CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Data Hiding and Watermarking Techniques: A Survey

by Anoop Kumar Chaturvedi, Piyush Kumar Shukla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 32
Year of Publication: 2018
Authors: Anoop Kumar Chaturvedi, Piyush Kumar Shukla
10.5120/ijca2018916729

Anoop Kumar Chaturvedi, Piyush Kumar Shukla . Data Hiding and Watermarking Techniques: A Survey. International Journal of Computer Applications. 179, 32 ( Apr 2018), 28-36. DOI=10.5120/ijca2018916729

@article{ 10.5120/ijca2018916729,
author = { Anoop Kumar Chaturvedi, Piyush Kumar Shukla },
title = { Data Hiding and Watermarking Techniques: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2018 },
volume = { 179 },
number = { 32 },
month = { Apr },
year = { 2018 },
issn = { 0975-8887 },
pages = { 28-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number32/29204-2018916729/ },
doi = { 10.5120/ijca2018916729 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:57:14.454635+05:30
%A Anoop Kumar Chaturvedi
%A Piyush Kumar Shukla
%T Data Hiding and Watermarking Techniques: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 32
%P 28-36
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet is used as a leading object for simple and effective communication because of advancements technology and science. Several users access the internet and maintain their information by the help of various medium in secure and effective way. Security of information is provided by digital water marking and cryptographic techniques for patent defences, fiddle recognition and content authentication of digital information. In this paper, a widespread survey of several techniques for data hiding are explained briefly which deals with secure and private multimedia information and its accuracy. In the information hiding procedure, cryptography and steganography have assumed a noteworthy part in digital media. Information encryption keys shared by image supplier and beneficiary for image encoding and decoding. In the meantime information covering up keys additionally used to install and remove the implanted information from advanced image and obtained the cover pictures. At the extraction side if both secret key and hided information is available than unique information can be recuperated effectively. On the off chance that the beneficiary has keys for both the encryption and information hiding than it can remove the extra information and recuperate the original image.

References
  1. A. Rasmi, and M. Mohanapriya, “An Extensiv Survey of Data Hiding Techniques”, European Journal of Applied Sciences, Volume 9 (3), pp. 133-139, 2017.
  2. Ales Roceka, Karel Slavícekb, Otto Dostálb, and Michal Javorník, “A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters”, Biomedical Signal Processing and Control, Elsevier, Volume 29, pp. 44-52, 2016.
  3. Anoop Kumar Chaturvedi and Piyush Kumar Shukla, “Reversible Data-Hiding Schemes For Encrypted Image: A Review”, International Journal of Advanced Research in Computer Science, Volume 8, (8) pp. 658-660, 2017.
  4. C. Munuera, “Steganography and error-correcting codes”, Signal Processing, Elsevier, Volume 87, pp. 1528–1533, 2007.
  5. Chen Cui, and Xia-Mu Niu, “A robust DIBR 3D image watermarking algorithm based on histogram shape”, Measurement, Elsevier, Volume 92, pp. 130–143, 2016.
  6. Chuan Qin, and Xinpeng Zhang, “Effective reversible data hiding in encrypted image with privacy protection for image content”, J. Vis. Commun. Image R., Elsevier, Volume 31, pp. 154–164, 2015.
  7. Chuan Qin, Huili Wang, Xinpeng Zhang, and Xingming Sun, “Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode”, Information Sciences, Elsevier, Volume 373, pp. 233–250, 2016.
  8. Dalel Bouslimi, and Gouenou Coatrieux, “A crypto-watermarking system for ensuring reliability control and traceability of medical images”, Signal Processing: Image Communication, Elsevier, Volume 47, pp.160–169, 2016.
  9. Diljith M. Thodi and Jeffrey J. Rodríguez, “Expansion Embedding Techniques for Reversible Watermarking”, IEEE Transactions on Image Processing, Volume 16,(3), pp. 721-730, 2007.
  10. Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn, “Information Hiding—A Survey”, Proceedings of the IEEE, Volume 87, (7), pp.1062-1078, 1999. (Publisher Item Identifier S 0018-9219(99)04946-4.)
  11. Frank Y. Shih, and Xin Zhong, “High-capacity multiple regions of interest watermarking for medical images”, Elsevier on Information Sciences, Volume 367-368, pp-648-659, 2016.
  12. Huaiqing Wang and Shuozhong Wang, “Cyber Warfare: Steganography vs. Steganalysis”, Communications of the ACM, Volume 47,(10), pp. 76-82, 2004.
  13. Hwai-Tsu Hu, Jieh-Ren Chang, and Ling-Yuan Hsu, “Robust blind image watermarking by modulating the mean of partly sign-altered DCT coefficients guided by human visual perception”, Int. J. Electron. Commun. (AEÜ), Elsevier, Volume 70, pp. 1374–1381, 2016.
  14. Jitha Raj.T, and E.T Sivadasan, “A Survey Paper on Various Reversible Data Hiding Techniques in Encrypted Images”, International Advance Computing Conference (IACC), IEEE, pp-1139-1143, 2015.
  15. Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, and Fenghua Li, “Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption”, IEEE Transactions on Information Forensics and Security, Volume 8,(3), pp. 553-562, 2013.
  16. Lan Zhou, Vijay Varadharajan, and Michael Hitchens, “Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage”, IEEE Transactions on Information Forensics and Security, Volume 8,(12), pp. 1947-1960, 2013.
  17. Manas Ranjan Nayak, Joyashree Bag, Souvik Sarkar, and Subir Kumar Sarkar, “Hardware implementation of a novel water marking algorithm based on phase congruency and singular value decomposition technique”, Int. J. Electron. Commun. (AEÜ), Elsevier, Volume 71, pp. 1–8, 2017.
  18. Minati Mishra, Priyadarsini Mishra and Flt. Lt. Dr. M.C. Adhikary, “Digital Image Data Hiding Techniques: A Comparative Study”, ANSVESA, Volume 7, (2), pp.105-115, 2012.
  19. Po-Chyi Su, Tien-Ying Kuo, and Meng-Huan Li, “A practical design of digital watermarking for video streaming services”, J. Vis. Commun. Image R., Elsevier, Volume 42,(C), pp. 161–172, 2017.
  20. Shrinivas Khadare and Urmila Shrawankar, “Image bit depth plane digital watermarking for secured classified image data transmission”, International Conference on Information Security & Privacy (ICISP 2015), Procedia Computer Science, Elsevier, Volume 78, pp. 698-705, 2016.
  21. Sudhanshu Suhas Gongea, and Ashok Ghatol, “Aggregation of Discrete Cosine Transform Digital Image Watermarking with Advanced Encryption Standard Technique”, Twelfth International Multi-Conference on Information Processing, Procedia Computer Science, Elsevier, Volume 89, pp. 732 – 742, 2016.
  22. Thai-Son Nguyen, Chin-Chen Chang, and Xiao-Qian Yang, “A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain”, Int. J. Electron. Commun. (AEÜ), Elsevier, Volume 70,(8), pp. 1055–1061, 2016.
  23. Thien Huynh, Oresti Banos, Sungyoung Lee, Yongik Yoon, and Thuong Le-Tien, “Improving digital image watermarking by means of optimal channel selection”, Expert Systems With Applications, Elsevier, Volume 62, pp. 177–189, 2016.
  24. Vasiliy Sachnev, Hyoung Joong Kim, Member, Jeho Nam Senior Member, Sundaram Suresh, and Yun Qing Shi, “Reversible Watermarking Algorithm Using Sorting and Prediction”, IEEE Transactions on Circuits and Systems for Video Technology, Volume 19,(7), pp. 989-999, 2009.
  25. Wang Chun-peng, Wang Xing-yuan, Xia Zhi-qiu, Zhang Chuan, and Chen Xing-jun, “Geometrically resilient color image zero-watermarking algorithm based on quaternion Exponent moments”, J. Vis. Commun. Image R., Elsevier, Volume 41, pp. 247–259, 2016.
  26. Wioletta Wójtowicz, and Marek R. Ogiela, “Digital images authentication scheme based on bimodal biometric watermarking in an independent domain”, J. Vis. Commun. Image R., Elsevier, Volume 38, pp. 1-10, 2016.
  27. Xiang-yang Wang, Yu-nan Liu, Meng-meng Han, and Hong-ying Yang, “Local quaternion PHT based robust color image watermarking Algorithm”, J. Vis. Commun. Image R., Elsevier, Volume 38, pp. 678-694, 2016.
  28. Xiang-yang Wang, Yu-nan Liu, Huan Xu, and Ai-long Wang, Hong-ying Yang, “Blind optimum detector for robust image watermarking in nonsubsampled shearlet Domain”, Information Sciences, Elsevier, Volume 372, pp. 634-654, 2016.
  29. Xiaochun Cao, Ling Du, Xingxing Wei, Dan Meng, and Xiaojie Guo, “High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation”, IEEE Transactions on Cybernetics,Volume 46,(5), pp-1132-1143, 2016.
  30. Xiaolong Li, Weiming Zhang, Xinlu Gui, and Bin Yang, “Efficient Reversible Data Hiding Based on Multiple Histograms Modification”, IEEE Transactions on Information Forensics and Security, Volume 10,(9), pp. 2016-2027, 2015.
  31. Xinpeng Zhang, Member, “Reversible Data Hiding With Optimal Value Transfer”, IEEE Transactions on Multimedia, Volume 15,(2), pp. 316-325, 2013.
  32. Xinpeng Zhang, “Reversible Data Hiding in Encrypted Image”, IEEE Signal Processing Letters, Volume 18,(4), pp.255-258, 2011.
  33. Xiyao Liua, Fangfang Lia, Jingyu Dua, Yang Guanc, Yuesheng Zhuc, and Beiji Zoua, “A robust and synthesized-unseen watermarking for the DRM of DIBR-based 3D video”, Neurocomputing, Elsevier, Volume 222, pp. 155-169, 2017.
  34. Yahya AL-Nabhani, Hamid A. Jalab, Ainuddin Wahid, and Rafidah Md Noor, “Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural Network”, Journal of King Saud University – Computer and Information Sciences, Elsevier, Volume 27,(4), pp. 393–401, 2015.
  35. Yongjian Hu, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li, “Difference Expansion Based Reversible Data Hiding Using Two Embedding Directions”, IEEE Transactions on Multim edia, Volume 10,(8), pp. 1500-1512, 2008.
  36. Yu-Chi Chen, Chih-Wei Shiu, and Gwoboa Horng, “Encrypted signal-based reversible data hiding with public key Cryptosystem”, J. Vis. Commun. Image R., Elsevier, Volume 25, (5), pp. 1164-1170, 2014.
  37. Yunpeng Zhang, Chengyou Wang, Xiaoli Wang and Min Wang, “Feature-Based Image Watermarking Algorithm Using SVD and APBT for Copyright Protection”, Future Internet, MDPI, Volume 9,(2), 13, pp-1-15, 2017.
  38. Yusuf Perwej, Firoj Parwej, and Asif Perwej, “An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection”, The International Journal of Multimedia & Its Applications (IJMA), Volume 4,(2), pp. 21-38, 2012.
  39. Zhenghui Liu, FanZhang, JingWang, HongxiaWang, and JiwuHuang, “Authentication and recovery algorithm for speech signal based on digital watermarking”, Signal Processing, Elsevier, Volume 123, pp. 157–166, 2016.
  40. Zhuhong Shao, Yuanyuan Shang, Rui Zeng, Huazhong Shu, Gouenou Coatrieux, and Jiasong Wu, “Robust watermarking scheme for color image based on quaternion- type moment invariants and visual cryptography”, Signal Processing:ImageCommunication, Elsevier, Volume 48, pp. 12–21, 2016.
  41. AUTHORS PROFILE
  42. Anoop Kumar Chaturvedi: Obtained his Bachelor’s degree from Dr. H.S. Gour University, Sagar, India in 1998 and Master’s degree in Computer Science & Engineering with gold medal from Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, India in 2010. He is currently pursuing his Ph.D. degree in Computer Science & Engineering at Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, India. His research interest includes digital watermarking and image data hiding.
  43. Dr. Piyush Kumar Shukla: Received his Bachelor’s degree in Electronics & Communication Engineering, LNCT, Bhopal in 2001, M.Tech (Computer Science & Engineering) in 2005 from SATI, Vidisha and Ph.D. (Computer Science & Engineering) in 2013 from RGPV, Bhopal. M.P. India. He is Member of ISTE (Life Member), IEEE, IACSIT, IAENG. Currently he is working as an Assistant Prof. in Department of Computer Science & Engineering, UIT-RGPV Bhopal. He is also I/C of PG Program (Dual Degree In
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking Data Hiding Cryptography