Hybrid SVD-Based Image Watermarking Schemes: A Review

被引:47
作者
Alshoura, Wafa' Hamdan [1 ]
Zainol, Zurinahni [1 ]
Teh, Je Sen [1 ]
Alawida, Moatsum [1 ]
Alabdulatif, Abdulatif [2 ]
机构
[1] Univ Sains Malaysia, Sch Comp Sci, Gelugor 11800, Malaysia
[2] Qassim Univ, Coll Comp, Dept Comp Sci, Buraydah 51452, Saudi Arabia
关键词
Watermarking; Transforms; Frequency-domain analysis; Robustness; Digital images; Encryption; Distributed databases; Embedding; extraction; frequency domain; image watermarking; singular-value decomposition (SVD); DISCRETE WAVELET TRANSFORM; SINGULAR-VALUE DECOMPOSITION; OF-THE-ART; DIGITAL IMAGE; MEDICAL IMAGES; DIFFERENTIAL EVOLUTION; DWT-SVD; ROBUST WATERMARKING; COLOR IMAGES; DOMAIN;
D O I
10.1109/ACCESS.2021.3060861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Watermarking is an important technique for protecting sensitive e-multimedia data and intellectual property. Watermarking techniques are used for many applications such as ownership protection, which is a popular area of research as compared to others such as authentication and local temper localization. There are many image watermarking schemes that have been recently published based on the frequency domain as it can fulfill watermarking requirements such as high robustness and imperceptibility. Singular-value decomposition (SVD) is one of them and is used in many frequency transform-based image watermarking schemes due to its stability and mathematical simplicity. However, there are many schemes that lack robustness against malicious cyberattacks, whereby the watermarks are easy to detect and destroy. Consequently, the proposed watermarking schemes became more complicated and cannot resist various geometric and non-geometric attacks. Thus, there are many existing hybrid SVD-based image watermarking schemes found be insecure. As there is also a lack of in-depth reviews in this domain, the focus of this paper is the analysis of the state-of-the-art in hybrid SVD-based image watermarking. We perform efficiency comparisons to highlight various security problems, open issues, and research gaps. Based on our findings, we additionally provide some recommendations for the development of more robust schemes in the future. This paper provides essential information for researchers and practitioners alike to advance the field of image watermarking.
引用
收藏
页码:32931 / 32968
页数:38
相关论文
共 176 条
[1]   Compact storage of medical images with patient information [J].
Acharya, UR ;
Anand, D ;
Bhat, PS ;
Niranjan, UC .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2001, 5 (04) :320-323
[2]   Survey of robust and imperceptible watermarking [J].
Agarwal, Namita ;
Singh, Amit Kumar ;
Singh, Pradeep Kumar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (07) :8603-8633
[3]  
Agung B. W. R., 2012, 2012 IEEE International Conference on Communication, Networks and Satellite (ComNetSat 2012), P167, DOI 10.1109/ComNetSat.2012.6380799
[4]  
Ahmad Asma, 2014, International Journal of Computer Network and Information Security, V6, P58, DOI 10.5815/ijcnis.2014.12.07
[5]   An intelligent and blind dual color image watermarking for authentication and copyright protection [J].
Ahmadi, Sajjad Bagheri Baba ;
Zhang, Gongxuan ;
Rabbani, Mahdi ;
Boukela, Lynda ;
Jelodar, Hamed .
APPLIED INTELLIGENCE, 2021, 51 (03) :1701-1732
[6]   Robust and hybrid SVD-based image watermarking schemes: A survey [J].
Ahmadi, Sajjad Bagheri Baba ;
Zhang, Gongxuan ;
Wei, Songjie .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (1-2) :1075-1117
[7]  
Ahonen T, 2004, LECT NOTES COMPUT SC, V3021, P469
[8]   ANiTW: A Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media [J].
Ahvanooey, Milad Taleby ;
Li, Qianmu ;
Zhu, Xuefang ;
Alazab, Mamoun ;
Zhang, Jing .
COMPUTERS & SECURITY, 2020, 90
[9]   Robust hybrid watermarking techniques for different color imaging systems [J].
Al-Afandy, Khalid A. ;
El-Shafai, Walid ;
El-Rabaie, El-Sayed M. ;
Abd El-Samie, Fathi E. ;
Faragallah, Osama S. ;
El-Mhalaway, Ahmed ;
Shehata, Ahmed M. ;
El-Banby, Ghada M. ;
El-Halawany, Mohamed M. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (19) :25709-25759
[10]   Digital Cosine Chaotic Map for Cryptographic Applications [J].
Alawida, Moatsum ;
Samsudin, Azman ;
Teh, Je Sen ;
Alshoura, Wafa Hamdan .
IEEE ACCESS, 2019, 7 :150609-150622