Digital Image Watermarking Techniques: A Review
Abstract
:1. Introduction
- We identify the limitations of existing watermarking techniques;
- We present the current trends of image watermarking techniques;
- We investigate the techniques that meet some of the requirements of image watermarking techniques perfectly;
- We point out the challenges that must be addressed by future researchers.
2. Image Watermarking Backgrounds and Frameworks
3. Design Requirements of Image Watermarking System
3.1. Imperceptibility
3.2. Robustness
- ▪
- Robust: A robust watermark prevents various noisy attacks, as well as geometric or non-geometric attacks, without altering the watermark data. The watermark remains the same even after some attacks and provides authorization by detecting the watermark [18]. This watermark is used in such areas as copyright protection, broadcast monitoring, copy control, and fingerprinting [16].
- ▪
- Fragile: Fragile watermarks are mainly used for integrity verification and content authentication of multimedia data where signature information can be added. This watermark validates whether it has been tampered or not [16]. A fragile technique is typically easier to implement than a robust one [19]. In [20], binary authentication information was inserted into the host image where, for identifying tampering and localization, a pixel-based fragile watermarking technique was used. It resulted in an acceptable visual effect (in terms of the human eye).
- ▪
- Semi-fragile: This type of watermark resists some transformations but fails after malicious transformations. A semi-fragile watermark can be used for image authentication [21].
3.3. Security
3.4. Capacity
3.5. Computational Cost
3.6. False Positive
3.7. Watermark Keys
3.8. Tamper Resistance
3.9. Reversibility
3.10. Techniques that Meet Requirements Simultaneously
4. Digital Image Watermarking Applications
4.1. Broadcast Monitoring
4.2. Copyright Protection, Ownership Assertion, or Owner Identification
4.3. Copy Control and Finger Printing
4.4. Content Authentication and Integrity Verification
4.5. Indexing
4.6. Medical Applications
4.7. Other Applications
5. Survey on Digital Image Watermarking Techniques
5.1. Spatial Domain Watermarking Techniques
5.1.1. Least Significant Bit (LSB)
5.1.2. Intermediate Significant Bit (ISB)
5.1.3. Patchwork
5.2. Frequency (or Transform) Domain Watermarking Algorithms
5.2.1. Discrete Cosine Transform (DCT)
5.2.2. Discrete Fourier Transform (DFT)
5.2.3. Discrete Wavelet Transform (DWT)
5.2.4. Singular Value Decomposition (SVD)
5.3. Hybrid Domain Watermarking Algorithms and Current Trends in Watermarking
5.4. Summary of Watermarking Techniques of Working Domain
6. Challenges of Image Watermarking Methods
6.1. Attacks on Watermarks
6.1.1. Active Attacks
6.1.2. Passive Attacks
6.1.3. Removal Attacks
6.1.4. Geometric Attacks
6.1.5. Protocol Attacks
6.1.6. Cryptographic Attacks
6.2. Cost-Effectiveness of Different Attacking Scenarios
- ▪
- K: cost of finding the key. This includes the effective length of the key, which measures the security of the watermarking algorithm;
- ▪
- E: the embedding cost, which affects the robustness and imperceptibility of the watermarking algorithm. This cost estimates the watermark embedding strength;
- ▪
- R: the cost to remove the watermark by an attacker from the host image without using the key used in the watermark embedding algorithm;
- ▪
- G: the geometric distortion cost;
- ▪
- E1: the new embedding cost generated by an attacker.
6.3. Performance Metrics for Evaluating Watermarking System
7. Conclusions and Future Directions
Author Contributions
Funding
Conflicts of Interest
References
- Tao, H.; Chongmin, L.; Zain, J.M.; Abdalla, A.N. Robust Image Watermarking Theories and Techniques: A Review. J. Appl. Res. Technol. 2014, 12, 122–138. [Google Scholar] [CrossRef] [Green Version]
- Zhang, Y. Digital Watermarking Technology: A Review. In Proceedings of the ETP International Conference on Future Computer and Communication, Wuhan, China, 6–7 June 2009; pp. 250–252. [Google Scholar]
- Cox, I.; Miller, M.; Bloom, J.; Fridrich, J.; Kalker, T. Digital Watermarking and Steganography, 2nd ed.; The Morgan Kaufmann Series in Multimedia Information and Systems: Burlington, Massachusetts, 2008. [Google Scholar]
- Mohanarathinam, A.; Kamalraj, S.; Venkatesan, G.P.; Ravi, R.V.; Manikandababu, C.S. Digital Watermarking Techniques for Image Security: A Review. J. Ambient Intell. Humaniz. Comput. 2019, 1–9. [Google Scholar] [CrossRef]
- Cox, I.J.; Miller, M.L. “Review of watermarking and the importance of perceptual modeling”. Proc. SPIE 1997, 3016. [Google Scholar] [CrossRef]
- Yang, Q.; Zhang, Y.; Yang, C.; Li, W. Information Entropy Used in Digital Watermarking. In Proceedings of the 2012 Symposium on Photonics and Optoelectronics, Shanghai, China, 21–23 May 2012; pp. 1–4. [Google Scholar]
- Yu, C.; Li, X.; Chen, X.; Li, J. An Adaptive and Secure Holographic Image Watermarking Scheme. Entropy 2019, 21, 460. [Google Scholar] [CrossRef] [Green Version]
- Kumar, V.A.; Rao, C.H.S.; Dharmaraj, C. Image Digital Watermarking: A Survey. Int. J. Adv. Manag. Technol. Eng. Sci. 2018, 8, 127–143. [Google Scholar]
- Jaynes, E.T. Prior probabilities. IEEE Trans. Syst. Sci. Cybern. 1968, 4, 227–241. [Google Scholar] [CrossRef]
- Refregier, P.; Javidi, B. Optical Image Encryption based on Input Plane and Fourier Plane Random Encoding. Opt. Lett. 1995, 20, 767–769. [Google Scholar] [CrossRef]
- Wu, C.; Ko, J.; Rzasa, J.R.; Paulson, D.A.; Davis, C.C. Phase and Amplitude Beam Shaping with Two Deformable Mirrors Implementing Input Plane and Fourier Plane Phase Modifications. Appl. Opt. 2018, 57, 2337–2345. [Google Scholar] [CrossRef]
- Pun, C.M. High Capacity and Robust Digital Image Watermarking. In Proceedings of the 5th International Joint Conference on INC, IMS and IDC, Seoul, South Korea, 25–27 August 2009; pp. 1457–1461. [Google Scholar]
- Yang, H.M.; Liang, Y.Q.; Wang, X.D.; Ji, S.J. A DWT-Based Evaluation Method of Imperceptibility of Watermark in Watermarked Color Image. In Proceedings of the 2007 International Conference on Wavelet Analysis and Pattern Recognition, Beijing, China, 2–4 November 2007; pp. 198–203. [Google Scholar]
- Zhang, H.; Wang, C.; Zhou, X. A Robust Image Watermarking Scheme Based on SVD in the Spatial Domain. Future Internet 2017, 9, 45. [Google Scholar] [CrossRef] [Green Version]
- Takore, T.T.; Kumar, P.R.; Devi, G.L. A New Robust and Imperceptible Image Watermarking Scheme Based on Hybrid Transform and PSO. Int. J. Intell. Syst. Appl. 2018, 11, 50–63. [Google Scholar] [CrossRef]
- Liu, J.; He, X. A Review Study on Digital Watermarking. In Proceedings of the 1st International Conference on Information and Communication Technologies, ICICT, Karachi, Pakistan, 27–28 August 2005; pp. 337–341. [Google Scholar]
- Olanrewaju, R.F. Development of Intelligent Digital Watermarking via Safe Region. Ph.D. Thesis, Kulliyyah of Engineering, International Islamic University Malaysia, Selangor, Malaysia, 2011. [Google Scholar]
- Yadav, U.; Sharma, J.P.; Sharma, D.; Sharma, P.K. Different Watermarking Techniques & its Applications: A Review. Int. J. Sci. Eng. Res. 2014, 5, 1288–1294. [Google Scholar]
- Cvejic, N. Algorithms for Audio Watermarking and Steganography. Master’s Thesis, Department of Electrical and Information Engineering, University of Oulu, Oulu, Finland, 2004. [Google Scholar]
- Zhang, H.; Wang, C.; Zhou, X. Fragile Watermarking for Image Authentication. Using the Characteristic of SVD. Algorithms 2017, 10, 27. [Google Scholar] [CrossRef]
- Sang, J.; Alam, M.S. Fragility and Robustness of Binary-Phase-Only-Filter-Based Fragile/Semi fragile Digital Image Watermarking. IEEE Trans. Instrum. Meas. 2008, 57, 595–606. [Google Scholar] [CrossRef]
- Zhang, Y.; Wang, C.; Wang, X.; Wang, M. Feature-Based Image Watermarking Algorithm Using SVD and APBT for Copyright Protection. Future Internet 2017, 9, 13. [Google Scholar] [CrossRef] [Green Version]
- Zhou, X.; Zhang, H.; Wang, C. A Robust Image Watermarking Technique Based on DWT, APDCBT, and SVD. Symmetry 2018, 10, 77. [Google Scholar] [CrossRef] [Green Version]
- Loani, N.A.; Hurrahi, N.N.; Parah, S.A.; Lee, J.W.; Sheikhi, J.A.; MohiuddinBhat, G. Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access 2018, 6, 19876–19897. [Google Scholar] [CrossRef]
- Castiglione, A.; Pizzolante, R.; Palmieri, F.; Masucci, B.; Carpentieri, B.; De Santis, A. On-Board Format-Independent Security of Functional Magnetic Resonance Images. ACM Trans. Embed. Comput. Syst. 2017, 16, 1–15. [Google Scholar] [CrossRef]
- Wang, C.; Zhang, H.; Zhou, X. A Self-Recovery Fragile Image Watermarking with Variable Watermark Capacity. Appl. Sci. 2018, 8, 548. [Google Scholar] [CrossRef] [Green Version]
- Zhang, F.; Zhang, H. Digital Watermarking Capacity and Reliability. In Proceedings of the IEEE International Conference on e-Commerce Technology, San Diego, CA, USA, 9 July 2004; pp. 295–298. [Google Scholar]
- Katti, S.J.; Namuduri, V.R.; Namuduri, K.R. A Practical Approach for Evaluating the Capacity of Watermarking Channel. In Proceedings of the International Conference on Intelligent Sensing and Information Processing, Chennai, India, 4–7 January 2005; pp. 193–198. [Google Scholar]
- Kavitha, K.J.; Shan, B.P. Implementation of DWM for Medical Images using IWT and QR Code as a Watermark. In Proceedings of the IEEE Conference on Emerging Devices and Smart Systems, Tiruchengode, India, 3–4 March 2017; pp. 252–255. [Google Scholar]
- Pizzolante, R.; Castiglione, A.; Carpentieri, B. Protection of Microscopy Images through Digital Watermarking Techniques. In Proceedings of the International Conference on Intelligent Networking and Collaborative Systems, Salerno, Italy, 10–12 September 2014; pp. 65–72. [Google Scholar]
- Ling, H.-C.; Phan, R.C.-W.; Heng, S.-H. Comment on Robust Blind Image Watermarking Scheme Based on Redundant Discrete Wavelet Transform and Singular Value Decomposition. AEU-Int. J. Electron. Commun. 2013, 60, 894–897. [Google Scholar] [CrossRef]
- Goos, G.; Hartmanis, J.; Van Leeuwen, J. Cloud Computing and Security. In Proceedings of the 4th International Conference, ICCCS, Haikou, China, 8–10 June 2018; pp. 691–697. [Google Scholar]
- P’erez-Freire, L.; Na, P.C.; Ramon, J.; Troncoso-Pastoriza, J.R.; Gonzalez, F.P. Watermarking Security: A Survey. In Transactions on Data Hiding and Multimedia Security; Lecture Notes in Computer Science: Berlin/Heidelberg, Germany, 2006; pp. 41–72. [Google Scholar]
- Bruce, A.M. A Review of Digital Watermarking. Available online: https://pdfs.semanticscholar.org/d6eb/c1a3e1676df1b5a32033417215e8da096ac4.pdf (accessed on 16 February 2020).
- Chopra, J.; Kumar, A.; Kumar, A.; Marwaha, A. An Efficient Watermarking for Protecting Signature Biometric Template. In Proceedings of the 5th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 22–23 February 2018; pp. 413–418. [Google Scholar]
- Singh, A.K.; Kumar, B.; Singh, G.; Mohan, A. Medical Image Watermarking. Multimedia Systems and Applications; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar]
- Qasim, A.F.; Meziane, F.; Aspin, R. Digital watermarking: Applicability for Developing Trust in Medical Imaging Workflows State of the Art Review. Comput. Sci. Rev. 2018, 27, 45–60. [Google Scholar] [CrossRef]
- De Vleeschouwer, C.; Delaigle, J.; Macq, B. Invisibility and Application Functionalities in Perceptual Watermarking-An Overview. Proc. IEEE 2002, 90, 64–77. [Google Scholar] [CrossRef]
- Merrad, A. Implementation of a Biometric Speech Watermarking Based on Wavelet Transform. Ph.D. Thesis, Ziane Achour University of Djelfa, Djefa, Algeria, 2019. [Google Scholar]
- Singh, A.K.; Kumar, B.; Singh, S.K.; Ghrera, S.P.; Mohan, A. Multiple Watermarking Technique for Securing Online Social Network Contents Using Back Propagation Neural Network. Future Gener. Comput. Syst. 2016, 86, 926–939. [Google Scholar] [CrossRef]
- Zear, A.; Singh, A.K.; Kumar, P. A Proposed Secure Multiple Watermarking Technique Based on DWT, DCT and SVD for Application in Medicine. Multimed Tools Appl. 2016, 77, 4863–4882. [Google Scholar] [CrossRef]
- Phadikar, A.; Jana, P.; Mandal, H. Reversible Data Hiding for DICOM Image Using Lifting and Companding. Cryptography 2019, 3, 21. [Google Scholar] [CrossRef] [Green Version]
- Yusof, Y.; Khalifa, O.O. Digital Watermarking for Digital Images using Wavelet Transform. In Proceedings of the IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, Penang, Malaysia, 14–17 May 2007; pp. 665–669. [Google Scholar]
- Singh, V. Digital Watermarking: A Tutorial. Available online: http://www.cyberjournals.com/Papers/Jan2011/02.pdf (accessed on 16 February 2020).
- Agbaje, M.; Olugbenga Awodele, O.; Idowu, S.A. Broadcast Monitoring and Applications. J. Telecommun. 2012, 7, 11–16. [Google Scholar]
- Kaur, E.J.; Kaur, E.K. Digital Watermark: A Study. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2012, 2, 159–163. [Google Scholar]
- Hsu, C.S.; Tu, S.F. Digital Watermarking Scheme for Copyright Protection and Tampering Detection. Int. J. Inf. Technol. Secur. 2019, 11, 107–119. [Google Scholar]
- Hamidi, M.; Chetouani, A.; El Haziti, M.; El Hassouni, M.; Cherifi, H. Blind Robust 3D Mesh Watermarking Based on Mesh Saliency and Wavelet Transform for Copyright Protection. Information 2019, 10, 67. [Google Scholar] [CrossRef] [Green Version]
- Kunhu, A.; Al Mansoori, S.; Al-Ahmad, H. A Novel Reversible Watermarking Scheme Based on SHA3 for Copyright Protection and Integrity of Satellite Imagery. Int. J. Comput. Sci. Netw. Secur. 2019, 19, 92–102. [Google Scholar]
- Furon, T. A Survey of Watermarking Security; International Workshop on Digital Watermarking: Siena, Italy, 2005; pp. 201–215. [Google Scholar]
- Rashid, A. Digital Watermarking Applications and Techniques: A Brief Review. Int. J. Comput. Appl. Technol. Res. 2016, 5, 147–150. [Google Scholar]
- Adnan, W.A.W.; Hitarn, S.; Abdul-Karim, S.; Tamjis, M.R. A Review of Image Watermarking. In Proceedings of the Student Conference on Research and Development, Putrajaya, Malaysia, 25–26 August 2003; pp. 381–384. [Google Scholar]
- Mahajan, J.R.; Patil, N.N. Alpha Channel for Integrity Verification using Digital Signature on Reversible Watermarking QR. In Proceedings of the 2015 International Conference on Computing Communication Control and Automation, Pune, India, 26–27 February 2015; pp. 602–606. [Google Scholar]
- Tohidi, F.; Paul, M.; Hooshmandasl, M.R.; Debnath, T.; Jamshidi, H. Efficient Self-embedding Data Hiding for Image Integrity Verification with Pixel-Wise Recovery Capability. In Pacific-Rim Symposium on Image and Video Technology; Springer: Cham, Switzerland, 2019; Volume 11854, pp. 128–141. [Google Scholar]
- Allaf, A.H.; Kbir, M.A.; Allaf, A.H.; Kbir, M.A. A Review of Digital Watermarking Applications for Medical Image Exchange Security. In The Proceedings of the Third International Conference on Smart City Applications; Springer: Cham, Switzerland, 2019; pp. 472–480. [Google Scholar]
- Wu, N.I.; Hwang, M.S. Data Hiding: Current Status and Key Issues. Int. J. Netw. Secur. 2007, 4, 1–9. [Google Scholar]
- Celik, M.; Sharma, G.; Saber, E.; Tekalp, A. Hierarchical Watermarking for Secure Image Authentication with Localization. IEEE Trans. Image Process. 2002, 11, 585–595. [Google Scholar] [CrossRef]
- Mukherjee, D.P. Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication. IEEE Trans. Multimed. 2004, 6, 1–15. [Google Scholar] [CrossRef]
- Nikolaidis, N.; Pitas, I. Robust Image Watermarking in the Spatial Domain. Signal Process. 1998, 66, 385–403. [Google Scholar] [CrossRef]
- Habes, A. Information Hiding in BMP Image Implementation, Analysis and Evaluation. Inf. Transm. Comput. Netw. 2006, 6, 1–10. [Google Scholar]
- Abdullatif, M.; Zeki, A.M.; Chebil, J.; Gunawan, T.S. Properties of Digital Image Watermarking. In Proceedings of the IEEE 9th International Colloquium on Signal Processing and its Applications, Kuala Lumpur, Malaysia, 8–10 March 2013; pp. 235–240. [Google Scholar]
- Fung, A.G.C.; Junior, W.G. A Review Study on Image Digital Watermarking. In Proceedings of the 10th International Conference on Networks, St Maarten, The Netherlands, 22–23 January 2011; pp. 24–28. [Google Scholar]
- Manjula, G.R.; Danti, A. A Novel Hash Based Least Significant Bit (2-3-3) Image Steganography in Spatial Domain. Int. J. Secur. Priv. Trust Manag. 2015, 4, 11–20. [Google Scholar]
- Abraham, J.; Paul, V. An Imperceptible Spatial Domain Color Image Watermarking Scheme. J. King Saud Univ. 2019, 31, 125–133. [Google Scholar] [CrossRef]
- Muyco, S.D.; Hernandez, A.A. Least Significant Bit Hash Algorithm for Digital Image Watermarking Authentication. In Proceedings of the 5th International Conference on Computing and Artificial Intelligence, Bali, Indonesia, 19–22 April 2019; pp. 150–154. [Google Scholar]
- Zeki, A.M.; Manaf, A.A. A Novel Digital Watermarking Technique Based on ISB (Intermediate Significant Bit). World Acad. Sci. Eng. Technol. Int. J. Comput. Inf. Eng. 2009, 3, 444–451. [Google Scholar]
- Mohammed, G.N.; Yasin, A.; Zeki, A.M. Robust Image Watermarking Based on Dual Intermediate Significant Bit (DISB). In Proceedings of the 6th International Conference on CSIT, Amman, Jordan, 26–27 March 2014; pp. 19–22. [Google Scholar]
- Jane, O.; Elbasi, E. A New Approach in Non-blind Watermarking method Based on DWT and SVD via LU Decomposition. Turk. J. Electr. Eng. Comput. Sci. 2014, 22, 1354–1366. [Google Scholar] [CrossRef]
- Zeki, A.; Abubakar, A.; Chiroma, H. An Intermediate Significant Bit (ISB) Watermarking Technique Using Neural Networks. Available online: https://link.springer.com/article/10.1186/s40064-016-2371-6#citeas (accessed on 16 February 2020).
- Rathor, B.; Saharan, R. Steganography using Bit Plane Embedding and Cryptography. In Proceedings of the 1st International Conference on Smart System, Innovations and Computing, Jaipur, India, 15–16 April 2017; Volume 79, pp. 319–330. [Google Scholar]
- Bender, W.; Gruhl, D.; Morimoto, N.; Lu, A. Techniques for Data Hiding. IBM Syst. J. 1996, 35, 313–336. [Google Scholar] [CrossRef]
- Singh, P.; Chadha, R.S. A Survey of Digital Watermarking Techniques, Applications and Attacks. Int. J. Eng. Innov. Technol. 2013, 2, 165–175. [Google Scholar]
- Wu, X.; Hu, J.; Gu, Z.; Huang, J. A Secure Semi-fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters. Available online: https://dl.acm.org/doi/10.5555/1082290.1082302 (accessed on 16 February 2020).
- Yeo, I.N.; Kim, H.J. Generalized Patchwork Algorithm for Image Watermarking. Multimed. Syst. 2003, 9, 261–265. [Google Scholar] [CrossRef]
- Saqib, M.; Naaz, S. Spatial and Frequency Domain Digital Image Watermarking Techniques for Copyright Protection. Int. J. Eng. Sci. Technol. 2017, 9, 691–699. [Google Scholar]
- Meyer-Baese, A.; Schmid, V. Feature Selection and Extraction. In Proceedings of the Pattern Recognition and Signal Analysis in Medical Imaging, Nasreen, Shamila, 27 August 2014; pp. 21–69. [Google Scholar]
- Kitanovski, V.; Taskovski, D.; Bogdanova, S. Watermark Generation using Image-Dependent Key for Image Authentication. In Proceedings of the International Conference on “Computer as a Tool”, Belgrade, Serbia, 21–24 November 2005; pp. 947–950. [Google Scholar]
- Chen, B.; Wornell, G.W. Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Trans. Inf. Theory 2001, 47, 1423–1443. [Google Scholar] [CrossRef] [Green Version]
- Patra, J.C.; Phua, J.E.; Rajan, D. DCT Domain Watermarking scheme Using Chinese Remainder Theorem for Image Authentication. In Proceedings of the International Conference on Multimedia and Expo, Suntec, Singapore, 19–23 July 2010; pp. 111–116. [Google Scholar]
- Xu, Z.J.; Wang, Z.Z.; Lu, Q. Research on Image Watermarking Algorithm Based on DCT. Procedia Environ. Sci. 2011, 10, 1129–1135. [Google Scholar] [CrossRef] [Green Version]
- Laouamer, L.; Tayan, O. A Semi-Blind Robust DCT Watermarking Approach for Sensitive Text Images. Arab. J. Sci. Eng. 2015, 40, 1097–1109. [Google Scholar] [CrossRef]
- Roy, S.; Pal, A.K. A Blind DCT Based Color Watermarking Algorithm for Embedding Multiple Watermarks. AEU-Int. J. Electron. Commun. 2017, 72, 149–161. [Google Scholar] [CrossRef]
- Liu, S.; Pan, Z.; Song, H. Digital Image Watermarking Method Based on DCT and Fractal Encoding. IET Image Process 2017, 11, 815–821. [Google Scholar] [CrossRef]
- Vishwakarma, V.P.; Sisaudia, V. Gray-scale Image Watermarking Based on DE-KELM in DCT Domain. Procedia Comput. Sci. 2018, 132, 1012–1020. [Google Scholar] [CrossRef]
- Singh, S.P.; Bhatnagar, G. A New Robust Watermarking System in Integer DCT Domain. J. Vis. Commun. Image Represent. 2018, 53, 86–101. [Google Scholar] [CrossRef]
- Discrete Fourier Transform. Available online: https://en.wikipedia.org/wiki/Discrete_Fourier_transform (accessed on 23 October 2019).
- Tsui, T.K.; Zhang, X.; Androutsos, D. Color Image Watermarking Using Multidimensional Fourier Transforms. IEEE Trans. Inf. Forensics Secur. 2008, 3, 16–28. [Google Scholar] [CrossRef]
- Poljicak, A.; Mandic, L.; Agic, D. Discrete Fourier Transform Based Watermarking Method with an Optimal Implementation Radius. J. Electron. Imaging 2011, 20, 033008. [Google Scholar] [CrossRef]
- Cedillo-Hernandez, M.; Garcia-Ugalde, F.; Nakano-Miyatake, M.; Perez-Meana, H. Robust Watermarking method in DFT Domain for Effective Management of Medical Imaging. J. Signal Image Video Process. 2013, 9, 1163–1178. [Google Scholar] [CrossRef]
- Ouyang, J.; Coatrieux, G.; Shu, H. Robust Hashing for Image Authentication Using Quaternion Discrete Fourier Transform and Log-Polar Transform. J. Digit. Signal Process. 2015, 41, 98–109. [Google Scholar] [CrossRef]
- Gaata, M.T. An Efficient Image Watermarking Approach Based on Fourier Transform. International J. Comput. Appl. 2016, 136, 8–11. [Google Scholar]
- Jamal, S.S.; Khan, M.U.; Shah, T. A Watermarking Technique with Chaotic Fractional S-box Transformation. J. Wirel. Peers Commun. 2016, 90, 2033–2049. [Google Scholar] [CrossRef]
- Raut, S.S.; Mune, A.R. A Review Paper on Digital Watermarking Techniques. Int. J. Eng. Sci. Comput. 2017, 7, 10460–10463. [Google Scholar]
- Discrete Wavelet Transform. Available online: https://en.wikipedia.org/wiki/Discrete_wavelet_transform (accessed on 23 October 2019).
- Kehtarnavaz, N. Digital Signal Processing System Design, 2nd ed.; Elsevier: Cambridge, MA, USA, 2008. [Google Scholar]
- Najafi, E. A Robust Embedding and Blind Extraction of Image Watermarking Based on Discrete Wavelet Transform. J. Math. Sci. 2017, 1, 307–318. [Google Scholar] [CrossRef] [Green Version]
- Chen, Z.; Chen, Y.; Hu, W.; Qian, D. Wavelet Domain Digital Watermarking Algorithm Based on Threshold Classification. In International Conference in Swarm Intelligence; Springer: Cham, Switzerland, 2015; Volume 9142, pp. 129–136. [Google Scholar]
- Haribabu, M.; Bindu, C.H.; Swamy, K.V. A Secure & Invisible Image Watermarking Scheme Based on Wavelet Transform in HSI color space. In Proceedings of the 6th International Conference on Advances in Computing & Communications, Cochin, India, 6–8 September 2016; pp. 462–468. [Google Scholar]
- Jia, S.; Zhou, Q.; Zhou, H. A Novel Color Image Watermarking Scheme Based on DWT and QR Decomposition. J. Appl. Sci. Eng. 2017, 20, 193–200. [Google Scholar]
- Hannoun, K.; Hamiche, H.; Lahdir, M.; Laghrouche, M.; Kassim, S. A Novel DWT Domain Watermarking Scheme Based on a Discrete-Time Chaotic System. IFAC-Pap. Line 2018, 51, 50–55. [Google Scholar] [CrossRef]
- Ambadekar, S.P.; Jain, J.; Khanapuri, J. Digital Image Watermarking through Encryption and DWT for Copyright Protection. J. Recent Trends Signal Image Process. 2018, 727, 187–195. [Google Scholar]
- Wang, J.; Du, Z. A Method of Processing Color Image Watermarking Based on the Haar Wavelet. J. Vis. Commun. Image Represent. 2019, 64, 1–8. [Google Scholar] [CrossRef]
- Singular Value Decomposition. Available online: https://en.wikipedia.org/wiki/Singular_value_decomposition (accessed on 24 October 2019).
- Chang, C.-C.; Tsai, P.; Lin, C.-C. SVD-Based Digital Image Watermarking Scheme. J. Pattern Recognit. Lett. 2005, 26, 1577–1586. [Google Scholar] [CrossRef]
- Vaishnavia, D.; Subashini, T.S. Robust and Invisible Image Watermarking in RGB Color Space Using SVD. In Proceedings of the International Conference on Information and Communication Technologies, Kochi India, 3–5 December 2014; pp. 1770–1777. [Google Scholar]
- Ali, M.; Ahn, C.W.; Pant, M.; Siarry, P. A Reliable Image Watermarking Scheme Based on Redistributed Image Normalization and SVD. Discret. Dyn. Nat. Soc. 2016, 1–15. [Google Scholar] [CrossRef] [Green Version]
- Verma, D.; Aggarwal, A.K.; Agarwal, H. Watermarking Scheme Based on Singular Value Decomposition and Homomorphic Transform. Available online: https://aip.scitation.org/doi/abs/10.1063/1.5008715 (accessed on 12 February 2020).
- Shih, F.Y.; Wu, S.Y. Combinational Image Watermarking in the Spatial and Frequency Domains. J. Pattern Recognit. Soc. 2003, 36, 969–975. [Google Scholar] [CrossRef]
- Sridhar, P. A Robust Digital Image Watermarking in Hybrid Frequency Domain. Int. J. Eng. Technol. 2018, 7, 243–248. [Google Scholar] [CrossRef] [Green Version]
- Kumar, A. A Review on Implementation of Digital Image Watermarking Using LSB and DWT. Inf. Commun. Technol. Sustain. Dev. 2019, 933, 595–602. [Google Scholar]
- Abdulrahman, A.K.; Ozturk, S. A Novel Hybrid DCT and DWT Based Robust Watermarking Algorithm for Color Images. Multimed. Tools Appl. 2019, 78, 17027–17049. [Google Scholar] [CrossRef]
- Savakar, D.G.; Ghuli, A. Robust Invisible Digital Image Watermarking using Hybrid Scheme. Arab. J. Sci. Eng. 2019, 44, 3995–4008. [Google Scholar] [CrossRef]
- Liu, J.; Li, J.; Ma, J.; Sadiq, N.; Bhatti, U.A.; Ai, Y. A Robust Multi-Watermarking Algorithm for Medical Images Based on DTCWT-DCT and Henon Map. Appl. Sci. 2019, 9, 700. [Google Scholar] [CrossRef] [Green Version]
- El-hajj, M.; Fadlallah, A.; Chamoun, M.; Serhrouchni, A. A Survey of Internet of Things (IoT) Authentication Schemes. Sensors 2019, 19, 1141. [Google Scholar] [CrossRef] [Green Version]
- Dobre, R.A.; Preda, R.O.; Oprea, C.C.; Pirnog, I. Authentication of JPEG Images on the Blockchain. In Proceedings of the International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO), Prague, Czech Republic, 19–21 May 2018; pp. 211–215. [Google Scholar]
- Yongliang, L.; Gao, W. Secure Watermark Verification Scheme. In Proceedings of the International Conference on Multimedia and Expo (ICME), Taipei, Taiwan, 27–30 June 2004; pp. 923–926. [Google Scholar]
- Huang, C.; Wu, J. Attacking Visible Watermarking Schemes. IEEE Trans. Multimed. 2004, 6, 16–30. [Google Scholar] [CrossRef]
- Agarwal, N.; Singh, A.K.; Singh, P.K. Survey of Robust and Imperceptible Watermarking. Multimed. Tools Appl. 2019, 78, 8603–8633. [Google Scholar] [CrossRef]
- Nyeem, H.; Boles, W.; Boyd, C. Digital Image Watermarking: Its Formal Model, Fundamental Properties and Possible Attacks. EURASIP J. Adv. Signal Process 2014, 135, 1–22. [Google Scholar] [CrossRef] [Green Version]
- Chitra, K.; Venkatesan, V.P. Spatial Domain Watermarking Technique: An Introspective Study. In Proceedings of the International Conference on Informatics and Analytics, Pondicherry, India, 25–26 August 2016; pp. 1–6. [Google Scholar]
- Varshney, Y. Attacks on Digital Watermarks: Classification, Implications, Benchmarks. Int. J. Emerg. Technol. 2017, 8, 229–235. [Google Scholar]
- Lin, C.; Wu, M.; Bloom, J.A.; Cox, I.J.; Miller, M.L.; Lui, Y.M. Rotation, Scale, and Translation Resilient Watermarking for Images. IEEE Trans. Image Process. 2001, 10, 767–782. [Google Scholar] [CrossRef]
- Dittmann, J.; Wohlmacher, P.; Nahrstedt, K. Using Cryptographic and Watermarking Algorithms. IEEE Multimed. 2001, 8, 54–65. [Google Scholar] [CrossRef]
- Kutter, M.; Voloshynovskiy, S.V.; Herrigel, A. Watermark Copy Attack. Available online: http://www.alpvision.com/pdf/ei2000_ol.pdf (accessed on 16 February 2020).
- Soman, K.P.; Ramachandran, K.I. Insight into Wavelets, from Theory to Practice, 3rd ed.; PHI Learning: Delhi, India, 2010. [Google Scholar]
- Sara, U.; Akter, M.; Uddin, M.S. Image Quality Assessment through FSIM, SSIM, MSE, and PSNR-A Comparative Study. J. Comput. Commun. 2019, 7, 8–18. [Google Scholar] [CrossRef] [Green Version]
Used Techniques | Factors | Results | Applications |
---|---|---|---|
Hybrid transform domain and Particle Swarm Optimization (PSO) algorithm [15] | Imperceptibility and robustness | Performs better than existing methods | Image Authentication |
APBT-based algorithm and SVD [22] | Imperceptibility and robustness | Better imperceptibility and good robustness | Authenticity and integrity of copyright protection |
DWT, APDCBT, and SVD [23] | Imperceptibility and robustness | Performs better than existing methods | Copyright protection |
Spatial domain technique [30] | Robustness and computational complexity | Guarantees of security and robustness | Protection of Microscopy Images |
BPNN [40] | Robustness, security, and capacity | Better robustness and security | Protection of digital contents |
DWT, DCT, and SVD [41] | Robustness, imperceptibility, capacity, and security | Acceptable visual quality for diagnosis | Healthcare |
Lifting and companding [42] | Imperceptibility, capacity, and security | Performs better than existing reversible watermarking techniques | DICOM images |
Requirements | Applications |
---|---|
Imperceptibility | Copyright protection and fingerprinting. |
Robustness | Copyright protection, content authentication, and integrity verification. |
Security | Copyright protection, data authentication, fingerprinting and tracking to digital contents, indexing, medical applications, and telemedicine data exchange. |
Capacity | Tamper detection and integrity of medical images. |
Computational cost | Protection of microscopy images. |
False positive | Copy control and ownership. |
Watermark keys | Copyright protection. |
Tamper resistance | Authenticity and copyright integrity. |
Reversibility | Medical applications. |
Used Techniques | Image Type | Image Size (pixels) (Host Image and Watermark Image Respectively) | Factors | Advantages | Limitations | Applications |
---|---|---|---|---|---|---|
LSB Modification [64] | Color | 512 × 512, 64 × 64 | Robustness | High quality of the watermarked image -High robustness to attacks -Good PSNR (47.6dB) -Fast speed | The worst scenario for having no difference between the host image and the watermark image -Only B component is used for embedding color | Copyright protection |
LSB hash algorithm [65] | - | - | Capacity | Extract watermark data effectively | Less robust to various attacks | Histogram analysis, Hamming distance |
ISB [66] | Grayscale | 256 × 256, 90 × 90 | Robustness | Improve robustness -Minimum distortion of the watermarked image | Less Robust against geometric attacks, like scaling, rotation, filtering, and cropping. | Image authentication |
DISB [67] | Grayscale | 256 × 256, - | Robustness, Capacity | Better NCC values -Better robustness than LSB -PSNR > 30 dB -Improves capacity over ISB | Less Robust against geometric attacks, like scaling and rotation. -Limited to one pixel | Image authentication |
ISB [69] | Grayscale | 256 × 256, 90 × 90 | watermarked image quality | Improved robustness based on the NCC and PSNR values - Robust against blurring, filtering, compression, and noise. | Less Robust against geometric attacks, like scaling and rotation. | Image authentication |
Generalized patchwork [74] | - | - | Robustness | Better robustness against compression attacks | Not robust against random bend attacks | Used for large areas of random texture image |
DCT and hash key [77] | - | 512 × 512, 64 × 64 | Robustness and security | Robust against common image processing operations -Secure | Fragile in case of tampering | Image authentication |
DCT [12] | Grayscale | 512 x 512, 64 × 64 | High capacity and robustness | Capable of embedding 4096 bits -Robust against Gaussian low pass filter and JPEG compression | Less Robust against geometric attacks, like scaling, rotation, filtering, and cropping. -Less imperceptible | Image authentication |
DCT and CRT [79] | Grayscale | 512 × 512, 64 × 64 or 128 × 64 | Robustness, imperceptibility, and security | Less computational complexity than SVD-Improves security -Robust to JPEG compression attacks, brightening, and sharpeningeffects | Less robust to tampering attack | Image authentication |
DCT and linear interpolation [81] | Color | 256 × 256, 256 × 256 | Robustness | Robust against rotational attacks, noising attacks, JPEG compression attacks, and median filtering attacks | Complex | Integrity verification, tamper detection, image authentication, copyright protection |
DCT and repetition code [82] | Color | 512 × 512, 64 × 64 | Robustness, imperceptibility | Higher PSNR value, -Better robustness against filtering, noising and geometric attacks | Higher computational complexity | Copyright ownership |
DCT and fractal encoding [83] | Grayscale | 1024 × 1024, 256 × 256 | Robustness | Better robustness, -Good PSNR, -Improves security | Higher computational complexity | Copyright ownership |
DCT, DE-KELM, andentropy [84] | Grayscale | 512 × 512, 32 × 32 | Watermarked image quality, robustness, imperceptibility | Preserves watermarked image quality, -Robust against JPEG compression, filtering, and histogram equalization, -Better PSNR values | Not robust against rotation attack, -Low payload capacity | Medical imaging |
Integer DCT, non-linear chaotic map, and DSR [85] | Grayscale | 256 × 256, 256 × 256 | Robustness, imperceptibility | Solves false positive detection problem, -Better robustness against geometric and non-geometric attacks | Less robust against histogram equalization and wrapping | Image authentication |
DCT, Arnold transform, and chaotic encryption [24] | Grayscale and color | 512 × 512, 64 × 64 | Robustness, imperceptibility, Payload capacity | Robust against JPEG compression, rotation, cropping, Gaussian noise, filtering, and combined attacks, -Highly secure | Less robust against cropping operation | Copyright protection and ownership verification |
SCDFT and QFT [87] | Color | 512 × 480, - | Robustness, imperceptibility | Robust against geometric transformations, Gaussian noise, and image enhancement, -Maximizes imperceptibility | Not robust against JPEG compression and color conversion, -Higher computational complexity | Copy control and transaction tracking |
DFT [88] | Bitmap | 512 × 512, - | Quality of watermarked image | Minimizes quality degradation of watermarked image, -Robust against amplitude modulation, PS, half-toning, PC, and attacks from the StirMark benchmark software, -Low complexity | Less robust against cropping | Image authentication |
DFT [89] | DICOM Grayscale | 512 × 512 × 8 bits, - | Robustness -Quality of watermarked image -Payload capacity | Robust against JPEG compression, sharpening, filtering, and Gaussian noise, -Robust against geometric attacks, like rotation and scaling - Avoids the detachment problem -Better imperceptibility -Good PSNR | Not capable of restoring the EPR data to their original text format | Medical image management |
QDFT and log- polar transform [90] | Color | 512 × 384 or 384 × 512, - | Robustness, Security | Robust against large angle rotation operations, JPEG compression, average and median filtering, and brightness adjustment, -Secured | Not robust against a type of tampering | Content authentication |
DFT [91] | Color | 256 × 256, - | Robustness, Image quality | Robust against filtering, Blurring, sharpness, and Gamma noise | Not robust against geometric operations | Copyright protection and authenticity |
DFT and Chaotic system [92] | Grayscale | 256 × 256, 50 × 50 | Robustness, security | Robust against JPEG compression, cropping, and noise | Less robust against rotation operation,-Complex to compute | Cryptology |
DWT [97] | Grayscale | 256 × 256, 32 × 32 | Robustness, imperceptibility | Robust against salt-and-pepper noise, JEPG compression, rotation, and median filtering -Good imperceptibility, -PSNR = 89.1481, NC = 1.0000 | Not robust against cropping | Content authentication |
DWT [98] | Color and Grayscale | Color 512 × 512, Grayscale 256 × 256 | Robustness, image quality | Robust against Gaussian noise, salt- and-pepper noise, speckle noise, and brightness | Less robust against transformation operation | Copyright protection and owner information |
DWT and QR Decomposition [99] | Color | 512 × 512, 32 × 32 | Robustness, imperceptibility | Robust against compression, cropping, filtering, and noise adding, -Better imperceptibility, | Less robust against salt-and-pepper noise and cropping | Copyright protection |
DWT and chaotic system [100] | Grayscale | 512 × 512, - | Robustness, security | Secured against statistical attacks | Complex | Microcontroller circuits’ |
DWT and encryption [101] | Color and Grayscale | Color 228 × 228, Grayscale 90 × 90 | Robustness, imperceptibility | Robust against rotation, JPEG compression, and salt- and-pepper noise, -Better imperceptibility, -PSNR >50 dB | Not robust against cropping, scaling, and other transformations | Copyright protection, content authentication |
DWT and Haar wavelet [102] | Color | 256 × 256, 64 × 64 | Robustness, imperceptibility | Robust against lossy compression and Gaussian noise | Complex | Security of image information |
SVD [104] | Grayscale | 512 × 512, 32 × 32 | Robustness, image quality, security | Robust against JPEG compression, Gaussian noise, sharpening, and cropping, -Preserves image quality | Not robust against rotation and scaling | Ownership identification |
SVD [105] | Color and Grayscale | 256 × 256, 256 × 256 | Robustness, security | Robust against Gaussian noise, Salt-and-pepper noise, motion blur, median filtering, and JPEG compression | Not robust against rotation, cropping, and scaling | Digital security of an image |
SVD and Redistributed image normalization [106] | Grayscale | 512 × 512, 64 × 64 | Robustness and security | Solves false positive detection problem, -Better robustness and imperceptibility | Does not work for color images | Ownership identification, medical image watermarking, and fingerprinting |
SVD and Homomorphic Transform [107] | Grayscale | 512 × 512, 512 × 512 | Robustness and imperceptibility | Robust against large rotation, cropping, scaling, JPEG compression, salt- and-pepper noise, Gaussian noise, andaverage filtering | Low capacity of data embedding, - Major changes in singular values due to small changes in image | Digital security of an image |
Attacks | Cost |
---|---|
Active | |
Passive | |
Removal | |
Geometric | |
Protocol | |
Cryptographic |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Begum, M.; Uddin, M.S. Digital Image Watermarking Techniques: A Review. Information 2020, 11, 110. https://doi.org/10.3390/info11020110
Begum M, Uddin MS. Digital Image Watermarking Techniques: A Review. Information. 2020; 11(2):110. https://doi.org/10.3390/info11020110
Chicago/Turabian StyleBegum, Mahbuba, and Mohammad Shorif Uddin. 2020. "Digital Image Watermarking Techniques: A Review" Information 11, no. 2: 110. https://doi.org/10.3390/info11020110
APA StyleBegum, M., & Uddin, M. S. (2020). Digital Image Watermarking Techniques: A Review. Information, 11(2), 110. https://doi.org/10.3390/info11020110