Recent trends in image watermarking techniques for copyright protection: a survey
01 Dec 2020-International Journal of Multimedia Information Retrieval (Springer London)-Vol. 9, Iss: 4, pp 249-270
TL;DR: In this study, contemporary developments of digital image watermarking techniques are appraised so as to identify state-of-the-art practices and their limitations.
Abstract: Digital copyright protection signifies the technology of rights protection, utilization control, and management of digital substances in the activity of production, propagation, retailing, and consumption. In the era of digital boom in information technology and multimedia, malicious exploitations and piracy have become a global phenomenon; thus, the need for digital content protection is inexorable. Image watermarking has been advocated universally to resolve innumerable dilemmas correlated with issues in the fields of digital rights management and multimedia security. According to anticipated applications, various suitable image watermarking procedures have been designed to safeguard the copyright of digital subjects. In this study, contemporary developments of digital image watermarking techniques are appraised so as to identify state-of-the-art practices and their limitations. This research contribution will be expedient for the academics in instigating efficient watermarking techniques for copyright authentication.
Citations
More filters
••
TL;DR: The paper highlights the potential to apply the modified watermark algorithms to secure IoT networks and provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT.
Abstract: Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on finding effective and low-weight secure approaches. Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes. Watermarking technology is integrated into different frames without adding an overheard as in the conventional encryption. Therefore, it is efficient to be used in data encryption for applications that run over limited resources such as the Internet of Things (IoT). In this paper, different digital watermarking algorithms and approaches are presented. Additionally, watermarking requirements and challenges are illustrated in detail. Moreover, the common architecture of the watermarking system is described. Furthermore, IoT technology and its challenges are highlighted. Finally, the paper provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT and summarises them into one table. In addition, the paper highlights the potential to apply the modified watermark algorithms to secure IoT networks.
22 citations
••
TL;DR: In this article , the authors proposed color image authentication based on blind fragile image watermarking for tamper detection and self-recovery named AuSR1, which divides each channel of the cover image into non-overlapping blocks with the size of 2 × 2 pixels.
18 citations
••
TL;DR: A self-embedding watermark using a spiral block mapping for tamper detection and restoration of digital medical image has a potential to be manipulated by unauthorized persons due to advanced communication technology.
Abstract: —Digital medical image has a potential to be manipulated by unauthorized persons due to advanced communication technology. Verifying integrity and authenticity have become important issues on the medical image. This paper proposed a self-embedding watermark using a spiral block mapping for tamper detection and restoration. The block-based coding with the size of 3×3 was applied to perform self-embedding watermark with two authentication bits and seven recovery bits. The authentication bits are obtained from a set of condition between sub-block and block image, and the parity bits of each sub-block. The authentication bits and the recovery bits are embedded in the least significant bits using the proposed spiral block mapping. The recovery bits are embedded into different sub-blocks based on a spiral block mapping. The watermarked images were tested under various tampered images such as blurred image, unsharp-masking, copy-move, mosaic, noise, removal, and sharpening. The experimental results show that the scheme achieved a PSNR value of about 51.29 dB and a SSIM value of about 0.994 on the watermarked image. The scheme showed tamper localization with accuracy of 93.8%. In addition, the proposed scheme does not require external information to perform recovery bits. The proposed scheme was able to recover the tampered image with a PSNR value of 40.45 dB and a SSIM value of 0.994.
17 citations
••
TL;DR: In this article , a robust color image-watermarking algorithm based on new multiple fractional multi-channel orthogonal moments, fractional-order exponent moments (MFrEMs), fractionalorder polar harmonic transforms (MFRPHTs), and fractional order radial harmonic Fourier moments (RHFMs) was proposed.
Abstract: Abstract Robust watermarking is an effective method and a promising solution for securing and protecting the copyright of digital images. Moments and moment invariants have become popular tools for robust watermarking due to their geometric invariance and favorable capability of image description. Many moments-based robust watermarking schemes have been proposed. However, there is a challenging problem of these schemes that should be addressed. One of these problems is to improve both imperceptibility and robustness. In contrast, the other problem, most of these schemes used inefficient, traditional computation methods of the moments, resulting in an inaccurate and inefficient performance of the watermarking schemes. To overcome these challenges, in this paper, we propose a novel robust color image-watermarking algorithm based on new multiple fractional multi-channel orthogonal moments, fractional-order exponent moments (MFrEMs), fractional-order polar harmonic transforms (MFrPHTs), and fractional-order radial harmonic Fourier moments (MFrRHFMs). Firstly, highly accurate fractional new multi-channel orthogonal moments are computed for the host color images. Then, more stable and accurate coefficients of fractional new multi-channel orthogonal moments are selected. Finally, a robust color image watermarking approach for multiple watermarks images is proposed based on MFrEMs, MFrPHTs, and MFrRHFMs using a 1D Sine chaotic map. The experimental results demonstrate that the proposed approach provides robustness against various attacks and better imperceptibility than the existing methods.
8 citations
••
TL;DR: Wang et al. as discussed by the authors designed a Tent-Henon-Map double chaos watermarking encryption method and designed a medical image encryption based on ridgelet-DCT transform.
Abstract: Abstract With the help of big data, cloud computing, artificial intelligence and other technologies, the informatization and intelligence of the wisdom medical have been gradually realized. However, with the transmission and storage of massive amounts of medical images in the cloud, information security issues have become increasingly prominent. The privacy of patients is at risk of disclosure, theft and tampering, which has become an important challenge restricting the development of wisdom medical. How to protect the personal information of patients in the cloud environment has become an urgent problem to be solved. Medical image watermarking technology is an effective method to solve this problem. Combining the characteristics of Tent chaos and Henon chaos, this paper designed a Tent-Henon-Map double chaos watermarking encryption method and designed a medical image encryption watermarking algorithm based on ridgelet-DCT transform. The watermark images were encrypted by the Tent-Henon-Map double chaos which had the characteristics of sensitive initial values and large key space. Then, the feature vectors of the medical images were extracted through ridgelet-DCT transform. On the basis of ordinary watermarking technology, combined with zero watermarking, third-party concepts, and cryptographic technology, watermarking had a good ability to resist image processing attacks. The experimental results showed that the key space of the algorithm was $${10}^{116}$$ 10 116 , which had better encryption and hard to crack. The time of watermark embedding and extraction were only 0.336 s and 0.439 s, with lower computational cost. And under high-strength conventional attacks and geometric attacks, the NC values of the algorithm were all greater than 0.55, which could effectively extract watermark information. It shown that the algorithm proposed had good robustness against conventional and geometric attacks It shown that the algorithm proposed had good robustness against conventional and geometric attacks, while taking into account the security.
5 citations
References
More filters
••
TL;DR: A copyright protection method that is based on hiding an ‘invisible’ signal, known as digital watermark, in the image is presented and a variation that generates image dependent watermarks as well as a method to handle geometrical distortions are presented.
542 citations
01 Jan 2013
TL;DR: This paper incorporate the detail study watermarking definition, concept and the main contributions in this field such as categories of water marking process that tell which watermarked method should be used.
Abstract: The expansion of the Internet has frequently increased the availability of digital data such as audio, images and videos to the public. Digital watermarking is a technology being developed to ensure and facilitate data authentication, security and copyright protection of digital media. This paper incorporate the detail study watermarking definition, concept and the main contributions in this field such as categories of watermarking process that tell which watermarking method should be used. It starts with overview, classification, features, framework, techniques, application, challenges, limitations and performance metric of watermarking and a comparative analysis of some major watermarking techniques. In the survey our prime concern is image only.
240 citations
••
TL;DR: A novel algorithm using synergetic neural networks for robustness and security of digital image watermarking is proposed, which obtains an optimal Peak Signal-to-noise ratio (PSNR) and can complete certain image processing operations with improved performance.
233 citations
••
TL;DR: The proposed algorithm for multiple watermarking based on discrete wavelet transforms, discrete cosine transform and singular value decomposition has been proposed for healthcare applications and has been found to be giving excellent performance for robustness, imperceptibility, capacity and security simultaneously.
Abstract: In this paper, an algorithm for multiple watermarking based on discrete wavelet transforms (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) has been proposed for healthcare applications. For identity authentication purpose, the proposed method uses three watermarks in the form of medical Lump image watermark, the doctor signature/identification code and diagnostic information of the patient as the text watermarks. In order to improve the robustness performance of the image watermark, Back Propagation Neural Network (BPNN) is applied to the extracted image watermark to reduce the noise effects on the watermarked image. The security of the image watermark is also enhanced by using Arnold transform before embedding into the cover. Further, the symptom and signature text watermarks are also encoded by lossless arithmetic compression technique and Hamming error correction code respectively. The compressed and encoded text watermark is then embedded into the cover image. Experimental results are obtained by varying the gain factor, different sizes of text watermarks and the different cover image modalities. The results are provided to illustrate that the proposed method is able to withstand a different of signal processing attacks and has been found to be giving excellent performance for robustness, imperceptibility, capacity and security simultaneously. The robustness performance of the method is also compared with other reported techniques. Finally, the visual quality of the watermarked image is evaluated by the subjective method also. This shows that the visual quality of the watermarked images is acceptable for diagnosis at different gain factors. Therefore the proposed method may find potential application in prevention of patient identity theft in healthcare applications.
227 citations
••
TL;DR: Robustness of the scheme is better than existing scheme for similar set of medical images in terms of normalized correlation coefficient (NCC) and bit-error-rate (BER) and performance comparison of proposed scheme with existing schemes shows proposed scheme has better robustness against different types of attacks.
Abstract: In this paper, a blind image watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is proposed. In this scheme, DWT is applied on ROI (region of interest) of the medical image to get different frequency subbands of its wavelet decomposition. On the low frequency subband LL of the ROI, block-SVD is applied to get different singular matrices. A pair of elements with similar values is identified from the left singular value matrix of these selected blocks. The values of these pairs are modified using certain threshold to embed a bit of watermark content. Appropriate threshold is chosen to achieve the imperceptibility and robustness of medical image and watermark contents respectively. For authentication and identification of original medical image, one watermark image (logo) and other text watermark have been used. The watermark image provides authentication whereas the text data represents electronic patient record (EPR) for identification. At receiving end, blind recovery of both watermark contents is performed by a similar comparison scheme used during the embedding process. The proposed algorithm is applied on various groups of medical images like X-ray, CT scan and mammography. This scheme offers better visibility of watermarked image and recovery of watermark content due to DWT-SVD combination. Moreover, use of Hamming error correcting code (ECC) on EPR text bits reduces the BER and thus provides better recovery of EPR. The performance of proposed algorithm with EPR data coding by Hamming code is compared with the BCH error correcting code and it is found that later one perform better. A result analysis shows that imperceptibility of watermarked image is better as PSNR is above 43 dB and WPSNR is above 52 dB for all set of images. In addition, robustness of the scheme is better than existing scheme for similar set of medical images in terms of normalized correlation coefficient (NCC) and bit-error-rate (BER). An analysis is also carried out to verify the performance of the proposed scheme for different size of watermark contents (image and EPR data). It is observed from analysis that the proposed scheme is also appropriate for watermarking of color image. Using proposed scheme, watermark contents are extracted successfully under various noise attacks like JPEG compression, filtering, Gaussian noise, Salt and pepper noise, cropping, filtering and rotation. Performance comparison of proposed scheme with existing schemes shows proposed scheme has better robustness against different types of attacks. Moreover, the proposed scheme is also robust under set of benchmark attacks known as checkmark attacks.
157 citations