Digital watermarking techniques for image security: a review

Multimedia technology usages is increasing day by day and to provide authorized data and protecting the secret information from unauthorized use is highly difficult and involves a complex process. By using the watermarking technique, only authorized user can use the data. Digital watermarking is a widely used technology for the protection of digital data. Digital watermarking deals with the embedding of secret data into actual information. Digital watermarking techniques are classified into three major categories, and they were based on domain, type of document (text, image, music or video) and human perception. Performance of the watermarked images is analysed using Peak signal to noise ratio, mean square error and bit error rate. Watermarking of images has been researched profoundly for its specialized and modern achievability in all media applications such as copyrights protection, medical reports (MRI scan and X-ray), annotation and privacy control. This paper reviews the watermarking technique and its merits and demerits.

[1]  Asifullah Khan,et al.  Wavelet Based Image Authentication and Recovery , 2007, Journal of Computer Science and Technology.

[2]  Deepa Kundur,et al.  A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.

[3]  S. Han,et al.  A survey of digital image watermarking techniques , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[4]  Mauro Barni,et al.  Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..

[5]  Tung-Shou Chen,et al.  Image tamper detection and recovery system based on discrete wavelet transformation , 2001, 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233).

[6]  Dinu Coltuc,et al.  Improved Embedding for Prediction-Based Reversible Watermarking , 2011, IEEE Transactions on Information Forensics and Security.

[7]  Regunathan Radhakrishnan,et al.  On the security of the digest function in the SARI image authentication system , 2002, IEEE Trans. Circuits Syst. Video Technol..

[8]  A. E. Bell The dynamic digital disk , 1999 .

[9]  Heung-Kyu Lee,et al.  Perceptually tuned robust watermarking scheme for digital images , 2000, Pattern Recognit. Lett..

[10]  Tor A. Ramstad,et al.  Hybrid KLT-SVD image compression , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[11]  Shigeo Wada,et al.  Wavelet-based perceptual watermarking with bit data embedded in still color images , 2004 .

[12]  Chin-Chen Chang,et al.  Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery , 2008, Pattern Recognit..

[13]  Ahmet M. Eskicioglu,et al.  Robust DWT-SVD domain image watermarking: embedding data in all frequencies , 2004, MM&Sec '04.

[14]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[15]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[16]  Chien-Chang Chen,et al.  A wavelet-based public key image authentication watermarking , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..

[17]  Qiang Li,et al.  Adaptive DWT-SVD Domain Image Watermarking Using Human Visual Model , 2007, The 9th International Conference on Advanced Communication Technology.

[18]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[19]  Aboul Ella Hassanien,et al.  A rough k-means fragile watermarking approach for image authentication , 2011, 2011 Federated Conference on Computer Science and Information Systems (FedCSIS).

[20]  Nalini K. Ratha,et al.  Secure data hiding in wavelet compressed fingerprint images , 2000, MULTIMEDIA '00.

[21]  Yong-Huai Huang,et al.  Hiding digital watermarks using multiresolution wavelet transform , 2001, IEEE Trans. Ind. Electron..

[22]  Xingming Sun,et al.  A Semi-Fragile Watermarking Algorithm using Adaptive Least Significant Bit Substitution , 2010 .

[23]  Ingemar J. Cox,et al.  Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..

[24]  Gwoboa Horng,et al.  A Robust Wavelet-Based Watermarking Scheme Using Quantization and Human Visual System Model , 2003 .

[25]  E. Mwangi,et al.  An image watermarking method based on the singular value decomposition and the wavelet transform , 2007, AFRICON 2007.

[26]  S. Nash,et al.  Numerical methods and software , 1990 .

[27]  Chang-Tsun Li,et al.  Semi-fragile watermarking scheme for authentication of JPEG images , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[28]  Iuon-Chang Lin,et al.  Reversible Watermarking: Current Status and Key Issues , 2006, Int. J. Netw. Secur..

[29]  A. Hassani Allaf,et al.  A Review of Digital Watermarking Applications for Medical Image Exchange Security , 2018, Innovations in Smart Cities Applications Edition 2.

[30]  A. K. Singh,et al.  A novel technique for digital image watermarking in spatial domain , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.

[31]  Shalu Singh,et al.  A secure non-blind block based digital image watermarking technique using DWT and DCT , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[32]  Chin-Chen Chang,et al.  Secure discrete-cosine-transform-based technique for recoverable tamper proofing , 2001 .

[33]  Peter Meerwald Quantization Watermarking in the JPEG2000 Coding Pipeline , 2001, Communications and Multimedia Security.

[34]  M. Raval,et al.  Discrete wavelet transform based multiple watermarking scheme , 2003, TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region.

[35]  Martin Steinebach,et al.  Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability , 2006, 2006 Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS'06).

[36]  Sorina Dumitrescu,et al.  Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.

[37]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[38]  Shan Suthaharan,et al.  Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..

[39]  Young-ho Seo A Digital Watermarking Algorithm Using Correlation of the Tree Structure of DWT Coefficients , 2004 .

[40]  Min-Jen Tsai,et al.  Joint wavelet and spatial transformation for digital watermarking , 2000, IEEE Trans. Consumer Electron..

[41]  Ashok A. Ghatol,et al.  Composition of DCT-SVD Image Watermarking and Advanced Encryption Standard Technique for Still Image , 2016 .

[42]  Jeng-Shyang Pan,et al.  Genetic watermarking based on transform-domain techniques , 2004, Pattern Recognit..

[43]  Tung-Shou Chen,et al.  Detecting and restoring the tampered images based on iteration-free fractal compression , 2003, J. Syst. Softw..

[44]  Ahmet M. Eskicioglu,et al.  A robust multiple watermarking scheme in the discrete wavelet transform domain , 2004, SPIE Optics East.

[45]  Wei Ren,et al.  LMDGW: a novel matrix based dynamic graph watermark , 2017, Journal of Ambient Intelligence and Humanized Computing.

[46]  Jeng-Shyang Pan,et al.  A Double Domain Based Robust Digital Image Watermarking Scheme , 2008, Edutainment.

[47]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[48]  Ja-Ling Wu,et al.  Multiresolution watermarking for digital images , 1998 .

[49]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[50]  Chih-Chin Lai,et al.  Image Watermarking Scheme Using Singular Value Decomposition and Micro-genetic Algorithm , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[51]  Heung-Kyu Lee,et al.  Robust Image Watermark Using Radon Transform and Bispectrum Invariants , 2002, Information Hiding.

[52]  A. Alti,et al.  A New Blind Medical Image Watermarking Based on Weber Descriptors and Arnold Chaotic Map , 2018, Arabian Journal for Science and Engineering.

[53]  Seungjae Lee,et al.  An SVD-based watermarking method for image content authentication with improved security , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[54]  Zheng Qin,et al.  Composing Semantic Web Services with PDDL , 2010 .

[55]  Xiaohui Zhao,et al.  A digital image watermarking method based on host image analysis and genetic algorithm , 2016, J. Ambient Intell. Humaniz. Comput..