Skip to main content
Log in

A recent survey on image watermarking techniques and its application in e-governance

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This survey presents a brief discussion of different aspects of digital image watermarking. Included in the present discussion are these general concepts: major characteristics of digital watermark, novel and recent applications of watermarking, different kinds of watermarking techniques and common watermark embedding and extraction process. In addition, recent state-of-art watermarking techniques, potential issues and available solutions are discussed in brief. Further, the performance summary of the various state-of-art watermarking techniques is presented in tabular format. This survey contribution will be useful for the researchers to implement efficient watermarking techniques for secure e-governance applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abbas NH, Ahmad SMS, Ramli ARB, Parveen S (2016)A multi-purpose watermarking scheme based on hybrid of lifting wavelet transform and Arnold transform. International conference on multidisciplinary in IT and communication science and applications

  2. Aherrahrou N, Tairi H (2013) A new robust watermarkingscheme based on PDE decomposition in computer systems and applications (AICCSA). 2013 ACS International Conference on, IEEE, p 1–5

  3. Akhaee A, Sahraeian SM, Marvasti F (2010) Contourlet-based imagewatermarking using optimum detector in noisy environment. IEEE Trans Image Process 19(4):700–715

    MATH  Google Scholar 

  4. Akhaee M, Sahraeian S, Jin C (2011) Blind image watermarking usinga sample projection approach. IEEE Trans Inf Forensics Secur 6(3):883–893

    Google Scholar 

  5. Ali M, Ahn CW, Pant M (2017) An efficient lossless robust watermarking scheme by integrating redistributed invariant wavelet and fractional Fourier transforms. Multimed Tool Appl 1–23. https://doi.org/10.1007/s11042-017-4815-6

    Google Scholar 

  6. Amini M, Ahmad MO, Swamy MNS (2017) Digital watermark extraction in wavelet domain using hidden Markov model. Multimed Tool Appl 76(3):3731–3749

    Google Scholar 

  7. Ansari IA, Pant M (2017) Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn Lett 94:228–236

    Google Scholar 

  8. Ansari A, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239

    Google Scholar 

  9. Badshah G, Liew SC, Zain JM, Ali M (2016) Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. J Digit Imaging 29(2):216–225

    Google Scholar 

  10. Bas P, Chassery JM, Macq B (2002) Geometrically invariant watermarking using feature points. IEEE Transaction Using Image Processing 11(9):1014–1028

    Google Scholar 

  11. Bhatnagar G, Wu QM, Atrey PK (2013) Secure randomized image watermarking based on singular value decomposition. ACM Trans Multimed Comput Commun Appl 10(1):1–21

    Google Scholar 

  12. Cai-yin W, Xiang-wei K, Chao L (2017) Process color watermarking: the use of visual masking and dot gain correction. Multimed Tool Appl 76(15):16291–16314

    Google Scholar 

  13. Cao X, Fu Z, Sun X (2016) A privacy-preserving outsourcing data storage scheme with fragile digital watermarking-based data auditing. J Electr Comput Eng 2016(2016):1–7

    Google Scholar 

  14. Chang CS, Shen JJ (2017) Features classification Forest: a novel development that is adaptable to robust blind watermarking techniques. IEEE Trans Image Process 26(8):3921–3935

    MathSciNet  MATH  Google Scholar 

  15. Chang CC, Fan YH, Tai WL (2008) Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 41(2):654–661

    MATH  Google Scholar 

  16. Chen CH, Tang YL, Wang CP (2014) A robust watermarking algorithm based on salient image features. Optik-International Journal for Light and Electron Optics 125(3):1134–1140

    Google Scholar 

  17. Chen F, He H, Tai HM, Wang H (2014) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Tool Appl 72(1):41–56

    Google Scholar 

  18. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann, Burlington

    Google Scholar 

  19. Deng C, Gao X, Li X, Tao D (2009) A local Tchebichef moments-based robust image watermarking. Signal Process 89(8):1531–1539

    MATH  Google Scholar 

  20. Deng C, Li J, Gao X (2010) Geometric attacks resistant image watermarking in affine covariant regions. Acta Automat Sin 26(2):221–228

    Google Scholar 

  21. Dorairangaswamy MA (2009) A novel invisible and blind watermarking scheme for copyright protection of digital images. IJCSNS International Journal of Computer Science and Network Security 9(4):71–78

    Google Scholar 

  22. Eggers JJ, Girod B (2001) Blind watermarking applied to image authentication. In: Acoustics, Speech, and Signal Processing, 2001. Proceedings (ICASSP'01). 2001 I.E. International Conference on Vol. 3, IEEE, p 1977–1980

  23. Gao X, Deng C, Li X, Tao D (2010) Geometric attacks resistant image watermarking in affine covariant regions. IEEE Trans Syst Man Cybern Part C Appl Rev 40(3):278–286

    Google Scholar 

  24. Ghazvini M, Hachrood EM, Mirzadi M (2017) An improved image watermarking method in frequency domain 12(2):260–275

  25. Ghebleh M, Kanso A, Own HS (2014) A blind chaos-basedwatermarking technique. Security and Communication Network 4(7):800–811

    Google Scholar 

  26. Gunjal BL, Mali SN (2015) MEO based secured, robust, high capacity and perceptual quality image watermarking in DWT-SVD domain. Springer Plus 4(1):126

    Google Scholar 

  27. Hamghalam M, Mirzakuchaki S, Akhaee MA (2013) Robust imagewatermarking using dihedral angle based maximum-likelihood detector. IET Image Process 7(5):451–463

    Google Scholar 

  28. Horng SJ, Rosiyadi D, Fan P, Wang X, Khan MK (2013) An adaptive watermarking scheme for e-government document images. Multimed Tool Appl 72(3):3085–3103

    Google Scholar 

  29. Horng SJ, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24(7):1099–1105

    Google Scholar 

  30. Hsia SC, Jou IC, Hwang SM (2002) A gray level watermarking algorithm using double layer hidden ICE TRANSACTIONS on fundamentals of electronics. Communications and Computer Sciences 85(2):436–471

    Google Scholar 

  31. Hu Y, Kwong S, Huang J (2006) An algorithm for removable visible watermarking. IEEE Trans Circuits Syst Video Technol 16(1):129–133

    Google Scholar 

  32. Huo Y, He H, Chen F (2012) Alterable-capacity fragile watermarking scheme with restoration capability. Opt Commun 285(7):1759–1766

    Google Scholar 

  33. Jamal SS, Khan MU, Shah T (2016) A watermarking technique with chaotic fractional S-box transformation. Wirel Pers Commun 90(4):2033–2049

    Google Scholar 

  34. Ji F, Deng C, An L, Huang D (2013) Desynchronization attacks resilient image watermarking scheme based on global restoration and local embedding. Neuro Computing 106:42–50

    Google Scholar 

  35. Kalantari NK, Ahadi SM (2010) A logarithmic quantization index modulation for perceptually betterdata hiding. IEEE Trans Image Process 19(6):1504–1517

    MathSciNet  MATH  Google Scholar 

  36. Kang SI, Lee IY (2006) A study on the electronic voting system using blind signature for anonymity. In hybrid information technology. ICHIT'06 International Conference on Vol. 2, IEEE, p 660–663

  37. Kumar B, Singh HV, Singh SP, Mohan A (2008) Novel efficient and secure medical data transmission on WIMAX. Telemedicine and e-Health 14(10):1063–1069

    Google Scholar 

  38. Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063

    Google Scholar 

  39. Lee WB, Chen TH (2002) A public verifiable copy protection technique for still images. J Syst Softw 62(3):195–204

    Google Scholar 

  40. Lei B, Zhao X, Lei H, Ni D, Siping C, Zhou F, Wang T (2017) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimed Tools Appl 1–23. https://doi.org/10.1007/s11042-017-4743-5

  41. Liao X, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform. Multimed Tool Appl pp. 1–15

  42. Liu XL, Lin CC (2016) Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2016.2633878

    Google Scholar 

  43. Liu N, Zhang Y, Chen Z, Zhang S (2009) Chaos-based semi-blind watermarking for CAD models. In: Intelligent systems, 2009. GCIS'09. WRI global congress on vol. 3, IEEE, p 411–414

  44. Liu N, Li H, Dai H, Guo D, Chen D (2015) Robust blind image watermarking based on chaotic mixtures. Nonlinear Dyn 80(3):1329–1355

    Google Scholar 

  45. Lu CS, Huang SK, Sze CJ, Mark Liao HY (2001) A new watermarking technique for multimedia protection. In: Guan L, Kung SY, Larsen J (eds). Multimedia image and video processing. CRC Press, pp. 507–530

  46. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking usinginterpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193

    Google Scholar 

  47. Lusson F, Bailey K, Leeney M, Curran K (2013) A novel approach to digital watermarking, exploiting colour spaces. Signal Process 93(5):1268–1294

    Google Scholar 

  48. Maheswari S, Rameshwaran K, Malarselvi KM (2015) DCT-PCA based watermarking on E-governance documents. Res J Appl Sci Eng Technol 9(7):507–511

    Google Scholar 

  49. Mingzhi C, Yan L, Yajian Z, Min L (2013) A combined DWT and DCT watermarkingscheme optimized using genetic algorithm. J Multimed 8(3):299–305

    Google Scholar 

  50. Mohanty SP (1999) Digital watermarking: A tutorial review. URL: http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey1999Mohanty.pdf

  51. Mohanty SP, Sengupta A, Guturu P, Kougianos E (2017) Everything you want to know about watermarking: from paper marks to hardware protection: from paper marks to hardware protection. IEEE Consumer Electronics Magazine 6(3):83–91

    Google Scholar 

  52. Mostafa SA, El-Sheimy N, Tolba AS, Abdelkader FM, Elhindy HM (2010) Wavelet packets-based blind watermarking for medical image management. Open Biomed Eng J 4:93–98

    Google Scholar 

  53. Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714–729

    Google Scholar 

  54. Naheed T, Usman I, Khan TM, Dar AH, Shafique MF (2014) Intelligent reversible watermarking technique in medical images using GA and PSO. Optik-International Journal for Light and Electron Optics 125(11):2515–2525

    Google Scholar 

  55. Nazari M, Sharif A, Mollaeefar M (2016) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tool Appl 76(15):16107–16123

    Google Scholar 

  56. Neena PM, Bijlani K (2015) Copyright protection for E-learning videos using digital watermarking. In: 2015 fifth international conference onAdvances in computing and communications (ICACC), Kochi, pp 447–450

  57. Nezhadarya E, Wang ZJ, Ward RK (2011) Robust image watermarking based on multiscale gradientdirection quantization. IEEE Trans Inf Forensics Secur 6(4):1200–1213

    Google Scholar 

  58. Niu XM, Lu ZM, Sun SH (2000) Digital watermarking of still images with gray-level digital watermarks. IEEE Trans Consum Electron 46(1):137–145

    Google Scholar 

  59. Niu PP, Wang X-Y, Liu Y-N, Yang H-Y (2016) A robust color image watermarking using local invariant significant bitplanehistogram. Multimed Tool Appl 76(3):3403–3433

    Google Scholar 

  60. Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Process 20(6):1597–1611

    Google Scholar 

  61. Rahman MM, Ahammed MS, Ahmed MR, Izhar MN (2017) A semi blind watermarking technique for copyright protection of image based on DCT and SVD domain. Glob J Res Eng 16(7):1–9

  62. Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal Process 92(6):1480–1491

    Google Scholar 

  63. Ren Y., Shen J., Wang J., Xu J. and Fang L. (2014) “Security data auditing based on multifunction digital watermark for multimedia file in cloud storage”, International Journal of Multimedia and Ubiquitous Engineering, Vo. 9, No 9, pp. 231–240

    Google Scholar 

  64. Rosiyadi D, Horng SJ, Fan P, Wang X, Khan MK, Pan Y (2012) Copyright protection for e-government document images. IEEE Multimedia 19(3):62–73

    Google Scholar 

  65. Run RS, Horng SJ, Lai JL, Kao TW, Chen RJ (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673–689

    Google Scholar 

  66. Sadreazami H, Ahmad MO, Swamy MNS (2016) Multiplicative watermark decoder in Contourlet domain using the normal inverse Gaussian distribution. IEEE Trans Multimedia 18(2):196–207

    Google Scholar 

  67. Sayahi I, Elkefi A, Amar CB (2016) Blind watermarking algorithm based on spiral scanning method and error-correcting codes. Multimed Tool Appl 76(15):16439–16462

    Google Scholar 

  68. Seo JS, Yoo CD (2004) Localized image watermarking based on feature points of scale- space representation. Pattern Recogn Lett 37(7):1365–1375

    MATH  Google Scholar 

  69. Seo JS, Yoo CD (2006) Image watermarking based on invariant regions of scale-space representation. IEEE transaction On Signal Processing 54(4):1537–1549

    MATH  Google Scholar 

  70. Sharma A, Singh AK, Kumar P (2017) Combining Haar wavelet and KarhunenLoeve transforms for robust and imperceptible data hiding using digital images. J Intell Syst. https://doi.org/10.1515/jisys-2017-0032

    Google Scholar 

  71. Shieh JM, Lou DC, Chang MC (2006) A semi-blind digital watermarking scheme based on singular value decomposition. Computer Standards & Interfaces 28(4):428–440

    Google Scholar 

  72. Singh HV, Rai S, Mohan A, Singh SP (2011) Robust copyright marking using weibull distribution. Comput Electr Eng 37(5):714–728

    Google Scholar 

  73. Singh AK, Dave M, Mohan A (2014) Wavelet based image watermarking: futuristic Conceptsin information security. Proc Natl Acad Sci, India, Sect A 84(3):345–359

    MATH  Google Scholar 

  74. Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine. Int J Electron Secur Digit Forensics 6(4):285–305

    Google Scholar 

  75. Singh HV, Singh AK, Yadav S, Mohan A (2014) DCT based secure data hiding for intellectual property right protection. CSI transactions on ICT 2(3):163–168

    Google Scholar 

  76. Singh AK, Dave M, Mohan A (2015) Robust and secure multiple watermarking in wavelet domain. Journal of Medical Imaging and Health Informatics 5(2):406–414

    Google Scholar 

  77. Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5(3):607–614

    Google Scholar 

  78. Singh AK, Kumar B, Dave M, Mohan A (2015a) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415–1433

    Google Scholar 

  79. Singh AK, Kumar B, Dave M, Ghrera SP, Mohan A (2016) Digital image watermarking: techniques and emerging applications. In: Handbook of research on modern cryptographic solutions for computer and cyber security 2016, IGI global, USA pp 246–272

  80. Singh S, Rathore VS, Singh R, Singh MK (2017) Hybrid semi-blind image watermarking in redundant wavelet domain. Multimed Tool Appl 76(18):19113–19137

    Google Scholar 

  81. Singh S, Rathore VS, Singh R (2017) Hybrid NSCT domain multiple watermarking for medical images. Multimed Tool Appl 76(3):3557–3575

    Google Scholar 

  82. Srivastava A, Saxena P (2013) DWT-DCT-SVD based semi-blind image watermarking using middle frequency band. IOSR Journal of Computer Engineering 12(2):63–66

    Google Scholar 

  83. Su Q, Niu Y, Zou H, Liu X (2013) A blind dual color images watermarking based on singular value decomposition. Appl Math Comput 219(16):8455–8466

    MathSciNet  MATH  Google Scholar 

  84. Su Q, Niu Y, Wang QJ, Sheng GA (2013) A Blind colorimage watermarking based on DC component in the spatialdomain. Optik-International Journal for Light and Electron Optics Optik 124(23):6255–6260

    Google Scholar 

  85. Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94:219–235

    Google Scholar 

  86. Tang CW, Hang HM (2003) A feature-based robust digital image watermarking scheme. IEEE Transaction Using Signal Processing 51(4):950–959

    MathSciNet  MATH  Google Scholar 

  87. Thakkar FN, Srivastava VK (2016) A fast watermarking algorithm with enhanced security using compressive sensing and principle components and its performance analysis against a set of standard attacks. Multimed Tool Appl 76(14):15191–15219

    Google Scholar 

  88. Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308

    Google Scholar 

  89. Wang SH, Lin YP (2004) Wavelet tree quantization for copyright protection watermarking. IEEE Trans Image Process 13(2):154–165

    MathSciNet  Google Scholar 

  90. Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn Lett 34(3):671–683

    MATH  Google Scholar 

  91. Wang Y, Doherty J, Dyck RV (2002) A wavelet-based watermarking algorithm forownership verification of digital images. IEEE Trans Image Process 11(2):77–88

    Google Scholar 

  92. Wang XY, Niu PP, Yang HY, Chen LL (2012b) Affine invariant image watermarking using intensityprobability density-based Harris Laplace detector. J Vis Commun Image Represent 23(6):892–907

    Google Scholar 

  93. Wang S, Zheng D, Zhao J, Tam WJ, Speranza F (2014) Adaptive watermarking and tree structure based image quality estimation. IEEE Trans Multimedia 6(2):331–324

    Google Scholar 

  94. Wang J, Lian S, Shi YQ (2017) Hybrid multiplicative multi-watermarking in DWT domain. Multidim Syst Sign Process 28(2):617–636

    MATH  Google Scholar 

  95. Wu X, Hu J, Gu Z, Huang J (2005) A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters. In: proceedings of the 2005 Australasian workshop on grid computing and e-research- vol. 44, Australian Computer Society, Inc., p 75–80

  96. Xiao D, Cai H, Wang Y (2015) High-capacity separable data hiding in encrypted image based on compressive sensing. Multimed Tool Appl 75(21):13779–13789

    Google Scholar 

  97. Xiao D, Deng M, Zhu X (2015) A reversible image authentication scheme based on compressive sensing. Multimed Tool Appl 74(18):7729–7752

    Google Scholar 

  98. Yang H, Yin J (2015) A secure removable visible watermarking for BTC compressed images. Multimed Tool Appl 74(6):1725–1739

    Google Scholar 

  99. Yang Y, Sun X, Yang H, Li CT (2008) Removable visible image watermarking algorithm in the discrete cosine transform domain. J Electron Imaging 17(3):033008-1–033008-11

    Google Scholar 

  100. Yin Z, Luo B, Hong W (2014) Separable and error-free reversible data hiding in encrypted image with high payload. Sci World J 604876:1–8

    Google Scholar 

  101. Yuan Y, Huang D, Liu D (2006) An integer wavelet basedmultiple logo-watermarking scheme. Computer and Computational Sciences, First International Multi-Symposiums on Computer and Computational Sciences, Hanzhou 2:175–179

    Google Scholar 

  102. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258

    Google Scholar 

  103. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826–832

    Google Scholar 

  104. Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Transaction Using Image Processing 20(2):485–495

    MathSciNet  MATH  Google Scholar 

  105. Zhang L, Gao Y, Xia Y, Dai Q, Li X (2015) A fine-grained image categorization system by Cellet-encodedspatial pyramid modeling. IEEE Trans Ind Electron 62(1):564–571

    Google Scholar 

  106. Zhu X, Ding J, Dong H, Hu K, Zhang X (2014) Normalized correlation-based quantization modulation for robust watermarking. IEEE Trans Multimedia 16(7):1888–1904

    Google Scholar 

  107. Zhu XS, Sun Y, Meng QH, Sun B, Wang P, Yang T (2016) Optimal watermark embedding combining spread spectrum and quantization. EURASIP Journal on Advances in Signal Processing 1:74

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, C., Singh, A.K. & Kumar, P. A recent survey on image watermarking techniques and its application in e-governance. Multimed Tools Appl 77, 3597–3622 (2018). https://doi.org/10.1007/s11042-017-5222-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5222-8

Keywords

Navigation