark a picture that the image already has copyright and whose owner is known, but in addition to visible watermarking there is also an invisible ...

  25. Stable Diffusion 3: Research Paper

    Key Takeaways: Today, we're publishing our research paper that dives into the underlying technology powering Stable Diffusion 3.. Stable Diffusion 3 outperforms state-of-the-art text-to-image generation systems such as DALL·E 3, Midjourney v6, and Ideogram v1 in typography and prompt adherence, based on human preference evaluations.

  26. Advances in medical image watermarking: a state of the art review

    Watermarking has been considered to be a potent and persuasive gizmo for its application in healthcare setups that work online, especially in the current COVID-19 scenario. The security and protection of medical image data from various manipulations that take place over the internet is a topic of concern that needs to be addressed. A detailed review of security and privacy protection using ...

  27. [2403.05807] A self-supervised CNN for image watermark removal

    Popular convolutional neural networks mainly use paired images in a supervised way for image watermark removal. However, watermarked images do not have reference images in the real world, which results in poor robustness of image watermark removal techniques. In this paper, we propose a self-supervised convolutional neural network (CNN) in image watermark removal (SWCNN). SWCNN uses a self ...

  28. Screen-shooting watermarking algorithm based on Harris-SIFT ...

    The display used to show the watermark images in this paper has a resolution of 1920 \(\times \) 1080 and is a 24-inch monitor. We used a "Mi 10 s" mobile phone to take pictures with good focus and quality control while displaying the image in full screen on the monitor. ... Wang, X.: Research on digital watermarking algorithm oriented to ...

  29. Image splicing forgery detection: A review

    This paper presents a comprehensive survey and classification of existing image splicing forgery detection approaches, focusing on 2014 to 2023. This study reviews 88 research papers on splicing in the context of image forgery detection. A generalized structure is introduced, outlining the typical stages involved in the detection process.