A Survey: Digital Image Watermarking-Robustness and Imperceptibility

被引:0
作者
Chaudhary, Himanshi [1 ,2 ]
Vishwakarma, Virendra P. [1 ]
机构
[1] Univ Sch Informat, Guru Gobind Singh Indraprastha Univ, Commun & Technol, Sect 16 C, New Delhi, India
[2] KIET Grp Inst, Dept Comp Sci & Engn, Delhi NCR, Ghaziabad, Delhi, India
关键词
Watermarking; robust; DCT; DWT; SVD; attacks; MULTIPLE WATERMARKING; MEDICAL IMAGES; DCT; SCHEME;
D O I
10.2174/0123520965317013240828054013
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the Internet expanding, multimedia security has become a significant problem. As digital image manipulation is getting simpler, the certification of authenticity has become more difficult. Digital watermarking outperforms conventional security methods for protecting photos from attacks. The need for reliable image authentication methods in the contemporary digital era has always been a hot topic among academics and researchers. When transmitting sensitive information today through a regular correspondence route, many hacks are possible. Everyone, therefore, requires their digital data to be non-tampered. Many solutions are available like stenography, cryptography, and watermarking. Watermarking gives promising results when it comes to the authenticity of the images. The robustness and imperceptibility of several existing watermarking techniques are demonstrated in this study and critical analysis is performed. Additionally, the author provides a thorough introduction to key ideas like the transform domain and the spatial domain. This study also offers a thorough analysis of contemporary methods for watermarking digital images while showcasing established practices in various domains. Hence, this research study could potentially serve as a viable resource for researchers seeking to develop effective watermarking techniques for practical applications.
引用
收藏
页数:18
相关论文
共 108 条
[1]  
Abraham J., 2019, Inf. Sci, V31, P125, DOI [10.1016/j.jksuci.2016.12.004, DOI 10.1016/J.JKSUCI.2016.12.004]
[2]  
Ahmad Asma, 2014, International Journal of Computer Network and Information Security, V6, P58, DOI 10.5815/ijcnis.2014.12.07
[3]  
Ahmad M., 2023, Recent Adv. Comp. Sci. Comm, V16, DOI [10.2174/2666255816666230502100729, DOI 10.2174/2666255816666230502100729]
[4]  
AL-Mansoori S, 2012, INT J COMPUT SCI NET, V12, P1
[5]   An FPP-resistant SVD-based image watermarking scheme based on chaotic control [J].
Alshoura, Wafa' Hamdan ;
Zainol, Zurinahni ;
Sen Teh, Je ;
Alawida, Moatsum .
ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (07) :5713-5734
[6]  
Ambadekar Sarita P., 2019, Recent Trends in Signal and Image Processing. ISSIP 2017. Advances in Intelligent Systems and Computing (AISC 727), P187, DOI 10.1007/978-981-10-8863-6_19
[7]  
Amirgholipour S, 2014, INT ARAB J INF TECHN, V11, P178
[8]  
Anand A., 2022, Hybrid nature-inspired optimization and encryption-based watermarking for e-healthcare
[9]   Authenticating and securing healthcare records: A deep learning-based zero watermarking approach [J].
Anand, Ashima ;
Bedi, Jatin ;
Aggarwal, Ashutosh ;
Khan, Muhammad Attique ;
Rida, Imad .
IMAGE AND VISION COMPUTING, 2024, 145
[10]   Compression-Then-Encryption-Based Secure Watermarking Technique for Smart Healthcare System [J].
Anand, Ashima ;
Singh, Amit Kumar ;
Lv, Zhihan ;
Bhatnagar, Guarav .
IEEE MULTIMEDIA, 2020, 27 (04) :133-143