Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Recent Trends in Image Watermarking for Authentication and Tamper Detection using Various Approch: A Survey

Published on December 2014 by Saiyyad M. M, Nitin N. Patil
National Conference on Emerging Trends in Information Technology
Foundation of Computer Science USA
NCETIT - Number 1
December 2014
Authors: Saiyyad M. M, Nitin N. Patil
08ef8761-8bfe-4b5f-b59c-9255b40129c7

Saiyyad M. M, Nitin N. Patil . Recent Trends in Image Watermarking for Authentication and Tamper Detection using Various Approch: A Survey. National Conference on Emerging Trends in Information Technology. NCETIT, 1 (December 2014), 9-10.

@article{
author = { Saiyyad M. M, Nitin N. Patil },
title = { Recent Trends in Image Watermarking for Authentication and Tamper Detection using Various Approch: A Survey },
journal = { National Conference on Emerging Trends in Information Technology },
issue_date = { December 2014 },
volume = { NCETIT },
number = { 1 },
month = { December },
year = { 2014 },
issn = 0975-8887,
pages = { 9-10 },
numpages = 2,
url = { /proceedings/ncetit/number1/19067-3010/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Emerging Trends in Information Technology
%A Saiyyad M. M
%A Nitin N. Patil
%T Recent Trends in Image Watermarking for Authentication and Tamper Detection using Various Approch: A Survey
%J National Conference on Emerging Trends in Information Technology
%@ 0975-8887
%V NCETIT
%N 1
%P 9-10
%D 2014
%I International Journal of Computer Applications
Abstract

A digital watermark is a used for identification of embedded data in a noise tolerant signal such as image data. It is used to identify ownership of the data. "Watermarking" is the process of hiding digital information in a carrier signal. Embedding a digital signal is called as watermarking. Robust Watermark is well suited for copyright protection because they stay intact with image under various manipulations. Security issues regarding images are important because images are used in electronic media. In this paper we discuss the issues like robustness, security, compression, capacity and fault-tolerance of these watermarking methods.

References
  1. R. C. Gonzalez, E. Richard, Woods, "Digital Image Processing", Prentice Hall Press, ISBN 0-201-18075-8, 2002.
  2. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  3. I. J. Cox and J. -P. Linnartz, "Some general methods for tampering with watermarks", IEEE Transactions on Selected Areas of Communications, vol. 16, no. 2, 1998, pp. 587–593.
  4. I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. "Secure spread spectrum watermarking for multimedia", IEEE Transactions on Image Processing, vol. 6, no 12, 1997, pp. 1673–1687.
  5. S. Craver, N. Memon, B. L. Yeo, and M. Yeung, "Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications", IEEE Transactions on Selected Areas of Communications, vol. 16, no. 4,1998, pp. 573–586.
  6. N. F. Maxemchuk and S. Low, "Marking text documents," in Proceedings of the IEEE International Conference on Image Processing, Washington, DC, Oct. 1997, pp. 13-16.
  7. A. M. Alattar, O. M. Alattar, "Watermarking electronic text documents containing justified paragraphs and irregular line spacing", in SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, June 2004, pp. 685-694.
  8. S. Palit and U. Garain,"A novel technique for the watermarking of symbolically compressed documents," in Proc. Of Int'l Workshop on Document Image Analysis for Libraries (DIAL'06), Lyon, France, April 2006, pp. 291-296.
  9. H. Guo et al. ," A fragile watermarking scheme for detecting malicious modifications of data base relations", Information. Sciences 176 (2006) 1350–1378
  10. W. -C. Chen, M. -S. Wang (2009), "A Fuzzy c-Means Clustering based Fragile Watermarking Scheme for Image Authentication", Expert Systems with Applications, Volume 36, Issue 2, Part 1, pp. 1300-1307.
  11. Huang-Chi Chen, Yu-Wen Chang, Rey-Chue Hwang (2012), "A Watermarking Technique based on the Frequency Domain", Journal of Multimedia, Vol. 7, No. 1, pp. 82-89
  12. Ankan Bhattacharya, SarbaniPalit, Nivedita Chatterjee, and Gourav Roy (2011), "Blind assessment of image quality employing fragile watermarking", 7th International Sym. on Image and Signal Processing and Analysis (ISPA 2011) Dubrovnik, Croatia, pp. 431-436.
  13. Haowen Yan, Jonathan Li, Hong Wen (2011), "A key points-based blind watermarking approach for vector geo-spatial data", Elsevier Journal of Computers, Environment and Urban Systems, Volume 35, Issue 6, pp. 485–492.
  14. A. Kannammal, K. Pavithra , S. Subha Rani (2012), "Double Watermarking of Dicom Medical Images using Wavelet DecompositionTechnique", European Journal of Scientific Research, Vol. 70, No. 1, pp. 46-55.
  15. ChitlaArathi,'' A Semi Fragile Image Watermarking Technique Using Block Based SVD",International Journal of Computer Science and Information Technologies, Vol. 3 (2), 2012,3644-3647
Index Terms

Computer Science
Information Sciences

Keywords

Image Watermarking Robust Watermark Fault Tolerance Security