Image Watermarking: A Review of Literature

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2016 by IJETT Journal
Volume-40 Number-1
Year of Publication : 2016
Authors : Amrinder Singh


Amrinder Singh"Image Watermarking: A Review of Literature", International Journal of Engineering Trends and Technology (IJETT), V40(1),15-22 October 2016. ISSN:2231-5381. published by seventh sense research group

Image watermarking is the process of embedding secret information without degrading the quality original image. The main objective of watermarking is to provide copyright protection, content authentication, ownership identification and data integrity. In this paper we classify the robust, fragile and semi-fragile watermarking techniques based on different domains in which data is embedded. Detailed literature survey of various applications and existing watermarking techniques is done. To evaluate the performance of watermarking scheme Peak signal to noise ratio (PSNR), Bit error rate (BER) and normalised correlation (NC) are described.


[1] Cox, I., et al., Digital watermarking and steganography. 2007: Morgan Kaufmann.
[2] Wolfgang, R.B., C.I. Podilchuk, and E.J. Delp, Perceptual watermarks for digital images and video. Proceedings of the IEEE, 1999. 87(7): p. 1108-1126.
[3] Potdar, V.M., S. Han, and E. Chang. A survey of digital image watermarking techniques. in INDIN'05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005. 2005. IEEE.
[4] Cox, I.J., M.L. Miller, and J.A. Bloom. Watermarking applications and their properties. in itcc. 2000. [5] Nikolaidis, N. and I. Pitas, Robust image watermarking in the spatial domain. Signal processing, 1998. 66(3): p. 385-403.
[6] Kimpan, S., A. Lasakul, and S. Chitwong. Variable block size based adaptive watermarking in spatial domain. in Communications and Information Technology, 2004. ISCIT 2004. IEEE International Symposium on. 2004. IEEE.
[7] Nasir, I., Y. Weng, and J. Jiang. A new robust watermarking scheme for color image in spatial domain. in Signal-Image Technologies and Internet-Based System, 2007. SITIS'07. Third International IEEE Conference on. 2007. IEEE.
[8] Cox, I.J., et al., Secure spread spectrum watermarking for multimedia. IEEE transactions on image processing, 1997. 6(12): p. 1673-1687.
[9] Lin, S.D., S.-C. Shie, and J.Y. Guo, Improving the robustness of DCT-based image watermarking against JPEG compression. Computer Standards & Interfaces, 2010. 32(1): p. 54-60.
[10] Gupta, G., A.M. Joshi, and K. Sharma. An efficient DCT based image watermarking scheme for protecting distribution rights. in Contemporary Computing (IC3), 2015 Eighth International Conference on. 2015. IEEE.
[11] Solachidis, V. and L. Pitas, Circularly symmetric watermark embedding in 2-D DFT domain. IEEE transactions on image processing, 2001. 10(11): p. 1741- 1753.
[12] Poljicak, A., L. Mandic, and D. Agic, Discrete Fourier transform–based watermarking method with an optimal implementation radius. Journal of Electronic Imaging, 2011. 20(3): p. 033008-033008-8.
[13] Barni, M., F. Bartolini, and A. Piva, Improved waveletbased watermarking through pixel-wise masking. IEEE transactions on image processing, 2001. 10(5): p. 783- 791.
[14] Wang, S.-H. and Y.-P. Lin, Wavelet tree quantization for copyright protection watermarking. IEEE transactions on image processing, 2004. 13(2): p. 154-165.
[15] Lin, W.-H., et al., A blind watermarking method using maximum wavelet coefficient quantization. Expert Systems with Applications, 2009. 36(9): p. 11509- 11516.
[16] Keyvanpour, M.-R. and F. Merrikh-Bayat, Robust dynamic block-based image watermarking in DWT domain. Procedia Computer Science, 2011. 3: p. 238- 242.
[17] Zhou, Y. and W. Jin. A robust digital image multiwatermarking scheme in the DWT domain. in Systems and Informatics (ICSAI), 2012 International Conference on. 2012. IEEE.
[18] Wang, Y., X. Bai, and S. Yan. Digital image watermarking based on texture block and edge detection in the discrete wavelet domain. in Sensor Network Security Technology and Privacy Communication System (SNS & PCS), 2013 International Conference on. 2013. IEEE.
[19] Xin, Y., S. Liao, and M. Pawlak, Circularly orthogonal moments for geometrically robust image watermarking. Pattern Recognition, 2007. 40(12): p. 3740-3752.
[20] Singhal, N., et al., Robust image watermarking using local Zernike moments. Journal of Visual Communication and Image Representation, 2009. 20(6): p. 408-419.
[21] Wang, X.-Y. and L.-M. Hou, A new robust digital image watermarking based on Pseudo-Zernike moments. Multidimensional Systems and Signal Processing, 2010. 21(2): p. 179-196.
[22] Yeung, M.M. and F. Mintzer. An invisible watermarking technique for image verification. in Image Processing, 1997. Proceedings., International Conference on. 1997. IEEE.
[23] Zhong, H., F. Liu, and L.-c. Jiao. A new fragile watermarking technique for image authentication. in Signal Processing, 2002 6th International Conference on. 2002. IEEE.
[24] Suthaharan, S., Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters, 2004. 25(16): p. 1893-1903.
[25] Zhang, X. and S. Wang, Fragile watermarking with error-free restoration capability. IEEE Transactions on Multimedia, 2008. 10(8): p. 1490-1499.
[26] Munir, R. A chaos-based fragile watermarking method in spatial domain for image authentication. in Intelligent Technology and Its Applications (ISITIA), 2015 International Seminar on. 2015. IEEE.
[27] Wu, M. and B. Liu. Watermarking for Image Authentication. in ICIP (2). 1998.
[28] Chen, C.-H., Y.-L. Tang, and W.-S. Hsieh. An Image Authentication and Recovery Method Using Optimal Selection of Block Types. in Multimedia (ISM), 2014 IEEE International Symposium on. 2014. IEEE.
[29] He, H., J. Zhang, and H.-M. Tai. A wavelet-based fragile watermarking scheme for secure image authentication. in International Workshop on Digital Watermarking. 2006. Springer.
[30] Rajawat, M. and D. Tomar. A Secure Watermarking and Tampering Detection Technique on RGB Image Using 2 Level DWT. in Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on. 2015. IEEE.
[31] Lin, E.T., C.I. Podilchuk, and E.J. Delp III. Detection of image alterations using semifragile watermarks. in Electronic Imaging. 2000. International Society for Optics and Photonics.
[32] Ho, C.K. and C.-T. Li. Semi-fragile watermarking scheme for authentication of JPEG images. in Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on. 2004. IEEE.
[33] Wang, W., A. Men, and B. Yang. A feature-based semifragile watermarking scheme in DWT domain. in 2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content. 2010. IEEE.
[34] Qi, X. and X. Xin, A quantization-based semi-fragile watermarking scheme for image content authentication. Journal of visual communication and image representation, 2011. 22(2): p. 187-200.

Robust watermarking, Fragile watermarking, Semi-fragile watermarking DCT, DWT, DFT.