Journal ArticleDOI
Recent trends in image watermarking techniques for copyright protection: a survey
Arkadip Ray,Somaditya Roy +1 more
Reads0
Chats0
TLDR
In this study, contemporary developments of digital image watermarking techniques are appraised so as to identify state-of-the-art practices and their limitations.Abstract:
Digital copyright protection signifies the technology of rights protection, utilization control, and management of digital substances in the activity of production, propagation, retailing, and consumption. In the era of digital boom in information technology and multimedia, malicious exploitations and piracy have become a global phenomenon; thus, the need for digital content protection is inexorable. Image watermarking has been advocated universally to resolve innumerable dilemmas correlated with issues in the fields of digital rights management and multimedia security. According to anticipated applications, various suitable image watermarking procedures have been designed to safeguard the copyright of digital subjects. In this study, contemporary developments of digital image watermarking techniques are appraised so as to identify state-of-the-art practices and their limitations. This research contribution will be expedient for the academics in instigating efficient watermarking techniques for copyright authentication.read more
Citations
More filters
Journal ArticleDOI
Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
TL;DR: The paper highlights the potential to apply the modified watermark algorithms to secure IoT networks and provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT.
Journal ArticleDOI
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
A. Aminuddin,Ferda Ernawan +1 more
TL;DR: In this article , the authors proposed color image authentication based on blind fragile image watermarking for tamper detection and self-recovery named AuSR1, which divides each channel of the cover image into non-overlapping blocks with the size of 2 × 2 pixels.
Journal ArticleDOI
Three Layer Authentications with a Spiral Block Mapping to Prove Authenticity in Medical Images
TL;DR: A self-embedding watermark using a spiral block mapping for tamper detection and restoration of digital medical image has a potential to be manipulated by unauthorized persons due to advanced communication technology.
Journal ArticleDOI
Robust color image watermarking using multiple fractional-order moments and chaotic map
TL;DR: In this article , a robust color image-watermarking algorithm based on new multiple fractional multi-channel orthogonal moments, fractional-order exponent moments (MFrEMs), fractionalorder polar harmonic transforms (MFRPHTs), and fractional order radial harmonic Fourier moments (RHFMs) was proposed.
Journal ArticleDOI
A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos
TL;DR: Wang et al. as discussed by the authors designed a Tent-Henon-Map double chaos watermarking encryption method and designed a medical image encryption based on ridgelet-DCT transform.
References
More filters
Book ChapterDOI
A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image
TL;DR: Digital Watermarking Technique is used to provide ownership & copyright protection for cheque image and private key encryption & decryption technique used for security of bank watermark.
Journal ArticleDOI
An Efficient Robust Blind Watermarking Method Based on Convolution Neural Networks in Wavelet Transform Domain
TL;DR: A novel scheme of digital image blind watermarking based on the combination of the discrete wavelet transform (DWT) and the convolutional neural network (CNN) is proposed, which has superior performance against common attacks of JPEG compression, mean and median filtering, salt and pepper noise, Gaussian noise, speckle noise, brightness modification, scaling, cropping, rotation, and shearing operations.
Journal ArticleDOI
Image Watermarking Using Two Level Encryption Method Based on Chaotic Logistic Mapping and Rivest Shamir Adleman Algorithm
TL;DR: The experimental outcome shows that the proposed approach delivers a high secure network with low computational complexity by means of entropy value and Peak Signal-to-Noise Ratio (PSNR).
Journal ArticleDOI
A Robust Color Image Watermarking Algorithm Based on APDCBT and SSVD
TL;DR: A robust color image watermarking algorithm based on all phase discrete cosine biorthogonal transform and shuffled singular value decomposition and SSVD and Fibonacci transform is proposed, which has better performance in robustness and imperceptibility.
Book ChapterDOI
Digital Image Watermarking Scheme Based on Visual Cryptography and SVD
TL;DR: Experimental results show that the proposed watermarking scheme to balance the tradeoff between security and imperceptibility by using visual cryptography and singular value decomposition is imperceptible, secure and robust to the common image processing and other attacks.