An Overview of Robust Digital Image Watermarking

被引:38
作者
Verma, Vivek Singh [1 ]
Jha, Rajib Kumar [2 ]
机构
[1] Indian Inst Informat Technol, Dept Elect & Commun Engn, Jabalpur 482005, India
[2] Indian Inst Technol, Dept Elect Engn, Patna 800013, Bihar, India
关键词
Comparative analysis; Image authentication; Image watermarking; Quantitative analysis; Robustness; Survey; DISCRETE WAVELET TRANSFORM; INVISIBLE WATERMARKING; SIGNIFICANT DIFFERENCE; COPYRIGHT PROTECTION; LIFTING SCHEME; SVD; AUTHENTICATION; CONSTRUCTION; ALGORITHM; RECOVERY;
D O I
10.1080/02564602.2015.1042927
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a thorough literature review of robust digital image watermarking applied in diverse applications. Researchers have already done lots of noteworthy work in the field of digital image watermarking. Even though, it is interesting to point out that current methods designed for image integrity may not be perfect. Therefore, the main aim of this paper is to offer a comprehensive reference source to the researchers involved in the design of robust digital image watermarking schemes, regardless of particular application areas. In this article, classification of various watermarking schemes with their properties and applications in the different domain is studied. The general structure of watermarking system, different quantitative matrices, and various categories of attacks are also discussed in this survey. The comparative and quantitative analysis of various watermarking schemes in the different domain will help the researchers in a quick review of existing algorithms.
引用
收藏
页码:479 / 496
页数:18
相关论文
共 72 条
[1]  
[Anonymous], ELECT COMMUN JAPAN 2
[2]  
[Anonymous], 2008, DIGITAL WATERMARKING
[3]  
[Anonymous], DICTA 93
[4]  
[Anonymous], THESIS DELFT U TECHN
[5]   An optimal robust digital image watermarking based on SVD using differential evolution algorithm [J].
Aslantas, Veysel .
OPTICS COMMUNICATIONS, 2009, 282 (05) :769-777
[6]   Copyright protection of digital images by embedded unperceivable marks [J].
Barni, M ;
Bartolini, F ;
Cappellini, V ;
Piva, A .
IMAGE AND VISION COMPUTING, 1998, 16 (12-13) :897-906
[7]   Image authentication techniques for surveillance applications [J].
Bartolini, F ;
Tefas, A ;
Barni, M ;
Pitas, I .
PROCEEDINGS OF THE IEEE, 2001, 89 (10) :1403-1418
[8]   Robust watermarking using fractional wavelet packet transform [J].
Bhatnagar, G. ;
Raman, B. ;
Wu, Q. M. J. .
IET IMAGE PROCESSING, 2012, 6 (04) :386-397
[9]   A new robust reference watermarking scheme based on DWT-SVD [J].
Bhatnagar, Gaurav ;
Raman, Balasubramanian .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) :1002-1013
[10]   Copy protection for DVD video [J].
Bloom, JA ;
Cox, IJ ;
Kalker, T ;
Linnartz, JPMG ;
Miller, ML ;
Traw, CBS .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1267-1276