Image Watermarking: A Review of Literature
![]() |
International Journal of Engineering Trends and Technology (IJETT) | ![]() |
© 2016 by IJETT Journal | ||
Volume-40 Number-1 |
||
Year of Publication : 2016 | ||
Authors : Amrinder Singh |
||
![]() |
Amrinder Singh"Image Watermarking: A Review of Literature", International Journal of Engineering Trends and Technology (IJETT), V40(1),15-22 October 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
Image watermarking is the process of
embedding secret information without degrading the
quality original image. The main objective of
watermarking is to provide copyright protection,
content authentication, ownership identification and
data integrity. In this paper we classify the robust,
fragile and semi-fragile watermarking techniques
based on different domains in which data is
embedded. Detailed literature survey of various
applications and existing watermarking techniques is
done. To evaluate the performance of watermarking
scheme Peak signal to noise ratio (PSNR), Bit error
rate (BER) and normalised correlation (NC) are
described.
References
[1] Cox, I., et al., Digital watermarking and steganography.
2007: Morgan Kaufmann.
[2] Wolfgang, R.B., C.I. Podilchuk, and E.J. Delp,
Perceptual watermarks for digital images and video.
Proceedings of the IEEE, 1999. 87(7): p. 1108-1126.
[3] Potdar, V.M., S. Han, and E. Chang. A survey of digital
image watermarking techniques. in INDIN'05. 2005 3rd
IEEE International Conference on Industrial
Informatics, 2005. 2005. IEEE.
[4] Cox, I.J., M.L. Miller, and J.A. Bloom. Watermarking
applications and their properties. in itcc. 2000.
[5] Nikolaidis, N. and I. Pitas, Robust image watermarking
in the spatial domain. Signal processing, 1998. 66(3): p.
385-403.
[6] Kimpan, S., A. Lasakul, and S. Chitwong. Variable
block size based adaptive watermarking in spatial
domain. in Communications and Information
Technology, 2004. ISCIT 2004. IEEE International
Symposium on. 2004. IEEE.
[7] Nasir, I., Y. Weng, and J. Jiang. A new robust
watermarking scheme for color image in spatial domain.
in Signal-Image Technologies and Internet-Based
System, 2007. SITIS'07. Third International IEEE
Conference on. 2007. IEEE.
[8] Cox, I.J., et al., Secure spread spectrum watermarking
for multimedia. IEEE transactions on image processing,
1997. 6(12): p. 1673-1687.
[9] Lin, S.D., S.-C. Shie, and J.Y. Guo, Improving the
robustness of DCT-based image watermarking against
JPEG compression. Computer Standards & Interfaces,
2010. 32(1): p. 54-60.
[10] Gupta, G., A.M. Joshi, and K. Sharma. An efficient DCT
based image watermarking scheme for protecting
distribution rights. in Contemporary Computing (IC3),
2015 Eighth International Conference on. 2015. IEEE.
[11] Solachidis, V. and L. Pitas, Circularly symmetric
watermark embedding in 2-D DFT domain. IEEE
transactions on image processing, 2001. 10(11): p. 1741-
1753.
[12] Poljicak, A., L. Mandic, and D. Agic, Discrete Fourier
transform–based watermarking method with an optimal
implementation radius. Journal of Electronic Imaging,
2011. 20(3): p. 033008-033008-8.
[13] Barni, M., F. Bartolini, and A. Piva, Improved waveletbased
watermarking through pixel-wise masking. IEEE
transactions on image processing, 2001. 10(5): p. 783-
791.
[14] Wang, S.-H. and Y.-P. Lin, Wavelet tree quantization for
copyright protection watermarking. IEEE transactions
on image processing, 2004. 13(2): p. 154-165.
[15] Lin, W.-H., et al., A blind watermarking method using
maximum wavelet coefficient quantization. Expert
Systems with Applications, 2009. 36(9): p. 11509-
11516.
[16] Keyvanpour, M.-R. and F. Merrikh-Bayat, Robust
dynamic block-based image watermarking in DWT
domain. Procedia Computer Science, 2011. 3: p. 238-
242.
[17] Zhou, Y. and W. Jin. A robust digital image multiwatermarking
scheme in the DWT domain. in Systems
and Informatics (ICSAI), 2012 International Conference
on. 2012. IEEE.
[18] Wang, Y., X. Bai, and S. Yan. Digital image
watermarking based on texture block and edge detection
in the discrete wavelet domain. in Sensor Network
Security Technology and Privacy Communication
System (SNS & PCS), 2013 International Conference on.
2013. IEEE.
[19] Xin, Y., S. Liao, and M. Pawlak, Circularly orthogonal
moments for geometrically robust image watermarking.
Pattern Recognition, 2007. 40(12): p. 3740-3752.
[20] Singhal, N., et al., Robust image watermarking using
local Zernike moments. Journal of Visual
Communication and Image Representation, 2009. 20(6):
p. 408-419.
[21] Wang, X.-Y. and L.-M. Hou, A new robust digital image
watermarking based on Pseudo-Zernike moments.
Multidimensional Systems and Signal Processing, 2010.
21(2): p. 179-196.
[22] Yeung, M.M. and F. Mintzer. An invisible watermarking
technique for image verification. in Image Processing,
1997. Proceedings., International Conference on. 1997.
IEEE.
[23] Zhong, H., F. Liu, and L.-c. Jiao. A new fragile
watermarking technique for image authentication. in
Signal Processing, 2002 6th International Conference
on. 2002. IEEE.
[24] Suthaharan, S., Fragile image watermarking using a
gradient image for improved localization and security.
Pattern Recognition Letters, 2004. 25(16): p. 1893-1903.
[25] Zhang, X. and S. Wang, Fragile watermarking with
error-free restoration capability. IEEE Transactions on
Multimedia, 2008. 10(8): p. 1490-1499.
[26] Munir, R. A chaos-based fragile watermarking method
in spatial domain for image authentication. in Intelligent
Technology and Its Applications (ISITIA), 2015
International Seminar on. 2015. IEEE.
[27] Wu, M. and B. Liu. Watermarking for Image
Authentication. in ICIP (2). 1998.
[28] Chen, C.-H., Y.-L. Tang, and W.-S. Hsieh. An Image
Authentication and Recovery Method Using Optimal
Selection of Block Types. in Multimedia (ISM), 2014
IEEE International Symposium on. 2014. IEEE.
[29] He, H., J. Zhang, and H.-M. Tai. A wavelet-based fragile
watermarking scheme for secure image authentication.
in International Workshop on Digital Watermarking.
2006. Springer.
[30] Rajawat, M. and D. Tomar. A Secure Watermarking and
Tampering Detection Technique on RGB Image Using 2
Level DWT. in Communication Systems and Network
Technologies (CSNT), 2015 Fifth International
Conference on. 2015. IEEE.
[31] Lin, E.T., C.I. Podilchuk, and E.J. Delp III. Detection of
image alterations using semifragile watermarks. in
Electronic Imaging. 2000. International Society for
Optics and Photonics.
[32] Ho, C.K. and C.-T. Li. Semi-fragile watermarking
scheme for authentication of JPEG images. in
Information Technology: Coding and Computing, 2004.
Proceedings. ITCC 2004. International Conference on.
2004. IEEE.
[33] Wang, W., A. Men, and B. Yang. A feature-based semifragile
watermarking scheme in DWT domain. in 2010
2nd IEEE InternationalConference on Network
Infrastructure and Digital Content. 2010. IEEE.
[34] Qi, X. and X. Xin, A quantization-based semi-fragile
watermarking scheme for image content authentication.
Journal of visual communication and image
representation, 2011. 22(2): p. 187-200.
Keywords
Robust watermarking, Fragile
watermarking, Semi-fragile watermarking DCT,
DWT, DFT.