Digital Image Watermarking Techniques: A Review
Digital Image Watermarking Techniques: A Review
D. Jayadevappa
K.Ezhilarasan
Abstract
Keywords:
1. INTRODUCTION
Imperceptibility
Security
Verifiability
Computational Cost
Watermark Detection
Capacity
Tradeoff
parameters
FIGURE 1:
et.al
.
et al.
also
NN
k
l,
Ak
PQ
et al.
ing scheme
the scheme was
et al.
et al.
was
was
was
was
of
could be
NN
n
et al.
NN
et al.
88
t C w
X
X u*,v,b X u ,v,b u ,v,b u ,v,b
u ,v,b
if X u ,v,b tuc,v,b
otherwise
X u*,v,b
X u ,v,b
tuc,v ,b
wu ,v,b
t F w
X
X u*,v,l , f X u ,v,l , f l , f u ,v,l , f
u ,v,l , f
if X u ,v,l , f tlF, f
otherwise
u, v
X u , v ,l , f
*
f , X u , v ,l , f
tlF, f
u , v ,l , f
scheme
et al.
T
scheme
et al.
the watermark
scheme
scheme
88
lc-
lc
et al.
lc
lc
et al.
et al.
NN
I k1 , k2
N1 1 N 2 1
i ( n , n )e
n1 0 n2 0
j 2 n1k1 / N1 j 2 n2 k2 / N 2
M (k1 , k2 ) I (k1 , k2 )
P(k1 , k2 )
W (k1 , k2 )
NN
S
UW
A U S VT
S W U W S W VW T
AW U S W V T
W
VW
SW
SW
VW
AW
et al.
et al.
et al.
( x) (2 x e
x /2
where x x 2 y 2
1/ 2
* (k ) k
k k
/2
M x 2 (2 .x * A
Pi , j k M i x .M j x
i
Pi , j ( k )
M i ( x)
i
et al.
M2
l
al
et al.
et al.
et al.
et al.
5. EVALUATING WATERMARKS
PSNR
NN
MSE
BER
C
H W
Transform
Adopted
SS
DCT
DFT
DWT
Multiwavelets
Contourlets
Ridgelets
Curvelets
Shearlets
TABLE 1:
SSIM
p,q
2
p
c1 2
p
2
p
2
q
2
p
pq
c2
c
2
q respectively
pq
MSE
MSE =
1 p q
N (i, j ) W (i, j )
pq i 1 j 1
p
q
N (i, j )
W (i, j )
5.2. Watermarking Attacks
et al.
1) Compression Attacks
2) Interference Attacks
4) Geometric Attacks
5) Cryptographic Attacks-
6) Collusion Attacks-
7) Active Attacks
8) Passive Attacks
Attack
No Attack
PSNR
TABLE 2:
6. CONCLUSION
7. REFERENCES
Median
Filtering
Salt and
Pepper
Noise
Gaussian
Filter