SlideShare a Scribd company logo
1 of 7
Download to read offline
RESEARCH ARTICLE
RSP Science Hub
International Research Journal on Advanced Science Hub
2582-4376
Vol. 05, Issue 01 January
www.rspsciencehub.com
http://dx.doi.org/10.47392/irjash.2023.002
An Overview on Research Trends, Challenges, Applications and Future
Direction in Digital Image Watermarking
Pavan A C 1
, M T Somashekara2
1
Research Scholar, Department of Computer Science and Applications, Bangalore University, Bangalore, India
2
Associate Professor, Department of Computer Science and Applications, Bangalore University, Bangalore, India
Emails: shyam2712.pavan@gmail.com, somashekar mt@hotmail.com
Article History
Received: 20 December 2022
Accepted: 22 January 2023
Keywords:
Digital image Watermark-
ing;
Tamper Detection;
Visual Imperceptibility;
Robustness
Abstract
Digital data including photographs, audio, and video are now readily available
because to the development of the Internet. The ease of access to multime-
dia raises concerns about ownership identification, authentication of content,
security, and copyright protection. Here, we talk about the idea of digital pic-
ture watermarking with an emphasis on the method utilized for embedding and
extracting the watermark from images. This paper also presents a complete
classification of digital watermarking along with its fundamental properties,
such as visual imperceptibility, resilience, capacity, and security. Additionally,
we have covered the most recent uses of digital watermarking in the fields of
healthcare, distance learning, electronic voting, and the military. The robust-
ness is assessed by looking at how image processing assaults affect the content
that is signed and the recoverability of the watermark. The thorough survey
that is offered in this study, in the opinion of the authors, will aid brand-new
scholars in learning more about this area. Additionally, the comparative study
can spark suggestions for how to enhance the methods already outlined.
1. Introduction
The ability to gather information is the key to an
organization’s success in the modern day. How well
it can prevent other users from accessing and mod-
ifying the information produced by its operations
and processes is also a cause for concern. The ease
of access to digital storage devices, as well as the
Internet’s widespread use, has made it simple to
produce and distribute digital material. This has
made it imperative to create strategies for combating
copyright violations (C. Kumar, A. K. Singh, and P.
Kumar P. Singh and Chadha).
Digital watermarking is a widely used approach
in cases where an organisation needs to prevent
data from leaking into the public domain. When a
business has a direct fiduciary relationship with its
customers and is required to protect their informa-
tion as well, it is absolutely essential (C. Kumar,
A. K. Singh, and P. Kumar). Digital watermarking
is a technique to offer defence against any modifi-
cation or tampering (S. Kumar, B. K. Singh, and
Yadav Cox et al. S. Kumar and Dutta). It pro-
tects digital content and authenticates users. Sig-
nal information is inserted into the original media
content as part of the digital watermarking process.
In order to identify the true owner of the digital
media, the implanted information is then discov-
ered and removed. The process of watermarking
entails incorporating watermark, digital signature,
or label data into the digital medium. You can
extract this watermark to show the media object’s
OPEN ACCESS 8
Challenges, Applications and Future Direction in Digital Image Watermarking 2023, Vol. 05, Issue 01 January
legitimacy (Abraham and Paul). We can visualise a
recognisable ”seal” over an image as an illustration
of a watermark.
There are three basic parts of digital watermark-
ing algorithm: -
1. Creating Watermark
2. An Encoding algorithm
3. A decoding algorithm (C. Kumar, A. K. Singh,
and P. Kumar Y. Liu et al. A. K. Singh et al.).
This method can be applied for confidential com-
munication, copyright protection, embedding fin-
gerprints for data integrity checks, and placing
authentication. Tracing illicit users so that the owner
can contact regulatory authorities is another signifi-
cant application of watermarking technology. It can
be helpful to make sure that information about the
individuals who purchase and sell digital material is
recorded for each transaction. For the purpose of
preventing violations of copyright, this data can be
tracked further. In fact, this unauthorised dissem-
ination of digital content requires the implementa-
tion of rigorous restrictions. The paper is organised
as follows: Section 2 classifies digital watermark-
ing according to a number of factors. The salient
characteristics of digital watermarking are described
in Section 3. The most recent fields of watermark-
ing application are covered in Section 4. The many
sorts of attacks are presented in Section 5. The key
findings and outcomes of related research by vari-
ous authors are examined in section 6, and the con-
clusions and potential future applications of image
watermarking are presented in section 7.
2. Digital Watermarking Classifications
This aspect of paper describes the categorization of
digital watermarking which is based on some of the
criteria (Pavan and Somashekara) like robustness,
perceptibility, area, and multimedia detection tech-
nique. We will also discuss the many widely used
watermarking techniques in the next section.
2.1. Based on Characteristics/Robustness
Robust: When copyright information must be incor-
porated, strong watermarking is suggested. If the
watermarked image survives an attack undisturbed,
this shows robustness. It is resistant to numerous
assaults. It is evident that a strong watermark is use-
ful for copyright protection.
Fragile: If the data has been altered, it is simple
to determine from the watermark’s condition. This
watermark is the best option for integrity protection.
Semi-fragile: A semi-fragile watermark is toler-
ant of some degree of modification (P. Singh and
Chadha S. Kumar, B. K. Singh, and Yadav Abraham
and Paul).
2.2. Based on Perceptibility
Perceptible: Perceptible refers to a visible water-
mark.
Imperceptible: Imperceptible watermark is the
phrase used to describe a watermark that cannot be
seen. This prevents the visibility of information that
is hidden within the image. In these circumstances, a
barely discernible watermark can be used to demon-
strate ownership of the image (P. Singh and Chadha
A. Dixit and R. Dixit).
2.3. Based on Domain
Frequency: Before anything further, the image
is converted to the frequency domain. Different
transformation techniques, including DCT, DFT,
and DWT, are used in this type of watermark-
ing (Sherekar, Thakare, and Jain).
Spatial: The watermark is injected into the host
image, and watermarking in this context modifies
the value of pixels in randomly chosen areas of
images. In the spatial domain, no transformation
or conversion is used. Some of the well-liked spa-
tial domain-based approaches include LSB, Patch-
work method, and SSM Modulation (P. Singh and
Chadha S. Kumar, B. K. Singh, and Yadav). In gen-
eral, watermarking done in the frequency domain is
more reliable than watermarking done in the spatial
domain.
2.4. Spatial Domain
Method of Least Significant Bit (LSB):
The watermark is put using this technique in the
image’s pixels’ least significant bit (LSB). The best
method for embedding is either of the two. One
method substitutes a pseudo-noise (PN) sequence
for the LSB of an image, while another method adds
the PN sequencing to the LSB. Although the LSB
approach is simple to implement, it sacrifices robust-
ness against attacks.
Method of Patchwork:
Patchwork technique selects n pairings of picture
points at random (x, y). Data is darkened in the y
region and lightened in the x region. Although this
approach may endure numerous assaults, it is not
9
Pavan A C and Somashekara 2023, Vol. 05, Issue 01 January
very powerful.
2.5. Frequency Domain
Discrete cosine transforms (DCT):
The methodology used in this method involves
separating a picture signal into non-overlapping
blocks of size 8 8 pixels. Following the comple-
tion of block-wise DCT, the coefficients to be water-
marked are selected. To obtain the signed picture, an
inverse of DCT is then performed to each 8x8 block.
Discrete wavelets transform (DWT):
This technique involves applying a series of low
and high-pass filters on the image. The decomposi-
tion of an image into four equal subbands includes
horizontal features, low frequency (LL), diagonal
and vertical features (HL) in each subband (HH).
Because it offers a reliable and safe watermarking
method, it is a favoured algorithm (P. Singh and
Chadha S. Kumar, B. K. Singh, and Yadav Sherekar,
Thakare, and Jain).
2.6. Based on the Process of Detection
Blind: These watermarking techniques fall into this
category, and all that is needed to remove the embed-
ded data is the watermarked image. Applications
for it include copyright protection, voting, and other
things (Agarwal, A. K. Singh, and P. K. Singh).
Non-Blind: In such kind of watermarking, the
procedure duplicates the watermark with the text
data, the image, and the added data. Copyright pro-
tection is one area where it is used (Agarwal, A. K.
Singh, and P. K. Singh).
2.7. Based on Multimedia
Words, punctuation, phrases, and other elements
make up text watermarking. One of these com-
ponents undergoes transformation, and the result
watermark is embedded (S. Kumar, B. K. Singh,
and Yadav). Large-size photographs must be water-
marked, which is accomplished by image water-
marking. We demand strong watermarks on pho-
tographs that should be undetectable (S. Kumar,
B. K. Singh, and Yadav). Video watermarking: In
this situation, getting an undetectable watermark is
challenging. Graphic Watermarking: A watermark
is incorporated into 2D or 3D digital graphics. It
offers copyright defence.
3. Some of the Characteristics of Digital
Watermarking
Here, few aspects of digital watermarking are
mentioned:-
Robustness: The digital watermark can withstand
various processing activities and attacks, according
to the robustness characteristic. After that, it is
regarded as robust (S. Liu, Pan, and H. Song).
Imperceptibility: The feature of imperceptibility
states that a watermarked image should not be per-
ceptible to the human eye. The embedded water-
mark shouldn’t be visible. Only specialist proce-
dures can detect it. The act of embedding a water-
mark should be done in a way that preserves the
integrity of the material and ensures that the viewer
cannot see the watermark (S. Liu, Pan, and H. Song).
Security: According to the security function, the
embedded digital watermark cannot be deleted, even
in the event of targeted attacks. According to water-
mark security, it should be difficult to change or
remove a watermark without doing any harm to the
host signal. Data ownership, protection, and confi-
dentiality can all be achieved by watermarking secu-
rity (P. Singh and Chadha). Data payload or capacity
refers to the volume of information included within
a watermarked image (S. Kumar, B. K. Singh, and
Yadav).
Verifiability: Using the watermark, we ought to
be able to obtain some proof of who owns copyright-
protected data. This assists in determining the legiti-
macy of any digital data and even in restricting unau-
thorised copying of it (Su, Yuan, and D. Liu).
4. Few Recent Watermarking Applications
As we are all aware, photos are freely available on
the internet and may be simply distributed. Com-
mercial usage of these photos is permitted. Data
must therefore be protected by copyright, and digi-
tal watermarking is highly helpful in this regard. To
determine who owns the copyright, a digital water-
mark will be inserted (P. Singh and Chadha Agar-
wal, A. K. Singh, and P. K. Singh). Digital water-
marking using a fingerprint may be suggested as a
way to embed some individuality. It should be tough
to modify the fingerprint. The data entered is asso-
ciated with the customer. This fingerprinting reveal
which authorised consumers are participating in the
distribution of copyright data in violation of the con-
tract (P. Singh and Chadha Sherekar, Thakare, and
International Research Journal on Advanced Science Hub (IRJASH) 10
Challenges, Applications and Future Direction in Digital Image Watermarking 2023, Vol. 05, Issue 01 January
Jain). Digital watermarking can be used to stop the
unauthorised reproduction of digital data. Devices
that perform replication are able to recognise these
watermarks, report instances of copying, and so pre-
vent unauthorised copying (S. Kumar, B. K. Singh,
and Yadav A. Dixit and R. Dixit).
Broadcast Monitoring: It has been increasingly
easier and more common to access and find media
content throughout time. The information is also
accessible online. In these circumstances, it is cru-
cial for content owners and copyright holders to be
aware of the actual content distributor. Here, digital
watermarking is crucial (S. Kumar, B. K. Singh, and
Yadav A. Dixit and R. Dixit).
Medical Application: Visible watermarking can
be used to embed the patient’s name in the reports
from an MRI, CT, or X-ray scan. These medical
reports determine how the patient will be treated.
Thus, visible watermarking is a technique that can
be utilised to prevent report mixing (Agarwal, A. K.
Singh, and P. K. Singh).
Electronic voting system: From large cities to
tiny communities, the Internet is now widely used
throughout the nation. Elections are carried out with
the assistance of electronic voting while taking secu-
rity into account (Agarwal, A. K. Singh, and P. K.
Singh).
Remote Education: In small settlements, a teacher
shortage is a major issue. Distance learning requires
the use of smart technology. In this instance, water-
marking contributes to the reliable transmission of
educational content via the internet (Agarwal, A. K.
Singh, and P. K. Singh Sherekar, Thakare, and Jain).
5. Attacks on Watermarking
The assault resistance of a watermarking technol-
ogy is a constant criterion for evaluation. Oper-
ations on any watermark are conducted to disable
the watermark that has been implanted or make it
more challenging for users to locate the watermark.
Any assault aims to undermine the security that
digital content receives from a watermark. Water-
marking attacks fall into four categories: protocol
attack, cryptographic attack, geometry attack and
removal attack (Sanjay and Dutta C. Song et al.
Voloshynovskiy et al.).
Geometry Attack: This type of processing
applies to the watermark image and modifies its
geometry by rotation, cropping, and other tech-
niques. Additional categories for these include crop-
ping, scaling, translation, and rotation (Abraham
and Paul).
Assault for Data Removal: This attack seeks to
delete the added information from the digital image.
If it is unable to, they nonetheless attempt to destroy
the contained data (Su, Yuan, and D. Liu). Assaults
that fall within this category, known as protocol
attacks, do not harm embedded data. There are two
different kinds of Protocol assaults: Invertible and
Copy attacks. A watermark should therefore be non-
invertible and uncopyable. The watermark can be
reverse if the attacker deletes their particular water-
mark from the host image. The attacker then imper-
sonates the data’s owner. This demonstrates that
non-invertible watermarks are necessary for copy-
right protection (Vaidya and Pvssr Su, Yuan, and D.
Liu).
Copy Attack: This type of attack Protocols also
exists. The watermark is not removed in this either.
The attacker instead makes an estimate of the water-
mark using host data. Then it is copied to additional
data (Vaidya and Pvssr). Attacks that compromise
the security of watermarking methods fall under the
category of cryptographic attacks. With this, they
can either extract the watermark data that was added
or add a shady watermark. This includes the Brute-
force and Oracle assaults (Su, Yuan, and D. Liu). In
order to give a thorough analysis of picture water-
marking, we assembled a collection of a few publi-
cations, some of which served to establish the his-
tory of digital watermarking and others of which
were considered to be pertinent to the topic. Table
1 lists the watermarking plans put out by different
research teams over the past few years after conduct-
ing a comparative analysis.
The table includes a review and evaluation of ear-
lier work on digital watermarking methods. Some
of the common strategies that have been previously
investigated include the spatial domain and fre-
quency domain techniques. Furthermore, it has been
discovered that image pixels digital watermarking is
less trustworthy and hence less common. The water-
marked image’s performance is assessed using its
capacity, security, imperceptibility, and robustness.
These were the most preferred criteria because they
included the watermarked image’s visual impercep-
tibility and the watermarking’s durability. In fact,
future work has the potential to combine techniques
11
Pavan A C and Somashekara 2023, Vol. 05, Issue 01 January
TABLE
1.
Summary
of
various
Watermarking
Schemes
Research
group
Title
Technique
used
Input
Visual
Impercepti-
bility
Robustness
Abraham
and
Paul
[6]
”An
impercep-
tible
spatial
domain
color
image
water-
marking
scheme”
Spatial
domain
Simple
Image
Region
Detector
(SIRD):
Esti-
mation
of
most
suitable
portion
within
the
block
of
an
image.
Cover
image
Col-
ored
image
of
Size:
512
X
512
X
3
pix-
els
Watermark
Size:
64
X
64
pixels
PSNR
=
47.6
dB
SSIM
=
0.9904
NCC
=
Range
[0.9917
-
1]
BER=
Range
[0.7500-
0]
Attacks
considered:
Salt
and
Pepper,
Poisson,
Speckle,
average
filtering,
Gaussian
LPF,
Sharpening,
JPEG
Compression,
Crop-
ping,
Resizing
Liu
et
al.
[15]
”Digital
image
watermarking
method
based
on
DCT
and
fractal
encoding”
Fractal
encoding
and
DCT
method
are
combined
for
dou-
ble
encryption
for
embedding
purpose.
Cover
image
Size:
1024
X
1024
pix-
els
Watermark
Size:
256
X
256
pixels
PSNR
Range=[41-
45
]
dB
Attacks
Considered:
white
noise
attack,
Gaussian
fil-
ter
attack,
JPEG
compres-
sion
attack.
Moosaza
deh
and
Ekbatanif
ard
[17]
”A
new
DCT-
based
robust
image
water-
marking
method
using
teachinglearning-
Based
optimiza-
tion”
Image
watermarking
scheme
based
on
DCT
Teaching-
Learning-
Based
Optimization
(TLBO):
Automatic
detection
of
embedding
parameters
and
suitable
position
for
inserting
the
watermark.
Cover
image
Size:
512
X
512
pixels
Watermark
Size:
32
X
32
pixels
PSNR=
Range[39.95-
40.73]
NCC
=
Range
[0.7871-
0.9901]
Attacks
considered
:
Salt
&
pepper
noise,
Uni-
form
noise,
Poisson
noise,
Gaussian
noise,
Scaling,
Rotation,
Cropping,
Sharp-
ening,
Motion
Filter,
Disk
filter,
Wiener,
Median
fil-
ter,
Gaussian
Filter,
JPEG
compression
Ambadek
ar
et
al.[24]
”Digital
Image
Watermarking
Through
Encryp-
tion
and
DWT
for
Copyright
Protection”
DWT
and
encryption-based
watermarking.
Cover
Image
Size:
228
x
228
Pixels
Watermark
Size:
grayscale
image
90
x
90
pixels
PSNR=54.96
dB
NCC=0.9749
Attacks
Con-
sidered
:
Noise,
Geometric,
Compression
International Research Journal on Advanced Science Hub (IRJASH) 12
Challenges, Applications and Future Direction in Digital Image Watermarking 2023, Vol. 05, Issue 01 January
and employ them in hybrid form to not only improve
the durability of the watermarked image but also
to mitigate the shortcomings of each methodology
taken independently.
6. Conclusion
This article provides a general overview of digi-
tal image watermarking systems in addition to pro-
viding comprehensive classification and characteris-
tics. The several application fields, including health-
care, distance learning, military, and electronic vot-
ing systems, have been discussed. Due to the
widespread transmission of digital data, it’s seen
that data security has elevated to the top of the prior-
ity list. Digital watermarking is therefore employed
for giving approved data or protecting sensitive data.
Robustness, imperceptibility, security, and capacity
are used to assess how well the watermarked pho-
tos operate. PSNR and bit-error ratio are used to
examine them. It was found that the favoured cri-
terion was robustness. For the purposes of con-
tent authentication and ownership evidence, invis-
ible watermarking is used. Research teams have
used frequency domain methods and made an effort
to strike a balance between visual imperceptibility
and resilience. In this essay, we examine numerous
watermarking techniques applied on digital photos
in the recent past.
Authors’ Note
The authors declare that there is no conflict of
interest regarding the publication of this article.
Authors confirmed that the pa-per was free of pla-
giarism.
References
Abraham, Jobin and Varghese Paul. “An impercep-
tible spatial domain color image watermarking
scheme”. Journal of King Saud University - Com-
puter and Information Sciences 31.1 (2019): 125–
133. 10.1016/j.jksuci.2016.12.004.
Agarwal, Namita, Amit Kumar Singh, and Pradeep
Kumar Singh. “Survey of robust and imper-
ceptible watermarking”. Multimedia Tools and
Applications 78.7 (2019): 8603–8633. 10.1007/
s11042-018-7128-5.
Cox, I, et al. “Digital watermarking and steganogra-
phy”. (2007).
Dixit, A and R Dixit. “A Review on Digital Image
Watermarking Techniques”. International Jour-
nal of Image, Graphics & Signal Processing 9.4
(2017). 10.5815/ijigsp.2017.04.0.
Kumar, Chandan, Amit Kumar Singh, and Pardeep
Kumar. “A recent survey on image watermarking
techniques and its application in e-governance”.
Multimedia Tools and Applications 77.3 (2018):
3597–3622. 10.1007/s11042-017-5222-8.
Kumar, Sanjay and Ambar Dutta. “Performance
analysis of spatial domain digital watermarking
techniques”. 2016 International Conference on
Information Communication and Embedded Sys-
tems (ICICES) (2016): 1–4. 10 . 1109 / ICICES .
2016.7518910.
Kumar, Sanjay, Binod Kumar Singh, and Mohit
Yadav. “A Recent Survey on Multimedia and
Database Watermarking”. Multimedia Tools and
Applications 79.27-28 (2020): 20149–20197. 10.
1007/s11042-020-08881-y.
Liu, Shuai, Zheng Pan, and Houbing Song. “Digital
image watermarking method based on DCT and
fractal encoding”. IET Image Processing 11.10
(2017): 815–821. 10 . 1109 / RTEICT . 2016 .
7808145.
Liu, Yang, et al. “Secure and robust digital image
watermarking scheme using logistic and RSA
encryption”. Expert Systems with Applications 97
(2018): 95–105. 10.1016/j.eswa.2017.12.003.
Sanjay, Kumar and Ambar Dutta. “A study on
robustness of block entropy based digital image
watermarking techniques with respect to vari-
ous attacks”. 2016 IEEE International Confer-
ence on Recent Trends in Electronics, Information
& Communication Technology (RTEICT) (2016):
1802–1806. 10.1109/RTEICT.2016.7808145.
Sherekar, S, V Thakare, and S Jain. “Role of Digi-
tal Watermark in e-governance and ecommerce”.
International Journal of Computer Science and
Network Security 8.1 (2008): 257–261.
Singh, A K, et al. “Medical Image Watermark-
ing: Techniques and Applications. Book series on
Multimedia Systems and Applications”. (2017).
13
Pavan A C and Somashekara 2023, Vol. 05, Issue 01 January
Singh, P and R S Chadha. “A survey of digital water-
marking techniques, applications and attacks”.
International Journal of Engineering and Inno-
vative Technology (IJEIT) 2.9 (2013): 165–175.
10.1007/s11042-020-08881-y.
Song, Chunlin, et al. “Analysis of Digital Image
Watermark Attacks”. 2010 7th IEEE Consumer
Communications and Networking Conference
(2010): 1–5. 10.1109/CCNC.2010.5421631.
Su, Qingtang, Zihan Yuan, and Decheng Liu. “An
Approximate Schur Decomposition-Based Spa-
tial Domain Color Image Watermarking Method”.
IEEE Access 7 (2019): 4358–4370.
Vaidya, P and C M Pvssr. “A robust semi-blind
watermarking for color images based on multiple
decompositions”. Multimedia Tools and Appli-
cations 76.24 (2017): 25623–25656. 10 . 1007 /
s11042-017-4355-0.
Voloshynovskiy, S, et al. “Attacks on digital water-
marks: classification, estimation based attacks,
and benchmarks”. IEEE Communications Maga-
zine 39.8 (2001): 118–126. 10.1109/35.940053.
© Pavan A C et al. 2023 Open
Access. This article is distributed
under the terms of the Creative
Commons Attribution 4.0 International License
(http://creativecommons.org/licenses/by/4.0/),
which permits unrestricted use, distribution, and
reproduction in any medium, provided you give
appropriate credit to the original author(s) and the
source, provide a link to the Creative Commons
license, and indicate if changes were made.
Embargo period: The article has no embargo
period.
To cite this Article: , Pavan A C, and M T
Somashekara. “An Overview on Research Trends,
Challenges, Applications and Future Direction
in Digital Image Watermarking .” International
Research Journal on Advanced Science Hub 05.01
January (2023): 08–14. http://dx.doi.org/10.47392/
irjash.2023.002
International Research Journal on Advanced Science Hub (IRJASH) 14

More Related Content

Similar to An Overview on Research Trends, Challenges, Applications and Future.pdf

27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Publishing House
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Journals
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 
A New Wavelet based Digital Watermarking Method for Authenticated Mobile Signals
A New Wavelet based Digital Watermarking Method for Authenticated Mobile SignalsA New Wavelet based Digital Watermarking Method for Authenticated Mobile Signals
A New Wavelet based Digital Watermarking Method for Authenticated Mobile SignalsCSCJournals
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...prjpublications
 

Similar to An Overview on Research Trends, Challenges, Applications and Future.pdf (20)

27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
50120130406038
5012013040603850120130406038
50120130406038
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
A New Wavelet based Digital Watermarking Method for Authenticated Mobile Signals
A New Wavelet based Digital Watermarking Method for Authenticated Mobile SignalsA New Wavelet based Digital Watermarking Method for Authenticated Mobile Signals
A New Wavelet based Digital Watermarking Method for Authenticated Mobile Signals
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
 
I43014752
I43014752I43014752
I43014752
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
dwm
dwmdwm
dwm
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

An Overview on Research Trends, Challenges, Applications and Future.pdf

  • 1. RESEARCH ARTICLE RSP Science Hub International Research Journal on Advanced Science Hub 2582-4376 Vol. 05, Issue 01 January www.rspsciencehub.com http://dx.doi.org/10.47392/irjash.2023.002 An Overview on Research Trends, Challenges, Applications and Future Direction in Digital Image Watermarking Pavan A C 1 , M T Somashekara2 1 Research Scholar, Department of Computer Science and Applications, Bangalore University, Bangalore, India 2 Associate Professor, Department of Computer Science and Applications, Bangalore University, Bangalore, India Emails: shyam2712.pavan@gmail.com, somashekar mt@hotmail.com Article History Received: 20 December 2022 Accepted: 22 January 2023 Keywords: Digital image Watermark- ing; Tamper Detection; Visual Imperceptibility; Robustness Abstract Digital data including photographs, audio, and video are now readily available because to the development of the Internet. The ease of access to multime- dia raises concerns about ownership identification, authentication of content, security, and copyright protection. Here, we talk about the idea of digital pic- ture watermarking with an emphasis on the method utilized for embedding and extracting the watermark from images. This paper also presents a complete classification of digital watermarking along with its fundamental properties, such as visual imperceptibility, resilience, capacity, and security. Additionally, we have covered the most recent uses of digital watermarking in the fields of healthcare, distance learning, electronic voting, and the military. The robust- ness is assessed by looking at how image processing assaults affect the content that is signed and the recoverability of the watermark. The thorough survey that is offered in this study, in the opinion of the authors, will aid brand-new scholars in learning more about this area. Additionally, the comparative study can spark suggestions for how to enhance the methods already outlined. 1. Introduction The ability to gather information is the key to an organization’s success in the modern day. How well it can prevent other users from accessing and mod- ifying the information produced by its operations and processes is also a cause for concern. The ease of access to digital storage devices, as well as the Internet’s widespread use, has made it simple to produce and distribute digital material. This has made it imperative to create strategies for combating copyright violations (C. Kumar, A. K. Singh, and P. Kumar P. Singh and Chadha). Digital watermarking is a widely used approach in cases where an organisation needs to prevent data from leaking into the public domain. When a business has a direct fiduciary relationship with its customers and is required to protect their informa- tion as well, it is absolutely essential (C. Kumar, A. K. Singh, and P. Kumar). Digital watermarking is a technique to offer defence against any modifi- cation or tampering (S. Kumar, B. K. Singh, and Yadav Cox et al. S. Kumar and Dutta). It pro- tects digital content and authenticates users. Sig- nal information is inserted into the original media content as part of the digital watermarking process. In order to identify the true owner of the digital media, the implanted information is then discov- ered and removed. The process of watermarking entails incorporating watermark, digital signature, or label data into the digital medium. You can extract this watermark to show the media object’s OPEN ACCESS 8
  • 2. Challenges, Applications and Future Direction in Digital Image Watermarking 2023, Vol. 05, Issue 01 January legitimacy (Abraham and Paul). We can visualise a recognisable ”seal” over an image as an illustration of a watermark. There are three basic parts of digital watermark- ing algorithm: - 1. Creating Watermark 2. An Encoding algorithm 3. A decoding algorithm (C. Kumar, A. K. Singh, and P. Kumar Y. Liu et al. A. K. Singh et al.). This method can be applied for confidential com- munication, copyright protection, embedding fin- gerprints for data integrity checks, and placing authentication. Tracing illicit users so that the owner can contact regulatory authorities is another signifi- cant application of watermarking technology. It can be helpful to make sure that information about the individuals who purchase and sell digital material is recorded for each transaction. For the purpose of preventing violations of copyright, this data can be tracked further. In fact, this unauthorised dissem- ination of digital content requires the implementa- tion of rigorous restrictions. The paper is organised as follows: Section 2 classifies digital watermark- ing according to a number of factors. The salient characteristics of digital watermarking are described in Section 3. The most recent fields of watermark- ing application are covered in Section 4. The many sorts of attacks are presented in Section 5. The key findings and outcomes of related research by vari- ous authors are examined in section 6, and the con- clusions and potential future applications of image watermarking are presented in section 7. 2. Digital Watermarking Classifications This aspect of paper describes the categorization of digital watermarking which is based on some of the criteria (Pavan and Somashekara) like robustness, perceptibility, area, and multimedia detection tech- nique. We will also discuss the many widely used watermarking techniques in the next section. 2.1. Based on Characteristics/Robustness Robust: When copyright information must be incor- porated, strong watermarking is suggested. If the watermarked image survives an attack undisturbed, this shows robustness. It is resistant to numerous assaults. It is evident that a strong watermark is use- ful for copyright protection. Fragile: If the data has been altered, it is simple to determine from the watermark’s condition. This watermark is the best option for integrity protection. Semi-fragile: A semi-fragile watermark is toler- ant of some degree of modification (P. Singh and Chadha S. Kumar, B. K. Singh, and Yadav Abraham and Paul). 2.2. Based on Perceptibility Perceptible: Perceptible refers to a visible water- mark. Imperceptible: Imperceptible watermark is the phrase used to describe a watermark that cannot be seen. This prevents the visibility of information that is hidden within the image. In these circumstances, a barely discernible watermark can be used to demon- strate ownership of the image (P. Singh and Chadha A. Dixit and R. Dixit). 2.3. Based on Domain Frequency: Before anything further, the image is converted to the frequency domain. Different transformation techniques, including DCT, DFT, and DWT, are used in this type of watermark- ing (Sherekar, Thakare, and Jain). Spatial: The watermark is injected into the host image, and watermarking in this context modifies the value of pixels in randomly chosen areas of images. In the spatial domain, no transformation or conversion is used. Some of the well-liked spa- tial domain-based approaches include LSB, Patch- work method, and SSM Modulation (P. Singh and Chadha S. Kumar, B. K. Singh, and Yadav). In gen- eral, watermarking done in the frequency domain is more reliable than watermarking done in the spatial domain. 2.4. Spatial Domain Method of Least Significant Bit (LSB): The watermark is put using this technique in the image’s pixels’ least significant bit (LSB). The best method for embedding is either of the two. One method substitutes a pseudo-noise (PN) sequence for the LSB of an image, while another method adds the PN sequencing to the LSB. Although the LSB approach is simple to implement, it sacrifices robust- ness against attacks. Method of Patchwork: Patchwork technique selects n pairings of picture points at random (x, y). Data is darkened in the y region and lightened in the x region. Although this approach may endure numerous assaults, it is not 9
  • 3. Pavan A C and Somashekara 2023, Vol. 05, Issue 01 January very powerful. 2.5. Frequency Domain Discrete cosine transforms (DCT): The methodology used in this method involves separating a picture signal into non-overlapping blocks of size 8 8 pixels. Following the comple- tion of block-wise DCT, the coefficients to be water- marked are selected. To obtain the signed picture, an inverse of DCT is then performed to each 8x8 block. Discrete wavelets transform (DWT): This technique involves applying a series of low and high-pass filters on the image. The decomposi- tion of an image into four equal subbands includes horizontal features, low frequency (LL), diagonal and vertical features (HL) in each subband (HH). Because it offers a reliable and safe watermarking method, it is a favoured algorithm (P. Singh and Chadha S. Kumar, B. K. Singh, and Yadav Sherekar, Thakare, and Jain). 2.6. Based on the Process of Detection Blind: These watermarking techniques fall into this category, and all that is needed to remove the embed- ded data is the watermarked image. Applications for it include copyright protection, voting, and other things (Agarwal, A. K. Singh, and P. K. Singh). Non-Blind: In such kind of watermarking, the procedure duplicates the watermark with the text data, the image, and the added data. Copyright pro- tection is one area where it is used (Agarwal, A. K. Singh, and P. K. Singh). 2.7. Based on Multimedia Words, punctuation, phrases, and other elements make up text watermarking. One of these com- ponents undergoes transformation, and the result watermark is embedded (S. Kumar, B. K. Singh, and Yadav). Large-size photographs must be water- marked, which is accomplished by image water- marking. We demand strong watermarks on pho- tographs that should be undetectable (S. Kumar, B. K. Singh, and Yadav). Video watermarking: In this situation, getting an undetectable watermark is challenging. Graphic Watermarking: A watermark is incorporated into 2D or 3D digital graphics. It offers copyright defence. 3. Some of the Characteristics of Digital Watermarking Here, few aspects of digital watermarking are mentioned:- Robustness: The digital watermark can withstand various processing activities and attacks, according to the robustness characteristic. After that, it is regarded as robust (S. Liu, Pan, and H. Song). Imperceptibility: The feature of imperceptibility states that a watermarked image should not be per- ceptible to the human eye. The embedded water- mark shouldn’t be visible. Only specialist proce- dures can detect it. The act of embedding a water- mark should be done in a way that preserves the integrity of the material and ensures that the viewer cannot see the watermark (S. Liu, Pan, and H. Song). Security: According to the security function, the embedded digital watermark cannot be deleted, even in the event of targeted attacks. According to water- mark security, it should be difficult to change or remove a watermark without doing any harm to the host signal. Data ownership, protection, and confi- dentiality can all be achieved by watermarking secu- rity (P. Singh and Chadha). Data payload or capacity refers to the volume of information included within a watermarked image (S. Kumar, B. K. Singh, and Yadav). Verifiability: Using the watermark, we ought to be able to obtain some proof of who owns copyright- protected data. This assists in determining the legiti- macy of any digital data and even in restricting unau- thorised copying of it (Su, Yuan, and D. Liu). 4. Few Recent Watermarking Applications As we are all aware, photos are freely available on the internet and may be simply distributed. Com- mercial usage of these photos is permitted. Data must therefore be protected by copyright, and digi- tal watermarking is highly helpful in this regard. To determine who owns the copyright, a digital water- mark will be inserted (P. Singh and Chadha Agar- wal, A. K. Singh, and P. K. Singh). Digital water- marking using a fingerprint may be suggested as a way to embed some individuality. It should be tough to modify the fingerprint. The data entered is asso- ciated with the customer. This fingerprinting reveal which authorised consumers are participating in the distribution of copyright data in violation of the con- tract (P. Singh and Chadha Sherekar, Thakare, and International Research Journal on Advanced Science Hub (IRJASH) 10
  • 4. Challenges, Applications and Future Direction in Digital Image Watermarking 2023, Vol. 05, Issue 01 January Jain). Digital watermarking can be used to stop the unauthorised reproduction of digital data. Devices that perform replication are able to recognise these watermarks, report instances of copying, and so pre- vent unauthorised copying (S. Kumar, B. K. Singh, and Yadav A. Dixit and R. Dixit). Broadcast Monitoring: It has been increasingly easier and more common to access and find media content throughout time. The information is also accessible online. In these circumstances, it is cru- cial for content owners and copyright holders to be aware of the actual content distributor. Here, digital watermarking is crucial (S. Kumar, B. K. Singh, and Yadav A. Dixit and R. Dixit). Medical Application: Visible watermarking can be used to embed the patient’s name in the reports from an MRI, CT, or X-ray scan. These medical reports determine how the patient will be treated. Thus, visible watermarking is a technique that can be utilised to prevent report mixing (Agarwal, A. K. Singh, and P. K. Singh). Electronic voting system: From large cities to tiny communities, the Internet is now widely used throughout the nation. Elections are carried out with the assistance of electronic voting while taking secu- rity into account (Agarwal, A. K. Singh, and P. K. Singh). Remote Education: In small settlements, a teacher shortage is a major issue. Distance learning requires the use of smart technology. In this instance, water- marking contributes to the reliable transmission of educational content via the internet (Agarwal, A. K. Singh, and P. K. Singh Sherekar, Thakare, and Jain). 5. Attacks on Watermarking The assault resistance of a watermarking technol- ogy is a constant criterion for evaluation. Oper- ations on any watermark are conducted to disable the watermark that has been implanted or make it more challenging for users to locate the watermark. Any assault aims to undermine the security that digital content receives from a watermark. Water- marking attacks fall into four categories: protocol attack, cryptographic attack, geometry attack and removal attack (Sanjay and Dutta C. Song et al. Voloshynovskiy et al.). Geometry Attack: This type of processing applies to the watermark image and modifies its geometry by rotation, cropping, and other tech- niques. Additional categories for these include crop- ping, scaling, translation, and rotation (Abraham and Paul). Assault for Data Removal: This attack seeks to delete the added information from the digital image. If it is unable to, they nonetheless attempt to destroy the contained data (Su, Yuan, and D. Liu). Assaults that fall within this category, known as protocol attacks, do not harm embedded data. There are two different kinds of Protocol assaults: Invertible and Copy attacks. A watermark should therefore be non- invertible and uncopyable. The watermark can be reverse if the attacker deletes their particular water- mark from the host image. The attacker then imper- sonates the data’s owner. This demonstrates that non-invertible watermarks are necessary for copy- right protection (Vaidya and Pvssr Su, Yuan, and D. Liu). Copy Attack: This type of attack Protocols also exists. The watermark is not removed in this either. The attacker instead makes an estimate of the water- mark using host data. Then it is copied to additional data (Vaidya and Pvssr). Attacks that compromise the security of watermarking methods fall under the category of cryptographic attacks. With this, they can either extract the watermark data that was added or add a shady watermark. This includes the Brute- force and Oracle assaults (Su, Yuan, and D. Liu). In order to give a thorough analysis of picture water- marking, we assembled a collection of a few publi- cations, some of which served to establish the his- tory of digital watermarking and others of which were considered to be pertinent to the topic. Table 1 lists the watermarking plans put out by different research teams over the past few years after conduct- ing a comparative analysis. The table includes a review and evaluation of ear- lier work on digital watermarking methods. Some of the common strategies that have been previously investigated include the spatial domain and fre- quency domain techniques. Furthermore, it has been discovered that image pixels digital watermarking is less trustworthy and hence less common. The water- marked image’s performance is assessed using its capacity, security, imperceptibility, and robustness. These were the most preferred criteria because they included the watermarked image’s visual impercep- tibility and the watermarking’s durability. In fact, future work has the potential to combine techniques 11
  • 5. Pavan A C and Somashekara 2023, Vol. 05, Issue 01 January TABLE 1. Summary of various Watermarking Schemes Research group Title Technique used Input Visual Impercepti- bility Robustness Abraham and Paul [6] ”An impercep- tible spatial domain color image water- marking scheme” Spatial domain Simple Image Region Detector (SIRD): Esti- mation of most suitable portion within the block of an image. Cover image Col- ored image of Size: 512 X 512 X 3 pix- els Watermark Size: 64 X 64 pixels PSNR = 47.6 dB SSIM = 0.9904 NCC = Range [0.9917 - 1] BER= Range [0.7500- 0] Attacks considered: Salt and Pepper, Poisson, Speckle, average filtering, Gaussian LPF, Sharpening, JPEG Compression, Crop- ping, Resizing Liu et al. [15] ”Digital image watermarking method based on DCT and fractal encoding” Fractal encoding and DCT method are combined for dou- ble encryption for embedding purpose. Cover image Size: 1024 X 1024 pix- els Watermark Size: 256 X 256 pixels PSNR Range=[41- 45 ] dB Attacks Considered: white noise attack, Gaussian fil- ter attack, JPEG compres- sion attack. Moosaza deh and Ekbatanif ard [17] ”A new DCT- based robust image water- marking method using teachinglearning- Based optimiza- tion” Image watermarking scheme based on DCT Teaching- Learning- Based Optimization (TLBO): Automatic detection of embedding parameters and suitable position for inserting the watermark. Cover image Size: 512 X 512 pixels Watermark Size: 32 X 32 pixels PSNR= Range[39.95- 40.73] NCC = Range [0.7871- 0.9901] Attacks considered : Salt & pepper noise, Uni- form noise, Poisson noise, Gaussian noise, Scaling, Rotation, Cropping, Sharp- ening, Motion Filter, Disk filter, Wiener, Median fil- ter, Gaussian Filter, JPEG compression Ambadek ar et al.[24] ”Digital Image Watermarking Through Encryp- tion and DWT for Copyright Protection” DWT and encryption-based watermarking. Cover Image Size: 228 x 228 Pixels Watermark Size: grayscale image 90 x 90 pixels PSNR=54.96 dB NCC=0.9749 Attacks Con- sidered : Noise, Geometric, Compression International Research Journal on Advanced Science Hub (IRJASH) 12
  • 6. Challenges, Applications and Future Direction in Digital Image Watermarking 2023, Vol. 05, Issue 01 January and employ them in hybrid form to not only improve the durability of the watermarked image but also to mitigate the shortcomings of each methodology taken independently. 6. Conclusion This article provides a general overview of digi- tal image watermarking systems in addition to pro- viding comprehensive classification and characteris- tics. The several application fields, including health- care, distance learning, military, and electronic vot- ing systems, have been discussed. Due to the widespread transmission of digital data, it’s seen that data security has elevated to the top of the prior- ity list. Digital watermarking is therefore employed for giving approved data or protecting sensitive data. Robustness, imperceptibility, security, and capacity are used to assess how well the watermarked pho- tos operate. PSNR and bit-error ratio are used to examine them. It was found that the favoured cri- terion was robustness. For the purposes of con- tent authentication and ownership evidence, invis- ible watermarking is used. Research teams have used frequency domain methods and made an effort to strike a balance between visual imperceptibility and resilience. In this essay, we examine numerous watermarking techniques applied on digital photos in the recent past. Authors’ Note The authors declare that there is no conflict of interest regarding the publication of this article. Authors confirmed that the pa-per was free of pla- giarism. References Abraham, Jobin and Varghese Paul. “An impercep- tible spatial domain color image watermarking scheme”. Journal of King Saud University - Com- puter and Information Sciences 31.1 (2019): 125– 133. 10.1016/j.jksuci.2016.12.004. Agarwal, Namita, Amit Kumar Singh, and Pradeep Kumar Singh. “Survey of robust and imper- ceptible watermarking”. Multimedia Tools and Applications 78.7 (2019): 8603–8633. 10.1007/ s11042-018-7128-5. Cox, I, et al. “Digital watermarking and steganogra- phy”. (2007). Dixit, A and R Dixit. “A Review on Digital Image Watermarking Techniques”. International Jour- nal of Image, Graphics & Signal Processing 9.4 (2017). 10.5815/ijigsp.2017.04.0. Kumar, Chandan, Amit Kumar Singh, and Pardeep Kumar. “A recent survey on image watermarking techniques and its application in e-governance”. Multimedia Tools and Applications 77.3 (2018): 3597–3622. 10.1007/s11042-017-5222-8. Kumar, Sanjay and Ambar Dutta. “Performance analysis of spatial domain digital watermarking techniques”. 2016 International Conference on Information Communication and Embedded Sys- tems (ICICES) (2016): 1–4. 10 . 1109 / ICICES . 2016.7518910. Kumar, Sanjay, Binod Kumar Singh, and Mohit Yadav. “A Recent Survey on Multimedia and Database Watermarking”. Multimedia Tools and Applications 79.27-28 (2020): 20149–20197. 10. 1007/s11042-020-08881-y. Liu, Shuai, Zheng Pan, and Houbing Song. “Digital image watermarking method based on DCT and fractal encoding”. IET Image Processing 11.10 (2017): 815–821. 10 . 1109 / RTEICT . 2016 . 7808145. Liu, Yang, et al. “Secure and robust digital image watermarking scheme using logistic and RSA encryption”. Expert Systems with Applications 97 (2018): 95–105. 10.1016/j.eswa.2017.12.003. Sanjay, Kumar and Ambar Dutta. “A study on robustness of block entropy based digital image watermarking techniques with respect to vari- ous attacks”. 2016 IEEE International Confer- ence on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (2016): 1802–1806. 10.1109/RTEICT.2016.7808145. Sherekar, S, V Thakare, and S Jain. “Role of Digi- tal Watermark in e-governance and ecommerce”. International Journal of Computer Science and Network Security 8.1 (2008): 257–261. Singh, A K, et al. “Medical Image Watermark- ing: Techniques and Applications. Book series on Multimedia Systems and Applications”. (2017). 13
  • 7. Pavan A C and Somashekara 2023, Vol. 05, Issue 01 January Singh, P and R S Chadha. “A survey of digital water- marking techniques, applications and attacks”. International Journal of Engineering and Inno- vative Technology (IJEIT) 2.9 (2013): 165–175. 10.1007/s11042-020-08881-y. Song, Chunlin, et al. “Analysis of Digital Image Watermark Attacks”. 2010 7th IEEE Consumer Communications and Networking Conference (2010): 1–5. 10.1109/CCNC.2010.5421631. Su, Qingtang, Zihan Yuan, and Decheng Liu. “An Approximate Schur Decomposition-Based Spa- tial Domain Color Image Watermarking Method”. IEEE Access 7 (2019): 4358–4370. Vaidya, P and C M Pvssr. “A robust semi-blind watermarking for color images based on multiple decompositions”. Multimedia Tools and Appli- cations 76.24 (2017): 25623–25656. 10 . 1007 / s11042-017-4355-0. Voloshynovskiy, S, et al. “Attacks on digital water- marks: classification, estimation based attacks, and benchmarks”. IEEE Communications Maga- zine 39.8 (2001): 118–126. 10.1109/35.940053. © Pavan A C et al. 2023 Open Access. This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. Embargo period: The article has no embargo period. To cite this Article: , Pavan A C, and M T Somashekara. “An Overview on Research Trends, Challenges, Applications and Future Direction in Digital Image Watermarking .” International Research Journal on Advanced Science Hub 05.01 January (2023): 08–14. http://dx.doi.org/10.47392/ irjash.2023.002 International Research Journal on Advanced Science Hub (IRJASH) 14