Skip to content
2000
Volume 18, Issue 8
  • ISSN: 2352-0965
  • E-ISSN: 2352-0973

Abstract

With the Internet expanding, multimedia security has become a significant problem. As digital image manipulation is getting simpler, the certification of authenticity has become more difficult. Digital watermarking outperforms conventional security methods for protecting photos from attacks. The need for reliable image authentication methods in the contemporary digital era has always been a hot topic among academics and researchers. When transmitting sensitive information today through a regular correspondence route, many hacks are possible. Everyone, therefore, requires their digital data to be non-tampered. Many solutions are available like stenography, cryptography, and watermarking. Watermarking gives promising results when it comes to the authenticity of the images. The robustness and imperceptibility of several existing watermarking techniques are demonstrated in this study and critical analysis is performed. Additionally, the author provides a thorough introduction to key ideas like the transform domain and the spatial domain. This study also offers a thorough analysis of contemporary methods for watermarking digital images while showcasing established practices in various domains. Hence, this research study could potentially serve as a viable resource for researchers seeking to develop effective watermarking techniques for practical applications.

Loading

Article metrics loading...

/content/journals/raeeng/10.2174/0123520965317013240828054013
2024-09-10
2025-11-15
Loading full text...

Full text loading...

References

  1. PodilchukC.I. DelpE.J. Digital watermarking: algorithms and applications.IEEE Signal Process. Mag.2001184334610.1109/79.939835
    [Google Scholar]
  2. Secure Spread Spectrum Watermarking for Images, Audio, and Video.Proceedings of 3rd IEEE International Conference on Image Processing, 19 September 1996, Lausanne, Switzerland, pp. 243-246.
    [Google Scholar]
  3. GuptaS. SalujaK. SolankiV. KaurK. SinglaP. ShahidM. Efficient methods for digital image watermarking and information embedding.Measurement: Sensors20222410052010.1016/j.measen.2022.100520
    [Google Scholar]
  4. EvsutinO. DzhanashiaK. Watermarking schemes for digital images: Robustness overview.Signal Process. Image Commun.202210011652310.1016/j.image.2021.116523
    [Google Scholar]
  5. CaoX. FuZ. SunX. A privacy-preserving outsourcing data storage scheme with fragile digital watermarking-based data auditingJ. Elec. Comp. Eng.2016201641710.1155/2016/3219042
    [Google Scholar]
  6. Menendez-OrtizA. Feregrino-UribeC. Hasimoto-BeltranR. Garcia-HernandezJ.J. A survey on reversible watermarking for multimedia content: a robustness overview.IEEE Access2019713266213268110.1109/ACCESS.2019.2940972
    [Google Scholar]
  7. ZhangZ. XiaoW. LiuT. LiY. JinS. LiF. WangH. A reversible image watermarking algorithm for tamper detection based on SIFT.Multimedia Tools Appl.20238312346473466810.1007/s11042‑023‑16976‑5
    [Google Scholar]
  8. AzizogluG. ToprakA.N. A novel reversible fragile watermarking method in DWT domain for tamper localization and digital image authentication.Biomed. Signal Process. Control20238410501510.1016/j.bspc.2023.105015
    [Google Scholar]
  9. GaoG. WangM. WuB. Efficient robust reversible watermarking based on zms and integer wavelet transform.IEEE Trans. Industr. Inform.20242034115412310.1109/TII.2023.3321101
    [Google Scholar]
  10. SahuA.K. SahuM. PatroP. SahuG. NayakS.R. Dual image-based reversible fragile watermarking scheme for tamper detection and localization.Pattern Anal. Appl.202326257159010.1007/s10044‑022‑01104‑0
    [Google Scholar]
  11. GuptaM. Rama KishoreR. A survey of watermarking technique using deep neural network architecture- IEEE 2021 International Conference on Computing, Communication, and Intelligent Systems, 19-20 February 2021, Greater Noida, India, pp. 630–635.10.1109/ICCCIS51004.2021.9397226
    [Google Scholar]
  12. WangZ. ByrnesO. WangH. SunR. MaC. ChenH. WuQ. XueM. Data hiding with deep learning: a survey unifying digital watermarking and steganography.IEEE Trans. Comput. Soc. Syst.20231062985299910.1109/TCSS.2023.3268950
    [Google Scholar]
  13. SinghH.K. SinghA.K. Comprehensive review of watermarking techniques in deep-learning environments.J. Electron. Imaging202232312310.1117/1.JEI.32.3.031804
    [Google Scholar]
  14. Ben JabraS. Ben FarahM. Deep learning-based watermarking techniques challenges: a review of current and future trends.Circ. Syst. Sig. Proc.20244374339436810.1007/s00034‑024‑02651‑z
    [Google Scholar]
  15. GullS. ParahS.A. Advances in medical image watermarking: a state of the art review.Multimedia Tools Appl.20248311407144710.1007/s11042‑023‑15396‑937362709
    [Google Scholar]
  16. AyubaS. ZainonW.M.N.W. Medical image watermarking: a survey on applications, approach and performance requirement compliance.Int. J. Multimed. Inf. Retr.20231223310.1007/s13735‑023‑00290‑9
    [Google Scholar]
  17. A CP. M TS. An overview on research trends, challenges, applications and future direction in digital image watermarking.Int. Res. J. Adv. Sci. Hub20235181410.47392/irjash.2023.002
    [Google Scholar]
  18. SanthiB. PriyaS. Secure medical data transmission in mobile health care system using medical image watermarking techniquesMobile Computing Solutions for Healthcare SystemsBentham science publisherS202310411910.2174/9789815050592123010011
    [Google Scholar]
  19. DixitR. NandalA. DhakaA. AgarwalV. KuriakoseY.V. LWT-DCT based image watermarking scheme using normalized svd.Recent adv. comp. sci. comm.20211492976299110.2174/2666255813999200821161656
    [Google Scholar]
  20. AhmadM. NadeemM. IslamM. AliS. AgrawalA. Ahmad KhanR. Selection of digital watermarking techniques for medical image security by using the fuzzy analytical hierarchy process.Recent Adv. Comp. Sci. Comm.2023167e02052321640410.2174/2666255816666230502100729
    [Google Scholar]
  21. ChaudharyH. VishwakarmaV.P. Secure watermarking algorithm for enhancing invisibility and robustness of medical images2023 14th International Conference on Computing Communication and Networking Technologies, 06-08 July 2023, Delhi, India, pp. 1-7.10.1109/ICCCNT56998.2023.10307030
    [Google Scholar]
  22. GiriK.J. QuadriS.M.K. BashirR. BhatJ.I. DWT based color image watermarking: a review.Multimed. Tools Appl.20207943-44328813289510.1007/s11042‑020‑09716‑6
    [Google Scholar]
  23. CoxI.J. KilianJ. LeightonF.T. ShamoonT. Secure spread spectrum watermarking for multimedia.IEEE Trans. Image Process.19976121673168710.1109/83.65012018285237
    [Google Scholar]
  24. HartungF. KutterM. Multimedia watermarking techniques.Proc. IEEE19998771079110710.1109/5.771066
    [Google Scholar]
  25. WangZ. BovikA.C. SheikhH.R. SimoncelliE.P. Image quality assessment: from error visibility to structural similarity.IEEE Trans. Image Process.200413460061210.1109/TIP.2003.81986115376593
    [Google Scholar]
  26. KutterM. PetitcolasF.A.P. Fair benchmark for image watermarking systemsProceedings of SPIE - The International Society for Optical Engineering, January 1999, San Jose, California, U.S.A, pp. 226–239.
    [Google Scholar]
  27. CoxI. MillerM. BloomJ. HonsingerC. Digital Watermarking.J. Electron. Imaging200211341410.1117/1.1494075
    [Google Scholar]
  28. DatabaseU-S.I. Barbara Image.2024Available from: https://sipi.usc.edu/database/database.php?volume=miscimage=4.1.01
  29. NikolaidisN. PitasI. Robust image watermarking in the spatial domain.Signal Processing199866338540310.1016/S0165‑1684(98)00017‑6
    [Google Scholar]
  30. SuQ. ChenB. Robust color image watermarking technique in the spatial domain.Soft Comput.20182219110610.1007/s00500‑017‑2489‑7
    [Google Scholar]
  31. AbrahamJ. PaulV. An imperceptible spatial domain color image watermarking scheme.J. King Saud University - Comp. Info. Sci.201931112513310.1016/j.jksuci.2016.12.004
    [Google Scholar]
  32. CheungW.N. Digital image watermarking in spatial and transform domains2000 TENCON proceedings. Intelligent systems and Technologies for the new Millennium, 24-27 September 2000, Kuala Lumpur, Malaysia, pp. 374-378.10.1109/TENCON.2000.892292
    [Google Scholar]
  33. GunjalB.L. ManthalkarR.R. An overview of transform domain robust digital image watermarking algorithms.J. Emerg. Trends. Comp. Info. Sci.2010213742
    [Google Scholar]
  34. ShiehC.S. HuangH.C. WangF.H. PanJ.S. Genetic watermarking based on transform-domain techniques.Pattern Recognit.200437355556510.1016/j.patcog.2003.07.003
    [Google Scholar]
  35. ChuW.C. DCT-based image watermarking using subsampling.IEEE Trans. Multimed.200351343810.1109/TMM.2003.808816
    [Google Scholar]
  36. TaoB. DickinsonB. Adaptive watermarking in the DCT domain1997 IEEE International conference on acoustics, speech, and signal processing, April 21-24, 1997, Munich, Germany, pp. 2985–2988.10.1109/ICASSP.1997.595419
    [Google Scholar]
  37. BarniM. BartoliniF. CappelliniV. PivaA. A DCT-domain system for robust image watermarking.Signal Processing199866335737210.1016/S0165‑1684(98)00015‑2
    [Google Scholar]
  38. AmirgholipourS. SharifiA. A pre-filtering method to improve watermark detection rate in DCT based watermarking.Int. Arab J. Inf. Technol.2014112178185
    [Google Scholar]
  39. YantaoZ. YunfeiM. ZhiquanL. A robust chaos-based DCT-domain watermarking algorithm2008 International Conference on Computer Science and Software Engineering, 12-14 December 2008, Wuhan, China, pp. 935-938.10.1109/CSSE.2008.332
    [Google Scholar]
  40. DixitR. NandalA. DhakaA. KuriakoseY.V. AgarwalV. A DCT fractional bit replacement based dual watermarking algorithm for image authentication.Recent Adv. Comp. Sci. Comm.20211492899291910.2174/2666255813999200818203600
    [Google Scholar]
  41. DarenH. JiufenL. JiwuH. HongmeiL. A DWT-based image watermarking algorithmIEEE International Conference on Multimedia and Expo, 22-25 August 2001, Tokyo, Japan, pp. 313-316.
    [Google Scholar]
  42. BabyD. ThomasJ. AugustineG. GeorgeE. MichaelN.R. A novel DWT based image securing method using steganography.Procedia Comput. Sci.20154661261810.1016/j.procs.2015.02.105
    [Google Scholar]
  43. KumarV. KumarD. Performance evaluation of DWT based image steganographyIEEE 2nd International Advance Computing Conference, 19-20 February 2010, Patiala, India, pp. 223-228.10.1109/IADCC.2010.5423005
    [Google Scholar]
  44. AhmadA. SinhaG.R. KashyapN. 3-Level DWT Image Watermarking Against Frequency and Geometrical Attacks.IJCNIS2014612586310.5815/ijcnis.2014.12.07
    [Google Scholar]
  45. Po-YuehP-Y. LinH-J. A DWT based approach for image steganography.IJASE200643275290
    [Google Scholar]
  46. SinghA.K. ThakurS. JolfaeiA. SrivastavaG. ElhosenyM. MohanA. Joint encryption and compression-based watermarking technique for security of digital documents.ACM Trans. Internet Technol.202121112010.1145/3414474
    [Google Scholar]
  47. AnandA. SinghA.K. LvZ. BhatnagarG. Compression-then-encryption-based secure watermarking technique for smart healthcare system.IEEE Multimed.202027413314310.1109/MMUL.2020.2993269
    [Google Scholar]
  48. DagaduJ.C. LiJ. Context-based watermarking cum chaotic encryption for medical images in telemedicine applications.Multimed. Tools Appl.20187718242892431210.1007/s11042‑018‑5725‑y
    [Google Scholar]
  49. ThankiR. KothariA. Multi-level security of medical images based on encryption and watermarking for telemedicine applications.Multimed. Tools Appl.20218034307432510.1007/s11042‑020‑09941‑z
    [Google Scholar]
  50. AnandA. SinghA.K. Hybrid nature-inspired optimization and encryption-based watermarking for e-healthcare.IEEE Trans. Comput. Soc. Syst.2022
    [Google Scholar]
  51. Hsu C.-T. WuJ.-L. Hidden digital watermarks in images.IEEE Trans. Image Process.199981586810.1109/83.73668618262865
    [Google Scholar]
  52. KitanovskiV. TaskovskiD. BogdanovaS. Watermark generation using image-dependent key for image authenticationThe International Conference on "Computer as a Tool", 21-24 November 2005, Belgrade, Serbia, pp. 947-950.10.1109/EURCON.2005.1630103
    [Google Scholar]
  53. LiuS. PanZ. SongH. Digital image watermarking method based on DCT and fractal encoding.IET Image Process.2017111081582110.1049/iet‑ipr.2016.0862
    [Google Scholar]
  54. AriatmantoD. ErnawanF. Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking.J. King Saud Uni.- Comp. Info. Sci.202234360561410.1016/j.jksuci.2020.02.005
    [Google Scholar]
  55. BegumM. FerdushJ. UddinM.S. A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition.J. King Saud Uni - Comp. Info. Sci.20223485856586710.1016/j.jksuci.2021.07.012
    [Google Scholar]
  56. HernándezJ.R. AmadoM. Pérez-GonzálezF. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure.IEEE Trans. Image Process.200091556810.1109/83.81759818255372
    [Google Scholar]
  57. SharmaV.K. MirR.N. An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm.J. King Saud Uni. - Comp. Info. Sci.202234361562610.1016/j.jksuci.2019.03.009
    [Google Scholar]
  58. ArtilesJ.A.P. ChavesD.P.B. PimentelC. Robust image watermarking algorithm using chaotic sequences.JISA20226810321910.1016/j.jisa.2022.103219
    [Google Scholar]
  59. KahlessenaneF. KhaldiA. KafiR. EuschiS. A DWT based watermarking approach for medical image protection.J. Ambient Intell. Humaniz. Comput.20211222931293810.1007/s12652‑020‑02450‑9
    [Google Scholar]
  60. ChaudharyH. VishwakarmaV.P. Analysis of healthcare data security with DWT-HD-SVD based-algorithm invisible watermarking against multi-size watermarks.Sci. Rep.20241411076910.1038/s41598‑024‑61479‑438730071
    [Google Scholar]
  61. ChenZ. ChenY. HuW. QianD. Wavelet domain digital watermarking algorithm based on threshold classification.6th International Conference, ICSI 2015 held in conjunction with the Second BRICS Congress, June 25-28, 2015, Beijing, China, pp. 129–136.
    [Google Scholar]
  62. RahmanM.A. RabbiM.M.F. DWT-SVD based new watermarking idea in RGB color space.IJSIP20158619319810.14257/ijsip.2015.8.6.20
    [Google Scholar]
  63. SinghaA. UllahM.A. Development of an audio watermarking with decentralization of the watermarks.J. King Saud Uni. - Comp. Info. Sci.20223463055306110.1016/j.jksuci.2020.09.007
    [Google Scholar]
  64. TangM. ZhouF. A robust and secure watermarking algorithm based on DWT and SVD in the fractional order fourier transform domain.Array20221510023010.1016/j.array.2022.100230
    [Google Scholar]
  65. Da RosatM. PaimG. SoaresR. Da CostaE. BampiS. Discrete haar wavelet transform hardware design for energy-efficient image watermarking29th IEEE International Conference on Electronics, Circuits and Systems, 24-26 October 2022, Glasgow, United Kingdom, pp. 1-4.10.1109/ICECS202256217.2022.9971079
    [Google Scholar]
  66. SmithA. JohnsonR. Secure watermarking: An encryption-based approach.J. Inf. Secur.201910287104
    [Google Scholar]
  67. ChenL. Privacy-Preserving Watermarking via Homomorphic Encryption.IEEE Trans. Multimed.202015513571371
    [Google Scholar]
  68. ParkS. Blockchain-enhanced encryption-based watermarking for multimedia asset traceability.J. Multimed. Tools. Appl.202180338953912
    [Google Scholar]
  69. KimJ. LeeS. Key management system for secure encryption-based watermarking.J. Inf. Sci. Eng.201834511791194
    [Google Scholar]
  70. BalS.N. NayakM.R. SarkarS.K. On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching.J. King Saud Uni.- Comp. Info. Sci.202133555256110.1016/j.jksuci.2018.04.006
    [Google Scholar]
  71. AmbadekarS.P. JainJ. KhanapuriJ. Digital image watermarking through encryption and dwt for copyright protectionRecent Trends in Signal and Image ProcessingSpringer-Link201918719510.1007/978‑981‑10‑8863‑6_19
    [Google Scholar]
  72. ZhongX. DasA. AlrasheediF. TanvirA. A brief, in-depth survey of deep learning-based image watermarking.Appl. Sci. (Basel)202313211185210.3390/app132111852
    [Google Scholar]
  73. GeS. XiaZ. FeiJ. TongY. WengJ. LiM. A robust document image watermarking scheme using deep neural network.Multimed. Tool. Appl.20238225385893861210.1007/s11042‑023‑15048‑y
    [Google Scholar]
  74. KhanA.A. LaghariA.A. BaqasahA.M. AlroobaeaR. GadekalluT.R. SampedroG.A. ZhuY. ORAN-B5G: A next generation open radio access network architecture with machine learning for beyond 5g in industrial 5.0.IEEE Trans. Green Comm. Net.20241110.1109/TGCN.2024.3396454
    [Google Scholar]
  75. ChaudharyH. VishwakarmaV.P. Digital image watermarking recent trends and techniques : A survey.J. Info. Optimi. Sci.20244541051105910.47974/JIOS‑1627
    [Google Scholar]
  76. AnandA. BediJ. AggarwalA. KhanM.A. RidaI. Authenticating and securing healthcare records: A deep learning-based zero watermarking approach.Image Vis. Comput.202414510497510.1016/j.imavis.2024.104975
    [Google Scholar]
  77. Radha KumariR. Vijaya KumarV. Rama NaiduK. Deep learning-based image watermarking technique with hybrid DWT-SVD.Imaging Sci. J.2023200311710.1080/13682199.2023.2223080
    [Google Scholar]
  78. KhanA.A. LaghariA.A. ElmannaiH. ShaikhA.A. BourouisS. HadjouniM. AlroobaeaR. GAN-IoTVS: A novel internet of multimedia things-enabled video streaming compression model using gan and fuzzy logic.IEEE Sens. J.20232323294342944110.1109/JSEN.2023.3316088
    [Google Scholar]
  79. KhanA. A. Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computingPeerJ Comput Sci.2024101933
    [Google Scholar]
  80. KhanA.A. LaghariA.A. GadekalluT.R. ShaikhZ.A. JavedA.R. RashidM. EstrelaV.V. MikhaylovA. A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment.Comput. Electr. Eng.202210210823410.1016/j.compeleceng.2022.108234
    [Google Scholar]
  81. KhanA.A. LaghariA.A. ShaikhZ.A. Dacko-PikiewiczZ. KotS. Internet of Things (IoT) Security with Blockchain Technology: A State-of-the-Art Review.IEEE Access20241399110.1109/ACCESS.2022.3163740
    [Google Scholar]
  82. KhanA.A. LaghariA.A. AlroobaeaR. BaqasahA.M. AlsafyaniM. BacarraR. AlsayaydehJ.A.J. Secure remote sensing data with blockchain distributed ledger technology: a solution for smart cities.IEEE Access202412693836939610.1109/ACCESS.2024.3401591
    [Google Scholar]
  83. XiangR. LiuG. LiK. LiuJ. ZhangZ. DangM. Zero-watermark scheme for medical image protection based on style feature and ResNet.Biomed. Signal Process. Control20238610512710.1016/j.bspc.2023.105127
    [Google Scholar]
  84. TsuiT.K. ZhangX.P. AndroutsosD. Color image watermarking using multidimensional Fourier transforms.IEEE Trans. Inf. Forensics Security200831162810.1109/TIFS.2007.916275
    [Google Scholar]
  85. ShakirH.R. Implementing digital image security framework with hybrid approach of chaotic map and singular-value decomposition.Chaos, Solitons Fractals: X2022810007510.1016/j.csfx.2022.100075
    [Google Scholar]
  86. MehtaR. RajpalN. VishwakarmaV.P. Sub-band discrete cosine transform-based greyscale image watermarking using general regression neural network.IJSISEg20158638038910.1504/IJSISE.2015.072927
    [Google Scholar]
  87. JanaM. JanaB. JoardarS. Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic.J. King Saud Uni. - Comp. Info. Sci.202234109822983510.1016/j.jksuci.2021.12.011
    [Google Scholar]
  88. VermaV.S. Kumar JhaR. Improved watermarking technique based on significant difference of lifting wavelet coefficients.Signal Image Video Process.2015961443145010.1007/s11760‑013‑0603‑6
    [Google Scholar]
  89. KoleyS. A feature adaptive image watermarking framework based on Phase Congruency and Symmetric Key Cryptography.J. King Saud Uni. - Comp. Info. Sci.202234363664510.1016/j.jksuci.2019.03.002
    [Google Scholar]
  90. HuW.W. ZhouR.G. El-RafeiA. JiangS.X. Quantum image watermarking algorithm based on Haar wavelet transform.IEEE Access2019712130312132010.1109/ACCESS.2019.2937390
    [Google Scholar]
  91. BhattiU.A. YuZ. LiJ. NawazS.A. MehmoodA. ZhangK. YuanL. Hybrid watermarking algorithm using Clifford algebra with Arnold scrambling and chaotic encryption.IEEE Access20208763867639810.1109/ACCESS.2020.2988298
    [Google Scholar]
  92. Fragoso-NavarroE. Rangel-EspinozaK. Nakano-MiyatakeM. Cedillo-HernandezM. Perez-MeanaH. Seam Carving based visible watermarking robust to removal attacks.J. King Saud Uni. - Comp. Infor. Sci.20223474499451310.1016/j.jksuci.2021.03.010
    [Google Scholar]
  93. SanthiV. ArulmozhivarmanP. Hadamard transform based adaptive visible/invisible watermarking scheme for digital images.JISA201318416717910.1016/j.istr.2013.01.001
    [Google Scholar]
  94. AlshouraW.H. ZainolZ. TehJ.S. AlawidaM. An FPP-resistant SVD-based image watermarking scheme based on chaotic control.Alex. Eng. J.20226175713573410.1016/j.aej.2021.10.052
    [Google Scholar]
  95. YuM. WangY. JiangG. BaiY. LuoT. High dynamic range image watermarking based on Tucker decomposition.IEEE Access2019711305311306410.1109/ACCESS.2019.2935627
    [Google Scholar]
  96. PrabhaK. Shatheesh SamI. An effective robust and imperceptible blind color image watermarking using WHT.J. King Saud Uni.- Comp. Info. Sci.20223462982299210.1016/j.jksuci.2020.04.003
    [Google Scholar]
  97. HelalS. SalemN. A hybrid watermarking scheme using walsh hadamard transform and SVD.Procedia Comput. Sci.202119424625410.1016/j.procs.2021.10.080
    [Google Scholar]
  98. FavorskayaM.N. PakhirkaA.I. Adaptive HVS objectivity-based watermarking scheme for copyright protection.Procedia Comput. Sci.20211921441145010.1016/j.procs.2021.08.148
    [Google Scholar]
  99. DeviK.J. SinghP. BilalM. NayyarA. Enabling secure image transmission in unmanned aerial vehicle using digital image watermarking with H-Grey optimization.Expert Syst. Appl.202423612119010.1016/j.eswa.2023.121190
    [Google Scholar]
  100. SyedF. GuptaS.K. Hamood AlsamhiS. RashidM. LiuX. A survey on recent optimal techniques for securing unmanned aerial vehicles applications.Trans. Emerg. Telecommun. Technol.2021327e413310.1002/ett.4133
    [Google Scholar]
  101. Al-MansooriS. KunhuA. Robust watermarking technique based on DCT to protect the ownership of DubaiSat-1 images against attacks.IJCSNS20121261
    [Google Scholar]
  102. CoatrieuxG. H. Ma\^\itre, B. Sankur, Y. Rolland, and R. Collorec, “Relevance of watermarking in medical imagingProceedings 2000 IEEE EMBS international conference on information technology applications in biomedicine. ITAB-ITIS 2000. Joint Meeting Third IEEE EMBS international conference on information technol, 09-10 November 2000, Arlington, VA, USA, pp. 250-255.
    [Google Scholar]
  103. SinghA.K. DaveM. MohanA. Hybrid technique for robust and imperceptible multiple watermarking using medical images.Multimedia Tools Appl.201675148381840110.1007/s11042‑015‑2754‑7
    [Google Scholar]
  104. SharmaA. SinghA.K. GhreraS.P. Robust and secure multiple watermarking for medical images.Wirel. Pers. Commun.20179241611162410.1007/s11277‑016‑3625‑x
    [Google Scholar]
  105. SinghA.K. KumarB. DaveM. MohanA. Multiple watermarking on medical images using selective discrete wavelet transform coefficients.J. Med. Imaging Health Inform.20155360761410.1166/jmihi.2015.1432
    [Google Scholar]
  106. Purna KumariB. Subramanyam RallabandiV.P. Modified patchwork-based watermarking scheme for satellite imagery.Signal Processing200888489190410.1016/j.sigpro.2007.10.009
    [Google Scholar]
  107. HeilemanG.L. YangY. The effects of invisible watermarking on satellite image classificationProceedings of the 3rd ACM workshop on Digital rights management, October 27, 2003, Washington, DC, USA, pp. 120–132.10.1145/947380.947396
    [Google Scholar]
  108. SharmaS. ShivaniS. SaxenaN. An efficient fragile watermarking scheme for tamper localization in satellite images.Comput. Electr. Eng.202310910878310.1016/j.compeleceng.2023.108783
    [Google Scholar]
/content/journals/raeeng/10.2174/0123520965317013240828054013
Loading
/content/journals/raeeng/10.2174/0123520965317013240828054013
Loading

Data & Media loading...


  • Article Type:
    Review Article
Keyword(s): attacks; DCT; DWT; robust; SVD; Watermarking
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test