IJIGSP Vol. 9, No. 4, 8 Apr. 2017
Cover page and Table of Contents: PDF (size: 547KB)
Full Text (PDF, 547KB), PP.56-66
Views: 0 Downloads: 0
Copyright protection, Cryptography, Digital image watermarking, Discrete Cosine Transform, Discrete Fourier Transform, Discrete Wavelet Transform, Fragile, Frequency domain, Image processing, Ownership, Robust, Security, Singular Value Decomposition, Spatial domain
Nowadays, Multimedia security [1] is a major issue. Images, video, audio, text files are losing their credibility day by day as they can be distorted or manipulated by using several tools. Ensuring the authenticity [2] and integrity of digital media is a major issue. The manipulation made by forgery tools are so smoothly done that we don’t even suspect that forgery may be involved in digital content. Multimedia data is facing several issues related to illegal distribution, duplication and manipulation of information conveyed by them. The digital watermarking [3] technique plays an important role in protecting digital content. In this paper, On the basis of their operating principles different watermarking techniques are categorized [4]. Attacks, applications and requirements [5] related to watermarking techniques are also discussed. Different watermarking techniques proposed by researchers for protecting copyrights of digital media are presented which are based on spatial and frequency domain. Frequency domain are getting much more attention due to use of wavelets which have high degree of resemblance to human visual system. In digital watermarking, secret information is embedded with original data for maintaining ownership rights of the digital content. Spatial domain watermarking techniques work over pixel characteristics and frequency domain watermarks concerned about different transformations that can be used with digital content. Imperceptibility, robustness, security, complexity and capacity are some requirements of the digital watermarking which completely depends on the algorithm used for watermarking.
Anuja Dixit, Rahul Dixit,"A Review on Digital Image Watermarking Techniques", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.9, No.4, pp.56-66, 2017. DOI: 10.5815/ijigsp.2017.04.07
[1]C. S. Lu, “Multimedia Security: Steganography and Digital Watermarking for Protection of Intellectual Property”, Idea Group Publishing, 2005. DOI: https://doi.org/10.4018/978-1-59140-192-6
[2]F. Hartung, and M. Kutter, “Multimedia Watermarking Techniques”, Proc. IEEE, Special Issue on Identification and Protection of Multimedia Information, vol. 87, pp. 1079–1107, July 1999. DOI: https://doi.org/10.1109/5.771066
[3]K. Veeraswamy, B. Chandra Mohan and S.Srinivas, “HVS Based Robust Digital Watermarking Scheme using Contourlet”, International Journal of Computer Science and Network Security, vol.8, no.2, February 2008. DOI: DOI: https://doi.org/10.1117/12.853476
[4]G. C. Kesseler,"An Overview of Steganography", James Mandison University Infosec Transport, 2011. DOI: https://doi.org/10.1016/b978-0-12-385510-7.00002-3
[5]H. Inoue, A. Miyazaki and T. Katsura, “An Image Watermarking Method Based on the Wavelet Transform”, IEEE Conf. on Image Processing, vol. 1, pp. 296-300, 1999.DOI: https://doi.org/10.1109/icip.1999.821617
[6]Xi Zhao, Anthony T. S. Ho, “An Introduction to Robust Transform Based Image Watermarking Techniques”, Intelligent Multimedia Analysis for Security Applications , pp. 337-364, 2010. DOI: https://doi.org/10.1007/978-3-642-11756-5_15
[7]R. C. Gonzalez, R. E. Woods, B. R. Masters, “Digital Image Processing,” Third Edition, 2008. DOI: https://doi.org/10.1117/1.3115362
[8]J. C. Murphy, D. Dubbel, and R. Benson, “Technology Approaches to Currency Security,” in Optical Security and Counterfeit Deterrence Techniques II, vol. 33, no. 14, pp. 21–28, 1998. DOI: https://doi.org/10.1117/12.304695
[9]M. L. Miller, I. J. Cox and J. A. Bloom, “Watermarking in the Real World: An application to DVD,” in Multimedia and Security—Workshop at ACM Multimedia’98 (GMD Report), vol. 41, pp. 71–76, 1998.DOI: https://doi.org/10.1109/acssc.1999.831999
[10]P. Tao and A. M. Eskicioglu, “A Robust Multiple Watermarking Scheme in the DWT Domain,” Optics East 2004 Symposium, Internet Multimedia Management Systems V Conference, Philadelphia, PA, pp. 133-144, October 25-28, 2004. DOI: https://doi.org/10.1117/12.569641
[11]R. B. Wolfgang and E. J. Delp, “A watermark for Digital Images,” in Proc. IEEE Int. Conf. Images Processing,” Lausanne, Switzerland, pp. 219–222, September 1996. DOI: https://doi.org/10.1109/icip.1996.560423
[12]Tang Wenliang,”A Feature-Based Digital Image Watermarking Algorithm Resisting to Geometrical Attacks,” Second International Symposium on Electronic Commerce and Security, IEEE, 2009. DOI: https://doi.org/10.1109/isecs.2009.94
[13]N. Deshpande, A. Rajarkar, R.R. Muthalkar, “Robust Dual Watermarking Scheme for Video Derived from Strategy Fusion,” International Journal of Image, Graphics and Signal Processing, vol. 6, no. 5, pp. 19-27, 2013. DOI: https://doi.org/10.5815/ijigsp.2014.05.03
[14]C. Lu and H. Yuan M. Liao, “Multipurpose Watermarking for Image Authentication and Protection,” IEEE Transactions on Image Processing, vol. 10, no.10, pp. 1579–1592, October 2001. DOI: https://doi.org/10.1109/83.951542
[15]M. Miller, I. J. Cox, J. P. Linnartz and T. Kalker, “A review of watermarking principles and practices,” In Digital Signal Processing in Multimedia Systems, pp. 461-485, 1999.
[16]J. G. Proakis, “Digital Communications,” McGraw-Hill, New York, NY, USA, 3rd edition, 1995.
[17]C. Rey, “Blind Detection of Malicious Alterations on Still Images using Robust Watermarks,” in Secure Images and Image Authentication Colloquium, IEE Electronics & Communications, London, UK, 2000. DOI: https://doi.org/10.1049/ic:20000218
[18]A. K. Singh, N. Sharma, M. Dave and A. Mohan "A novel technique for digital image watermarking in spatial domain," in Parallel Distributed and Grid Computing (PDGC), 2nd IEEE International Conference, pp. 497-501, 2012. DOI: https://doi.org/10.1109/pdgc.2012.6449871
[19]Neeta Deshpande, Snehal Kamalapur and Jacobs Daisy, "Implementation of LSB steganography and Its Evaluation for Various Bits," 1st International Conference on Digital Information Management, pp. 173-178, 6 Dec. 2006. DOI: https://doi.org/10.1109/icdim.2007.369349
[20]Tosihiro Akiyama, Fumiaki Motoyoshi, Osamu Uchida and Shohachiro Nakanishi, "Hybrid Digital Watermarking for Color Images Based on Wavelet Transform," IADIS International Conference Applied Computing 2006, San Sebastian, Spain, February 2006.
[21]S. D. Lin., S. C. Shie and J.Y. Guo "Improving the Robustness of DCT-Based Image Watermarking Against JPEG Compression," Computer Standards & Interfaces, vol. 32, pp. 54-60, 2010. DOI: https://doi.org/10.1016/j.csi.2009.06.004
[22]A. M. Kothari, V. Dwivedi, “Video Watermarking Combination of Discrete Wavelet & Cosine Transform to Achieve Extra Robustness,” International Journal of Image, Graphics and Signal Processing, vol. 5, no. 3, pp. 36-41, 2013. DOI: https://doi.org/10.5815/ijigsp.2013.03.05
[23]P. Tao and A. M. Eskicioglu, “A Robust Multiple Watermarking Scheme in the DWT Domain,” Optics East 2004 Symposium, Internet Multimedia Management Systems Conference, Philadelphia, pp. 133-144, October 25-28, 2004. DOI: https://doi.org/10.1117/12.569641
[24]Baisa L. Gunjal and R.R. Manthalkar “An Overview Of Transform Domain Robust Digital Image Watermarking Algorithms,” Journal of Emerging Trends in Computing and Information Sciences, 2011.
[25]H.-H. Tsai, Y. J. Jhuang and Y. S. Lai "An SVD-based Image Watermarking in Wavelet Domain using SVR and PSO", Applied Soft Computing, vol. 12, pp. 2442-2453, 2012. DOI: https://doi.org/10.1016/j.asoc.2012.02.021
[26]L. Robert and T. Shanmugapriya,” A Study on Digital Watermarking Techniques”, International Journal of Recent Trends in Engineering, vol. 1, no. 2, May 2009.
[27]N. Chandrakar and J. Baggaa,”Performance Comparison of Digital Image Watermarking Techniques: A Survey,” International Journal of computer Application Technology and Research, vol. 2, no. 2, pp. 126-130, 2013. DOI: https://doi.org/10.7753/ijcatr0202.1008
[28]D. Mistry, “Comparison of Digital Watermarking Methods,” International Journal on Computer Science and Engineering, vol. 02, no. 09, pp. 2905-2909, 2010.
[29]J. Fridrich, M. Goljan, and R. Du, “Invertible Authentication,” in Proc. SPIE Conf. Security and Watermarking of Multimedia Contents III San Jose, Calif, USA, vol. 43, no. 14, pp. 197–208, , January 2001. DOI: https://doi.org/10.1117/12.435400
[30]Shereem Ghanem and Fatma A.E. Abou-Chadi, "Contourlet Versus Wavelet Transform: A Performance Study for a Robust Image Watermarking," 2009. DOI: https://doi.org/10.1109/icadiwt.2009.5273921
[31]Sin-Joo Lee and Sung-Hwan Jung, "A Survey of Watermarking Techniques Applied toMultimedia," ISIE 2001. DOI: https://doi.org/10.1109/isie.2001.931796
[32]V. S. Jabade and S. R. Gengaje, “Literature Review of Wavelet Based Digital Image Watermarking Techniques,” International Journal of Computer Appliations, vol. 31, no. 1, 2011, pp 28-36.