Survey of robust and imperceptible watermarking

被引:106
作者
Agarwal, Namita [1 ]
Singh, Amit Kumar [2 ]
Singh, Pradeep Kumar [1 ]
机构
[1] JUIT, Dept CSE & IT, Solan, HP, India
[2] NIT Patna, Dept CSE, Patna, Bihar, India
关键词
Watermarking; Imperceptible; Robustness; Security; Capacity; DIGITAL IMAGE WATERMARKING; DISCRETE WAVELET TRANSFORM; SINGULAR-VALUE DECOMPOSITION; REVERSIBLE WATERMARKING; SPREAD-SPECTRUM; MULTIPLE WATERMARKING; HYBRID TECHNIQUE; DWT-SVD; SCHEME; ALGORITHM;
D O I
10.1007/s11042-018-7128-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Robustness, imperceptibility and embedding capacity are the preliminary requirements of any watermarking technique. However, research concluded that these requirements are difficult to achieve at same time. In this paper, we review various recent robust and imperceptible watermarking methods in spatial and transform domain. Further, the paper introduces elementary concepts of digital watermarking, characteristics and novel applications of watermark in detail. Furthermore, various analysis and comparison of different notable watermarking techniques are discussed in tabular format. We believe that our survey contribution will helpful for fledgling researchers to develop robust and imperceptible watermarking algorithms for various practical applications.
引用
收藏
页码:8603 / 8633
页数:31
相关论文
共 137 条
[1]   Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network [J].
AL-Nabhani, Yahya ;
Jalab, Hamid A. ;
Wahid, Ainuddin ;
Noor, Rafidah Md .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2015, 27 (04) :393-401
[2]   An optimal image watermarking approach through cuckoo search algorithm in wavelet domain [J].
Ali M. ;
Ahn C.W. .
International Journal of System Assurance Engineering and Management, 2018, 9 (03) :602-611
[3]   Digital Image Watermarking via Adaptive Logo Texturization [J].
Andalibi, Mehran ;
Chandler, Damon M. .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (12) :5060-5073
[4]  
[Anonymous], J SYSTEMS SOFTWARE
[5]  
[Anonymous], 2009, ACM SIGKDD explorations newsletter, DOI 10.1145/1656274.1656278
[6]  
[Anonymous], 2013, INT J COMPUTER TECHN
[7]  
[Anonymous], ELSEVIER
[8]  
[Anonymous], THESIS
[9]  
[Anonymous], 2012, J SOFTW
[10]  
[Anonymous], TIP