Abstract
This survey presents a brief discussion of different aspects of digital image watermarking. Included in the present discussion are these general concepts: major characteristics of digital watermark, novel and recent applications of watermarking, different kinds of watermarking techniques and common watermark embedding and extraction process. In addition, recent state-of-art watermarking techniques, potential issues and available solutions are discussed in brief. Further, the performance summary of the various state-of-art watermarking techniques is presented in tabular format. This survey contribution will be useful for the researchers to implement efficient watermarking techniques for secure e-governance applications.
Similar content being viewed by others
References
Abbas NH, Ahmad SMS, Ramli ARB, Parveen S (2016)A multi-purpose watermarking scheme based on hybrid of lifting wavelet transform and Arnold transform. International conference on multidisciplinary in IT and communication science and applications
Aherrahrou N, Tairi H (2013) A new robust watermarkingscheme based on PDE decomposition in computer systems and applications (AICCSA). 2013 ACS International Conference on, IEEE, p 1–5
Akhaee A, Sahraeian SM, Marvasti F (2010) Contourlet-based imagewatermarking using optimum detector in noisy environment. IEEE Trans Image Process 19(4):700–715
Akhaee M, Sahraeian S, Jin C (2011) Blind image watermarking usinga sample projection approach. IEEE Trans Inf Forensics Secur 6(3):883–893
Ali M, Ahn CW, Pant M (2017) An efficient lossless robust watermarking scheme by integrating redistributed invariant wavelet and fractional Fourier transforms. Multimed Tool Appl 1–23. https://doi.org/10.1007/s11042-017-4815-6
Amini M, Ahmad MO, Swamy MNS (2017) Digital watermark extraction in wavelet domain using hidden Markov model. Multimed Tool Appl 76(3):3731–3749
Ansari IA, Pant M (2017) Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn Lett 94:228–236
Ansari A, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239
Badshah G, Liew SC, Zain JM, Ali M (2016) Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. J Digit Imaging 29(2):216–225
Bas P, Chassery JM, Macq B (2002) Geometrically invariant watermarking using feature points. IEEE Transaction Using Image Processing 11(9):1014–1028
Bhatnagar G, Wu QM, Atrey PK (2013) Secure randomized image watermarking based on singular value decomposition. ACM Trans Multimed Comput Commun Appl 10(1):1–21
Cai-yin W, Xiang-wei K, Chao L (2017) Process color watermarking: the use of visual masking and dot gain correction. Multimed Tool Appl 76(15):16291–16314
Cao X, Fu Z, Sun X (2016) A privacy-preserving outsourcing data storage scheme with fragile digital watermarking-based data auditing. J Electr Comput Eng 2016(2016):1–7
Chang CS, Shen JJ (2017) Features classification Forest: a novel development that is adaptable to robust blind watermarking techniques. IEEE Trans Image Process 26(8):3921–3935
Chang CC, Fan YH, Tai WL (2008) Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 41(2):654–661
Chen CH, Tang YL, Wang CP (2014) A robust watermarking algorithm based on salient image features. Optik-International Journal for Light and Electron Optics 125(3):1134–1140
Chen F, He H, Tai HM, Wang H (2014) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Tool Appl 72(1):41–56
Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann, Burlington
Deng C, Gao X, Li X, Tao D (2009) A local Tchebichef moments-based robust image watermarking. Signal Process 89(8):1531–1539
Deng C, Li J, Gao X (2010) Geometric attacks resistant image watermarking in affine covariant regions. Acta Automat Sin 26(2):221–228
Dorairangaswamy MA (2009) A novel invisible and blind watermarking scheme for copyright protection of digital images. IJCSNS International Journal of Computer Science and Network Security 9(4):71–78
Eggers JJ, Girod B (2001) Blind watermarking applied to image authentication. In: Acoustics, Speech, and Signal Processing, 2001. Proceedings (ICASSP'01). 2001 I.E. International Conference on Vol. 3, IEEE, p 1977–1980
Gao X, Deng C, Li X, Tao D (2010) Geometric attacks resistant image watermarking in affine covariant regions. IEEE Trans Syst Man Cybern Part C Appl Rev 40(3):278–286
Ghazvini M, Hachrood EM, Mirzadi M (2017) An improved image watermarking method in frequency domain 12(2):260–275
Ghebleh M, Kanso A, Own HS (2014) A blind chaos-basedwatermarking technique. Security and Communication Network 4(7):800–811
Gunjal BL, Mali SN (2015) MEO based secured, robust, high capacity and perceptual quality image watermarking in DWT-SVD domain. Springer Plus 4(1):126
Hamghalam M, Mirzakuchaki S, Akhaee MA (2013) Robust imagewatermarking using dihedral angle based maximum-likelihood detector. IET Image Process 7(5):451–463
Horng SJ, Rosiyadi D, Fan P, Wang X, Khan MK (2013) An adaptive watermarking scheme for e-government document images. Multimed Tool Appl 72(3):3085–3103
Horng SJ, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24(7):1099–1105
Hsia SC, Jou IC, Hwang SM (2002) A gray level watermarking algorithm using double layer hidden ICE TRANSACTIONS on fundamentals of electronics. Communications and Computer Sciences 85(2):436–471
Hu Y, Kwong S, Huang J (2006) An algorithm for removable visible watermarking. IEEE Trans Circuits Syst Video Technol 16(1):129–133
Huo Y, He H, Chen F (2012) Alterable-capacity fragile watermarking scheme with restoration capability. Opt Commun 285(7):1759–1766
Jamal SS, Khan MU, Shah T (2016) A watermarking technique with chaotic fractional S-box transformation. Wirel Pers Commun 90(4):2033–2049
Ji F, Deng C, An L, Huang D (2013) Desynchronization attacks resilient image watermarking scheme based on global restoration and local embedding. Neuro Computing 106:42–50
Kalantari NK, Ahadi SM (2010) A logarithmic quantization index modulation for perceptually betterdata hiding. IEEE Trans Image Process 19(6):1504–1517
Kang SI, Lee IY (2006) A study on the electronic voting system using blind signature for anonymity. In hybrid information technology. ICHIT'06 International Conference on Vol. 2, IEEE, p 660–663
Kumar B, Singh HV, Singh SP, Mohan A (2008) Novel efficient and secure medical data transmission on WIMAX. Telemedicine and e-Health 14(10):1063–1069
Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063
Lee WB, Chen TH (2002) A public verifiable copy protection technique for still images. J Syst Softw 62(3):195–204
Lei B, Zhao X, Lei H, Ni D, Siping C, Zhou F, Wang T (2017) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimed Tools Appl 1–23. https://doi.org/10.1007/s11042-017-4743-5
Liao X, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform. Multimed Tool Appl pp. 1–15
Liu XL, Lin CC (2016) Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2016.2633878
Liu N, Zhang Y, Chen Z, Zhang S (2009) Chaos-based semi-blind watermarking for CAD models. In: Intelligent systems, 2009. GCIS'09. WRI global congress on vol. 3, IEEE, p 411–414
Liu N, Li H, Dai H, Guo D, Chen D (2015) Robust blind image watermarking based on chaotic mixtures. Nonlinear Dyn 80(3):1329–1355
Lu CS, Huang SK, Sze CJ, Mark Liao HY (2001) A new watermarking technique for multimedia protection. In: Guan L, Kung SY, Larsen J (eds). Multimedia image and video processing. CRC Press, pp. 507–530
Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking usinginterpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193
Lusson F, Bailey K, Leeney M, Curran K (2013) A novel approach to digital watermarking, exploiting colour spaces. Signal Process 93(5):1268–1294
Maheswari S, Rameshwaran K, Malarselvi KM (2015) DCT-PCA based watermarking on E-governance documents. Res J Appl Sci Eng Technol 9(7):507–511
Mingzhi C, Yan L, Yajian Z, Min L (2013) A combined DWT and DCT watermarkingscheme optimized using genetic algorithm. J Multimed 8(3):299–305
Mohanty SP (1999) Digital watermarking: A tutorial review. URL: http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey1999Mohanty.pdf
Mohanty SP, Sengupta A, Guturu P, Kougianos E (2017) Everything you want to know about watermarking: from paper marks to hardware protection: from paper marks to hardware protection. IEEE Consumer Electronics Magazine 6(3):83–91
Mostafa SA, El-Sheimy N, Tolba AS, Abdelkader FM, Elhindy HM (2010) Wavelet packets-based blind watermarking for medical image management. Open Biomed Eng J 4:93–98
Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714–729
Naheed T, Usman I, Khan TM, Dar AH, Shafique MF (2014) Intelligent reversible watermarking technique in medical images using GA and PSO. Optik-International Journal for Light and Electron Optics 125(11):2515–2525
Nazari M, Sharif A, Mollaeefar M (2016) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tool Appl 76(15):16107–16123
Neena PM, Bijlani K (2015) Copyright protection for E-learning videos using digital watermarking. In: 2015 fifth international conference onAdvances in computing and communications (ICACC), Kochi, pp 447–450
Nezhadarya E, Wang ZJ, Ward RK (2011) Robust image watermarking based on multiscale gradientdirection quantization. IEEE Trans Inf Forensics Secur 6(4):1200–1213
Niu XM, Lu ZM, Sun SH (2000) Digital watermarking of still images with gray-level digital watermarks. IEEE Trans Consum Electron 46(1):137–145
Niu PP, Wang X-Y, Liu Y-N, Yang H-Y (2016) A robust color image watermarking using local invariant significant bitplanehistogram. Multimed Tool Appl 76(3):3403–3433
Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Process 20(6):1597–1611
Rahman MM, Ahammed MS, Ahmed MR, Izhar MN (2017) A semi blind watermarking technique for copyright protection of image based on DCT and SVD domain. Glob J Res Eng 16(7):1–9
Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal Process 92(6):1480–1491
Ren Y., Shen J., Wang J., Xu J. and Fang L. (2014) “Security data auditing based on multifunction digital watermark for multimedia file in cloud storage”, International Journal of Multimedia and Ubiquitous Engineering, Vo. 9, No 9, pp. 231–240
Rosiyadi D, Horng SJ, Fan P, Wang X, Khan MK, Pan Y (2012) Copyright protection for e-government document images. IEEE Multimedia 19(3):62–73
Run RS, Horng SJ, Lai JL, Kao TW, Chen RJ (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673–689
Sadreazami H, Ahmad MO, Swamy MNS (2016) Multiplicative watermark decoder in Contourlet domain using the normal inverse Gaussian distribution. IEEE Trans Multimedia 18(2):196–207
Sayahi I, Elkefi A, Amar CB (2016) Blind watermarking algorithm based on spiral scanning method and error-correcting codes. Multimed Tool Appl 76(15):16439–16462
Seo JS, Yoo CD (2004) Localized image watermarking based on feature points of scale- space representation. Pattern Recogn Lett 37(7):1365–1375
Seo JS, Yoo CD (2006) Image watermarking based on invariant regions of scale-space representation. IEEE transaction On Signal Processing 54(4):1537–1549
Sharma A, Singh AK, Kumar P (2017) Combining Haar wavelet and KarhunenLoeve transforms for robust and imperceptible data hiding using digital images. J Intell Syst. https://doi.org/10.1515/jisys-2017-0032
Shieh JM, Lou DC, Chang MC (2006) A semi-blind digital watermarking scheme based on singular value decomposition. Computer Standards & Interfaces 28(4):428–440
Singh HV, Rai S, Mohan A, Singh SP (2011) Robust copyright marking using weibull distribution. Comput Electr Eng 37(5):714–728
Singh AK, Dave M, Mohan A (2014) Wavelet based image watermarking: futuristic Conceptsin information security. Proc Natl Acad Sci, India, Sect A 84(3):345–359
Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine. Int J Electron Secur Digit Forensics 6(4):285–305
Singh HV, Singh AK, Yadav S, Mohan A (2014) DCT based secure data hiding for intellectual property right protection. CSI transactions on ICT 2(3):163–168
Singh AK, Dave M, Mohan A (2015) Robust and secure multiple watermarking in wavelet domain. Journal of Medical Imaging and Health Informatics 5(2):406–414
Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5(3):607–614
Singh AK, Kumar B, Dave M, Mohan A (2015a) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415–1433
Singh AK, Kumar B, Dave M, Ghrera SP, Mohan A (2016) Digital image watermarking: techniques and emerging applications. In: Handbook of research on modern cryptographic solutions for computer and cyber security 2016, IGI global, USA pp 246–272
Singh S, Rathore VS, Singh R, Singh MK (2017) Hybrid semi-blind image watermarking in redundant wavelet domain. Multimed Tool Appl 76(18):19113–19137
Singh S, Rathore VS, Singh R (2017) Hybrid NSCT domain multiple watermarking for medical images. Multimed Tool Appl 76(3):3557–3575
Srivastava A, Saxena P (2013) DWT-DCT-SVD based semi-blind image watermarking using middle frequency band. IOSR Journal of Computer Engineering 12(2):63–66
Su Q, Niu Y, Zou H, Liu X (2013) A blind dual color images watermarking based on singular value decomposition. Appl Math Comput 219(16):8455–8466
Su Q, Niu Y, Wang QJ, Sheng GA (2013) A Blind colorimage watermarking based on DC component in the spatialdomain. Optik-International Journal for Light and Electron Optics Optik 124(23):6255–6260
Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94:219–235
Tang CW, Hang HM (2003) A feature-based robust digital image watermarking scheme. IEEE Transaction Using Signal Processing 51(4):950–959
Thakkar FN, Srivastava VK (2016) A fast watermarking algorithm with enhanced security using compressive sensing and principle components and its performance analysis against a set of standard attacks. Multimed Tool Appl 76(14):15191–15219
Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308
Wang SH, Lin YP (2004) Wavelet tree quantization for copyright protection watermarking. IEEE Trans Image Process 13(2):154–165
Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn Lett 34(3):671–683
Wang Y, Doherty J, Dyck RV (2002) A wavelet-based watermarking algorithm forownership verification of digital images. IEEE Trans Image Process 11(2):77–88
Wang XY, Niu PP, Yang HY, Chen LL (2012b) Affine invariant image watermarking using intensityprobability density-based Harris Laplace detector. J Vis Commun Image Represent 23(6):892–907
Wang S, Zheng D, Zhao J, Tam WJ, Speranza F (2014) Adaptive watermarking and tree structure based image quality estimation. IEEE Trans Multimedia 6(2):331–324
Wang J, Lian S, Shi YQ (2017) Hybrid multiplicative multi-watermarking in DWT domain. Multidim Syst Sign Process 28(2):617–636
Wu X, Hu J, Gu Z, Huang J (2005) A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters. In: proceedings of the 2005 Australasian workshop on grid computing and e-research- vol. 44, Australian Computer Society, Inc., p 75–80
Xiao D, Cai H, Wang Y (2015) High-capacity separable data hiding in encrypted image based on compressive sensing. Multimed Tool Appl 75(21):13779–13789
Xiao D, Deng M, Zhu X (2015) A reversible image authentication scheme based on compressive sensing. Multimed Tool Appl 74(18):7729–7752
Yang H, Yin J (2015) A secure removable visible watermarking for BTC compressed images. Multimed Tool Appl 74(6):1725–1739
Yang Y, Sun X, Yang H, Li CT (2008) Removable visible image watermarking algorithm in the discrete cosine transform domain. J Electron Imaging 17(3):033008-1–033008-11
Yin Z, Luo B, Hong W (2014) Separable and error-free reversible data hiding in encrypted image with high payload. Sci World J 604876:1–8
Yuan Y, Huang D, Liu D (2006) An integer wavelet basedmultiple logo-watermarking scheme. Computer and Computational Sciences, First International Multi-Symposiums on Computer and Computational Sciences, Hanzhou 2:175–179
Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258
Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826–832
Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Transaction Using Image Processing 20(2):485–495
Zhang L, Gao Y, Xia Y, Dai Q, Li X (2015) A fine-grained image categorization system by Cellet-encodedspatial pyramid modeling. IEEE Trans Ind Electron 62(1):564–571
Zhu X, Ding J, Dong H, Hu K, Zhang X (2014) Normalized correlation-based quantization modulation for robust watermarking. IEEE Trans Multimedia 16(7):1888–1904
Zhu XS, Sun Y, Meng QH, Sun B, Wang P, Yang T (2016) Optimal watermark embedding combining spread spectrum and quantization. EURASIP Journal on Advances in Signal Processing 1:74
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kumar, C., Singh, A.K. & Kumar, P. A recent survey on image watermarking techniques and its application in e-governance. Multimed Tools Appl 77, 3597–3622 (2018). https://doi.org/10.1007/s11042-017-5222-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5222-8