A Survey: Digital Image Watermarking Techniques

Multimedia security is extremely significant concern for the internet technology because of the ease of the duplication, distribution and manipulation of the multimedia data. The digital watermarking is a field of information hiding which hide the crucial information in the original data for protection illegal duplication and distribution of multimedia data. This paper presents a survey on the existing digital image watermarking techniques. The results of various digital image watermarking techniques have been compared on the basis of outputs. In the digital watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. The image watermarking techniques may divide on the basis of domain like spatial domain or transform domain or on the basis of wavelets. The spatial domain techniques directly work on the pixels and the frequency domain works on the transform coefficients of the image. This survey elaborates the most important methods of spatial domain and transform domain and focuses the merits and demerits of these techniques.

[1]  K. Deb,et al.  Combined DWT-DCT based digital image watermarking technique for copyright protection , 2012, 2012 7th International Conference on Electrical and Computer Engineering.

[2]  Stephen D. Wolthusen,et al.  Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.

[3]  Iwan Setyawan,et al.  Watermarking digital image and video data. A state-of-the-art overview , 2000 .

[4]  Anastasios Tefas,et al.  Robust spatial image watermarking using progressive detection , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[5]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[6]  A. Das,et al.  Audio Watermarking Based on Mean Quantization in Cepstrum Domain , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[7]  Wang Yun-Cai,et al.  Notice of RetractionResearch on digital content copyright protection system , 2009, 2009 IEEE International Conference on Network Infrastructure and Digital Content.

[8]  R. Haber,et al.  Visual Perception , 2018, Encyclopedia of Database Systems.

[9]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[10]  Ioannis Pitas,et al.  A method for watermark casting on digital image , 1998, IEEE Trans. Circuits Syst. Video Technol..

[11]  Saeed Mozaffari,et al.  Watermarking in binary document images using fractal codes , 2014, Pattern Recognit. Lett..

[12]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[13]  A.P. Vinod,et al.  An Authentication Watermarking Scheme with Transaction Tracking Enabled , 2007, 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference.

[14]  Mauro Barni,et al.  Copyright protection of digital images by embedded unperceivable marks , 1998, Image Vis. Comput..

[15]  Sankar K. Pal,et al.  International Journal of Signal Processing , Image Processing and Pattern Recognition , 2008 .

[16]  Ahmed H. Tewfik,et al.  Multiresolution scene-based video watermarking using perceptual models , 1998, IEEE J. Sel. Areas Commun..

[17]  Jagdish W. Bakal,et al.  ROBUST DIGITAL WATERMARKING TECHNIQUE BY USING DCT AND SPREAD SPECTRUM , 2013 .

[18]  Shang-Lin Hsieh,et al.  An Image Copyright Protection Scheme with Tamper Detection Capability , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.

[19]  Edward J. Delp,et al.  Overview of image security techniques with applications in multimedia systems , 1998, Other Conferences.

[20]  Wilhelm Burger,et al.  Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.

[21]  J. P. Gupta,et al.  Audio Watermarking: Current State of Art and Future Objectives , 2011 .

[22]  Jaspal Bagga,et al.  Performance Comparison of Digital Image Watermarking Techniques: A Survey , 2013 .

[23]  Wei Su,et al.  Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[24]  Li Liu,et al.  Watermarking Protocol for Broadcast Monitoring , 2010, 2010 International Conference on E-Business and E-Government.

[25]  S. Han,et al.  A survey of digital image watermarking techniques , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[26]  M. Sharma,et al.  Digital watermarking using DWT and DES , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[27]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[28]  C. Arun,et al.  A wavelet based image watermarking technique using image sharing method , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[29]  T. Shanmugapriya,et al.  A Study on Digital Watermarking Techniques , 2009 .

[30]  Ioannis Pitas,et al.  Chaotic watermarks for embedding in the spatial digital image domain , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[31]  Qing Wei,et al.  A fragile software watermarking algorithm for content authentication , 2009, 2009 IEEE Youth Conference on Information, Computing and Telecommunication.

[32]  Liu Chun-Lin,et al.  A Tutorial of the Wavelet Transform , 2010 .

[33]  Tzungher Chen,et al.  Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol , 2006, Pattern Recognit..

[34]  Jianwei Zhang,et al.  A Digital Fingerprinting Scheme of Digital Image , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.

[35]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..