Abstract: With thousands of images piling inside the world serves daily, authentication of any of any image at any given time around the world continues to be an undeniable issue. Mounting rise in data and information exchange, a heavy use of images has become common place. The challenges related to image authentication are increasing at an alarming rate. Digital image segmentation in watermarking has been found to be of good use in improve the performance of image authentication. Undertaken work in this paper compare time duration of segments and block based decomposition, watermark self-embedding, segment level watermark embedding and superpixel SVD based watermark embedding approach for image authentication. With this experiments and analysis, the superpixel based image segmentation with SVD has been applied to retain the quality of image of the embedment of digital watermark with acceptable PSNR value. Also time obtain for segmentation is less compare to block based method. The applied work is likely to have its prospective application in medical image segmentation, copyright protection and in digital forensic image investigation.


Superpixel segmentation, self-embedding, PSNR, SVD, Image authentication

Full Text:



R Achanta. “SLIC Superpixels” EPFL Technical Report 149300, 2010,

Radhakrishna Achanta, Appu Shaji, Kevin Smith, Aurelien Lucchi, Pascal Fua, and Sabine Susstrunk. “SLIC Superpixels Compared to State-of-the-art Superpixel Methods”JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, DECEMBER 2011

Chetan K.R, Dr. Nirmala Shivananda. “A new fragile watermarking approach for tamper detection and recovery of document images” 2014 IEEE International Conference on Advances in Computing,Communications and Informatics (ICACCI)pp- 1494 - 1498

Wei-Che Chen, Ming-Shi Wang. “A fuzzy c-means clustering-based fragile watermarking scheme for image authentication” Elsevier2007 Science Direct/Expert system with application, Pages 1300–1307

Mohmmad Ali M. Saiyyad, Nitin N. Patil. “Authentication and Tamper Detection in Images Using Dual Watermarking Approach” Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), IEEE 2014 ,pp-1-5

Saraju P. Mohanty and Bharat K. Bhargava. “Invisible Watermarking Based on Creation and Robust Insertion-Extraction of Image Adaptive Watermarks”, ACM Journal Name, Vol. V, No. N, February 2008, Pages 1–24.

PL Lin, PW Huang and AW Peng. “ A fragile watermarking scheme for image authentication with localization and recovery” Proceedings of the IEEE Sixth International Symposium on Multimedia Software Engineering (ISMSE’04) 2004 IEEE, pp-146 - 153

Sergio Bravo-Solorio and AsokeK.Nandi. “ Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities ” Elsevier 2010,pp- Pages 728–739

Xiumei Qiao, Rongrong Ni and Yao Zhao. “ Superpixel-Based Watermarking Scheme for Image Authentication and Recovery” Digital-Forensics and Watermarking Volume 9023 of the series Lecture Notes in Computer Science pp 160-173

Shao-Hui Liu a, Hong-Xun Yao a, Wen Gao b and Yong-Liang Liu.” An image fragile watermark scheme based on chaotic image pattern and pixel-pairs” Science Direct- Applied Mathematics and Computation (2007) pp 869–882

A.Umaamaheshvari and Dr.K.Thanushkodi. “Robust Image Watermarking Based On Block Based Error Correction Code” International Conference on Current Trends in Engineering and Technology, ICCTET’13, July 3, IEEE 2013,pp 34-40

Important links:

Yan Xing , Jieqing Tan,” A Color Watermarking Scheme Based on Block-SVD and Arnold Transformation” IEEE Digital Media and its Application in Museum & Heritages, Second Workshop on Dec 2007 pages 3-8

Clara Cruz-Ramos, Rogelio Reyes-Reyes, Mariko Nakano-Miyatake,and Héctor Pérez-Meana“Image Authentication Scheme Based on Self-embedding Watermarking” Springer-Verlag Berlin Heidelberg 2009 pages 1005–1012

Hong- Jie He, Jia-ShuZhang and FanChen.” Adjacent-block based statistical detection method for self-embedding watermarking techniques” Elsevier -Signal Processing 89 (2009) pp1557–1566

Hongjie He · Jia shu Zhang · Heng-Ming Tai,” A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization” Springer Science+Business Media, LLC 2010 pages 307–324

Oussama Benrhouma · Houcemeddine Hermassi Safya Belghith,” Tamper detection and self-recovery scheme by DWT watermarking”, Springer Science+Business July 2014 February 2015, Volume 79, Issue 3, pp 1817-1833

ET Lin, CI Podilchuk, EJ Delp III,” Detection of image alterations using semifragile watermarks” Proc. SPIE 3971, Security and Watermarking of Multimedia Contents II, 152 (May 9, 2000)

Xinpeng Zhang , ShuozhongWang,ZhenxingQian,GuoruiFeng” Reversible fragile watermarking for locating tampered blocks in JPEG images” 2010 Elsevier pp 3026–3036

Y.Q. Shi and B. Jeon (Eds.):” A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication” IWDW 2006, LNCS 4283, 2006.Springer-Verlag Berlin Heidelberg 2006 pp 422–432

Raphael C.-W. Phan. “Tampering with a watermarking-based image authentication scheme” Elsevier Pattern Recognition (2008) pages 3493 – 3496



  • There are currently no refbacks.

Copyright (c) 2017 International Journal of Advanced Research in Computer Science