Properties of digital image watermarking

Digital image watermarking techniques have been developed widely in recent years to maintain the broadcasting media and content authentication, broadcast monitoring, copy control, and many other applications. Therefore, many studies have used digital image watermarking to solve these problem. This paper highlights digital image watermarking. It starts with a basic model of digital image watermarking, it discusses the main requirements and applications. Moreover, it reviews some of the techniques and algorithm used in image watermarking. In addition, digital image watermarking attacks are discussed. Lastly, Watermarking evaluation system is described.

[1]  Lakhmi C. Jain,et al.  Intelligent Watermarking Techniques: (With CD-ROM) , 2004 .

[2]  Akram M. Zeki,et al.  A watermarking authentication system for medical images , 2011 .

[3]  O. O. Khalifa,et al.  State-of-the-art digital watermarking attacks , 2012, 2012 International Conference on Computer and Communication Engineering (ICCCE).

[4]  Abdullah Bamatraf,et al.  Digital watermarking algorithm using LSB , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.

[5]  Ramiro Jordan,et al.  Geometric attacks on image watermarking systems , 2005, IEEE MultiMedia.

[6]  Akram M. Zeki,et al.  Watermarking technique based on ISB (Intermediate Significant Bit) , 2010 .

[7]  Rekha Gupta,et al.  Digital Image Watermarking by Using Discrete Wavelet Transform and Discrete Cosine Transform and Comparison Based on PSNR , 2011, 2011 International Conference on Communication Systems and Network Technologies.

[8]  Akram M. Zeki,et al.  Analysis of ISB watermarking model: block based methods vs embedding repetition methods , 2011, MoMM '11.

[9]  Jean-Francois Delaigle,et al.  Invisibility and application functionalities in perceptual watermarking an overview , 2002, Proc. IEEE.

[10]  O.O. Khalifa,et al.  Digital watermarking for digital images using wavelet transform , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.

[11]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[12]  Othman Omran Khalifa,et al.  Forgery detection in medical images using Complex Valued Neural Network (CVNN) , 2011 .

[13]  Yanqun Zhang,et al.  Digital Watermarking Technology: A Review , 2009, 2009 ETP International Conference on Future Computer and Communication.

[14]  Xiangjian He,et al.  A Review Study on Digital Watermarking , 2005, 2005 International Conference on Information and Communication Technologies.

[15]  Jun Sang,et al.  Fragility and Robustness of Binary-Phase-Only-Filter-Based Fragile/Semifragile Digital Image Watermarking , 2008, IEEE Transactions on Instrumentation and Measurement.

[16]  Ying Wang,et al.  Toward a Better Understanding of DCT Coefficients in Watermarking , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[17]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[18]  Nedeljko Cvejic,et al.  ALGORITHMS FOR AUDIO WATERMARKING AND STEGANOGRAPHY , 2004 .

[19]  Jiang Yong Zheng,et al.  A DCT-BASED Digital Watermarking Algorithm for Image , 2012, 2012 International Conference on Industrial Control and Electronics Engineering.