Journal ArticleDOI
Recent trends in image watermarking techniques for copyright protection: a survey
Arkadip Ray,Somaditya Roy +1 more
Reads0
Chats0
TLDR
In this study, contemporary developments of digital image watermarking techniques are appraised so as to identify state-of-the-art practices and their limitations.Abstract:
Digital copyright protection signifies the technology of rights protection, utilization control, and management of digital substances in the activity of production, propagation, retailing, and consumption. In the era of digital boom in information technology and multimedia, malicious exploitations and piracy have become a global phenomenon; thus, the need for digital content protection is inexorable. Image watermarking has been advocated universally to resolve innumerable dilemmas correlated with issues in the fields of digital rights management and multimedia security. According to anticipated applications, various suitable image watermarking procedures have been designed to safeguard the copyright of digital subjects. In this study, contemporary developments of digital image watermarking techniques are appraised so as to identify state-of-the-art practices and their limitations. This research contribution will be expedient for the academics in instigating efficient watermarking techniques for copyright authentication.read more
Citations
More filters
Journal ArticleDOI
A Privacy-Centered Protocol for Enhancing Security and Authentication of Academic Certificates
TL;DR: In this article , the authors proposed a certificate verification privacy control protocol (CVPC) to improve the trust and credibility of digital academic certificates, ensuring that individuals' rights and opportunities are protected.
Journal ArticleDOI
Security Analysis and Improvement of Dual Watermarking Framework for Multimedia Privacy Protection and Content Authentication
TL;DR: In this paper , an improved scheme was proposed to improve the security and tamper detection ability of the original watermarking scheme and recover the tampered robust watermark, which is safer and more reliable and shows good performance in tampering detection and the recovery robustness of the watermark.
References
More filters
Journal ArticleDOI
Robust image watermarking in the spatial domain
Nikos Nikolaidis,Ioannis Pitas +1 more
TL;DR: A copyright protection method that is based on hiding an ‘invisible’ signal, known as digital watermark, in the image is presented and a variation that generates image dependent watermarks as well as a method to handle geometrical distortions are presented.
A Survey of Digital Watermarking Techniques, Applications and Attacks
TL;DR: This paper incorporate the detail study watermarking definition, concept and the main contributions in this field such as categories of water marking process that tell which watermarked method should be used.
Journal ArticleDOI
A novel CNN based security guaranteed image watermarking generation scenario for smart city applications
TL;DR: A novel algorithm using synergetic neural networks for robustness and security of digital image watermarking is proposed, which obtains an optimal Peak Signal-to-noise ratio (PSNR) and can complete certain image processing operations with improved performance.
Journal ArticleDOI
A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine
TL;DR: The proposed algorithm for multiple watermarking based on discrete wavelet transforms, discrete cosine transform and singular value decomposition has been proposed for healthcare applications and has been found to be giving excellent performance for robustness, imperceptibility, capacity and security simultaneously.
Journal ArticleDOI
A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications
TL;DR: Robustness of the scheme is better than existing scheme for similar set of medical images in terms of normalized correlation coefficient (NCC) and bit-error-rate (BER) and performance comparison of proposed scheme with existing schemes shows proposed scheme has better robustness against different types of attacks.