Skip to main content
Log in

Digital image and video watermarking: methodologies, attacks, applications, and future directions

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, internet technology has grown in advance, and multimedia data-sharing growth rates have skyrocketed. As a result, protecting multimedia data in digital networks has become a significant problem. Multimedia data such as audio, text, video, and image are highly used as a data-sharing communication system which demands security, particularly in image and video. Digital watermarking is the one solution that has gained widespread recognition over the past two decades for data embedding in image and video, a key tactic in multimedia tamper detection and recovery. The review tells about the growth rate and data breaches on multimedia data across different applications, which raises the issue of multimedia security. Notably, social network platforms are highly targeted due to their rapid growth, which has created opportunities for data breaches and multimedia manipulation. Here, the forensic field comes into play, where some data-hiding strategies are used to look for evidence of tampering. Even though watermarking techniques can attain security in tamper detection, they face some issues and challenges across various applications. This motivated us to analyze the existing work carried out by data hiding watermarking techniques in the field of multimedia tamper detection in detail and the gap analyzed. Overall, dataset availability, watermarking performance quality metrics, and several image-processing attacks are all explicitly mentioned. This review paper discusses a comprehensive study of the existing system in the field of tamper detection (both in Image and Video) in detail. Also, the development of existing watermarking techniques, issues, and challenges are covered in detail in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

Data availability

Data sharing does not apply to this article as no datasets were generated or analyzed during the current study.

References

  1. Abdelhakim A, Saleh HI, Abdelhakim M (2019) Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering. Multimed Tools Appl 78(22):32523–32563

    Google Scholar 

  2. Agarwal H, Husain F (2021) Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and SURF. J Inf Secur Appl 59:102846

    Google Scholar 

  3. Agilandeeswari L, Muralibabu K (2013) A robust video watermarking algorithm for content authentication using discrete wavelet transform (DWT) and singular value decomposition (SVD). Int J Sec Appl 7(4):145–158

    Google Scholar 

  4. Agilandeeswari L, Muralibabu K (2013) A novel block based video in video watermarking algorithm using discrete wavelet transform and singular value decomposition. Int J of Adv Res Comput Sci Soft Eng 3(4)

  5. Agilandeeswari L, Ganesan K (2016) A robust color video watermarking scheme based on hybrid embedding techniques. Multimedia Tools and Applications. 75(14):8745–8780

    Google Scholar 

  6. Agilandeeswari L, Ganesan K (2016) An efficient hilbert and integer wavelet transform based video watermarking. J Eng Sci Technol 11(3):327–345

    Google Scholar 

  7. Agilandeeswari L, Ganesan K (2016) An adaptive HVS based video watermarking scheme for multiple watermarks using BAM neural networks and fuzzy inference system. Expert Syst Appl 63:412–434

    Google Scholar 

  8. Agilandeeswari L, Ganesan K et al (2016) A bi-directional associative memory based multiple image watermarking on cover video. Multimed Tools Appl (Springer) 75(12):7211–7256

    Google Scholar 

  9. Agilandeeswari L, Ganesan K (2018) RST invariant robust video watermarking algorithm using quaternion curvelet transform. Multimed Tools Appl 77(19):25431–25474

    Google Scholar 

  10. Agilandeeswari, L., & Meena, S. D. (2023). SWIN transformer based contrastive self-supervised learning for animal detection and classification. Multimedia Tools and Applications, 82(7), 10445-10470.

    Google Scholar 

  11. Agilandeeswari L, Ganesan K, Muralibabu K (2013) "A side view based video in video watermarking using DWT and Hilbert transform," Security in computing and communications, Communications in Computer and Information Science (CCIS) series – Springer, p. 3

  12. Agilandeeswari, L., Paliwal, S., Chandrakar, A., & Prabukumar, M. (2022). A new lightweight conditional privacy preserving authentication and key–agreement protocol in social internet of things for vehicle to smart grid networks. Multimedia Tools and Applications, 81(19), 27683-27710.

  13. Agilandeeswari L, Prabukumar M, Radhesyam V, Phaneendra KLB, Farhan A (2022) Crop classification foragricultural applications in hyperspectral remote sensing images. Appl Sci 12(3):1670

    Google Scholar 

  14. Agilandeeswari L, Prabukumar M, Alenizi FA (2023) A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication. Multimed Tools Appl 1–53

  15. Al-Otum HM (2014) Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique. J Visual Commun Image Represent 25(5):1064–1081

    Google Scholar 

  16. Al-Otum HM, Ellubani AAA (2022) Secure and effective color image tampering detection and self restoration using a dual watermarking approach. Optik 262:169280

    Google Scholar 

  17. Appel G, Grewal L, Hadi R, Stephen AT (2020) The future of social media in marketing. J Acad Market Sci 48(1):79–95

    Google Scholar 

  18. Ariatmanto D, Ernawan F (2022) Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking. J King Saud Univ-Comput Inform Sci 34(3):605–614

    Google Scholar 

  19. Asiri S (n.d.) " Brief Introduction to Artificial Neural," Meet Artificial Neural Networks. Brief Introduction to Artificial Neural… | by Sidath Asiri | Towards Data Science

  20. Azizi S, Mohrekesh M, Samavi S (2013) Hybrid image watermarking using local complexity variations. In: 2013 21st Iranian Conference on Electrical Engineering (ICEE). IEEE, "Contourlet Transform," (n.d.), pp 1-6. https://www.researchgate.net/figure/The-contourlet-transform-consist-of-LP-and-DFB-part_fig2_257547896

  21. Begum M, Uddin MS (2020) Digital image watermarking techniques: a review. Information 11(2):110

    Google Scholar 

  22. Begum M, Uddin MS (2020) Analysis of digital image watermarking techniques through hybrid methods. Adv Multimed 2020:1–12

    Google Scholar 

  23. Bhalerao S, Ansari IA, Kumar A (2021) "Analysis of DNN based image watermarking data generation for self-recovery," 2021 international conference on control, Automation, Power and Signal Processing (CAPS), pp. 1–6

  24. Bhatti UA, Yu Z, Yuan L, Zeeshan Z, Nawaz SA, Bhatti M et al (2020) Geometric algebra applications ingeospatial artificial intelligence and remote sensing image processing. IEEE Access 8:155783–155796

    Google Scholar 

  25. Bolourian Haghighi B, Taherinia AH, Mohajerzadeh AH (2018) "TRLG: fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with quality optimized using LWT and GA," arXiv e-prints, arXiv-1803

  26. "Bossbase dataset" (n.d.) https://www.kaggle.com/lijiyu/bossbase

  27. Byrnes O, La W, Wang H, Ma C, Xue M, Wu Q (2021) " Data hiding with deep learning: A survey unifying digital watermarking and steganography," arXiv preprint arXiv:2107.09287

  28. Camacho C, Kai W (2021) A comprehensive review of deep-learning-based methods for image forensics. J Imaging 7(4):69

    Google Scholar 

  29. Cao F, An B, Wang J, Ye D, Wang H (2017) Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46:52–60

    Google Scholar 

  30. Cao H, Hu F, Sun Y, Chen S, Su Q (2022) Robust and reversible color image watermarking based on DFT in the spatial domain. Optik 169319:262

    Google Scholar 

  31. "Cassia-v2.0 Dataset:," (n.d.) https://www.kaggle.com/divg07/casia-20-image-tampering-detection-dataset

  32. Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11(6):585–595

    Google Scholar 

  33. Castro M, Ballesteros, DM, Renza D (2020) A dataset of 1050-tampered color and grayscale images (CG-1050). Data in Brief 28:104864. https://www.kaggle.com/saurabhshahane/cg1050

  34. Chalamala SR, Kakkirala K. R (2015) "Local binary patterns for digital image watermarking," 2015 3rd international conference on artificial intelligence, modelling and simulation (AIMS), pp. 159-162

  35. Chang YJ, Wang RZ, Lin JC (2009) A sharing-based fragile watermarking method for authentication and self-recovery of image tampering. EURASIP Journal on Advances in Signal Processing 2008:1–17

    Google Scholar 

  36. Chang CC, Lu TC, Zhu ZH, Tian H (2018) An effective authentication scheme using DCT for Mobile devices. Symmetry 10(1):13

    Google Scholar 

  37. Charkari NM, Chahooki MAZ (2007) " A robust high capacity watermarking based on DCT and spread spectrum," In 2007 IEEE International Symposium on Signal Processing and Information Technology. IEEE., pp. 194–197

  38. Chaughule SS, Megherbi DB (2019) "A robust, non-blind high capacity & secure digital watermarking scheme for image secret information, authentication and tampering localization and recovery via the discrete wavelet transform," 2019 IEEE international symposium on Technologies for Homeland Security (HST).IEEE, pp. 1-5

  39. Chen J, Kang X, Liu Y, Wang ZJ (2015) Median filtering forensics based on convolutional neural networks. IEEE Signal Process Lett 22(11):1849–1853

    Google Scholar 

  40. Coronel SLG, Ramírez BE, Mosqueda MAA (2016) Robust watermark technique using masking and Hermite transform. SpringerPlus 5(1):1–20

    Google Scholar 

  41. Cozzolino D, Poggi G, Verdoliva L (2015) Efficient Dense-Field Copy–Move Forgery Detection. IEEE Trans Inf Forensic Secur 10(11):2284–2297

    Google Scholar 

  42. Eugene B (2021) Data breaches: most significant breaches of the year 2021. https://www.identityforce.com/blog/2021-data-breaches

  43. Dobre RA, Preda RO, Marcu AE (2018) "Improved active method for image forgery detection and localization on Mobile devices," 2018 IEEE 24th international symposium for design and Technology in Electronic Packaging(SIITME). IEEE, pp. 255–260

  44. Dogan S, Tuncer T, Avci E, Gulten A (2011) A robust color image watermarking with singular value decomposition method. Adv Eng Softw 42(6):336–346

    Google Scholar 

  45. Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: 2013 IEEE China summit and international conference on signal and information processing. IEEE, China, pp 422–426

  46. Cao Q, Xu L (2019) Unsupervised greenhouse tomato plant segmentation based on self-adaptive iterative latent dirichlet allocation from surveillance camera. Agronomy 9(2): 91. https://www.researchgate.net/publication/331168576/figure/fig1/AS:727678764199949@1550503545624/Sub-bands-separated-by-a-three-level-dyadic-discrete-wavelet-transform-DWT.png

  47. Elshoura SM, Megherbi DB (2013) Analysis of noise sensitivity of Tchebichef and Zernike moments with application to image watermarking. J Vis Commun Image Represent 24(5):567–578

    Google Scholar 

  48. Fang H, Zhang W, Zhou H, Cui H, Yu N (2018) Screen-shooting resilient watermarking. IEEE Trans Inf Forensics Secur 14(6):1403–1418

    Google Scholar 

  49. Prabukumar M, Agilandeeswari L, Ganesan K (2019) An intelligent lung cancer diagnosis system using cuckoo search optimization and support vector machine classifier. J Ambient Intell Human Comput 10:267–293

    Google Scholar 

  50. Fita A, Endebu B (2019) Watermarking colored digital image using singular value decomposition for data protection. J Math Stat Anal 127:964–9726

    Google Scholar 

  51. Gao H, Chen Q (2021) A robust and secure image watermarking scheme using SURF and improved artificial bee colony algorithm in DWT domain. Optik 242:166954

    Google Scholar 

  52. Gómez-Moreno H, Gil-Jiménez P, Lafuente-Arroyo S, López-Sastre R, Maldonado-Bascón S (2014) A salt and pepper noise reduction scheme for digital images based on support vector machines classification and regression. Sci World J 2014:826405

  53. Sunny S, Agilandeeswari L (2013) Secure data sharing of patient record in cloud environment using attribute based encryption. Int J Appl Eng Res 8(19)

  54. "Growth Rate of Facebook," (n.d.) https://cdn.statcdn.com/Infographic/images/normal/10047.jpeg

  55. Guo JM, Prasetyo H (2014) Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int J Electron Commun 68(9):816–834

    Google Scholar 

  56. Guo JM, Prasetyo H (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent 25(5):1149–1163

    Google Scholar 

  57. Hamidi M, El Haziti M, Cherifi H, El Hassouni M (2018) Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform. Multimed Tools Appl 77(20):27181–27214

    Google Scholar 

  58. Han B, Du J, Jia Y, Zhu H (2021) Zero-watermarking algorithm for medical image based on VGG19 deep convolution neural network. J Health Eng 2021

  59. Hartung F, Girod B (1998) Watermarking of uncompressed and compressed video. Signal Process 66(3):283–301

    Google Scholar 

  60. Hatami E, Rashidy Kanan H, Layeghi K, Harounabadi A (2023) An optimized robust and invisible digital image watermarking scheme in Contourlet domain for protecting rightful ownership. Multimed Tools Appl 82(2):2021–2051

    Google Scholar 

  61. Hongbo BI, Xueming LI, Zhang Y (2013) A novel HVS-based watermarking scheme in contourlet transform domain. Telkomnika Indonesian J Electr Eng 11(12):7516–7524

    Google Scholar 

  62. Hoshi AR, Zainal N, Ismail M, Rahem AART, Wadi SM (2021) A robust watermark algorithm for copyright protection by using 5-level DWT and two logos. Indonesian J Electric Eng Comput Sci 22(2):842–856

    Google Scholar 

  63. Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1–3):178–184

    Google Scholar 

  64. Hurrah NN, Parah SA, Loan NA, Sheikh JA, Elhoseny M, Muhammad K (2019) Dual watermarking framework for privacy protection and content authentication of multimedia. Futur Gener Comput Syst 94:654–673

    Google Scholar 

  65. Islam SM, Debnath R, Hossain S. A (2007) "DWT based digital watermarking technique and its robustness on image rotation, scaling, JPEG compression, cropping, and multiple watermarking," 2007 international conference on information and communication technology. IEEE., pp. 246-249

  66. Issa M (2018) "Digital image watermarking performance improvement using bio-inspired algorithms," In: Hassanien, A., Oliva, D. (eds) Advances in Soft Computing and Machine Learning in Image Processing, Advances in Soft Computing and Machine Learning in Image Processing Studies in Computational Intelligence,730. Springer, Cham., vol. 730

  67. Jana M, Jana B, Joardar S (2022) Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic. J King Saud Univ-Comput Inform Sci 34(10):9822–9835

    Google Scholar 

  68. Jayamalar T, Radha V (2010) Survey on digital video watermarking techniques and attacks on watermarks. Int J Eng Sci Technol 2(12):6963–6967

    Google Scholar 

  69. Jeffry B, Mammi H (2017) "A study on image security in social media using digital watermarking with metadata.," In 2017 IEEE conference on application, Information and Network Security (AINS) IEEE, pp 118–123

  70. Jyothika A, Geetharanjin PR (2018) "Robust watermarking scheme and tamper detection using integer wavelet transform," 2018 2nd international conference on trends in electronics and informatics (ICOEI), pp. 676-679, May

  71. Kang H, Leng L, Kim BG (2022) Data hiding of multicompressed images based on Shamir threshold sharing. Appl Sci 12(19):9629

    Google Scholar 

  72. Kessler B (2002) Constructions of orthogonal and biorthogonal scaling functions and multiwavelets using fractal. Adv Imaging Electron Phys 124:195–252

    Google Scholar 

  73. Kim C, Yang CN (2021) Self-embedding fragile watermarking scheme against tampering image by using AMBTC and OPAP approaches. Appl Sci 11(3):1146

    Google Scholar 

  74. Kim C, Shin D, Yang C, Leng L (2021) Data hiding method for color AMBTC compressed images using color difference. Appl Sci 11(8):3418

    Google Scholar 

  75. Kim C, Yang CN, Baek J, Leng L (2021) Survey on data hiding based on block truncation coding. Appl Sci 11(19):9209

    Google Scholar 

  76. "Kinetics datasets:" (n.d.) https://paperswithcode.com/dataset/kinetics-700

  77. Korus P, Huang J Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization. IEEE Trans Inf Forensic Secur 12(4):809–824

  78. Kourkchi H, Ghaemmaghami S (2008) Image adaptive semi-fragile watermarking scheme based on RDWT-SVD. In: 2008 International Conference on Innovations in Information Technology. IEEE, pp 130–134

  79. Lancini R, Mapelli F, Tubaro S (2002) " A robust video watermarking technique in the spatial domain," In International symposium on VIPromCom video/image processing and multimedia communications. IEEE

  80. Laouamer L (2022) New informed non-blind medical image watermarking based on local binary pattern

  81. Laouamer L, AlShaikh M, Nana L, Pascu AC (2015) Robust watermarking scheme and tamper detection based on threshold versus intensity. J Innov Digit Ecosyst 2(1–2):1–12

    Google Scholar 

  82. Lee GJ, Yoon EJ, Yoo KY (2008) A new LSB based digital watermarking scheme with random mapping function. In: 2008 International Symposium on Ubiquitous Multimedia Computing. IEEE, pp 130–134

  83. Lefèvre P, Carré P, Fontaine C, Gaborit P, Huang J (2022) Efficient image tampering localization using semi-fragile watermarking and error control codes. Signal Process 190:108342

    Google Scholar 

  84. Li W, Yu N (2010) "Rotation robust detection of copy-move forgery," 2010 IEEE International Conference on Image Processing, pp. 2113–2116

  85. Lin CH, Liu JC, Shih CH, Lee YW (2008) " A robust watermark scheme for copyright protection," 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008) IEEE, pp. 132–137

  86. Luo H, Yu FX, Huang ZL, Lu ZM (2011) Blind image watermarking based on discrete fractional random transform and subsampling. Optik 1:311–316

    Google Scholar 

  87. Maheshwari JP, Kumar M, Mathur G, Yadav RP, Kakerda RK.(2015) Robust digital image watermarking using DCT based pyramid transform via image compression. In: 2015 International conference on communications and signal processing (ICCSP). IEEE, pp 1059–1063

  88. Maji P, Pal M, Ray R, Shil R (2020) "Image tampering issues in social media with proper detection," 2020 8th international conference on reliability, IEEE Infocom technologies and optimization (trends and future directions)(ICRITO), pp. 1272-1275

  89. Manjunatha S, Patil MM (2021) Deep learning-based Technique for Image Tamper Detection. In: 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV). IEEE, pp 1278-1285

  90. Mo J, Ma ZF, Huang QL (2012) An adaptive watermarking scheme using SVD in Contourlet domain. Adv Inf Sci Serv Sci 4(15):221–232

    Google Scholar 

  91. Mobasseri BG (2000) "A spatial digital video watermark that survives MPEG," Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540) , pp. 68–73

  92. Mohanrajan SN, Loganathan A (2022) Novel vision transformer–based bi-LSTM model for LU/LC prediction—Javadi Hills. Appl Sci 12(13):6387

    Google Scholar 

  93. Molina J, Ponomaryov V, Reyes R, Cruz C (2019) "Watermarking-based self-recovery and authentication framework for colour images," 2019 7th international workshop on biometrics and forensics (IWBF), pp. 1-6

  94. Moltisanti M, Paratore A, Battiato S, Saravo L (2015) Image manipulation on facebook for forensics evidence. In: Image Analysis and Processing—ICIAP 2015: 18th International Conference, Genoa, Italy, September 7-11, 2015, Proceedings, Part II 18. Springer International Publishing, Italy, pp 506–517

  95. Mun, S. M., Nam, S. H., Jang, H., Kim, D., & Lee, H. K. (2019). Finding robust domain from attacks: A learning framework for blind watermarking. Neurocomputing, 337, 191-202.

    Google Scholar 

  96. Munir R, Harlili H (2020) Application of Chaos-Based Fragile Watermarking to Authenticate Digital Video. In: Digital Forensic Science. IntechOpen

  97. Ng T, Chang S, Sun Q (2004) Colombia gray: a data set of authentic and spliced image blocks. Columbia University, ADVENT Technical Report, 4

  98. Ng TT, Hsu J, Chang SF (2009) Columbia image splicing detection evaluation dataset. DVMM lab. Columbia Univ Cal Photos Digit Libr. "Colombia color dataset:," (n.d.). https://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm

  99. NR NR, Shreelekshmi R (2022) Fragile watermarking scheme for tamper localization in images using logistic map and singular value decomposition. J Visual Commun Image Represent 85:103500

  100. D. T. Nguyen, Z. Zong, P. Ogunbona and W. Li, "Object detection using Non-Redundant Local Binary Patterns," 2010 IEEE International Conference on Image Processing, Hong Kong, China, 2010, pp. 4609-4612, doi: 10.1109/ICIP.2010.5651633."Local binary pattern image," (n.d.) no. https://ckyrkou.medium.com/object-detection-using-local-binary-patterns-50b165658368

  101. Patel, M., Sajja, P. S., & Sheth, R. K. (2013). Analysis and survey of digital watermarking techniques. International Journal of Advanced Research in Computer Science and Software Engineering, 3(10), 1-15.

    Google Scholar 

  102. Patil RD, Metkar S (2015) "Fragile video watermarking for tampering detection and localization," in 2015 international conference on advances in computing, communications and informatics (ICACCI). IEEE., pp. 1661-1666

  103. Plata M, Syga P (2020) " Robust spatial-spread deep neural image watermarking," In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE., pp. 62–70

  104. Prakash C, Kumar A, Maheshkar SEA (2018) An integrated method of copy-move and splicing for image forgery detection. Multimed Tools Appl 77:26939–26963

    Google Scholar 

  105. Preda RO (2014) Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain. In: 2014 10th international conference on communications (COMM). IEEE, pp 1–4

  106. Rafigh M, Moghaddam ME (2010) A robust evolutionary based digital image watermarking technique in DCT domain. In: 2010 Seventh International Conference on Computer Graphics, Imaging and Visualization. IEEE, pp 105–109

  107. Rakhmawati L (2018) "Image fragile watermarking with two authentication components for tamper detection and recovery," in 2018 international conference on intelligent autonomous systems (ICoIAS). IEEE, pp. 35–38

  108. Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 1–6

  109. Rezaei M, Taheri H (2022) Digital image self-recovery using CNN networks. Optik 264:169345

  110. Rhayma AH, Makhloufi, HH, Hmida AB (2018) "Semi fragile watermarking scheme for image recovery in wavelet domain," 2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), pp. 1–5

  111. Sawant S.S, Manoharan P, Loganathan A (2021) Band selection strategies for hyperspectral image classification based on machine learning and artificial intelligent techniques–Survey. Arab J Geosci 14:1–10

    Google Scholar 

  112. Saini P, Ahuja R, Kaur A (2021) A review on video authentication technique exploiting watermarking methods. In: 2021 9th international conference on reliability Infocom technologies and optimization (trends and future directions)(ICRIT). ICRIT, pp 1–5

  113. Sang J, Liu Q, Song CL (2020) Robust video watermarking using a hybrid DCT-DWT approach. J Electron Sci Technol 18(2):100052

    Google Scholar 

  114. Sawant SS, Prabukumar M, Loganathan A, Alenizi FA, Ingaleshwar S (2022) Multi-objective multi-verse optimizer based unsupervised band selection for hyperspectral image classification. Int J Remote Sens 43(11):3990–4024

    Google Scholar 

  115. Scheibenreif L, Hanna J, Mommert M, Borth D (2022) "Self-supervised vision transformers for land-cover segmentation and classification," In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 1422–1431

  116. Setiadi DRIM (2020) PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80(6):8423–8444

    Google Scholar 

  117. Sharma V, Gangarde M, Oza S (2019) A spatial domain based secure and robust video watermarking technique using modified LSB and secret image sharing. ICTACT J Image Vid Process 10(1):2061–2070

    Google Scholar 

  118. Shukla D, Sharma M (2018) A novel scene-based video watermarking scheme for copyright protection. J Intell Syst 27(1):47–66

    Google Scholar 

  119. Singh B, Sharma MK (2021) Tamper detection technique for document images using zero watermarking in wavelet domain. Comput Electric Eng 89:106925

  120. Singh B, Sharma DK (2021) SiteForge: Detecting and localizing forged images on microblogging platforms using deep convolutional neural network. Comput Industri Eng 162:107733

  121. Sinhal R, Ansari IA, Ahn CW (2020) Blind image watermarking for localization and restoration of color images. IEEE Access 8:200157–200169

    Google Scholar 

  122. SIPI dataset: Allan Weber, 213-740-4147 (n.d.). https://sipi.usc.edu/database/database.php?volume=misc.

  123. "Social Media Growth," (n.d.) https://www.smartinsights.com/social-media-marketing/social-media-strategy/new-global-social-media-research/

  124. Song C, Sudirman S, Merabti M, Al-Jumeily D (2011) "Region-Adaptive Watermarking System and Its Application," 2011 Developments in E-systems engineering. IEEE, pp 215–220

  125. Soni B, Das PK, Thounaojam DM (2017) CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Process 12(2):167–178

    Google Scholar 

  126. Soppari K, Chandra NS (2020) Development of improved whale optimization-based FCM clustering for image watermarking. Comput Sci Rev 37:100287

  127. Standard test dataset-SIPI (n.d.). https://www.imageprocessingplace.com/root_files_V3/image_databases.htm

  128. Sun W, Zhou J, Li Y, Cheung M, She J (2020) Robust high-capacity watermarking over online social network shared images. IEEE Trans Circ Syst Vid Technol 31(3):1208–1221

    Google Scholar 

  129. Tan L, He Y, Wu F, Zhang D (2020) A blind watermarking algorithm for digital image based on DWT. J Phys: Confer Ser 1518(1):012068

  130. Tang W, Tan SLB, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process Lett 24(10):1547–1551

    Google Scholar 

  131. Thakur R, Rohilla R (2020) Recent advances in digital image manipulation detection techniques: A brief review. Forens Sci Int 312:110311

  132. "The Copy-Move Forgery Database with Similar but Genuine Objects (COVERAGE) accompanies the following publication: COVERAGE– A NOVEL DATABASE FOR COPY-MOVE FORGERY DETECTION," (2016) IEEE International Conference on Image processing (ICIP)

  133. Tohidi F, Paul M, Hooshmandasl MR (2021) Detection and recovery of higher tampered images using novel feature and compression strategy. IEEE Access 9:57510–57528

    Google Scholar 

  134. Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD—New database for copy-move forgery detection. In: Proceedings ELMAR-2013. IEEE, "CoMoFoD Dataset:," (n.d.), pp 49–54. https://www.vcl.fer.hr/comofod/examples.html

  135. Tsai MJ, Chien CC (2008) "A wavelet-based semi-fragile watermarking with recovery mechanism," in 2008 IEEE international symposium on circuits and systems (ISCAS). IEEE, pp. 3033-3036

  136. Vahedi E, Lucas C, Zoroofi RA, Shiva M (2007) "A new approach for image watermarking by using particle swarm optimization," 2007 IEEE International Conference on Signal Processing and Communications, pp. 1383–1386

  137. Vassaux PB, Nguyen S, Baudry PB, Chassery J (2002) "Scrambling technique for video object watermarking resisting to MPEG-4," International Symposium on VIPromCom Video/Image Processing and Multimedia Communication, pp. 239–244

  138. Venu KN, Sujatha BK (2021) Enhanced block based copy paste image forgery detection. Mater Today:Proc 2021. https://doi.org/10.1016/j.matpr.2021.01.189

  139. Verma VS, Jha RK, Ojha A (2015) Digital watermark extraction using support vector machine with principal component analysis based feature reduction. J Vis Commun Image Represent 31:75–85

    Google Scholar 

  140. Verma V, Srivastava VK, Thakkar F (2016) "DWT-SVD based digital image watermarking using swarm intelligence," 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 3198–3203

  141. "Video Dataset:," (n.d.) https://paperswithcode.com/datasets?mod=videos

  142. "VIPP dataset:," (n.d.) http://clem.dii.unisi.it/~vipp/datasets.html

  143. Wan W, Wang J, Zhang Y, Li J, Yu H, Sun J (2022) A comprehensive survey on robust image watermarking. Neurocomputing 448:226–247

    Google Scholar 

  144. Wang X, Wang J, Peng H (2009) "A semi-fragile image watermarking resisting to JPEG compression," in 2009 international conference on management of e-commerce and e-government. IEEE., pp. 498-502

  145. Wang XY, Jiao LX, Wang XB, Yang HY, Niu PP (2018) A new keypoint-based copy-move forgery detection for color image. Appl Intell 48(10):3630–3652

    Google Scholar 

  146. Wang XY, Liu YN, Xu H, Wang P, Yang HY (2018) Robust copy–move forgery detection using quaternion exponent moments. Pattern Anal Applic 21(2):451–467

    MathSciNet  Google Scholar 

  147. Xu H, Kang X, Chen Y, Wang Y (2019) Rotation and scale invariant image watermarking based on polar harmonic transforms. Optik 183:401–414

    Google Scholar 

  148. Yao B, Jiang X, Khosla A, Lin AL, Guibas L, Fei-Fei L (2011) Human action recognition by learning bases of action attributes and parts. In: 2011 International conference on computer vision. IEEE, pp 1331–1338

  149. Yeo IK, Kim HJ (2003) Generalized patchwork algorithm for image watermarking. Multimed Syst 9(3):261–265

    Google Scholar 

  150. Yu C (2020) "Attention based data hiding with generative adversarial networks," in Proceedings of the AAAI conference on artificial intelligence, Vol. 34, No. 01, pp. 1120–1128

  151. Yu X, Wang C, Zhou X (2017) Review on semi-fragile watermarking algorithms for content authentication of digital images. Future Int 9(4):56

    Google Scholar 

  152. Zampoglou M, Papadopoulos S, Kompatsiaris Y (2015) " Detecting image splicing in the wild (WEB)," IEEE International Conference on Multimedia & Expo Workshops (ICMEW)

  153. Zhang Y, Thing VL (2017) A multi-scale noise-resistant feature adaptation approach for image tampering localization over Facebook. In: 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP). IEEE, pp 272–276

  154. Zhang X, Cui L, Shao L (2012) "A fast semi-fragile watermarking scheme based on quantizing the weighted mean of integer Haar wavelet coefficients," in 2012 symposium on photonics and optoelectronics. IEEE, pp. 1-4

  155. Zhang H, Wang C, Zhou X (2017) Fragile watermarking for image authentication using the characteristic of SVD. Algorithms 10(1):27

    MathSciNet  Google Scholar 

  156. Zheng PP, Feng J, Li Z, Zhou MQ (2014) A novel SVD and LS-SVM combination algorithm for blind watermarking. Neurocomputing 142:520–528

    Google Scholar 

  157. Zhou G, Lv D (2011) An overview of digital watermarking in image forensics. In: 2011 fourth international joint conference on computational sciences and optimization. IEEE, Kunming and Lijiang City, China, pp 332–335

  158. Zhou X, Ma J, Du W (2013) "SoW: a hybrid DWT-SVD based secured image watermarking," In PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System ,IEEE, pp. 197–200

  159. Zhou N, Luo A, Zou W (2019) Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multimed Tools Appl 78:2507–2523

    Google Scholar 

  160. Zhu J, Kaplan R, Johnson J, Fei-Fei L (2018) "Hidden: Hiding data with deep networks," In Proceedings of the European conference on computer vision (ECCV), pp. 657–672

  161. Zigomitros A, Papageorgiou A, Patsakis C (2012) Social network content management through watermarking. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications. IEEE, Liverpool, UK, pp 1381–1386

  162. Zong T, Xiang Y, Natgunanathan I, Guo S, Zhou W, Beliakov G (2015) Robust histogram shape-based method for image watermarking. Circuits and Systems for Video Technology. IEEE Trans 25:717–729

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to L. Agilandeeswari.

Ethics declarations

Conflict of interests/competing interests

The authors have no Funding and/or Conflicts of interests/Competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aberna, P., Agilandeeswari, L. Digital image and video watermarking: methodologies, attacks, applications, and future directions. Multimed Tools Appl 83, 5531–5591 (2024). https://doi.org/10.1007/s11042-023-15806-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15806-y

Keywords

Navigation