0% found this document useful (0 votes)
71 views17 pages

Digital Image Watermarking Techniques: A Review

Advancements in science and technology have introduced the need to protect data, authenticate data, integrate data, assert ownership, content labelling and security. Digital Watermarking schemes protect all forms of digital data. Digital Image Watermarking can be applied to gray scale, halftone, color, medical and 3D images. The process of watermarking can be broadly classified into three phases namely embedding, attacking, and decoding for typical scenarios. Some of the watermarking schemes adopted in the past include vector quantization, spread spectrum, SVD, DCT, DFT, etc. It was observed that the spread spectrum was more robust and it had also been applied for patenting. In spite of this, the method could not withstand high amplitude noise. Hence, later DCT, DFT and Wavelets were used. These schemes were not robust to collusion attacks. In this review, we have identified the embedding and detection schemes of the existing watermarks over the past decade and analyzed the robustness of each of these methods. The different parameters considered to analyze the performance of the existing watermarking schemes are also discussed. Research under watermarking is a great field of interest involving multimedia security, forensics, data authentication and digital rights protection. This paper will be useful for researchers to implement a robust watermarking scheme.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views17 pages

Digital Image Watermarking Techniques: A Review

Advancements in science and technology have introduced the need to protect data, authenticate data, integrate data, assert ownership, content labelling and security. Digital Watermarking schemes protect all forms of digital data. Digital Image Watermarking can be applied to gray scale, halftone, color, medical and 3D images. The process of watermarking can be broadly classified into three phases namely embedding, attacking, and decoding for typical scenarios. Some of the watermarking schemes adopted in the past include vector quantization, spread spectrum, SVD, DCT, DFT, etc. It was observed that the spread spectrum was more robust and it had also been applied for patenting. In spite of this, the method could not withstand high amplitude noise. Hence, later DCT, DFT and Wavelets were used. These schemes were not robust to collusion attacks. In this review, we have identified the embedding and detection schemes of the existing watermarks over the past decade and analyzed the robustness of each of these methods. The different parameters considered to analyze the performance of the existing watermarking schemes are also discussed. Research under watermarking is a great field of interest involving multimedia security, forensics, data authentication and digital rights protection. This paper will be useful for researchers to implement a robust watermarking scheme.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Digital Image Watermarking Techniques: A Review

Pushpa Mala .S.

[email protected]

Research Scholar, Jain University, Bengaluru, India


& Sambhram Institute of Technology, Bengaluru, India

D. Jayadevappa

[email protected]

Dept. of Electronics & Instrumentation Engineering,


JSS Academy of Technical Education, Bengaluru, India

K.Ezhilarasan

[email protected]

Research Scholar, Jain University, Bengaluru, India


& Sambhram Institute of Technology, Bengaluru, India

Abstract

Keywords:

1. INTRODUCTION

2. FEATURES OF DIGITAL WATERMARKING SCHEMES


Robustness

Imperceptibility

Security

Verifiability
Computational Cost

Watermark Detection

Capacity

Tradeoff

parameters

FIGURE 1:

3. DIGITAL IMAGE WATERMARKING APPROACHES

3.1. Visible and Invisible Watermarking

et.al

3. 2. Private and Public Watermarking


et al.
, was

.
et al.

also

3.3. Robust and Fragile Watermarking

NN
k

l,

Ak

PQ
et al.

ing scheme
the scheme was

3.4. Blind and Non-blind Watermarking


.
Nonblind watermarking schemes access
the host image during the detection phase and are private in nature.
et al.
schemes

et al.

et al.

3.5 Spatial and Frequency Domain Watermarking

4. FREQUENCY DOMAIN WATERMARKING APPROACHES


prior
ample
s

was
was

was

was
of

could be

NN
n
et al.

NN

et al.

88

t C w
X
X u*,v,b X u ,v,b u ,v,b u ,v,b
u ,v,b

if X u ,v,b tuc,v,b
otherwise
X u*,v,b

X u ,v,b

tuc,v ,b

wu ,v,b

t F w
X
X u*,v,l , f X u ,v,l , f l , f u ,v,l , f
u ,v,l , f

if X u ,v,l , f tlF, f
otherwise

u, v

X u , v ,l , f
*

f , X u , v ,l , f
tlF, f

u , v ,l , f

scheme

et al.
T

scheme
et al.
the watermark

scheme
scheme

88

lc-

lc
et al.

lc

lc

et al.

et al.

NN

I k1 , k2

N1 1 N 2 1

i ( n , n )e

n1 0 n2 0

j 2 n1k1 / N1 j 2 n2 k2 / N 2

M (k1 , k2 ) I (k1 , k2 )

P(k1 , k2 )

W (k1 , k2 )

NN

S
UW

A U S VT
S W U W S W VW T
AW U S W V T

W
VW
SW

SW
VW

AW

et al.

et al.

et al.

( x) (2 x e

x /2

where x x 2 y 2

1/ 2

* (k ) k

k k

/2

M x 2 (2 .x * A
Pi , j k M i x .M j x
i

Pi , j ( k )

M i ( x)
i

et al.
M2
l

al

et al.
et al.
et al.

et al.

5. EVALUATING WATERMARKS

5.1. Performance Evaluation Metrics

PSNR

NN
MSE

BER
C
H W

Transform
Adopted

Concept & Details

Results & Summary

SS

DCT
DFT

DWT

Multiwavelets
Contourlets
Ridgelets
Curvelets

Shearlets

TABLE 1:

SSIM
p,q

2
p

c1 2

p
2
p
2
q

2
p

pq

c2

c
2

q respectively

pq

MSE

MSE =

1 p q
N (i, j ) W (i, j )
pq i 1 j 1

p
q
N (i, j )

W (i, j )
5.2. Watermarking Attacks
et al.

1) Compression Attacks

2) Interference Attacks

3) Signal Processing Attacks

4) Geometric Attacks

5) Cryptographic Attacks-

6) Collusion Attacks-

7) Active Attacks

8) Passive Attacks

9) Histogram Equalization attacks

Attack

No Attack

PSNR
TABLE 2:

6. CONCLUSION

7. REFERENCES

Median
Filtering

Salt and
Pepper
Noise

Gaussian
Filter

You might also like