Digital data including photographs, audio, and video are now readily available
because to the development of the Internet. The ease of access to multimedia raises concerns about ownership identification, authentication of content,
security, and copyright protection. Here, we talk about the idea of digital picture watermarking with an emphasis on the method utilized for embedding and
extracting the watermark from images. This paper also presents a complete
classification of digital watermarking along with its fundamental properties,
such as visual imperceptibility, resilience, capacity, and security. Additionally,
we have covered the most recent uses of digital watermarking in the fields of
healthcare, distance learning, electronic voting, and the military. The robustness is assessed by looking at how image processing assaults affect the content
that is signed and the recoverability of the watermark. The thorough survey
that is offered in this study, in the opinion of the authors, will aid brand-new
scholars in learning more about this area. Additionally, the comparative study
can spark suggestions for how to enhance the methods already outlined.
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
The most quoted applications for digital watermarking is in the context of copyright-protection of digital (multi-)media. In this paper we offer a new digital watermarking technique, which pledges both Security and Quality for the image for the Patent protection. This methodology uses tale techniques like Shuffling, Composition & Decomposition, and Encryption & Decryption to record the information of a protected primary image and the allied watermarks. The quadtree can aid the processing of watermark and AES provides added security to information. Besides that, we intend a novel architecture for Patent Protection that holds promise for a better compromise between practicality and security for emerging digital rights management application. Security solutions must seize a suspicious version of the application-dependent restrictions and competing objectives.
A Hybrid Digital Watermarking Approach Using Wavelets and LSB IJECEIAES
The present paper proposed a novel approach called Wavelet based Least Significant Bit Watermarking (WLSBWM) for high authentication, security and copyright protection. Alphabet Pattern (AP) approach is used to generate shuffled image in the first stage and Pell’s Cat Map (PCM) is used for providing more security and strong protection from attacks. PCM applied on each 5×5 sub images. A wavelet concept is used to reduce the dimensionality of the image until it equals to the size of the watermark image. Discrete Cosign Transform is applied in the first stage; later N level Discrete Wavelet Transform (DWT) is applied for reducing up to the size of the watermark image. The water mark image is inserted in LH Sub band of the wavelet image using LSB concept. Simulation results show that the proposed technique produces better PSNR and similarity measure. The experimental results indicate that the present approach is more reliable and secure efficient. The robustness of the proposed scheme is evaluated against various image-processing attacks.
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
Digital communication has seen exponential growth in the past decade.
Consequently, the security of digital data has become a field of extensive research since
piracy and unauthorized use of such data is prevalent because of the ease with which data
can be replicated or tampered. Visual Cryptography (VC) is a special cryptographic
technique where decryption is done by an authorized user by simply overlaying the shares.
Thus, there is no requirement for complex computations unlike normal cryptography.
Though simple for an authorized user, it is equally difficult for an unauthorized user to
attack since the secret message can be deciphered if and only if all the shares are available
to the attacker. The probability of this is negligibly small since one of the shares usually
needs to be registered with a Certified Authority (CA). The procedure is non- intrusive and
does not alter the contents of the host image or video. For this reason, VC has been applied
to image watermarking widely. In case of video watermarking applications, robustness
against different types of attacks like frame attacks, spatial and temporal desynchronization
attacks, statistical analysis and collusion attacks need to be considered. Also creation of
shares for videos requires feature extraction techniques which are different from that of
images. Moreover, as size of video is more, a large secret payload can be used to construct a
share. In this survey paper, the research being carried out globally on VC techniques for
videos, along with their pros and cons have been highlighted. The paper also discusses
challenges in applying VC for video watermarking. Further, a performance comparison
amongst the mentioned schemes is also provided.
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
This document summarizes and compares various reversible watermarking techniques for image security. It discusses how reversible watermarking allows a watermark to be fully extracted from an image while also restoring the original cover image. The document reviews early techniques that used modulo addition and later techniques that improved imperceptibility by compressing image bits. It categorizes reversible techniques into data compression, difference expansion, and histogram shifting methods. Comparisons of techniques are presented to improve understanding of advances in reversible watermarking for image security.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
The document summarizes recent advances in digital image watermarking techniques. It discusses how watermarking techniques can be classified based on the domain of embedding (spatial or transform), robustness to attacks (fragile or robust), and need for cover data during extraction (blind or non-blind). Specifically, it describes spatial domain techniques like least significant bit insertion and transform domain techniques using discrete Fourier transform, discrete cosine transform, and discrete wavelet transform. Transform techniques embed watermarks by modifying transform coefficients rather than pixel values.
This document discusses a new approach to providing secure data transmission that combines digital watermarking and image compression techniques. Digital watermarking involves embedding hidden information in multimedia content like images, audio or video. The proposed approach uses discrete cosine transform (DCT) based watermarking combined with an improved adaptive Huffman encoding image compression algorithm. This combined technique aims to enhance security for data transmission while reducing storage space requirements compared to other compression methods.
This document discusses a proposed technique for secure data transmission that combines digital image watermarking and image compression. It begins with background information on digital watermarking, including its classifications, requirements, general system, and techniques such as spatial domain and frequency domain methods. It then provides an overview of image compression, including its benefits, techniques such as lossless and lossy compression, and common compression methods. The proposed technique embeds a watermark into an image using discrete cosine transform (DCT) based watermarking in the frequency domain. It then applies lossy image compression to the watermarked image using an improved adaptive Huffman coding algorithm. The goal is to achieve higher security for data transmission by combining these two techniques compared to
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
The most quoted applications for digital watermarking is in the context of copyright-protection of digital (multi-)media. In this paper we offer a new digital watermarking technique, which pledges both Security and Quality for the image for the Patent protection. This methodology uses tale techniques like Shuffling, Composition & Decomposition, and Encryption & Decryption to record the information of a protected primary image and the allied watermarks. The quadtree can aid the processing of watermark and AES provides added security to information. Besides that, we intend a novel architecture for Patent Protection that holds promise for a better compromise between practicality and security for emerging digital rights management application. Security solutions must seize a suspicious version of the application-dependent restrictions and competing objectives.
A Hybrid Digital Watermarking Approach Using Wavelets and LSB IJECEIAES
The present paper proposed a novel approach called Wavelet based Least Significant Bit Watermarking (WLSBWM) for high authentication, security and copyright protection. Alphabet Pattern (AP) approach is used to generate shuffled image in the first stage and Pell’s Cat Map (PCM) is used for providing more security and strong protection from attacks. PCM applied on each 5×5 sub images. A wavelet concept is used to reduce the dimensionality of the image until it equals to the size of the watermark image. Discrete Cosign Transform is applied in the first stage; later N level Discrete Wavelet Transform (DWT) is applied for reducing up to the size of the watermark image. The water mark image is inserted in LH Sub band of the wavelet image using LSB concept. Simulation results show that the proposed technique produces better PSNR and similarity measure. The experimental results indicate that the present approach is more reliable and secure efficient. The robustness of the proposed scheme is evaluated against various image-processing attacks.
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
Digital communication has seen exponential growth in the past decade.
Consequently, the security of digital data has become a field of extensive research since
piracy and unauthorized use of such data is prevalent because of the ease with which data
can be replicated or tampered. Visual Cryptography (VC) is a special cryptographic
technique where decryption is done by an authorized user by simply overlaying the shares.
Thus, there is no requirement for complex computations unlike normal cryptography.
Though simple for an authorized user, it is equally difficult for an unauthorized user to
attack since the secret message can be deciphered if and only if all the shares are available
to the attacker. The probability of this is negligibly small since one of the shares usually
needs to be registered with a Certified Authority (CA). The procedure is non- intrusive and
does not alter the contents of the host image or video. For this reason, VC has been applied
to image watermarking widely. In case of video watermarking applications, robustness
against different types of attacks like frame attacks, spatial and temporal desynchronization
attacks, statistical analysis and collusion attacks need to be considered. Also creation of
shares for videos requires feature extraction techniques which are different from that of
images. Moreover, as size of video is more, a large secret payload can be used to construct a
share. In this survey paper, the research being carried out globally on VC techniques for
videos, along with their pros and cons have been highlighted. The paper also discusses
challenges in applying VC for video watermarking. Further, a performance comparison
amongst the mentioned schemes is also provided.
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
This document summarizes and compares various reversible watermarking techniques for image security. It discusses how reversible watermarking allows a watermark to be fully extracted from an image while also restoring the original cover image. The document reviews early techniques that used modulo addition and later techniques that improved imperceptibility by compressing image bits. It categorizes reversible techniques into data compression, difference expansion, and histogram shifting methods. Comparisons of techniques are presented to improve understanding of advances in reversible watermarking for image security.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
The document summarizes recent advances in digital image watermarking techniques. It discusses how watermarking techniques can be classified based on the domain of embedding (spatial or transform), robustness to attacks (fragile or robust), and need for cover data during extraction (blind or non-blind). Specifically, it describes spatial domain techniques like least significant bit insertion and transform domain techniques using discrete Fourier transform, discrete cosine transform, and discrete wavelet transform. Transform techniques embed watermarks by modifying transform coefficients rather than pixel values.
This document discusses a new approach to providing secure data transmission that combines digital watermarking and image compression techniques. Digital watermarking involves embedding hidden information in multimedia content like images, audio or video. The proposed approach uses discrete cosine transform (DCT) based watermarking combined with an improved adaptive Huffman encoding image compression algorithm. This combined technique aims to enhance security for data transmission while reducing storage space requirements compared to other compression methods.
This document discusses a proposed technique for secure data transmission that combines digital image watermarking and image compression. It begins with background information on digital watermarking, including its classifications, requirements, general system, and techniques such as spatial domain and frequency domain methods. It then provides an overview of image compression, including its benefits, techniques such as lossless and lossy compression, and common compression methods. The proposed technique embeds a watermark into an image using discrete cosine transform (DCT) based watermarking in the frequency domain. It then applies lossy image compression to the watermarked image using an improved adaptive Huffman coding algorithm. The goal is to achieve higher security for data transmission by combining these two techniques compared to
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
The transition from analog technologies to digital technologies has increased the ever-growing concern for protection and authentication of digital content and data. Owners of digital content of any type are seeking and exploring new technologies for the protection of copyrighted multimedia content. Multimedia protection has become an issue in recent years, and to deal with this issue, researchers are continuously searching for and exploring new effective and efficient technologies. This thesis study has been prepared in order to increase the invisibility and durability of invisible watermarking by using the multilayer Discrete Wavelet Transform (DWT) in the frequency plane and embedding two marks into an image for the purpose of authentication and copyright when digital content travels through an unsecured channel. A novel watermarking algorithm has been proposed based on five active positions and on using two marks. In addition to the extraction process, watermarking images will be subjected to a set of attack tests. The evaluation criteria have been the bases of assessing the value of SNR, PNSR, MAE and RMSE for both the watermarking images and the watermarking images after attacks, followed by the invisibility of the watermarking being measured before and after the attacks. Our lab results show high robustness and high quality images obtaining value for both SNR and PNSR.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
This document provides a review of blind source separation (BSS) based digital image watermarking and extraction methods. It begins with an introduction to BSS and its application in digital image watermarking. It then surveys various digital image watermarking methods and BSS techniques used for watermark embedding and extraction. The document discusses the general watermarking framework including embedding, attacks, and detection. It also explores challenges in digital image watermarking such as capacity, robustness, and transparency. Finally, it concludes that further research can improve BSS-based watermarking methods to achieve high imperceptibility and robustness.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
Abstract :The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are unknown. One of the more interesting applications of BSS is in field of image data security/authentication where digital watermarking is proposed. Watermarking is a promising technique to help protect data security and intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here with their features and limitations. Thus literature survey is presented in two major categories-Digital image watermarking methods and BSS based techniques in digital image watermarking and extraction. Keywords – BSP, BSS, Mixing Coefficient, Digital Image Watermarking, Watermark Extraction.
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security.
This document discusses a randomized LSB hiding approach for nested digital image watermarking. It proposes encrypting one watermark image using Blowfish before embedding it into another watermark image using randomized LSB hiding. This nested watermark is then encrypted again using Blowfish before being embedded into the cover image for increased security. Randomized LSB hiding is used for embedding as it has lower complexity and is more robust than direct LSB hiding. The approach aims to improve security and embedding capacity for copyright protection of digital images.
Lsb hiding using random approach for image watermarkingeSAT Journals
Abstract A digital image watermarking is the process of embedding an image with a secondary parameter called watermark, without deterioration in the quality of image to provide copyright protection means to provide protection for intellectual property from illegal copying. In this paper the method of nested digital image watermarking is used that means a watermark inside another watermark embedded into the cover image that is the main image. Here the Randomized LSB hiding algorithm is used for embedding one image into another as it has lesser complexity and the approach is more robust to the variations in the type of image. The blowfish algorithm is used to encrypt the watermark image before embedding into the cover image. The concept of encryption of watermark image before get embedded into the main image is used here to increase the security of the watermark image. This is because the research work is mainly focus on to get the more secured watermark by improving and enhancing the embedding capacity. Key Words: Digital image Watermarking, Randomized LSB, Blowfish, Copyright Protection
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1) The document proposes a hybrid digital watermarking scheme that uses both discrete wavelet transform (DWT) and singular value decomposition (SVD) for color image authentication.
2) In the proposed scheme, the watermark is embedded in the singular values of the DWT sub-bands of the cover image, rather than directly on the wavelet coefficients. This reduces computational expense compared to other DWT-SVD methods.
3) Experimental results on test images show that the hybrid DWT-SVD scheme provides better imperceptibility and robustness against various attacks compared to using DWT or SVD alone. The recovered watermarks had high quality even after the watermarked images were distorted.
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
Copyright protection has become a need in today’s world. To achieve a secure copyright protection we embedded some information in images and videos and that image or video is called copyright protected. The embedded information can’t be detected by human eye but some attacks and operations can tamper that information to breach protection. So in order to find a secure technique of copyright protection, we have analyzed image processing techniques i.e. Spatial Domain (Least Significant Bit (LSB)), Transform Domain (Discrete Cosine Transform (DCT)), Discrete Wavelet Transform (DWT) and there are numerous algorithm for watermarking using them. After having a good understanding of the same we have proposed a novel algorithm named as Stage Staffing Algorithm that generates results with high effectiveness, additionally we can use self extracted-watermark technique to increase the security and automate the process of watermark image. The proposed algorithm provides protection in three stages. We have implemented the algorithm and results of the simulations are shown. The various factors affecting spatial domain watermarking are also discussed.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
Digital watermarking knowledge is a leading edge research field and it mainly focuses on the
intellectual property rights, hides data and embedded inside an image to show authenticity or proof
of ownership, discovery and authentication of the digital media to protect the important documents.
Digital watermarking can help to verify ownership, to recognize a misappropriate person and find the
marked documents. One of the significant technological actions of the last two decades was the
attack of digital media in a complete range of everyday life aspects.
Digital data can be stored efficiently with a very high quality and it can be manipulated very
easily using computers. In addition digital data can be transmitted in a fast and inexpensive way
through data communication networks without losing quality. According to the necessary study of
digital image watermarking, the digital watermarking model consists of two modules, which are
watermark embedding module and watermark extraction and detection module.
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
A Survey on Features Combination for Image WatermarkingEditor IJMTER
As the internet users are increasing day by day it is easy to transfer digital data. By this new
problem of data piracy is increasing. For this different methods of watermarking are developed for
protecting the digital data like video, audio, image, etc. Out of these many researcher are working on
image watermarking field from last few decades. This paper focus on the image watermarking features
combination with various techniques which are broadly categorized into spatial and frequency domain.
Many features are studied with their different requirement and functionality. It has been observed that
most of the researcher combines many features for achieving the prior goal of the watermark that is to
embed watermark and extract from the carrier image in presence of different attack.
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
A New Wavelet based Digital Watermarking Method for Authenticated Mobile SignalsCSCJournals
The mobile network security is becoming more important as the number of data being exchanged on the internet increases. The growing possibilities of modern mobile computing environment are potentially more vulnerable to attacks. As a result, confidentiality and data integrity becomes one of the most important problems facing Mobile IP (MIP). To address these issues, the present paper proposes a new Wavelet based watermarking scheme that hides the mobile signals and messages in the transmission. The proposed method uses the successive even and odd values of a neighborhood to insert the authenticated signals or digital watermark (DW). That is the digital watermark information is not inserted in the adjacent column and row position of a neighborhood. The proposed method resolves the ambiguity between successive even odd gray values using LSB method. This makes the present method as more simple but difficult to break, which is an essential parameter for any mobile signals and messages. To test the efficacy of the proposed DW method, various statistical measures are evaluated, which indicates high robustness, imperceptibility, un-ambiguity, confidentiality and integrity of the present method.
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
Image watermarking has come to wide use in the recent past. It is by the authentication problems and limitation means that the setting accuracy of the image watermarking operation is minimized. Different types of integration schemes have been proposed in the past to improve efficiency and makes the
embedding resistant against various attacks .Although transformation, spatial domain approaches have been developed PSNR improvements in image artifacts due to the fringes are still to be observed. To improvise the embedding, image artifacts in this paper a forward – based image embedding scheme is proposed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
The document describes a technique for watermarking grayscale images using the least significant bit (LSB) method. It begins with an abstract that introduces digital watermarking and LSB watermarking. It then provides more details on the LSB algorithm and how it embeds a watermark by replacing the LSB of selected image pixels. The paper tests the technique on various images, embedding the watermark in different bit positions. It calculates the mean squared error and peak signal-to-noise ratio for the watermarked images. Finally, it applies different noise attacks to the watermarked images and measures the effect on quality.
This document discusses various digital image watermarking techniques. It begins with an introduction and then discusses applications of watermarking as well as previous related work. It then discusses different watermarking domains, techniques, requirements, attacks, and example use cases. It provides references to 12 research papers on topics like DWT, DCT, and transform domain watermarking techniques that are robust to various attacks while maintaining imperceptibility and other goals.
A novel attack detection technique to find attack in watermarked images with ...prjpublications
The document describes a novel technique for detecting attacks on watermarked images. The technique uses Peak Signal-to-Noise Ratio (PSNR) and RGB color intensity values to analyze differences between an original watermarked image and a tested watermarked image. If the PSNR value is above a threshold, the images are considered identical. Otherwise, RGB intensity levels are compared. A match suggests no attack, while a mismatch identifies an attacked image and the type of attack applied. The technique is demonstrated by hiding data in an image, applying attacks, and correctly detecting the attacks based on PSNR and RGB analyses. Evaluation shows the approach effectively identifies various watermark attacks.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
More Related Content
Similar to An Overview on Research Trends, Challenges, Applications and Future.pdf
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
The transition from analog technologies to digital technologies has increased the ever-growing concern for protection and authentication of digital content and data. Owners of digital content of any type are seeking and exploring new technologies for the protection of copyrighted multimedia content. Multimedia protection has become an issue in recent years, and to deal with this issue, researchers are continuously searching for and exploring new effective and efficient technologies. This thesis study has been prepared in order to increase the invisibility and durability of invisible watermarking by using the multilayer Discrete Wavelet Transform (DWT) in the frequency plane and embedding two marks into an image for the purpose of authentication and copyright when digital content travels through an unsecured channel. A novel watermarking algorithm has been proposed based on five active positions and on using two marks. In addition to the extraction process, watermarking images will be subjected to a set of attack tests. The evaluation criteria have been the bases of assessing the value of SNR, PNSR, MAE and RMSE for both the watermarking images and the watermarking images after attacks, followed by the invisibility of the watermarking being measured before and after the attacks. Our lab results show high robustness and high quality images obtaining value for both SNR and PNSR.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
This document provides a review of blind source separation (BSS) based digital image watermarking and extraction methods. It begins with an introduction to BSS and its application in digital image watermarking. It then surveys various digital image watermarking methods and BSS techniques used for watermark embedding and extraction. The document discusses the general watermarking framework including embedding, attacks, and detection. It also explores challenges in digital image watermarking such as capacity, robustness, and transparency. Finally, it concludes that further research can improve BSS-based watermarking methods to achieve high imperceptibility and robustness.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
Abstract :The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are unknown. One of the more interesting applications of BSS is in field of image data security/authentication where digital watermarking is proposed. Watermarking is a promising technique to help protect data security and intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here with their features and limitations. Thus literature survey is presented in two major categories-Digital image watermarking methods and BSS based techniques in digital image watermarking and extraction. Keywords – BSP, BSS, Mixing Coefficient, Digital Image Watermarking, Watermark Extraction.
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security.
This document discusses a randomized LSB hiding approach for nested digital image watermarking. It proposes encrypting one watermark image using Blowfish before embedding it into another watermark image using randomized LSB hiding. This nested watermark is then encrypted again using Blowfish before being embedded into the cover image for increased security. Randomized LSB hiding is used for embedding as it has lower complexity and is more robust than direct LSB hiding. The approach aims to improve security and embedding capacity for copyright protection of digital images.
Lsb hiding using random approach for image watermarkingeSAT Journals
Abstract A digital image watermarking is the process of embedding an image with a secondary parameter called watermark, without deterioration in the quality of image to provide copyright protection means to provide protection for intellectual property from illegal copying. In this paper the method of nested digital image watermarking is used that means a watermark inside another watermark embedded into the cover image that is the main image. Here the Randomized LSB hiding algorithm is used for embedding one image into another as it has lesser complexity and the approach is more robust to the variations in the type of image. The blowfish algorithm is used to encrypt the watermark image before embedding into the cover image. The concept of encryption of watermark image before get embedded into the main image is used here to increase the security of the watermark image. This is because the research work is mainly focus on to get the more secured watermark by improving and enhancing the embedding capacity. Key Words: Digital image Watermarking, Randomized LSB, Blowfish, Copyright Protection
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1) The document proposes a hybrid digital watermarking scheme that uses both discrete wavelet transform (DWT) and singular value decomposition (SVD) for color image authentication.
2) In the proposed scheme, the watermark is embedded in the singular values of the DWT sub-bands of the cover image, rather than directly on the wavelet coefficients. This reduces computational expense compared to other DWT-SVD methods.
3) Experimental results on test images show that the hybrid DWT-SVD scheme provides better imperceptibility and robustness against various attacks compared to using DWT or SVD alone. The recovered watermarks had high quality even after the watermarked images were distorted.
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
Copyright protection has become a need in today’s world. To achieve a secure copyright protection we embedded some information in images and videos and that image or video is called copyright protected. The embedded information can’t be detected by human eye but some attacks and operations can tamper that information to breach protection. So in order to find a secure technique of copyright protection, we have analyzed image processing techniques i.e. Spatial Domain (Least Significant Bit (LSB)), Transform Domain (Discrete Cosine Transform (DCT)), Discrete Wavelet Transform (DWT) and there are numerous algorithm for watermarking using them. After having a good understanding of the same we have proposed a novel algorithm named as Stage Staffing Algorithm that generates results with high effectiveness, additionally we can use self extracted-watermark technique to increase the security and automate the process of watermark image. The proposed algorithm provides protection in three stages. We have implemented the algorithm and results of the simulations are shown. The various factors affecting spatial domain watermarking are also discussed.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
Digital watermarking knowledge is a leading edge research field and it mainly focuses on the
intellectual property rights, hides data and embedded inside an image to show authenticity or proof
of ownership, discovery and authentication of the digital media to protect the important documents.
Digital watermarking can help to verify ownership, to recognize a misappropriate person and find the
marked documents. One of the significant technological actions of the last two decades was the
attack of digital media in a complete range of everyday life aspects.
Digital data can be stored efficiently with a very high quality and it can be manipulated very
easily using computers. In addition digital data can be transmitted in a fast and inexpensive way
through data communication networks without losing quality. According to the necessary study of
digital image watermarking, the digital watermarking model consists of two modules, which are
watermark embedding module and watermark extraction and detection module.
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
A Survey on Features Combination for Image WatermarkingEditor IJMTER
As the internet users are increasing day by day it is easy to transfer digital data. By this new
problem of data piracy is increasing. For this different methods of watermarking are developed for
protecting the digital data like video, audio, image, etc. Out of these many researcher are working on
image watermarking field from last few decades. This paper focus on the image watermarking features
combination with various techniques which are broadly categorized into spatial and frequency domain.
Many features are studied with their different requirement and functionality. It has been observed that
most of the researcher combines many features for achieving the prior goal of the watermark that is to
embed watermark and extract from the carrier image in presence of different attack.
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
A New Wavelet based Digital Watermarking Method for Authenticated Mobile SignalsCSCJournals
The mobile network security is becoming more important as the number of data being exchanged on the internet increases. The growing possibilities of modern mobile computing environment are potentially more vulnerable to attacks. As a result, confidentiality and data integrity becomes one of the most important problems facing Mobile IP (MIP). To address these issues, the present paper proposes a new Wavelet based watermarking scheme that hides the mobile signals and messages in the transmission. The proposed method uses the successive even and odd values of a neighborhood to insert the authenticated signals or digital watermark (DW). That is the digital watermark information is not inserted in the adjacent column and row position of a neighborhood. The proposed method resolves the ambiguity between successive even odd gray values using LSB method. This makes the present method as more simple but difficult to break, which is an essential parameter for any mobile signals and messages. To test the efficacy of the proposed DW method, various statistical measures are evaluated, which indicates high robustness, imperceptibility, un-ambiguity, confidentiality and integrity of the present method.
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
Image watermarking has come to wide use in the recent past. It is by the authentication problems and limitation means that the setting accuracy of the image watermarking operation is minimized. Different types of integration schemes have been proposed in the past to improve efficiency and makes the
embedding resistant against various attacks .Although transformation, spatial domain approaches have been developed PSNR improvements in image artifacts due to the fringes are still to be observed. To improvise the embedding, image artifacts in this paper a forward – based image embedding scheme is proposed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
The document describes a technique for watermarking grayscale images using the least significant bit (LSB) method. It begins with an abstract that introduces digital watermarking and LSB watermarking. It then provides more details on the LSB algorithm and how it embeds a watermark by replacing the LSB of selected image pixels. The paper tests the technique on various images, embedding the watermark in different bit positions. It calculates the mean squared error and peak signal-to-noise ratio for the watermarked images. Finally, it applies different noise attacks to the watermarked images and measures the effect on quality.
This document discusses various digital image watermarking techniques. It begins with an introduction and then discusses applications of watermarking as well as previous related work. It then discusses different watermarking domains, techniques, requirements, attacks, and example use cases. It provides references to 12 research papers on topics like DWT, DCT, and transform domain watermarking techniques that are robust to various attacks while maintaining imperceptibility and other goals.
A novel attack detection technique to find attack in watermarked images with ...prjpublications
The document describes a novel technique for detecting attacks on watermarked images. The technique uses Peak Signal-to-Noise Ratio (PSNR) and RGB color intensity values to analyze differences between an original watermarked image and a tested watermarked image. If the PSNR value is above a threshold, the images are considered identical. Otherwise, RGB intensity levels are compared. A match suggests no attack, while a mismatch identifies an attacked image and the type of attack applied. The technique is demonstrated by hiding data in an image, applying attacks, and correctly detecting the attacks based on PSNR and RGB analyses. Evaluation shows the approach effectively identifies various watermark attacks.
Similar to An Overview on Research Trends, Challenges, Applications and Future.pdf (20)
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
An Overview on Research Trends, Challenges, Applications and Future.pdf
1. RESEARCH ARTICLE
RSP Science Hub
International Research Journal on Advanced Science Hub
2582-4376
Vol. 05, Issue 01 January
www.rspsciencehub.com
http://dx.doi.org/10.47392/irjash.2023.002
An Overview on Research Trends, Challenges, Applications and Future
Direction in Digital Image Watermarking
Pavan A C 1
, M T Somashekara2
1
Research Scholar, Department of Computer Science and Applications, Bangalore University, Bangalore, India
2
Associate Professor, Department of Computer Science and Applications, Bangalore University, Bangalore, India
Emails: shyam2712.pavan@gmail.com, somashekar mt@hotmail.com
Article History
Received: 20 December 2022
Accepted: 22 January 2023
Keywords:
Digital image Watermark-
ing;
Tamper Detection;
Visual Imperceptibility;
Robustness
Abstract
Digital data including photographs, audio, and video are now readily available
because to the development of the Internet. The ease of access to multime-
dia raises concerns about ownership identification, authentication of content,
security, and copyright protection. Here, we talk about the idea of digital pic-
ture watermarking with an emphasis on the method utilized for embedding and
extracting the watermark from images. This paper also presents a complete
classification of digital watermarking along with its fundamental properties,
such as visual imperceptibility, resilience, capacity, and security. Additionally,
we have covered the most recent uses of digital watermarking in the fields of
healthcare, distance learning, electronic voting, and the military. The robust-
ness is assessed by looking at how image processing assaults affect the content
that is signed and the recoverability of the watermark. The thorough survey
that is offered in this study, in the opinion of the authors, will aid brand-new
scholars in learning more about this area. Additionally, the comparative study
can spark suggestions for how to enhance the methods already outlined.
1. Introduction
The ability to gather information is the key to an
organization’s success in the modern day. How well
it can prevent other users from accessing and mod-
ifying the information produced by its operations
and processes is also a cause for concern. The ease
of access to digital storage devices, as well as the
Internet’s widespread use, has made it simple to
produce and distribute digital material. This has
made it imperative to create strategies for combating
copyright violations (C. Kumar, A. K. Singh, and P.
Kumar P. Singh and Chadha).
Digital watermarking is a widely used approach
in cases where an organisation needs to prevent
data from leaking into the public domain. When a
business has a direct fiduciary relationship with its
customers and is required to protect their informa-
tion as well, it is absolutely essential (C. Kumar,
A. K. Singh, and P. Kumar). Digital watermarking
is a technique to offer defence against any modifi-
cation or tampering (S. Kumar, B. K. Singh, and
Yadav Cox et al. S. Kumar and Dutta). It pro-
tects digital content and authenticates users. Sig-
nal information is inserted into the original media
content as part of the digital watermarking process.
In order to identify the true owner of the digital
media, the implanted information is then discov-
ered and removed. The process of watermarking
entails incorporating watermark, digital signature,
or label data into the digital medium. You can
extract this watermark to show the media object’s
OPEN ACCESS 8
2. Challenges, Applications and Future Direction in Digital Image Watermarking 2023, Vol. 05, Issue 01 January
legitimacy (Abraham and Paul). We can visualise a
recognisable ”seal” over an image as an illustration
of a watermark.
There are three basic parts of digital watermark-
ing algorithm: -
1. Creating Watermark
2. An Encoding algorithm
3. A decoding algorithm (C. Kumar, A. K. Singh,
and P. Kumar Y. Liu et al. A. K. Singh et al.).
This method can be applied for confidential com-
munication, copyright protection, embedding fin-
gerprints for data integrity checks, and placing
authentication. Tracing illicit users so that the owner
can contact regulatory authorities is another signifi-
cant application of watermarking technology. It can
be helpful to make sure that information about the
individuals who purchase and sell digital material is
recorded for each transaction. For the purpose of
preventing violations of copyright, this data can be
tracked further. In fact, this unauthorised dissem-
ination of digital content requires the implementa-
tion of rigorous restrictions. The paper is organised
as follows: Section 2 classifies digital watermark-
ing according to a number of factors. The salient
characteristics of digital watermarking are described
in Section 3. The most recent fields of watermark-
ing application are covered in Section 4. The many
sorts of attacks are presented in Section 5. The key
findings and outcomes of related research by vari-
ous authors are examined in section 6, and the con-
clusions and potential future applications of image
watermarking are presented in section 7.
2. Digital Watermarking Classifications
This aspect of paper describes the categorization of
digital watermarking which is based on some of the
criteria (Pavan and Somashekara) like robustness,
perceptibility, area, and multimedia detection tech-
nique. We will also discuss the many widely used
watermarking techniques in the next section.
2.1. Based on Characteristics/Robustness
Robust: When copyright information must be incor-
porated, strong watermarking is suggested. If the
watermarked image survives an attack undisturbed,
this shows robustness. It is resistant to numerous
assaults. It is evident that a strong watermark is use-
ful for copyright protection.
Fragile: If the data has been altered, it is simple
to determine from the watermark’s condition. This
watermark is the best option for integrity protection.
Semi-fragile: A semi-fragile watermark is toler-
ant of some degree of modification (P. Singh and
Chadha S. Kumar, B. K. Singh, and Yadav Abraham
and Paul).
2.2. Based on Perceptibility
Perceptible: Perceptible refers to a visible water-
mark.
Imperceptible: Imperceptible watermark is the
phrase used to describe a watermark that cannot be
seen. This prevents the visibility of information that
is hidden within the image. In these circumstances, a
barely discernible watermark can be used to demon-
strate ownership of the image (P. Singh and Chadha
A. Dixit and R. Dixit).
2.3. Based on Domain
Frequency: Before anything further, the image
is converted to the frequency domain. Different
transformation techniques, including DCT, DFT,
and DWT, are used in this type of watermark-
ing (Sherekar, Thakare, and Jain).
Spatial: The watermark is injected into the host
image, and watermarking in this context modifies
the value of pixels in randomly chosen areas of
images. In the spatial domain, no transformation
or conversion is used. Some of the well-liked spa-
tial domain-based approaches include LSB, Patch-
work method, and SSM Modulation (P. Singh and
Chadha S. Kumar, B. K. Singh, and Yadav). In gen-
eral, watermarking done in the frequency domain is
more reliable than watermarking done in the spatial
domain.
2.4. Spatial Domain
Method of Least Significant Bit (LSB):
The watermark is put using this technique in the
image’s pixels’ least significant bit (LSB). The best
method for embedding is either of the two. One
method substitutes a pseudo-noise (PN) sequence
for the LSB of an image, while another method adds
the PN sequencing to the LSB. Although the LSB
approach is simple to implement, it sacrifices robust-
ness against attacks.
Method of Patchwork:
Patchwork technique selects n pairings of picture
points at random (x, y). Data is darkened in the y
region and lightened in the x region. Although this
approach may endure numerous assaults, it is not
9
3. Pavan A C and Somashekara 2023, Vol. 05, Issue 01 January
very powerful.
2.5. Frequency Domain
Discrete cosine transforms (DCT):
The methodology used in this method involves
separating a picture signal into non-overlapping
blocks of size 8 8 pixels. Following the comple-
tion of block-wise DCT, the coefficients to be water-
marked are selected. To obtain the signed picture, an
inverse of DCT is then performed to each 8x8 block.
Discrete wavelets transform (DWT):
This technique involves applying a series of low
and high-pass filters on the image. The decomposi-
tion of an image into four equal subbands includes
horizontal features, low frequency (LL), diagonal
and vertical features (HL) in each subband (HH).
Because it offers a reliable and safe watermarking
method, it is a favoured algorithm (P. Singh and
Chadha S. Kumar, B. K. Singh, and Yadav Sherekar,
Thakare, and Jain).
2.6. Based on the Process of Detection
Blind: These watermarking techniques fall into this
category, and all that is needed to remove the embed-
ded data is the watermarked image. Applications
for it include copyright protection, voting, and other
things (Agarwal, A. K. Singh, and P. K. Singh).
Non-Blind: In such kind of watermarking, the
procedure duplicates the watermark with the text
data, the image, and the added data. Copyright pro-
tection is one area where it is used (Agarwal, A. K.
Singh, and P. K. Singh).
2.7. Based on Multimedia
Words, punctuation, phrases, and other elements
make up text watermarking. One of these com-
ponents undergoes transformation, and the result
watermark is embedded (S. Kumar, B. K. Singh,
and Yadav). Large-size photographs must be water-
marked, which is accomplished by image water-
marking. We demand strong watermarks on pho-
tographs that should be undetectable (S. Kumar,
B. K. Singh, and Yadav). Video watermarking: In
this situation, getting an undetectable watermark is
challenging. Graphic Watermarking: A watermark
is incorporated into 2D or 3D digital graphics. It
offers copyright defence.
3. Some of the Characteristics of Digital
Watermarking
Here, few aspects of digital watermarking are
mentioned:-
Robustness: The digital watermark can withstand
various processing activities and attacks, according
to the robustness characteristic. After that, it is
regarded as robust (S. Liu, Pan, and H. Song).
Imperceptibility: The feature of imperceptibility
states that a watermarked image should not be per-
ceptible to the human eye. The embedded water-
mark shouldn’t be visible. Only specialist proce-
dures can detect it. The act of embedding a water-
mark should be done in a way that preserves the
integrity of the material and ensures that the viewer
cannot see the watermark (S. Liu, Pan, and H. Song).
Security: According to the security function, the
embedded digital watermark cannot be deleted, even
in the event of targeted attacks. According to water-
mark security, it should be difficult to change or
remove a watermark without doing any harm to the
host signal. Data ownership, protection, and confi-
dentiality can all be achieved by watermarking secu-
rity (P. Singh and Chadha). Data payload or capacity
refers to the volume of information included within
a watermarked image (S. Kumar, B. K. Singh, and
Yadav).
Verifiability: Using the watermark, we ought to
be able to obtain some proof of who owns copyright-
protected data. This assists in determining the legiti-
macy of any digital data and even in restricting unau-
thorised copying of it (Su, Yuan, and D. Liu).
4. Few Recent Watermarking Applications
As we are all aware, photos are freely available on
the internet and may be simply distributed. Com-
mercial usage of these photos is permitted. Data
must therefore be protected by copyright, and digi-
tal watermarking is highly helpful in this regard. To
determine who owns the copyright, a digital water-
mark will be inserted (P. Singh and Chadha Agar-
wal, A. K. Singh, and P. K. Singh). Digital water-
marking using a fingerprint may be suggested as a
way to embed some individuality. It should be tough
to modify the fingerprint. The data entered is asso-
ciated with the customer. This fingerprinting reveal
which authorised consumers are participating in the
distribution of copyright data in violation of the con-
tract (P. Singh and Chadha Sherekar, Thakare, and
International Research Journal on Advanced Science Hub (IRJASH) 10
4. Challenges, Applications and Future Direction in Digital Image Watermarking 2023, Vol. 05, Issue 01 January
Jain). Digital watermarking can be used to stop the
unauthorised reproduction of digital data. Devices
that perform replication are able to recognise these
watermarks, report instances of copying, and so pre-
vent unauthorised copying (S. Kumar, B. K. Singh,
and Yadav A. Dixit and R. Dixit).
Broadcast Monitoring: It has been increasingly
easier and more common to access and find media
content throughout time. The information is also
accessible online. In these circumstances, it is cru-
cial for content owners and copyright holders to be
aware of the actual content distributor. Here, digital
watermarking is crucial (S. Kumar, B. K. Singh, and
Yadav A. Dixit and R. Dixit).
Medical Application: Visible watermarking can
be used to embed the patient’s name in the reports
from an MRI, CT, or X-ray scan. These medical
reports determine how the patient will be treated.
Thus, visible watermarking is a technique that can
be utilised to prevent report mixing (Agarwal, A. K.
Singh, and P. K. Singh).
Electronic voting system: From large cities to
tiny communities, the Internet is now widely used
throughout the nation. Elections are carried out with
the assistance of electronic voting while taking secu-
rity into account (Agarwal, A. K. Singh, and P. K.
Singh).
Remote Education: In small settlements, a teacher
shortage is a major issue. Distance learning requires
the use of smart technology. In this instance, water-
marking contributes to the reliable transmission of
educational content via the internet (Agarwal, A. K.
Singh, and P. K. Singh Sherekar, Thakare, and Jain).
5. Attacks on Watermarking
The assault resistance of a watermarking technol-
ogy is a constant criterion for evaluation. Oper-
ations on any watermark are conducted to disable
the watermark that has been implanted or make it
more challenging for users to locate the watermark.
Any assault aims to undermine the security that
digital content receives from a watermark. Water-
marking attacks fall into four categories: protocol
attack, cryptographic attack, geometry attack and
removal attack (Sanjay and Dutta C. Song et al.
Voloshynovskiy et al.).
Geometry Attack: This type of processing
applies to the watermark image and modifies its
geometry by rotation, cropping, and other tech-
niques. Additional categories for these include crop-
ping, scaling, translation, and rotation (Abraham
and Paul).
Assault for Data Removal: This attack seeks to
delete the added information from the digital image.
If it is unable to, they nonetheless attempt to destroy
the contained data (Su, Yuan, and D. Liu). Assaults
that fall within this category, known as protocol
attacks, do not harm embedded data. There are two
different kinds of Protocol assaults: Invertible and
Copy attacks. A watermark should therefore be non-
invertible and uncopyable. The watermark can be
reverse if the attacker deletes their particular water-
mark from the host image. The attacker then imper-
sonates the data’s owner. This demonstrates that
non-invertible watermarks are necessary for copy-
right protection (Vaidya and Pvssr Su, Yuan, and D.
Liu).
Copy Attack: This type of attack Protocols also
exists. The watermark is not removed in this either.
The attacker instead makes an estimate of the water-
mark using host data. Then it is copied to additional
data (Vaidya and Pvssr). Attacks that compromise
the security of watermarking methods fall under the
category of cryptographic attacks. With this, they
can either extract the watermark data that was added
or add a shady watermark. This includes the Brute-
force and Oracle assaults (Su, Yuan, and D. Liu). In
order to give a thorough analysis of picture water-
marking, we assembled a collection of a few publi-
cations, some of which served to establish the his-
tory of digital watermarking and others of which
were considered to be pertinent to the topic. Table
1 lists the watermarking plans put out by different
research teams over the past few years after conduct-
ing a comparative analysis.
The table includes a review and evaluation of ear-
lier work on digital watermarking methods. Some
of the common strategies that have been previously
investigated include the spatial domain and fre-
quency domain techniques. Furthermore, it has been
discovered that image pixels digital watermarking is
less trustworthy and hence less common. The water-
marked image’s performance is assessed using its
capacity, security, imperceptibility, and robustness.
These were the most preferred criteria because they
included the watermarked image’s visual impercep-
tibility and the watermarking’s durability. In fact,
future work has the potential to combine techniques
11
5. Pavan A C and Somashekara 2023, Vol. 05, Issue 01 January
TABLE
1.
Summary
of
various
Watermarking
Schemes
Research
group
Title
Technique
used
Input
Visual
Impercepti-
bility
Robustness
Abraham
and
Paul
[6]
”An
impercep-
tible
spatial
domain
color
image
water-
marking
scheme”
Spatial
domain
Simple
Image
Region
Detector
(SIRD):
Esti-
mation
of
most
suitable
portion
within
the
block
of
an
image.
Cover
image
Col-
ored
image
of
Size:
512
X
512
X
3
pix-
els
Watermark
Size:
64
X
64
pixels
PSNR
=
47.6
dB
SSIM
=
0.9904
NCC
=
Range
[0.9917
-
1]
BER=
Range
[0.7500-
0]
Attacks
considered:
Salt
and
Pepper,
Poisson,
Speckle,
average
filtering,
Gaussian
LPF,
Sharpening,
JPEG
Compression,
Crop-
ping,
Resizing
Liu
et
al.
[15]
”Digital
image
watermarking
method
based
on
DCT
and
fractal
encoding”
Fractal
encoding
and
DCT
method
are
combined
for
dou-
ble
encryption
for
embedding
purpose.
Cover
image
Size:
1024
X
1024
pix-
els
Watermark
Size:
256
X
256
pixels
PSNR
Range=[41-
45
]
dB
Attacks
Considered:
white
noise
attack,
Gaussian
fil-
ter
attack,
JPEG
compres-
sion
attack.
Moosaza
deh
and
Ekbatanif
ard
[17]
”A
new
DCT-
based
robust
image
water-
marking
method
using
teachinglearning-
Based
optimiza-
tion”
Image
watermarking
scheme
based
on
DCT
Teaching-
Learning-
Based
Optimization
(TLBO):
Automatic
detection
of
embedding
parameters
and
suitable
position
for
inserting
the
watermark.
Cover
image
Size:
512
X
512
pixels
Watermark
Size:
32
X
32
pixels
PSNR=
Range[39.95-
40.73]
NCC
=
Range
[0.7871-
0.9901]
Attacks
considered
:
Salt
&
pepper
noise,
Uni-
form
noise,
Poisson
noise,
Gaussian
noise,
Scaling,
Rotation,
Cropping,
Sharp-
ening,
Motion
Filter,
Disk
filter,
Wiener,
Median
fil-
ter,
Gaussian
Filter,
JPEG
compression
Ambadek
ar
et
al.[24]
”Digital
Image
Watermarking
Through
Encryp-
tion
and
DWT
for
Copyright
Protection”
DWT
and
encryption-based
watermarking.
Cover
Image
Size:
228
x
228
Pixels
Watermark
Size:
grayscale
image
90
x
90
pixels
PSNR=54.96
dB
NCC=0.9749
Attacks
Con-
sidered
:
Noise,
Geometric,
Compression
International Research Journal on Advanced Science Hub (IRJASH) 12
6. Challenges, Applications and Future Direction in Digital Image Watermarking 2023, Vol. 05, Issue 01 January
and employ them in hybrid form to not only improve
the durability of the watermarked image but also
to mitigate the shortcomings of each methodology
taken independently.
6. Conclusion
This article provides a general overview of digi-
tal image watermarking systems in addition to pro-
viding comprehensive classification and characteris-
tics. The several application fields, including health-
care, distance learning, military, and electronic vot-
ing systems, have been discussed. Due to the
widespread transmission of digital data, it’s seen
that data security has elevated to the top of the prior-
ity list. Digital watermarking is therefore employed
for giving approved data or protecting sensitive data.
Robustness, imperceptibility, security, and capacity
are used to assess how well the watermarked pho-
tos operate. PSNR and bit-error ratio are used to
examine them. It was found that the favoured cri-
terion was robustness. For the purposes of con-
tent authentication and ownership evidence, invis-
ible watermarking is used. Research teams have
used frequency domain methods and made an effort
to strike a balance between visual imperceptibility
and resilience. In this essay, we examine numerous
watermarking techniques applied on digital photos
in the recent past.
Authors’ Note
The authors declare that there is no conflict of
interest regarding the publication of this article.
Authors confirmed that the pa-per was free of pla-
giarism.
References
Abraham, Jobin and Varghese Paul. “An impercep-
tible spatial domain color image watermarking
scheme”. Journal of King Saud University - Com-
puter and Information Sciences 31.1 (2019): 125–
133. 10.1016/j.jksuci.2016.12.004.
Agarwal, Namita, Amit Kumar Singh, and Pradeep
Kumar Singh. “Survey of robust and imper-
ceptible watermarking”. Multimedia Tools and
Applications 78.7 (2019): 8603–8633. 10.1007/
s11042-018-7128-5.
Cox, I, et al. “Digital watermarking and steganogra-
phy”. (2007).
Dixit, A and R Dixit. “A Review on Digital Image
Watermarking Techniques”. International Jour-
nal of Image, Graphics & Signal Processing 9.4
(2017). 10.5815/ijigsp.2017.04.0.
Kumar, Chandan, Amit Kumar Singh, and Pardeep
Kumar. “A recent survey on image watermarking
techniques and its application in e-governance”.
Multimedia Tools and Applications 77.3 (2018):
3597–3622. 10.1007/s11042-017-5222-8.
Kumar, Sanjay and Ambar Dutta. “Performance
analysis of spatial domain digital watermarking
techniques”. 2016 International Conference on
Information Communication and Embedded Sys-
tems (ICICES) (2016): 1–4. 10 . 1109 / ICICES .
2016.7518910.
Kumar, Sanjay, Binod Kumar Singh, and Mohit
Yadav. “A Recent Survey on Multimedia and
Database Watermarking”. Multimedia Tools and
Applications 79.27-28 (2020): 20149–20197. 10.
1007/s11042-020-08881-y.
Liu, Shuai, Zheng Pan, and Houbing Song. “Digital
image watermarking method based on DCT and
fractal encoding”. IET Image Processing 11.10
(2017): 815–821. 10 . 1109 / RTEICT . 2016 .
7808145.
Liu, Yang, et al. “Secure and robust digital image
watermarking scheme using logistic and RSA
encryption”. Expert Systems with Applications 97
(2018): 95–105. 10.1016/j.eswa.2017.12.003.
Sanjay, Kumar and Ambar Dutta. “A study on
robustness of block entropy based digital image
watermarking techniques with respect to vari-
ous attacks”. 2016 IEEE International Confer-
ence on Recent Trends in Electronics, Information
& Communication Technology (RTEICT) (2016):
1802–1806. 10.1109/RTEICT.2016.7808145.
Sherekar, S, V Thakare, and S Jain. “Role of Digi-
tal Watermark in e-governance and ecommerce”.
International Journal of Computer Science and
Network Security 8.1 (2008): 257–261.
Singh, A K, et al. “Medical Image Watermark-
ing: Techniques and Applications. Book series on
Multimedia Systems and Applications”. (2017).
13