CFP last date
22 April 2024
Reseach Article

Survey of Digital Image Watermarking Techniques to achieve Robustness

by Seema Malshe(gondhalekar), Hitesh Gupta, Saurabh Mandloi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 45 - Number 13
Year of Publication: 2012
Authors: Seema Malshe(gondhalekar), Hitesh Gupta, Saurabh Mandloi
10.5120/6837-9172

Seema Malshe(gondhalekar), Hitesh Gupta, Saurabh Mandloi . Survey of Digital Image Watermarking Techniques to achieve Robustness. International Journal of Computer Applications. 45, 13 ( May 2012), 1-8. DOI=10.5120/6837-9172

@article{ 10.5120/6837-9172,
author = { Seema Malshe(gondhalekar), Hitesh Gupta, Saurabh Mandloi },
title = { Survey of Digital Image Watermarking Techniques to achieve Robustness },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 45 },
number = { 13 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume45/number13/6837-9172/ },
doi = { 10.5120/6837-9172 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:37:29.236884+05:30
%A Seema Malshe(gondhalekar)
%A Hitesh Gupta
%A Saurabh Mandloi
%T Survey of Digital Image Watermarking Techniques to achieve Robustness
%J International Journal of Computer Applications
%@ 0975-8887
%V 45
%N 13
%P 1-8
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital image watermarking is widely used for copyright protection of digital information. The effectiveness of a digital watermarking technique is indicated by the robustness of embedded watermarks against various attacks. So watermarking algorithms normally prefers robustness. Because of a robust algorithm it is not possible to eliminate the watermark without rigorous degradation of the cover content. In this paper we review few different digital image watermarking techniques to achieve robustness. This paper focuses on the various domains of digital image watermarking technique. Also describing few techniques to achieve robustness and comparing those techniques against robustness for attacks.

References
  1. "Researches on uniform meaningful watermark? liu quan, jiang xuemei, proceedings of the 2002 6t international conference on signal processing, 2002.
  2. S. Voloshynovskiy, S. Pereira, T. Pun, University of Geneva J. J. Eggers and J. K. Su, University of Erlangen-Nuremberg, Attacks on Digital Watermarks: Classification, Estimation-based Attacks and Benchmarks
  3. Neeta Deshpande, Snehal Kamalapur and Jacobs Daisy, "Implementation of LSB steganography and Its Evaluation for Various Bits", 1st International Conference on Digital Information Management,6 Dec. 2006 pp. 173-178.
  4. Mrs Neeta Deshpande, Dr. Archana rajurkar, Dr. R. manthalkar Review of Robust Video Watermarking algorithms, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 3, March 2010.
  5. K. R. Rao and P. Yip, "Discrete Cosine Transform: Properties, Algorithms, Advantages, Applications"
  6. H. Inoue, A. Miyazaki and T. Katsura, "An Image Watermarking Method Based on the Wavelet Transform", IEEE Conf. on Image Processing, Vol. 1, pp. 296-300, 1999.
  7. hua lian; bo-ning hu; rui-mei zhao; yan-li hou; , "design of digital watermarking algorithm based on wavelet transform," machine learning and cybernetics (icmlc), 2010 international conference on , vol. 5, no. , 621pp. 2228-2231, 11-14 july 2010
  8. Chih-Wei Tang and Hsueh-Ming Hang, "A Feature-Based Robust Digital Image Watermarking Scheme", IEEE Transactions on signal processing vol 51, NO. 4, APRIL 2003
  9. Jen-Sheng Tsai, Win-Bin Huang, Chao-Lieh Chen, Yau-Hwang Kuo, "A Feature-Based Digital Image Watermarking For Copyright Protection And Content Authentication "Image Processing,IEEE International Conference 2007
  10. Fabien A. P. Petitcolas , Ross J. Anderson, and Markus G. Kuhn "Attacks on Copyright Marking Systems"
  11. STIRMARK bench mark http://www. petitcolas. net/fabien/watermarking/stirmark/
  12. Jiri Fridrich*, Miroslav Goljan, "Comparing robustness of watermarking techniques"
  13. "Literature Survey on Digital Image Watermarking"Er-Hsien Fu , EE381K-Multidimensional Signal Processing8/19/98
  14. Hae-Yeoun Lee, Hyungshin Kim, Heung-Kyu Lee "Robust image watermarking using local invariant Features", Optical Engineering, 2006
  15. I. Cox, J. Kilian, T. Leighton, and T. Shamoon, / Secure spread spectrum watermarking for multi-media," IEEE Trans. on Image Processing 6 (1997), 1673-1687
  16. Wu, Y, 2005. "On the Security of SVD-Based Ownership Watermarking", IEEE Trans. Multimedia 7, pp. 624-627.
  17. Baisa L. Gunjal , R. R. Manthalkar "An Overview Of Transform Domain Robust Digital Image Watermarking Algorithms", Journal of Emerging Trends in Computing and Information Sciences 2010-11
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking Robust Attacks Dct Dwt Features