Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Recent Trends in Image Watermarking for Authentication and Tamper Detection using Various Approch: A Survey

Print
PDF
IJCA Proceedings on National Conference on Emerging Trends in Information Technology
© 2014 by IJCA Journal
NCETIT - Number 1
Year of Publication: 2014
Authors:
Saiyyad M. M
Nitin N. Patil

Saiyyad M M and Nitin N Patil. Article: Recent Trends in Image Watermarking for Authentication and Tamper Detection using Various Approch: A Survey. IJCA Proceedings on National Conference on Emerging Trends in Information Technology NCETIT(1):9-10, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Saiyyad M. M and Nitin N. Patil},
	title = {Article: Recent Trends in Image Watermarking for Authentication and Tamper Detection using Various Approch: A Survey},
	journal = {IJCA Proceedings on National Conference on Emerging Trends in Information Technology},
	year = {2014},
	volume = {NCETIT},
	number = {1},
	pages = {9-10},
	month = {December},
	note = {Full text available}
}

Abstract

A digital watermark is a used for identification of embedded data in a noise tolerant signal such as image data. It is used to identify ownership of the data. "Watermarking" is the process of hiding digital information in a carrier signal. Embedding a digital signal is called as watermarking. Robust Watermark is well suited for copyright protection because they stay intact with image under various manipulations. Security issues regarding images are important because images are used in electronic media. In this paper we discuss the issues like robustness, security, compression, capacity and fault-tolerance of these watermarking methods.

References

  • R. C. Gonzalez, E. Richard, Woods, "Digital Image Processing", Prentice Hall Press, ISBN 0-201-18075-8, 2002.
  • Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  • I. J. Cox and J. -P. Linnartz, "Some general methods for tampering with watermarks", IEEE Transactions on Selected Areas of Communications, vol. 16, no. 2, 1998, pp. 587–593.
  • I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. "Secure spread spectrum watermarking for multimedia", IEEE Transactions on Image Processing, vol. 6, no 12, 1997, pp. 1673–1687.
  • S. Craver, N. Memon, B. L. Yeo, and M. Yeung, "Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications", IEEE Transactions on Selected Areas of Communications, vol. 16, no. 4,1998, pp. 573–586.
  • N. F. Maxemchuk and S. Low, "Marking text documents," in Proceedings of the IEEE International Conference on Image Processing, Washington, DC, Oct. 1997, pp. 13-16.
  • A. M. Alattar, O. M. Alattar, "Watermarking electronic text documents containing justified paragraphs and irregular line spacing", in SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, June 2004, pp. 685-694.
  • S. Palit and U. Garain,"A novel technique for the watermarking of symbolically compressed documents," in Proc. Of Int'l Workshop on Document Image Analysis for Libraries (DIAL'06), Lyon, France, April 2006, pp. 291-296.
  • H. Guo et al. ," A fragile watermarking scheme for detecting malicious modifications of data base relations", Information. Sciences 176 (2006) 1350–1378
  • W. -C. Chen, M. -S. Wang (2009), "A Fuzzy c-Means Clustering based Fragile Watermarking Scheme for Image Authentication", Expert Systems with Applications, Volume 36, Issue 2, Part 1, pp. 1300-1307.
  • Huang-Chi Chen, Yu-Wen Chang, Rey-Chue Hwang (2012), "A Watermarking Technique based on the Frequency Domain", Journal of Multimedia, Vol. 7, No. 1, pp. 82-89
  • Ankan Bhattacharya, SarbaniPalit, Nivedita Chatterjee, and Gourav Roy (2011), "Blind assessment of image quality employing fragile watermarking", 7th International Sym. on Image and Signal Processing and Analysis (ISPA 2011) Dubrovnik, Croatia, pp. 431-436.
  • Haowen Yan, Jonathan Li, Hong Wen (2011), "A key points-based blind watermarking approach for vector geo-spatial data", Elsevier Journal of Computers, Environment and Urban Systems, Volume 35, Issue 6, pp. 485–492.
  • A. Kannammal, K. Pavithra , S. Subha Rani (2012), "Double Watermarking of Dicom Medical Images using Wavelet DecompositionTechnique", European Journal of Scientific Research, Vol. 70, No. 1, pp. 46-55.
  • ChitlaArathi,'' A Semi Fragile Image Watermarking Technique Using Block Based SVD",International Journal of Computer Science and Information Technologies, Vol. 3 (2), 2012,3644-3647