16
A detailed survey on Image watermarking 1 Swe thaSridharan, 2 Venkatesh Prasad R and 3 Srinarayan S 1 Department of Computer Science and Engineering, Rajalakshmi Engineering College and India 2 Department of Computer Science and Engineering, Rajalakshmi Engineering College and India 3 Department of Computer Science and Engineering, Rajalakshmi Engineering College and India [email protected];[email protected]; [email protected]; ABSTRACT With a giant leap into the digital era, there is a lot of data being generated daily. As the volume of data generated is very huge and rapid, there arises an urge to secure the data from various threats and piracies. To tackle this issue several Data Hiding Techniques (DHT) are being applied. Data hiding is a process of hiding data into any digital media using specific algorithms which canbe later retrieved at the receiver’s end using a secret key. Surprisingly, image data has lot of scope for embezzlement. Digital Image watermarking techniques is an effective technique to solve problems of image piracies. Watermarking involves adding some kind of additional data to the basic image to claim ownership of the image. In this paper, we present an extensive survey over thedigital image watermarking techniques. We analyse various methods involved in the process of image watermarking and exhibit a comparison of the pitfalls and advantages of various techniques. Watermarking thus provides robustness to the image while proving as a usefultool for image security. Keywords: data hiding, secret key,watermarking. INTRODUCTION Data hiding is a remarkable method which helps inproviding resistance to images against any type of piracy orunauthenticated ownership of the image data. The followingsection provides a brief discussion on the various data hiding techniques. International Journal of Pure and Applied Mathematics Volume 119 No. 12 2018, 16623-16638 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu 16623

A detailed survey on Image watermarking

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A detailed survey on Image watermarking

A detailed survey on Image watermarking

1SwethaSridharan,

2Venkatesh Prasad R and

3Srinarayan S

1Department of Computer Science and Engineering, Rajalakshmi Engineering College and India

2Department of Computer Science and Engineering, Rajalakshmi Engineering College and India

3Department of Computer Science and Engineering, Rajalakshmi Engineering College and India

[email protected];[email protected]; [email protected];

ABSTRACT

With a giant leap into the digital era, there is a lot of data being generated daily. As the volume of data generated is very huge and rapid, there arises an urge to secure the data from various threats and piracies. To tackle this issue several Data Hiding Techniques (DHT) are being applied. Data hiding is a process of hiding data into any digital media using specific algorithms which canbe later retrieved at the receiver’s end using a secret key. Surprisingly, image data has lot of scope for embezzlement. Digital Image watermarking techniques is an effective technique to solve problems of image piracies. Watermarking involves adding some kind of additional data to the basic image to claim ownership of the image. In this paper, we present an extensive survey over thedigital image watermarking techniques. We analyse various methods involved in the process of image watermarking and exhibit a comparison of the pitfalls and advantages of various techniques. Watermarking thus provides robustness to the image while proving as a usefultool for image security. Keywords: data hiding, secret key,watermarking.

INTRODUCTION

Data hiding is a remarkable method which helps inproviding resistance to images against any type of piracy orunauthenticated ownership of the image data. The followingsection provides a brief discussion on the various data hiding techniques.

International Journal of Pure and Applied MathematicsVolume 119 No. 12 2018, 16623-16638ISSN: 1314-3395 (on-line version)url: http://www.ijpam.euSpecial Issue ijpam.eu

16623

Page 2: A detailed survey on Image watermarking

Types of data hiding:

Cryptography:

Cryptography is a common technique which can be used to achieve secure communication. In cryptography, the data to be sent is encrypted at the sender’s side and later decrypted at the receiver’s side. Encryption is the process transforming the plain text into unreadable format called cipher text. The cipher text is decrypted using a secret key. The two types of cryptographic techniques are symmetric cryptography and asymmetric cryptography. In symmetric cryptography, a single key is shared by both the sender and the receiver whereas in asymmetric cryptography, the receiver’s public key is used for encryption and decryption is done with their private key. In this method, the encrypted text is explicitly visible and so the cryptanalysts can easily break the cipher text using cryptanalysis. The process of breaking the cipher text is called code breaking.

Steganography:

Steganography also known as secret writing is one of the process used from ancient times. Steganography is the process where data is hidden inside the media like text, images, video and audio in such a way that it prevents the external users from being accessing the data. The difference between cryptography and steganography is that, the hidden information is not visible to the naked eye. Steganalysis is the process by which the data that has been hidden inside a media can be detected. The different types of steganography are: Text steganography:

In text steganography, the data to be sent is hidden within alarger text file. The secret data is inserted into the text file in aparticular pattern which can be identified only by the intendedrecipient. The most common way of applying textsteganography is hiding the secret text within a HTML codeof a webpage. Some of the other techniques of textsteganography are selective hiding, semantic hiding, hidingusing whitespaces. Image steganography:

In image steganography, images are used as a medium forcarrying the secret data. The data is concealed within animage. Each pixel in an image consists of three bytes whichrepresents Red, Green and Blue colours. The imagesteganography works by the fact that, the difference in twocolours of a pixel which differs by one bit in either of thethree colour values is impossible for the human eye to detect.LSB (Least Significant Bit) algorithm is the most widely usedtechnique in which the LSB of picture’s pixel details isaccessed. Some of the other techniques used in imagesteganography are by masking and filtering and, by usingalgorithms and transformation.

Audio steganography:

Audio steganography is a technique in which the secret audiois hidden inside another audio by modifying its signal in an imperceptible manner i.e., it cannot be perceived by the human ear. The host message or audio signal and the stage audio do not differ much in characteristics. In this technique also, the LSB (Least Significant Bit) coding is the most common method. Some of the other methods involved in audio steganography are Wavelet coefficients, Echo hiding, Tone insertion, Phase coding, Spread spectrum.

International Journal of Pure and Applied Mathematics Special Issue

16624

Page 3: A detailed survey on Image watermarking

Video steganography:

Video steganography is a technique by which the data ishidden inside a video file. More data can be hidden using thistechnique. Since the data can be hidden inside the audio or thepicture file, both the image and audio steganographytechniques can be applied. The hidden data is usuallyimperceptible in nature as the frames in the video aredisplayed in a very faster rate.

Watermarking

Watermarking is the technique used to conceal proprietaryinformation into any form of digital media. The type ofwatermarking varies with different kinds of media. At presentthis is the widely used technique. This combines desirablefeatures of all its predecessors. A watermark should be robustto various kinds of attack. Watermarking can be done on text,image, audio and video.

Text watermarking:

In this type of watermarking the text document carries secretmessage relating to copyright information. Watermark isinserted in space between words or lines or in features ofcharacters.

Audio watermarking:

Audio watermarking is the technique where the data isenclosed by embedding with the audio. The amount of datathat can be embedded is comparatively very low as audio is adimensionless quantity. These are most commonlyimplemented to fight against online piracy of music albums.

Video watermarking: Adding a watermark or proprietary information to video isknown as video watermarking. It can

be viewed to be similarto or an extension of image watermarking. The watermarkingperformed on the video may be visible or invisible. This isdone to prove ownership of digital video content.

Image Watermarking:

Digital image watermarking is the technique used tosecure digital data from unauthorized users and to identify theownership of the particular data. In this technique the digitalcontent is embedded into the host image and it should berobust and resistant to any manipulation to the watermark.The watermarking system is said to be ideal if it is resistant tomodification like rotation, cropping (most common form ofattack), resizing, filtering etc. Another factor to be taken intoaccount is that embedding data into host media should notresult in the loss of its quality.

WATERMARKING TECHNIQUES

Steps in watermarking:

Watermark embedding:

Watermark embedding is the process in which thecopyright or ownership information is embedded inside thedigital image using an embedding algorithm. The data hiddencan contain text, serial number, secret data or thecompany’s logo which ensures authentication, protection ofdata and copyright information. The watermark can beembedded either using spatial or frequency domainalgorithms. The embedding should be done in a way such thatthe quality and the originality of the images are not sacrificed.An ideal embedding algorithm ensures that the manipulationof the data should be carried within the signal. A secret key isused for embedding and extracting the watermark to preventfrom illegal access. The watermark can be hidden in a dataeither visible or invisible.

International Journal of Pure and Applied Mathematics Special Issue

16625

Page 4: A detailed survey on Image watermarking

Watermark detection:

Watermark detection is based on the technique ofIndependent Component Analysis (ICA) algorithm.Watermark detection is the process in which the intendedperson can detect the watermark from the digital image and itshould be imperceptible to others. If the algorithm used forembedding the watermark is strong, then the attackers cannotdetect the watermark unless he knows the algorithm used toembed.

Watermark extraction:

Watermark extraction is the process which is used toretrieve the watermark from the digital image on which it isembedded. Watermark extraction is the reverse process to theone which is used for embedding. In this process, the digitalimage with the watermark is passed through the decodercircuit which retrieves the watermark. Extraction techniqueemployed should be in such a way that, there should not beany compromise in the quality of the picture.

PROPERTIES OF WATERMARKING

Robustness:

Robustness is the quality of the watermark to withstandagainst any hampering activities such as cropping, rotation,scaling and compression. As different algorithms are used inwatermarking, the level of robustness varies accordingly.Therefore, robustness can be classified into fragile, semifragile and robust.

Imperceptibility:

Imperceptibility refers to the fact that the watermark thatis embedded should not be perceived by others i.e., it shouldremain invisible. Imperceptibility and robustness are inverselyrelated to each other. According to the situation, eitherrobustness or imperceptibility is sacrificed. Imperceptibility ismeasured using Peak Signal to Noise Ratio (PSNR) takinginto consideration the signal strength. Capacity:

Capacity refers to the maximum amount of data that can beplaced in the host image. It is also referred to as Payload.The capacity of the image could differ according to therequirement of the application. Study of capacity as ameasure is useful in determining the size of thewatermark.

Security

Security is the property of a watermark which refers to howresistive it is towards attack. The watermark should haveunique features to resist against the attacks. The attacks typescan be classified into unauthorized embedding, unauthorizedremoval and unauthorized detection.

Complexity:

Complexity is a measured mainly for the purpose of costestimation. A watermark should have low complexity. Thecomplexity is measured based on the speed of embeddingand detection and the number of embedders and detectorsused. The complexity depends on the business modelused.

TYPES OF WATERMARKING

Based on human perception:

The watermarks are classified into two types based on thehuman perception by taking into account of the HumanVisual System (HVS). They are:

International Journal of Pure and Applied Mathematics Special Issue

16626

Page 5: A detailed survey on Image watermarking

Visible watermark:

In visible watermark, the watermark can be easilyperceived and visible to the human eye. This type ofwatermark usually includes a semi-transparent text orthe logo of a company which is overlaid at one of thecorners of the digital image. This the most commontype of watermarking concerned with the copyright orownership of the digital image.

Invisible watermark:

Invisible watermark is also known as imperceptiblewatermark. As the name suggest, the watermarkembedded cannot be perceived by the human eye i.e.,it is invisible to the human eye. The watermark can bedetected only with the help of the correct detectionalgorithm. This type of watermarking is particularlyused for important digital image to claim itsauthenticity.

According to the application: The watermarks are differentiated into source based anddestination based according to the

application.

Source Based:

In source based watermark, the watermark is inserted intoa digital image at the source level. The watermarkcontains the information of the user and distributed.The owner’s information will be on all the copies ofthe distributed image. Source based watermark ismainly used for authentication of the owner and tocheck whether or not the digital image is tampered.

Destination based:

In destination based watermark, a unique watermark willattached to each distributed copy of a digital image.This type of watermark is used to identify the buyer.The illegal buyer can be easily identified by using thistechnique.

According to the extraction Process:

Blind:

Blind watermarking is otherwise known as publicwatermarking. This type of watermarking does notrequire the cover image to extract the data. Thewatermark data is extracted from the digital imageusing the correct secret key.

I' × K → W In the above equation, I is the original data, I’ is thewatermarked data, K is the key and W is

thewatermark.

Semi Blind:

Semi blind watermarking is otherwise known as semiprivate watermarking. In this process also the coverimage is not required. This technique is used to findwhether the watermark can be detected. It requiresboth the watermarked image and the secret key fordetection and extraction.In the following equation, I is the original data, I’ isthe watermarked data, K is the key and W is thewatermark.

I'× K×W → {0, 1}

International Journal of Pure and Applied Mathematics Special Issue

16627

Page 6: A detailed survey on Image watermarking

Non-Blind:

Non blind watermarking is otherwise known as privatewatermarking. This technique of extraction requiresthe cover image. There are two types in this technique. Type I:

In this type, the watermark is extracted from the distorteddata and the cover image is used as a hint to find thewatermark.

Type II:

In this type, a copy of embedded watermark is also need tofind whether or not the watermark data is present.Inthe following equation, I is the original data, I’ isthe watermarked data, K is the key and W is thewatermark.

I×I'×K×W → {0, 1}

TECHNIQUES OF IMAGE WATERMARKING

Spatial Domain Watermarking: Spatial domain is a watermarking technique in which thecolour or the intensity of the digital

image’s pixel is altered toembed the watermark. This technique does not apply anytransforms on the host image. This is a simple technique andinvolves less complexity. The time for embedding thewatermark is also less when compared to other techniques.The techniques involved in spatial domain are: Least Significant Bits (LSB) method:

This is the most common method used in spatial domainwatermarking technique for embedding and extracting thewatermark. In this method, the image is divided into a set ofsubsets. Then a subset is selected and the watermark isembedded by substituting the watermark bits in the leastsignificant bits (LSB) of the selected subset. The watermarkmay be at a specific location in the host image or may bescattered throughout the image. The watermark embeddedusing this method is not visible to the human eye and thevisibility depends on the number of bits that is replaced.However, this technique is not robust enough to resist theattacks and third party can easily alter the watermark bychanging the LSB of each pixel and can make the watermarkto have a negligible effect on the host image. BlockProbability concept

Using repetition codes and hamming codes:

In this method, the repetition codes and hamming codes areused for embedding the watermark into the host image. Whenrepetition codes are used, the bits of the watermark image areencoded using (3, 1) repetition code. Then the three LeastSignificant Bits (LSB) bits of host image is replaced with thesingle bit of the watermark. When hamming codes are used,the bits of the watermark image are encoded using (7, 4)hamming code. Then it is scanned row wise and embeddedinto the LSB of the host image by substituting the bits of thewatermark data. The watermark embedded using thistechnique provides high robustness.

SSM modulation based technique:

In Spread Spectrum modulation technique, the energygenerated at different discrete frequencies is distributed intime. The watermark is embedded by combining the digitalimage with the noise signal which is modulated by theembedded watermark

Texture mapping coding technique:

Texture mapping coding technique is applicable only to thosedigital images which have texture in it. In this technique, thewatermark is embedded in the texture part of the image. Thewatermark is hidden

International Journal of Pure and Applied Mathematics Special Issue

16628

Page 7: A detailed survey on Image watermarking

inside the texture patterns of the image.Each texture in the digital image is recovered usingautocorrelation.

Correlation Based technique: In correlation based technique, the watermark is embedded tothe host image by applying the

pseudo-random noise pattern.The pseudo-random noise applied to the host image is represented by the following equation. Here, the gain factor isdirectly proportional to the robustness of the watermark andinversely proportional to the quality of the image.

Iw(x, y) = I (x, y) + K×W (x, y)

In the above equation, I(x, y) represents the original image where x and y are its coordinates, Iw(x, y) represents the watermarked image, W(x, y) represents the pseudo-random noise pattern, Krepresents the gain factor.

Patchwork:

Patchwork is a watermarking technique in which thewatermark is embedded into the host image in an invisiblemanner using Gaussian distribution. First, the host image isdivided into a set of patches and two set of patches is chosen.Then, the point in one patch is brightened while the other isdarkened. A pseudo-random number generator is used todetermine the point that has to be brightened or darkened. Thedecoding algorithm is uses a secret key to extract thewatermark. Frequency Domain Watermarking/Transform DomainWatermarking:

The frequency domain or transform domain is a watermarkingtechnique in which different types of transformation areapplied to the digital image to embed the watermark. Inthis technique, the watermark alters the coefficient valuesinstead of intensity values of the host image. Thetechniques involved in this technique are as follows:

Discrete Cosine Transform (DCT): Discrete Cosine Transformation (DCT) is a watermarking technique in which transformation is

performed where the kernel is in cosine function. In this method, the data is represented in terms of frequency and not in amplitude. The cover image is separated into set of spectral sub-bands corresponding to the image's visual quality. The image is separated into three set of frequency components high, low and medium. The changes made in the low frequency area are visible to the human eye as the signal energy lies at the low frequency area. The changes made in the high frequency area causes distortion to the host image. The change made in the middle frequency area does not affect the quality of the image. Therefore the transformation is set threshold value in this area. This method is robust against compression but cannot resist against the geometric attacks.

Discrete Wavelet Transform (DWT):

Discrete Wavelet Transform (DWT) is a transformation technique in which the embedding of watermark into the host image is based on the waves called wavelet of varying frequency. In this technique the host image is first decompose into four components high scale low frequency (LL), vertical low scale high frequency (LH), Horizontal low scale high frequency (HL), Diagonal low scale high frequency (HH). The watermark is usually embedded in the high frequency component. This method cannot resist against geometric and image processing attacks.

Discrete Fourier Transform (DFT):

Discrete Fourier Transform is a transformation technique which transforms a function into its frequency components. This technique is very robust in nature and can resist against geometric attacks. In DFT, the image is decomposed in sine and cosine forms. There are two types of embedding in DFT, direct embedding and template based embedding. In direct embedding, the watermark is embedded by altering the DFT magnitudes and coefficients. In template based embedding, the watermark is embedded

International Journal of Pure and Applied Mathematics Special Issue

16629

Page 8: A detailed survey on Image watermarking

using templates. Templates are the structures which are used to estimate the transformation factor. After transformation, the template can be searched and resynchronize the image.

Singular Value Decomposition (SVD): Single Value Decomposition is a technique in which a real or complex matrix is either

decomposed or factored. This technique involves two orthogonal matrix and one diagonal matrix. The contents in the diagonal matrix are singular values. The single value decomposition is the generalization of spectral theorem. According to spectral theorem, the normal matrices can be diagonalized by using the Eigenvector method.

Principal Component Analysis (PCA):

Principal Component Analysis is a technique which involves mathematical procedures used to identify the patterns in a digital image and to express the similarities and differences among them. These patterns can be used to compress the data by limiting the number of dimension without the loss of information. The watermark is embedded in the three colour channels RGB of the host image. PCA is the most powerful tool for analysing the data. PCA uses orthogonal transformation to convert the correlated variables to uncorrelated variables. The watermark is embedded in the three colour channels RGB of the host image.

Feature based watermarking: This is one of the watermarking techniques developed off late which uses spatial domain in

adding watermark using robust feature points. They are not only used to embed information but act a reference. Multiple copies of watermarked information are embedded around the feature point and uses shape theory to correct the effects of attacks. They are also known as “content aware methods” where specific knowledge on the media is used to increase the ability of watermark to withstand attacks.

Hybrid techniques: Discrete Wavelet Transform-Discrete Cosinetransform (DWT-DCT) hybrid:

Discrete Cosine Transform-Discrete Wavelet Transform (DWT-DCT) is a hybrid technique which combines both DCT and DWT techniques. In this method, first DWT is applied to the cover image up to different levels and then DCT is applied. The number of levels is directly proportional to the PSNR and inversely proportional to the size of the watermark. By using this method, the quality of the host image degrades very slowly. It does not alter the view of the host image.

Redundant Discrete Wavelet Transform (RDWT) andSingular Value Decomposition (SVD) based

technique:

This technique combines Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD). In RDWT method, redundancy is achieved by eliminating the down-sampling and up-sampling coefficients. The RDWT method is combined with the SVD method because the SVD cannot be used separately as it requires high computations. The RDWT decomposes the host image into four bands and embeds the watermark by modifying the singular values of the sub bands.

Discrete Cosine Transform - Singular ValueDecomposition (DCT-SVD) hybrid:

This technique combines Discrete Cosine Transform (DCT) and Singular Valued Decomposition (SVD) to produce a non-blind watermark. In this technique, the DCT is applied to the watermark image and the DCT coefficients are mapped. Then, the SVD is applied to the DCT transformed image by changing the singular values. The modified DCT coefficients are mapped to the original cover image. Thus the watermark is produced by applying the inverse DCT.

ATTACKS ON WATERMARKING

International Journal of Pure and Applied Mathematics Special Issue

16630

Page 9: A detailed survey on Image watermarking

An attack on the watermark can be defined as the process, in which the embedded information is destroyed, altered or the watermark is prevented from performing task for which it was created. It can be an intentional or unintentional. An ideal watermark should be robust against such attacks.

Removal attack:

In this type of attack the entire watermarked data is removed or destroyed from the host image without destroying it. This type of attack occurs when the watermarked data is added as a frame instead of mixing it with the host data.

Forgery attack: This type of attack is similar to substitution. Here objects are inserted deleted or background

substitution takes place.

Active attack: These types of attacks are deliberate attacks which tend to remove the watermarked information

just to make in undetectable. These types of attacks cause a serious copyright information problem as the watermark is the indication of ownership rights.

Passive attack: Here the attacker just tries to determine if the media is being watermarked or not. This might

seem simple and not of much use, but they should be protected as the knowledge about the presence of watermark is more than enough for the attackers to manipulate it.

APPLICATIONS

Some of the widely used applications of watermarking techniques are:

Copyright information:

Watermarking is used to determine the ownership details, the protection of which is one of the primary functions.

Digital right management: Digital right management is concerned with the managementof digital rights. It is said to cover

description, identification, trading and other features over the particular media.

Broadcast monitoring: Media is one of the sectors which is stretching its arms far and wide over the past few years. It is

important that we are aware of the source or the person who is telecasting the content.

Fingerprint: Fingerprints are unique and the owner can be identified very easily. This is one factor which is

difficult to manipulate.

Access control: At different levels we need to distinguish between the users as we may have to provide different

levels of access to different category of users. Watermark can be used as a distinguishing medium.

Audience measurement: Knowledge about the audience or viewers of a particular media is of increasing importance

nowadays. Not only the number of users is required but also the method or the way in which they access the content is essential to increase the usability.

International Journal of Pure and Applied Mathematics Special Issue

16631

Page 10: A detailed survey on Image watermarking

Content protection for audio and video: Some of the latest technologies used for maintaining audio and video content such as Blu-Ray

have high levels of protection from making multiple copies or trying to duplicate it.

Document and image security: Document and image security is one of the most important applications of watermark. Highly

confidential data and images must be protected over the net, the leakage of which could have a very serious impact.

Locating content online: Internet has turned out to be a medium where large volume of data is being exchanged.it has also

emerged as a potential place for customers to meet the buyers.

CONCLUSION This paper covers all the data hiding techniques and deals in depth with the image watermarking techniques, its implementations, and various types of attack it faces and its field of use. We have tried to throw light on almost every aspect of image watermarking by providing the necessary information from each sector of image watermarking.

Serial number Name of

technique

Papers referred Merits and

demerits

1 Least significant bit

A Survey on Digital Watermarking technique A Survey: Digital Image Watermarking technique A Comprehensive Survey on Digital Image Watermarking technique A Survey on digital Image Watermarking and Attacks

Merits: It is easy to implement and does not generate serious distortion. Demerits: It is not very robust against attack. It is very sensitive to noise.

2 Using repetition codes and hamming codes

A Comprehensive Survey on Digital Image Watermarking technique A Simple Robust Digital Image Watermarking against Salt and Pepper noise using repetition codes

Merits: Highly robust against salt and pepper noise with different noise densities. Demerits: As robustness increases there is a decrease in the quality of watermark.

3 SSM A Survey on digital Merits: Thistechnique

International Journal of Pure and Applied Mathematics Special Issue

16632

Page 11: A detailed survey on Image watermarking

modulation based technique

Image Watermarking and Attacks A Review on Digital Watermarking For Copyright Protection of Digital Data

can be used to establish secure connection. It increases resistance to natural interference and jamming. Demerits: This technique is not used for practical application.

4 Correlation based technique

A Survey on Digital Watermarking technique Transform Based Digital Image Watermarking Techniques for Image Authentication A Review on Digital Watermarking For Copyright Protection of Digital Data

Merits: The robustness can be increased by increasing the gain factor. Demerits: Gain factor affects the quality of the watermarked image.

5 Patchwork Estimation based Patchwork image processing technique A Review on Digital Watermarking Techniques, Applications and Attacks

Merits: Patchwork is has good resistance against cropping and tone scale correction. Demerits: In this technique, the patchwork can be destroyed by transformations like translation, scaling and rotation.

6 Discrete Cosine Transformation(D CT)

A Survey on Digital Watermarking technique Digital Image Watermarking algorithm using intermediate frequency A Survey: Digital Image Watermarking technique

frequencies that are not perceived by humans are removed. Demerits: It is weak against geometric attacks.

7 Discrete Wavelet transform

A Survey on Digital Watermarking technique A Survey: Digital Image

Merits: Robustness can be increased by

International Journal of Pure and Applied Mathematics Special Issue

16633

Page 12: A detailed survey on Image watermarking

(DWT) Watermarking technique A Digital Watermarking technique on Discrete Wavelet Transform A Survey on AWT and LWT based Digital Image Watermarking

increasing the watermark’s strength. Demerits: When the strength of the embedded watermark increases visible distortion increases.

8 Discrete Fourier Transform(DFT)

A Survey on Digital Watermarking technique A Survey: Digital Image Watermarking technique

Merits: Robust against geometric attack. Demerits: The phase representation of the image is easily affected by spatial shifts

9 Single valued decomposition

A Comprehensive Survey on Digital Image Watermarking technique A Survey on Digital Image watermarking techniques in spatial and transform domains

Merits: It combines imperceptibility with good quality and robustness. Demerits: False positive detection problem.

10 Principle component analysis

Digital Image Watermarking algorithm using intermediate frequency Watermarking using DWT and PCA

Merits: Reduces the dimensionality of data sets and robust against most attacks Demerits: This technique is not scale invariant. Some distributions cannot be characterized by this method.

International Journal of Pure and Applied Mathematics Special Issue

16634

Page 13: A detailed survey on Image watermarking

REFERENCES

G.Singh, H.Takur.Privacy and ownership protection techniques: comparison and survey. Indian journal of science and technology, 9(47).

Mrs.HemlataArya,Sonam Singh Bundela, Prashant Jain, Vijay Kushwah. A survey on digital

watermarking techniques. International Journal of Engineering Technology Science and Research, 3(5).

ManvendraGautam, Vineet Raj Singh Kushwah, SumitTiwari. A review study on digital

watermarkingtechniques. International Journal of Current Engineering and Scientific Research, 3(1).

Zhuoming DuHong-an Li,Zhanli Li, Qi Wang. Digital ImageWatermarking Algorithm Using the

Intermediate Frequency. Telkomnika, 14, pp. 1424-1431 Aditya Bhagat, Shikha Singh. Digital Image WatermarkingTechnique. International Journal Of

Engineering And Computer Science, 03(7),pp. 7084-7087 PreetiParashar, Rajeev Kumar Singh. Survey: Digital ImageWatermarking Techniques. International

Journal of Signal Processing, 7, pp. 111- 124 Ali Al-hal, Noor Hussain. Combining Cryptography and DigitalWatermarking for Secured Transmission

of Medical Images. IEEE Sujithra E, Yashwant.P, Saran R,Vignesh.R(2015). Image Piracy AlertSystem in Social Networks Using

Watermarking. International Journal for Research in Applied Science &amp Engineering Technology,3(5)

UruviH.Panchal, RohitSrivatsava(2015).A Comprehensive Survey onDigital Image Watermarking

Techniques. Fifth International Conference on Communication Systems and Network Technologies.

Chitra A Dhawale,Rachana V Mahule.Analysis of Image Security Techniques using Digital Image

Watermarking in Spatial Domain. International Journal of Computer Applications. Katzenbeisser Fabien Petitcolas and Stefan(2000). Information hiding techniques for steganography and

digital watermarking. Artech house. Joseph JK O and Thierry Punand Ruanaidh(1998).Rotation, scale and translation invariant spread

spectrum digital image watermarking. Signal processing 66.3: 303-317. Deepa, DimitriosHatzinakos and Kundur(1997). A robust digital imagewatermarking method using

wavelet-based fusion. International Conference on Image Processin and Proceedings. 1. IEEE Kutter, Martin, and Fabien AP Petitcolas(1999). Fair benchmark for imagewatermarking systems.

Electronic Imaging'99. International Society for Optics and Photonics. Wai C, Chu(2003). DCT-based image watermarking using subsampling. IEEE transactions on

multimedia 5.1: 34-38.

International Journal of Pure and Applied Mathematics Special Issue

16635

Page 14: A detailed survey on Image watermarking

Chang, Hsuan T, and Chung L. Tsan (2005).Image watermarking by use ofdigital holography embedded in the discrete-cosine-transform domain. Applied optics 44.29: 6211-6219.

Joseph JK,O'Ruanaidh and Thierry Pun(1997).Rotation, scale andtranslation invariant digital image

watermarking., International Conference on Image Processing and Proceedings. 1. IEEE. Martin Amado, Fernando Perez-Gonzalez,Hernandez and Juan R (2000).DCT-domain watermarking

techniques for still images: Detectorperformance analysis and a new structure. IEEE transactions on image processing 9.1: 55-68.

Chih-Chin,Lai and Cheng-Chih Tsai(2010).Digital image watermarkingusing discrete wavelet transform

and singular value decomposition. IEEE Transactions on instrumentation and measurement 59.11: 060-3063.

Huang, Jiwu, Yi Shi, andYun Q. Shi(2000). Embedding image watermarks in DC components. IEEE

transactions on circuits and systems for video technology 10.6: 974-979. Dimitrios, NikitasKaragiannis, Michael G. Strintzis and Tzovaras(1998).Robust image watermarking in

the subband or discrete cosinetransform domain. Signal Processing Conference (EUSIPCO 1998),9th European. IEEE.

Dubolia, Rakhi, et al. Digital image watermarking by using discretewavelet transform and discrete cosine

transform and comparison basedon PSNR. Communication Systems and Network Technologies (CSNT), 2011 International Conference on. IEEE.

Barni, Franco Bartolini, Teddy Furon, Mauro(2003). A general framework for robust watermarking

security. Signal Processing 83.10: 2069-2084. Dong, Zheng, et al(2007).A survey of RST invariant image watermarking algorithms. ACM Computing

Surveys (CSUR) 39.2: 5. Christian, and Jean-Luc Dugelay, Rey (2002).A survey of watermarkingalgorithms for image

authentication.EURASIP Journal on Advances in Signal Processing 2002.6: 218932. Ross J. Anderson, Markus G. Kuhn, Fabien AP andPetitcolas, (1999).Information hiding-a survey.

Proceedings of the IEEE 87.7:1062-1078. Er-Hsien, Fu (1998). Literature survey on digital image watermarking.EE381K Multidimensional Signal

Processing 19. Abbas, Cheddad, et al (2010). Digital image steganography: Survey and analysis of current

methods.Signal processing 90.3: 727-752. Rege P.Pand Raval(2003).Discrete wavelet transform basedmultiple watermarking scheme. TENCON

2003 Conference on Convergent Technologies for the Asia-Pacific Region. Vol. 3. IEEE. Gonzalo RArce, Charles GBoncelet, Xiang-Gen andXia(1998). Wavelettransform based watermark for

digital images. Optics Express 3.12: 497-511. PatrizioCampisi,Emanuele,Maiorana and Alessandro Neri(2007).Biometric signature authentication using

radon transform-based watermarking techniques.Biometrics Symposium, 2007. IEEE.

International Journal of Pure and Applied Mathematics Special Issue

16636

Page 15: A detailed survey on Image watermarking

Joseph JK,O'Ruanaidh and Thierry Pun(1997).Rotation, scale and translation invariant digital image

watermarking.., International Conference on. Image Processing,1997. Proceedings 1. IEEE. Shieh, Chin Shiuh, et al (2004).Genetic watermarking based on transform-domain techniques. Pattern

recognition 37.3:555-565. Bavisha T.E, Ms..MadlinAsha.M A KEYWORD BASED USER PRIVACY-PRESERVATION AND

COPY-DETERRENCE SCHEME FOR IMAGE RETRIEVAL IN CLOUD International Journal of Innovations in Scientific and Engineering Research (IJISER)

International Journal of Pure and Applied Mathematics Special Issue

16637

Page 16: A detailed survey on Image watermarking

16638