Skip to main content
Log in

Survey of robust and imperceptible watermarking

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Robustness, imperceptibility and embedding capacity are the preliminary requirements of any watermarking technique. However, research concluded that these requirements are difficult to achieve at same time. In this paper, we review various recent robust and imperceptible watermarking methods in spatial and transform domain. Further, the paper introduces elementary concepts of digital watermarking, characteristics and novel applications of watermark in detail. Furthermore, various analysis and comparison of different notable watermarking techniques are discussed in tabular format. We believe that our survey contribution will helpful for fledgling researchers to develop robust and imperceptible watermarking algorithms for various practical applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

References

  1. Ali M, Ahn CW (2018) An optimal image watermarking approach through cuckoo search algorithm in wavelet domain. Int J Syst Assur Eng Manag 9(3):602–611

    Article  Google Scholar 

  2. Al-Nabhani Y, Lalab HA, Wahid A, Noor RM (2015) Robust Watermarking Algorithm for Digital Images using Discrete Wavelet and Probabilistic Neural Network. Journal of King Saud University -Computer, and Information Sciences 27(4):393–401

    Article  Google Scholar 

  3. Andalibi M, Chandler DM (2015) Digital Image Watermarking via Adaptive Logo Texturization. IEEE Trans Image Process 24(12):5060–5073

    Article  MATH  Google Scholar 

  4. Aslantas V (2008) A Singular-value Decomposition –based Image Watermarking using Genetic Algorithm. Int J Electron Commun 62(5):386–394

    Article  Google Scholar 

  5. Bas P, Chassery JM, Macq B (2002) Geometrically invariant watermarking using feature points. IEEE Trans Image Process 11(6):1014–1028

    Article  Google Scholar 

  6. Bhatnagar G, Wu QMJ, Raman B (2012) A new robust adjustable logo watermarking scheme. Computers and Security 31(1):40–58

    Article  Google Scholar 

  7. Bouslimi D, Coatrieux G, Roux C (2011) A Joint Watermarking/Encryption Algorithm for Verifying Medical Image Integrity and Authenticity in Both Encrypted and Spatial domains. International Conference of the IEEE EMBS:8066–8069

  8. Celik MU, Lemma AN, Katzenbeisser S, Veen MV (2007) Secure Embedding of Spread Spectrum Watermarks Using Look-Up-Tables. IEEE-ICASSP 2:II-153–II-156

    Google Scholar 

  9. Chang CC, Chen TS, Chung LZ (2002) A Steganographic method Based upon JPEG and quantization table modification. Inf Sci 141(1-2):123–138

    Article  MATH  Google Scholar 

  10. Chang CC, Tsai P, Lin CC (2005) SVD- based digital image watermarking scheme. Pattern Recogn Lett 26(10):1577–1586

    Article  Google Scholar 

  11. Chauhan DS, Singh AK, Adarsh A, Kumar B, Saini JP (2017) Combining Mexican hat wavelet and spread spectrum for adaptive watermarking and its statistical detection using medical images. Multimedia Tool and Applications, pp.1-15

  12. Chen TS, Lee WB, Chen J, Kao YH, Hou PW (2013) Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving. J Supercomput 66(2):907–917

    Article  Google Scholar 

  13. Coatrieux G, Guillou CL, Cauwin JM (2009) Reversible Watermarking for Knowledge Digest Embedding and Reliability control in Medical Images. IEEE Trans Inf Technol Biomed 13(2):158–165

    Article  Google Scholar 

  14. Cox IJ, Kilian J, Leighton T, Shamoon TG (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  15. Delaigle JF, Vleeschouwer CD, Macq B (1998) Watermarking Algorithm Based on a Human Visual Model. Signal Processing (Elsevier) 66(3):319–335

    Article  MATH  Google Scholar 

  16. Deng C, Gao X, Li X, Tao D (2010) Local histogram based geometric invariant image watermarking. Signal Process 90(12):3256–3264

    Article  MATH  Google Scholar 

  17. Dharwadkar NV, Kulkarni GK, Melligeri TY, Amberker BB (2012) The image watermarking scheme using edge information in YCbCr color space. International Proceedings of Computer Science and Information Technology 56

  18. Dhole VS, Patil NN (2015) Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks. In: Computing Communication Control and Automation, International Conference on IEEE (ICCUBEA), pp. 752-757

  19. Dittmann J, Ferri LC, Vielhauer C (2001) Hologram watermarks for document authentications. IEEE International Conference on Information Technology: Coding and Computing: 60-64

  20. Duy TP, Tran D, Ma W (2017) An intelligent learning- based watermarking scheme for outsourced biomedical time series data. IEEE- IJCNN, pp. 4408-4415

  21. El’arbi M, Amar CB (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Image Process 8(11):619–626

    Article  Google Scholar 

  22. Fan MQ, Wang HX, Li SK (2008) Restudy on SVD-based watermarking scheme. Appl Math Comput 203(2):926–930

    MathSciNet  MATH  Google Scholar 

  23. Fazli S, Moeini M (2016) A robust image watermarking method based on DWT, DCT and SVD using a new technique for correction of main geometric attacks. Optik 127(2):964–972

    Article  Google Scholar 

  24. Feng LP, Zheng LB, Cao P (2010) A DWT-DCT based blind watermarking algorithm for copyright protection. In: Computer Science and Information Technology (ICCSIT), 3rd International Conference on IEEE, vol.7, pp. 455-458

  25. Fist E, Qi X (2007) A composite approach for blind grayscale logo watermarking. Proc IEEE International Conference on Image Processing 3:III–265

    Google Scholar 

  26. Fung BCM, Wang K, Yu PS (2007) Anonymizing classification data for privacy preservation. IEEE Trans Knowl Data Eng 19(5):711–725

    Article  Google Scholar 

  27. Ganic E, Eskicioglu AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies. In: Proceedings of the 2004 Workshop on Multimedia and Security, ACM, vol. 166-174

  28. Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. Journal of electronic imaging 14(4):043004

    Article  Google Scholar 

  29. Gao X, Deng C, Li X (2010) Geometric Distortion Insensitive Image Watermarking in Affine Covariant regions. IEEE Transactions on Systems, Man, And Cybernetics 40(3):278–286

    Article  Google Scholar 

  30. Ghafoor A, Imran M (2012) A non-blind color image watermarking scheme resistent against geometric attacks. Radioengineering 21(4):1246–1251

    Google Scholar 

  31. Gunjal BL (2011) Wavelet based color image watermarking scheme giving high robustness and exact correlation. International Journal of Emerging Trends in Engineering and Technology 1(1):21–30

    Google Scholar 

  32. Gupta AK, Raval MS (2012) A robust and secure watermarking scheme based on singular values replacement. Sadhana 37(4):425–440

    Article  MathSciNet  MATH  Google Scholar 

  33. Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The WEKA data mining software: an update. ACM SIGKDD Explorations Newsletter 11(1):10–18

    Article  Google Scholar 

  34. Harish NJ, Kumar BBS, Kusagur A (2013) Hybrid robust watermarking techniques based on DWT, DCT and SVD. International Journal of Advanced Electrical and Electronics Engineering 2(5):137–143

    Google Scholar 

  35. Hel-Or HZ (2001) Watermarking and copyright labelling of printed images. Journal of Electronic Imaging 10(3):794–803

    Article  Google Scholar 

  36. Hong W, Chen TS, Shiu CW (2009) Reversible Data Hiding for High-Quality Images using Modification of Prediction Errors. The Journal of Systems and Software 82(11):1833–1842

    Article  Google Scholar 

  37. Iftikhar S, Kamran M, Anwar Z (2015) RRW- A Robust and Reversible Watermarking Technique for Relational Data. IEEE Trans Knowl Data Eng 27(4):1132–1145

    Article  Google Scholar 

  38. Iftikhar S, Kamran M, Munir EU, Khan SU (2017) A Reversible Watermarking Technique for Social Network Data Sets for Enabling Data Trust in Cyber, Physical and Social Computing. IEEE Syst J 11(1):197–206

    Article  Google Scholar 

  39. Jero SE, Ramu P, Ramakrishnan S (2014) Discrete Wavelet Transform and Singular Value Decomposition Based ECG Steganography for Secured Patient Information Transmission. J Med Syst 38(10):1–11

    Google Scholar 

  40. Jero E, Ramu P, Swaminathan R (2016) Imperceptibility-Robustness tradeoff studies for ECG steganography using Continuous Ant Colony Optimization. Expert Syst Appl 49:123–135

    Article  Google Scholar 

  41. Jin C, Tao F, Fu Y (2006) Image watermarking based HVS characteristic of wavelet transform. Intelligent Information Hiding and Multimedia Signal Processing, pp. 71-74

  42. Kamran M, Farooq M (2012) An information-preserving watermarking scheme for right protection of EMR systems. IEEE Trans Knowl Data Eng 24(11):1950–1962

    Article  Google Scholar 

  43. Kamran M, Farooq M (2013) A Formal Usability Constraints Model for Watermarking of Outsourced Datasets. IEEE Transactions on Information Forensic and Security 8(6):1061–1072

    Article  Google Scholar 

  44. Kamstra LHJ, Heijmans AM (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090

    Article  MathSciNet  Google Scholar 

  45. Kapoor P, Sharma KK, Bedi SS, Kumar A (2011) Colored Image Watermarking Technique based on HVS using HSV color model. In: Proceedings of International Conference on Advances in Computer Engineering, pp. 20-24

  46. Khan MI, Rahman M, Sarker M, Hasan I (2013) Digital watermarking for image authentication based on combined DCT, DWT and SVD transformation. Int J Comput Sci Math 10(5):223–230

    Google Scholar 

  47. Kirovski D, Malvar HS (2003) Spread Spectrum Watermarking for Audio Signals. IEEE Trans Signal Process 51(4):1020–1033

    Article  MathSciNet  MATH  Google Scholar 

  48. Koch E, Zhao J (1995) Towards robust and hidden image copyright labelling. IEEE Workshop on Nonlinear Signal and Image Processing Marmaras Greece 1174:452–455

    Google Scholar 

  49. Kulkarni AS, Lokhande SS (2013) Imperceptible and Robust Digital Image Watermarking Techniques in Frequency Domain. International Journal of Computer Technology and Electronics Engineering (IJCTEE) 3:33–36

    Google Scholar 

  50. Kumar C, Singh AK, Kumar P (2017) A Recent Survey on Image Watermarking Techniques and Its Applications in e-governance. Multimed Tools Appl 77(3):3597–3622

    Article  Google Scholar 

  51. Kumar C, Singh AK, Kumar P (2018) Improved wavelet-based image watermarking through SPIHT. Multimedia Tools and Applications 1-14

  52. Kundur D, Hatzinakos D (1998) Digital watermarking using multiresolution wavelet decomposition. ICASSP 5:2969–2972

    Google Scholar 

  53. Kutter M, Jordan F, Bossen F (1997) Digital Signature of color images using amplitude modulation. Storage and retrieval for Image and Video Databases 2952:518–526

    Article  Google Scholar 

  54. Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063

    Article  Google Scholar 

  55. Langelaar GC, Lagendijk RL, Biemond J (1997) Robust labelling methods for copy protection of images. Storage and retrieval for Image and Video Databases 3022:289–309

    Google Scholar 

  56. Lee SH, Kim TS, Kim BJ, Kwon SG, Kwon KR, Lee K (2003) 3D Polygon Meshes Watermarking Using Normal Vector Distributions. IEEE-ICME 3:III–105

    Google Scholar 

  57. Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Transaction on Information Forensics Security 2(3):321–330

    Article  Google Scholar 

  58. Li CT, Yang FM (2003) One-Dimensional Neighbourhood Forming Strategy for Fragile Watermarking. Journal of Electronic Imaging 12(2):284–292

    Article  Google Scholar 

  59. Li J, Yu C, Gupta BB, Ren X (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545–4561

    Article  Google Scholar 

  60. Lin CY (2006) A Reversible Data Transform Algorithm Using Integer Transform for Privacy Preserving Data Mining. The Journal of Systems & Software 117(7):104–112

    Google Scholar 

  61. Lin SD, Shie S, Guo JY (2010) Improving the robustness of DCT- based image watermarking against JPEG compression. Computer Standards and Interfaces 32(1-2):54–60

    Article  Google Scholar 

  62. Liu Y, Ju L, Hu M, Ma X, Zhao H (2015) A robust Reversible Data Hiding Scheme For H.264 without Distortion Drift. Neurocomputing (Elsevier) 151(3):1053–1062

    Article  Google Scholar 

  63. Liu Y, Li Z, Ma X (2012) Reversible data hiding scheme based on H.264/AVC without distortion drift. JSW 7(5):1059–1065

    Article  Google Scholar 

  64. Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting right ownership. IEEE Transactions on Multimedia 4(1):121–128

    Article  Google Scholar 

  65. Loukhaoukha K, Nabti M, Zebbiche K (2014) A Robust SVD- based Image Watermarking Using a Multi-Objective Particle Swarm Optimization. Opto-Electronics Review 22(1):45–54

    Article  Google Scholar 

  66. Malakooti M, Majlesi J (2012) Digital image watermarking based on the multiple discrete wavelets transform and singular value decomposition. Multimedia Process 1(4)

  67. Mathon B, Cayre F, Bas P (2014) Optimal Transport for Secure Spread – Spectrum Watermarking for Still Images. IEEE Trans Image Process 23(4):1694–1705

    Article  MathSciNet  MATH  Google Scholar 

  68. Meerwald P (2001) Digital watermarking in the wavelet transform domain. Master’s Thesis, Department of Scientific Computing, University of Salzburg

  69. Mehta R, Rajpal N (2016) LWT-QR Decomposition based Robust and Efficient Image Watermarking scheme using Lagrangian SVR. Multimedia Tools and Applications (Springer) 75(7):4129–4150

    Article  Google Scholar 

  70. Mohammad AA, Alhaj A, Shaltaf S (2008) An improved SVD- based watermarking scheme for protecting rightful ownership. Signal Process 88(9):2158–2180

    Article  MATH  Google Scholar 

  71. Mohanty SP, Sengupta A, Guturu P, Kougianos E (2017) Everything you want to know about watermarking: From Paper marks to hardware protection. IEEE Consumer Electronics Magazine 6(3):83–91

    Article  Google Scholar 

  72. Naderahmadian Y, Hosseini-Khayat S (2010) Fast watermarking based on QR decomposition in wavelet domain. In: Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 127-130

  73. Najih A, Al-Haddad SAR, Ramli AR, Hashim SJ, Nematollahi MA (2017) Digital Image watermarking based on Angle Quantization in Discrete Contourlet Transform. Journal of King Saud University-Computer and Information Sciences 29(3):288–294

    Article  Google Scholar 

  74. Neviere XR, Doerr G, Alliez P (2014) Spread transform and roughness-based shaping to improve 3D watermarking based on quadratic programming. IEEE- ICIP, 4777-4781

  75. Nguyen TV, Patra JC (2008) A Simple ICA-based Digital Image Watermarking Scheme. Digital Image Processing 18:762–776

    Article  Google Scholar 

  76. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible Data Hiding. IEEE Transactions on circuits and systems for video technology 16(3):354–362

    Article  Google Scholar 

  77. Noore A, Tungala N, Houck MM (2004) Embedding Biometric identifiers in 2D barcodes for improved security. Computers & Security (Elsevier) 23(8):679–686

    Article  Google Scholar 

  78. Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images:a robust medical image watermarking system for E-healthcare. Multimed Tools Appl 76(8):10599–10633

    Article  Google Scholar 

  79. Patel SB, Mehta TB, Pradhan SN (2011) A Unified Technique for Robust Digital Watermarking of Colour Images using Data Mining and DCT. International Journal Internet Technology and Secured Transactions 3(1):81–96

    Article  Google Scholar 

  80. Patra B, Patra JC (2012) CRT-based fragile self-recovery watermarking scheme for image authentication and recovery. In: IEEE International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS), pp. 430-435

  81. Pei SC, Guo JM (2003) Hybrid Pixel-Based Data Hiding and Block-Based Watermarking for Error-Diffused Halftone Images. IEEE transactions on Circuits and Systems for Video Technology 13(8):867–884

    Article  Google Scholar 

  82. Peng H, Wang J, Wang W (2010) Image watermarking method in multiwavelet domain based on support vector machines. J Syst Softw 83(8):1470–1477

    Article  Google Scholar 

  83. Pham TD, Tran D, Ma W (2015) A proposed blind DWT-SVD watermarking scheme for EEG data. In: International Conference on Neural Information Processing, pp. 69-76

    Chapter  Google Scholar 

  84. Preda RO (2014) Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain. In: Communications 10th International conference on IEEE, pp. 1-4

  85. Qiang YZ, Ip HHS, Kowk LF (2003) Robust watermarking of 3D polygonal models based on vertice scrambling. Proceedings of Computer Graphics International IEEE, pp. 254-257

  86. Reddy VP, Varadarajan S (2010) An effective wavelet-based watermarking scheme using human visual system for protecting copyrights of digital images. International Journal of Computer and Electrical Engineering 2(1):32–40

    Article  Google Scholar 

  87. Rosiyadi D, Horng SJ, Fan P, Wang X (2012) Copyright protection for e-government document images. IEEE Multimedia 19(3):62–73

    Article  Google Scholar 

  88. Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible Watermarking Algorithm Using Sorting and Prediction. IEEE Transactions on Circuits and Systems for Video Technology 19(7):989–999

    Article  Google Scholar 

  89. Said A, Pearlman AW (1996) A new, fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Transactions on Circuits and Systems for Video Technology 6(3):243–250

    Article  Google Scholar 

  90. Santhi V, Thangavelu A (2011) DC coefficients based watermarking technique for color images using singular value decomposition. International Journal of Computer and Electrical Engineering 3(1):8–16

    Article  Google Scholar 

  91. Senapati RK, Patil UC, Mahapatra KK (2014) Reduced memory, low complexity embedded image compression algorithm using hierarchical listless discrete Tchebichef transform. IET Image Process 8(4):213–238

    Article  Google Scholar 

  92. Seo JS, Yoo CD (2004) Localized image watermarking based on feature points of scale-space representation. Pattern Recogn 37(7):1365–1375

    Article  MATH  Google Scholar 

  93. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and Robust fragile watermarking scheme for medical images. IEEE-Access 6:10269–10278

    Article  Google Scholar 

  94. Shen JJ, Hsu PW (2008) A Fragile Associative Watermarking on 2D Barcode for Data Authentication. International Journal of Network Security 7(3):301–309

    Google Scholar 

  95. Shen JJ, Ren JM (2010) A robust associative watermarking technique- based on vector quantization. Digital Signal Processing, pp. 1408-1423

  96. Sherekar S, Thakare VM, Jain S (2011) Attacks and Countermeasures on Digital Watermarks: Classification, Implications, Benchmarks. Int J Comput Sci Appl 4(2):32–45

    Google Scholar 

  97. Shi H, Lv F, Cao Y (2014) A Blind Watermarking technique for color image based on SVD with circulation. Journal of software 9(7):1749–1756

    Google Scholar 

  98. Shivani JLD, Senapati RK (2017) Robust Image Embedded Watermarking using DCT and Listless SPIHT. Future Intermet 9(3):33

    Article  Google Scholar 

  99. Singh AK (2017) Improved Hybrid Algorithm for Robust and Imperceptible Multiple Watermarking using Digital Images. Multimedia Tools Applications (Springer) 76(6):8881–8900

    Article  Google Scholar 

  100. Singh AK, Dave M, Mohan A (2014) Wavelet-Based Image Watermarking: futuristic concepts in Information Security. Proceedings of National Academy emerging of Sciences India Section A: Physical Sciences 84(3):345–359

    Article  MATH  Google Scholar 

  101. Singh AK, Dave M, Mohan A (2014) Hybrid Technique for Robust and Imperceptible image watermarking in DWT-DCT-SVD domain. National Academy Science Letters 37(4):351–358

    Article  Google Scholar 

  102. A.K. Singh, M. Dave and, A. Mohan, " Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain," Wireless Personal Communication (Springer), vol. 83, issue 3, pp. 2133-2150, 2015

  103. Singh AK, Dave M, Mohan A (2016) Hybrid Technique for robust and imperceptible multiple watermarking using medical images. Journal of Multimedia Tools and Applications (Springer) 75(14):8381–8401

    Article  Google Scholar 

  104. Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5(3):607–614

    Article  Google Scholar 

  105. Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple Watermarking Technique for Securing Online Social Network Contents using Back Propagation Neural Network. Future Generation Computer Systems (Elsevier) 86:926–939

    Article  Google Scholar 

  106. Singh AK, Kumar B, Singh G, Mohan A (2017) Medical image watermarking: techniques and applications. Book series on Multimedia Systems and Applications, Springer, ISBN: 978-3319576985

  107. Singh D, Singh SK (2017) DWT-SVD and DCT based Robust and Blind Watermarking Scheme for Copyright Protection. Multimed Tools Appl 76(11):13001–13024

    Article  Google Scholar 

  108. Singh A, Tayal A (2012) Choice of wavelet from wavelet families for DWT-DCT-SVD image watermarking. Int J Comput Appl 48(17):9–14

    Google Scholar 

  109. Song W, Hou JJ, Li ZH, Huang L (2011) Chaotic system and QR factorization based robust digital image watermarking algorithm. J Cent S Univ Technol 18(1):116–124

    Article  Google Scholar 

  110. Srivastava A, Saxena P (2013) DWT-DCT-SVD based semiblind image watermarking using middle frequency bands. IOSR Journal of Computer Engineering 12(2):63–66

    Article  Google Scholar 

  111. Su Q, Niu Y, Wang Q, Sheng G (2013) A blind color image watermarking based on DC component in the spatial domain. Optik 124(23):6255–6260

    Article  Google Scholar 

  112. Tang CW, Hang HM (2003) A feature- based robust digital image watermarking scheme. IEEE Trans Signal Process 51(4):950–959

    Article  MathSciNet  MATH  Google Scholar 

  113. Thakkar FN, Srivastava VK (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76(3):3669–3697

    Article  Google Scholar 

  114. Thakur S, Singh AK, Ghrera SP, Mohan A (2018) Chaotic based secure watermarking approach for medical images. Multimed Tools Appl:1–14. https://doi.org/10.1007/s11042-018-6691-0

  115. Thodi DM, Rodriguez JJ (2004) Reversible watermarking by prediction-error expansion. IEEE Southwest Symposium on Image Analysis and Interpretation: 21-25

  116. Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730

    Article  MathSciNet  Google Scholar 

  117. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13(8):890–896

    Article  Google Scholar 

  118. Tsai JS, Huang WB, Kuo YH, Horng MF (2012) Joint Robustness and Security Enhancement for Feature-based Image Watermarking Using Invariant feature regions. Signal Processing (Elsevier) 92(6):1431–1445

    Article  Google Scholar 

  119. Tsai HH, Jhuang YJ, Lai YS (2012) An SVD-based Image Watermarking in Wavelet Domain using SVR and PSO. Applied Soft Computing (Elsevier) 12(8):2442–2453

    Article  Google Scholar 

  120. Vacavant A (2016) A novel definition of robustness for image processing algorithms. In: International Workshop on Reproducible Research in Pattern Recognition (pp. 75-87). Springer, Cham

    Chapter  Google Scholar 

  121. Vallabha VH (2003) Multiresolution watermark based on wavelet transform for digital images. Cranes Software International Limited, Bangalore

    Google Scholar 

  122. Van DWD, Nachtegael M, Kerre EE (2003) A new similarity measure for image processing. Journal of Computational Methods in Sciences and Engineering 3(2):209–222

    Article  MATH  Google Scholar 

  123. Voloshynovskiy S, Pereira S, Pun T, Eggers JJ, Su JK (2001) Attacks on digital watermarks: classification, estimation-based attacks, and benchmarks. IEEE Communication Magazine 39(8):118–126

    Article  Google Scholar 

  124. Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Processing Letters 9(3):81–84

    Article  Google Scholar 

  125. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  126. Wang HJ, Su PC, Kuo CCJ (1998) Wavelet based digital image watermarking. Opt Express 3(12):491–496

    Article  Google Scholar 

  127. Wang X, Wu J, Niu P (2007) A new digital image watermarking algorithm resilient to desynchronization attacks. IEEE Transaction on Information Forensics Security 2(4):633–655

    Google Scholar 

  128. Wu HC, Chang CC (2005) A novel digital image watermarking scheme based on the vector quantization technique. Computers and Security 24(6):460–471

    Article  Google Scholar 

  129. Wu X, Guan ZH (2007) A novel digital watermark algorithm based on chaotic maps. Phys Lett A 365(5-6):403–406

    Article  Google Scholar 

  130. Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy preserving and copy deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(11):2594–2608

    Article  Google Scholar 

  131. Xing Y, Tan J (2010) A color image watermarking scheme resistent against Geometrical Attacks. Radioengineering 19(1):62–67

    Google Scholar 

  132. Xiong X (2015) A new robust color image watermarking scheme based on 3D-DCT. World Journal of Engineering and Technology 3(03):177–183

    Article  Google Scholar 

  133. Xuan G, Shi YQ, Chai P, Cui X, Ni Z, Tong X (2007) Optimum histogram pair based image lossless data embedding. International Workshop on Digital Watermarking: 264-278

  134. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882

    Article  Google Scholar 

  135. Zhao M, Dang Y (2008) Color image copyright protection digital watermarking algorithm based on DWT and DCT. In: Wireless Communications, Networking and Mobile Computing 4th international conference on IEEE, pp. 1-4

  136. Zheng Z, Saxena N, Mishra KK, Sangaiah AK (2018) Guided Dynamic Particle Swarm Optimization for Optimizing Digital Image Watermarking in Industry Applications. Futur Gener Comput Syst 88:92–106

    Article  Google Scholar 

  137. Zhou X, Zhang H, Wang C (2018) A Robust Image Watermarking Technique Based on DWT, APDCBT, and SVD. Symmetry MDPI 10(3):1–15

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Singh.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Agarwal, N., Singh, A.K. & Singh, P.K. Survey of robust and imperceptible watermarking. Multimed Tools Appl 78, 8603–8633 (2019). https://doi.org/10.1007/s11042-018-7128-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-7128-5

Keywords

Navigation