CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Techniques of Digital Image Watermarking: A Review

by Amit Mehto, Neelesh Mehra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 128 - Number 9
Year of Publication: 2015
Authors: Amit Mehto, Neelesh Mehra
10.5120/ijca2015906629

Amit Mehto, Neelesh Mehra . Techniques of Digital Image Watermarking: A Review. International Journal of Computer Applications. 128, 9 ( October 2015), 21-33. DOI=10.5120/ijca2015906629

@article{ 10.5120/ijca2015906629,
author = { Amit Mehto, Neelesh Mehra },
title = { Techniques of Digital Image Watermarking: A Review },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 128 },
number = { 9 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 21-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume128/number9/22902-2015906629/ },
doi = { 10.5120/ijca2015906629 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:21:12.488187+05:30
%A Amit Mehto
%A Neelesh Mehra
%T Techniques of Digital Image Watermarking: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 128
%N 9
%P 21-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s digital word it is very common to distribute digital image as a part of multimedia technology by use of the Internet. Security of this digital data over the Internet is very popular field among researchers. Watermarking is a process that embeds data or watermark inside data such that it cannot be easily accessed by authorized person. Watermarking provides copyright protection of digital data. Digital Image Water marking is a subfield of Digital watermarking, and it concerns with protection of digital image from unauthorized reproduction and modification. In digital watermarking, a secondary image is a watermark and this watermark lied into the host image and provides protection. Different Digital Image watermarking methods have been proposed in this field to maintain content authentication, copyright protection, tamper protection and many other application. This paper presents a model for digital image watermarking, properties and applications. Moreover, this paper present a survey on different types of digital Image watermarks. This paper reviews different aspects of digital image watermarking for protecting digital data and provide review of digital image watermarking methods named: Least Significant Bit (LSB), Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Singular Value Decomposition (SVD).

References
  1. Schyndel, R. G., Tirkel, A. and Osborne, C. F. “A Digital Watermark”, in proceedings of IEEE International conference on Image Processing, ICIP-1994, pp. 86-90.
  2. Er-Hsien Fu, “Literature Survey on Digital Image Watermarking”, EE381K-Multidimensional Signal Processing August 1998.
  3. Hartung F. and Kutter M., Katzenbeisser S. and Fabien A. P. Petitcolas, editors, “Information Hiding Techniques for Steganography and Digital watermarking” , Artech House, 2000 .
  4. Su G. M., “An Overview of Transparent and Robust Digital Image Watermarking”, 2001.
  5. Seitz, J., “Digital Watermarking for Digital Media”, Information Science Publishing, 2005.
  6. Liu, J. and Hi, X., “A review study on Digital Watermarking”. In proceeding of International Conference on Information and Communication Technologies, 2005.
  7. Kougianos E., Mohanty, S. P. and Mahapatra R. N. "Hardware assisted watermarking for multimedia” Computers and Electrical Engineering Volume 35 Issue 2, 2009 339- 358.
  8. Rawat K. S. et. Al, “Digital watermarking scheme for authorization against copying or piracy of color image”, Indian Journal of Computer Science and Engineering, Vol. 1 No. 4, pp. 295-300.
  9. Fridrich, J., “Image watermarking for tamper detection,” in proceedings of IEEE Int. Conf. Image Processing, Chicago, IL, Oct. 1998, pp. 404-408
  10. Coatrieux, G., Lecornu, L., Roux, C., Sankur, B. “A Review of Digital Image Watermarking in Health Care”.
  11. Muharemagic E. and Furht B. "A Survey of Watermarking Techniques and Applications" 2001.
  12. Katzenbeisser S. and Petitcolas F.A.P., “Information Hiding Technique for Steganography and Digital Watermarking”, Aetech House, UK 2000.
  13. Megalingam, R. K., Nair, M. M., Srikumar, R. Balasubramanian, V. K., Sarmaand, V. and Sarma V. “Performance Comparison of Novel, Robust Spatial Domain Digital Image Watermarking with the Conventional Frequency Domain Watermarking Techniques”, in proceeding of IEEE International Conference on Signal Acquisition and Processing 2010, pp. 349- 353
  14. Singh, P., and Chadha, R. S., “A Survey of Digital Watermarking Techniques, Applications and Attacks”, International Journal of Engineering and Innovative Technology (IJEIT), Vol. 2, No. 9, March 2013, pp. 165-175.
  15. Wu, C.H. and Cathey, R., “Digital Watermarking: A Comparative Overview of Several Digital Watermarking Schemes” 2002.
  16. Ali Al-Haj, “Combined DWT-DCT Digital Image Watermarking”, Journal of Computer Science, Vol. 3, No. 9, 2007, pp. 740-746.
  17. Lang, J., Sun, J. Y., and Yang, W. Y., “A Digital Watermarking Algorithm Based on Discrete Fractional Fourier Transformation” in proceeding of International Conference on Computer Science and Service System August 2012, pp. 691 – 694.
  18. Wu, C. and Hsieh, W., “Digital watermarking using zero tree of DCT”, IEEE Trans. Consumer Electronics, vol. 46, No. 1, 2000, pp. 87-94.
  19. Yang, Y., Sun, X., Yang, H., and Li, C. T. "A Removable Visible Image Watermarking Algorithm in DCT Domain," Journal of Electronic Imaging, Vol. 17, No. 3, July-September 2008, pp. 033008-1 ~ 033008-11.
  20. Huang, F., and Guan, Z. H. "A Hybrid SVD-DCT Watermarking Method Based on LPSNR", Pattern Recognition Letters, Vol. 25, No. 15, November 2004, pp. 1769-1775.
  21. Cox, I. J., Kilian, J., Leighton, F. T. and Shamoon, T., “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, Vol. 6, January 1997, pp. 1673–1687.
  22. Zhu, W., Xiong, Z. and Zhang, Y.Q., “Multi Resolution Watermarking for Images and Video”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 9, June 1999, pp.545–550.
  23. Langelaar, G.C. and Langendijk, R.L., “Optional Differential Energy Watermarking of DCT Encoded Images and Video”, IEEE Transactions on Image Processing, vol. 10, January 2001, pp. 148-158.
  24. Shaikh, M. S. and Dote, Y. "A Watermarking Scheme For Digital Images Using Multilevel Wavelet Decomposition", Malaysian Journal of Computer Science, Vol. 16 No. 1, June 2003, pp. 24-36.
  25. Liu, J. C. Lin, C. H., Kuo L. C. and Chang, J. C. "Robust Multi-scale Full-Band Image Watermarking for Copyright Protection", Lecture Notes in Computer Science, Springer Berlin, Heidelberg, Vol. 4570, 2007, pp. 176-184.
  26. Hassanien, A. E., “A Copyright Protection using Watermarking Algorithm", ACM Journal Informatica, Vol. 17, No. 2, April 2006, pp. 187-198.
  27. Chiu Y. C. and Tsai, W. H. "Copyright Protection against Print-and-Scan Operations by Watermarking for Color Images Using Coding and Synchronization of Peak Locations in Frequency Domain", Journal of Information Science And Engineering, Vol. 22, 2006, pp. 483-496.
  28. Singh, Y. S., Devi, B. P. and Singh K. M., “A Review of Different Techniques on Digital Image Watermarking Scheme” International Journal of Engineering Research, Vol.2, No.3, July 2013, pp.193-199.
  29. Liu, R. and Tan, T. “An SVD-based Watermarking Scheme for Protecting Rightful Ownership”, IEEE Trans. Multimedia, Vol. 4, No. 1, 2002, pp. 121-128, 2002.
  30. Chang, C. C., Tsai, P., and Lin, C. C. “SVD based Digital Image Watermarking Scheme”, Pattern Recognition Letters 26, 2005, pp. 1577-1586.
  31. Ghazy, R.A., El-fishawy, N.A., Hadhoud, M.M., Dessouky, M.I., El-Samie, F.E.A., “An Efficient Block-by-Block SVD-based Image Watermarking Scheme”, National Radio Science Conference, 2007, pp. 1-9.
  32. Shieh, J. M., Lou D. C. and Chang, M. C., “A Semi-blind Digital Watermarking Scheme Based on Singular Value Decomposition”, Computer Standards and Interfaces Vol. 28 No. 4, 2006, pp. 428-440.
  33. Hsieh, C. and Tsou, P. “Blind Cepstrum Domain Audio Watermarking Based on Time Energy Features”, in proceeding of 4th International Conference on Digital Signal Processing, 2004, pp. 705-708.
  34. Vladimir, B., and Rao, K. E. “An Efficient Implementation of the Forward and Inverse MDCT in MPEG Audio Coding”, IEEE Signal Processing Letters, Vol. 8, No. 2, 2005, pp. 48-51.
  35. Chandra, D.V.S., “Digital Image Watermarking Using Singular Value Decomposition”, in proceedings of 45th IEEE Midwest Symposium on Circuits and Systems, Tulsa, UK, August 2002, pp. 264-267.
  36. Cox I. J., Miller, M. L. and Bloom J. A., “Digital Watermarking”, Morgan Kaufmann Publishers, USA, 2002.
  37. Katzenbeisser S. and Petitcolas F.A.P., “Information Hiding Techniques for Steganography and Digital Watermarking”, Artech House, UK, 2000.
  38. Pan, J. S., Huang, H. C., Jain L. C., and Fang, W. C. “Intelligent Multimedia Data Hiding”, in Springer, 2004
  39. Liu J. and He, X. “A Review Study on Digital Watermarking”, in proceeding of 1st International Conference on Information and Communication Technologies, 2005, pp. 337-341.
  40. Friedman, G.L., “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image”, in proceeding of IEEE Transaction on Consumer Electronics, Vol. 39, No. 4, November 1993, pp. 905-910.
  41. Coatrieux, G., Lecornu, L., Roux, C., Sankur, B., “A Review of Digital Image Watermarking Health Care”.
  42. Hartung, F., Su., J. K. and Girod, B. “Spread Spectrum Watermarking: Malicious attacks and counterattacks”, 1999, pp. 147-158.
  43. Katzenbeisser S. and Petitcolas F.A.P., “Information Hiding Techniques for Steganography and Digital Watermarking”, Aetech House, UK, 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Discrete Wavelet Transform Discrete Cosine Transform Peak Signal to Noise Ratio.