Skip to main content

Study of Digital Watermarking Techniques for Against Security Attacks

  • Conference paper
  • First Online:
Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1 ( ICTIS 2017)

Abstract

Digital watermarking is fragile to different authorization and copyright protection in spatial domain, So in the vast majority of watermarking strategy’s transform domain is utilized. In that paper we have an review of such computerized watermarking procedures and techniques like discrete wavelet transform (DWT), singular value decomposition (SVD), discrete cosine transformation (DCT) with various methodologies alongside their applications, advantages and limitations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sturges, P.: Remember the human: the first rule of netiquette, librarians and the Internet. Online Inf. Rev. 26(3), 209–216 (2002)

    Article  Google Scholar 

  2. Fifarek, A.: Technology and privacy in the academic library. Online Inf. Rev. 26(6), 366–374 (2002)

    Article  Google Scholar 

  3. Raj, Y.A., Alli, P.: An analysis and overview of modern digital watermarking. Am. J. Appl. Sci. 9(1), 66 (2012)

    Article  Google Scholar 

  4. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography. Morgan Kaufmann, New Jersey (2007)

    Google Scholar 

  5. Agarwal, R., Santhanam, M.S., Venugopalan, K.: Multichannel digital watermarking of color images using SVD. In: 2011 International Conference on Image Information Processing (ICIIP), pp. 1–6. IEEE (2011)

    Google Scholar 

  6. Zhao, J., Koch, E.: Embedding robust labels into images for copyright protection. In: KnowRight, pp. 242–251 (1995)

    Google Scholar 

  7. Wolfgang, R.B., Podilchuk, C.I., Delp, E.J.: Perceptual watermarks for digital images and video. Proc. IEEE 87(7), 1108–1126 (1999)

    Article  Google Scholar 

  8. Pal, K., Ghosh, G., Bhattacharya, M.: Biomedical image watermarking in wavelet domain for data integrity using bit majority algorithm. Am. J. Biomed. Eng. 2(2), 29–37 (2012)

    Article  Google Scholar 

  9. Goyal, H., Chutani, S.: LSB embedding in spatial domain. Int. J. Comput. Technol. 3(1), 153–157 (2012)

    Google Scholar 

  10. Hernández, J.R.: DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans. Image Process. 9(1), 55–68 (2000)

    Article  MathSciNet  Google Scholar 

  11. Andrews, H.C., Patterson III, C.: Singular value decomposition (SVD) image coding. IEEE Trans. Commun. 24(4), 425–432 (1976)

    Article  Google Scholar 

  12. EL-Emam, N.N.: Hiding a large amount of data with high security using steganography algorithm. J. Comput. Sci. 3(4), 223–232 (2007)

    Article  Google Scholar 

  13. Mohan, B.C., Kumar, S.S.: A robust image watermarking scheme using singular value decomposition. J. Multimed. 3(1), 7–15 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Snehlata Maloo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Maloo, S., Lakshmi, N., Pareek, N.K. (2018). Study of Digital Watermarking Techniques for Against Security Attacks. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1. ICTIS 2017. Smart Innovation, Systems and Technologies, vol 83. Springer, Cham. https://doi.org/10.1007/978-3-319-63673-3_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63673-3_61

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63672-6

  • Online ISBN: 978-3-319-63673-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics