Abstract
In recent years, internet technology has grown in advance, and multimedia data-sharing growth rates have skyrocketed. As a result, protecting multimedia data in digital networks has become a significant problem. Multimedia data such as audio, text, video, and image are highly used as a data-sharing communication system which demands security, particularly in image and video. Digital watermarking is the one solution that has gained widespread recognition over the past two decades for data embedding in image and video, a key tactic in multimedia tamper detection and recovery. The review tells about the growth rate and data breaches on multimedia data across different applications, which raises the issue of multimedia security. Notably, social network platforms are highly targeted due to their rapid growth, which has created opportunities for data breaches and multimedia manipulation. Here, the forensic field comes into play, where some data-hiding strategies are used to look for evidence of tampering. Even though watermarking techniques can attain security in tamper detection, they face some issues and challenges across various applications. This motivated us to analyze the existing work carried out by data hiding watermarking techniques in the field of multimedia tamper detection in detail and the gap analyzed. Overall, dataset availability, watermarking performance quality metrics, and several image-processing attacks are all explicitly mentioned. This review paper discusses a comprehensive study of the existing system in the field of tamper detection (both in Image and Video) in detail. Also, the development of existing watermarking techniques, issues, and challenges are covered in detail in this paper.
Similar content being viewed by others
Data availability
Data sharing does not apply to this article as no datasets were generated or analyzed during the current study.
References
Abdelhakim A, Saleh HI, Abdelhakim M (2019) Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering. Multimed Tools Appl 78(22):32523–32563
Agarwal H, Husain F (2021) Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and SURF. J Inf Secur Appl 59:102846
Agilandeeswari L, Muralibabu K (2013) A robust video watermarking algorithm for content authentication using discrete wavelet transform (DWT) and singular value decomposition (SVD). Int J Sec Appl 7(4):145–158
Agilandeeswari L, Muralibabu K (2013) A novel block based video in video watermarking algorithm using discrete wavelet transform and singular value decomposition. Int J of Adv Res Comput Sci Soft Eng 3(4)
Agilandeeswari L, Ganesan K (2016) A robust color video watermarking scheme based on hybrid embedding techniques. Multimedia Tools and Applications. 75(14):8745–8780
Agilandeeswari L, Ganesan K (2016) An efficient hilbert and integer wavelet transform based video watermarking. J Eng Sci Technol 11(3):327–345
Agilandeeswari L, Ganesan K (2016) An adaptive HVS based video watermarking scheme for multiple watermarks using BAM neural networks and fuzzy inference system. Expert Syst Appl 63:412–434
Agilandeeswari L, Ganesan K et al (2016) A bi-directional associative memory based multiple image watermarking on cover video. Multimed Tools Appl (Springer) 75(12):7211–7256
Agilandeeswari L, Ganesan K (2018) RST invariant robust video watermarking algorithm using quaternion curvelet transform. Multimed Tools Appl 77(19):25431–25474
Agilandeeswari, L., & Meena, S. D. (2023). SWIN transformer based contrastive self-supervised learning for animal detection and classification. Multimedia Tools and Applications, 82(7), 10445-10470.
Agilandeeswari L, Ganesan K, Muralibabu K (2013) "A side view based video in video watermarking using DWT and Hilbert transform," Security in computing and communications, Communications in Computer and Information Science (CCIS) series – Springer, p. 3
Agilandeeswari, L., Paliwal, S., Chandrakar, A., & Prabukumar, M. (2022). A new lightweight conditional privacy preserving authentication and key–agreement protocol in social internet of things for vehicle to smart grid networks. Multimedia Tools and Applications, 81(19), 27683-27710.
Agilandeeswari L, Prabukumar M, Radhesyam V, Phaneendra KLB, Farhan A (2022) Crop classification foragricultural applications in hyperspectral remote sensing images. Appl Sci 12(3):1670
Agilandeeswari L, Prabukumar M, Alenizi FA (2023) A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication. Multimed Tools Appl 1–53
Al-Otum HM (2014) Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique. J Visual Commun Image Represent 25(5):1064–1081
Al-Otum HM, Ellubani AAA (2022) Secure and effective color image tampering detection and self restoration using a dual watermarking approach. Optik 262:169280
Appel G, Grewal L, Hadi R, Stephen AT (2020) The future of social media in marketing. J Acad Market Sci 48(1):79–95
Ariatmanto D, Ernawan F (2022) Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking. J King Saud Univ-Comput Inform Sci 34(3):605–614
Asiri S (n.d.) " Brief Introduction to Artificial Neural," Meet Artificial Neural Networks. Brief Introduction to Artificial Neural… | by Sidath Asiri | Towards Data Science
Azizi S, Mohrekesh M, Samavi S (2013) Hybrid image watermarking using local complexity variations. In: 2013 21st Iranian Conference on Electrical Engineering (ICEE). IEEE, "Contourlet Transform," (n.d.), pp 1-6. https://www.researchgate.net/figure/The-contourlet-transform-consist-of-LP-and-DFB-part_fig2_257547896
Begum M, Uddin MS (2020) Digital image watermarking techniques: a review. Information 11(2):110
Begum M, Uddin MS (2020) Analysis of digital image watermarking techniques through hybrid methods. Adv Multimed 2020:1–12
Bhalerao S, Ansari IA, Kumar A (2021) "Analysis of DNN based image watermarking data generation for self-recovery," 2021 international conference on control, Automation, Power and Signal Processing (CAPS), pp. 1–6
Bhatti UA, Yu Z, Yuan L, Zeeshan Z, Nawaz SA, Bhatti M et al (2020) Geometric algebra applications ingeospatial artificial intelligence and remote sensing image processing. IEEE Access 8:155783–155796
Bolourian Haghighi B, Taherinia AH, Mohajerzadeh AH (2018) "TRLG: fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with quality optimized using LWT and GA," arXiv e-prints, arXiv-1803
"Bossbase dataset" (n.d.) https://www.kaggle.com/lijiyu/bossbase
Byrnes O, La W, Wang H, Ma C, Xue M, Wu Q (2021) " Data hiding with deep learning: A survey unifying digital watermarking and steganography," arXiv preprint arXiv:2107.09287
Camacho C, Kai W (2021) A comprehensive review of deep-learning-based methods for image forensics. J Imaging 7(4):69
Cao F, An B, Wang J, Ye D, Wang H (2017) Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46:52–60
Cao H, Hu F, Sun Y, Chen S, Su Q (2022) Robust and reversible color image watermarking based on DFT in the spatial domain. Optik 169319:262
"Cassia-v2.0 Dataset:," (n.d.) https://www.kaggle.com/divg07/casia-20-image-tampering-detection-dataset
Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11(6):585–595
Castro M, Ballesteros, DM, Renza D (2020) A dataset of 1050-tampered color and grayscale images (CG-1050). Data in Brief 28:104864. https://www.kaggle.com/saurabhshahane/cg1050
Chalamala SR, Kakkirala K. R (2015) "Local binary patterns for digital image watermarking," 2015 3rd international conference on artificial intelligence, modelling and simulation (AIMS), pp. 159-162
Chang YJ, Wang RZ, Lin JC (2009) A sharing-based fragile watermarking method for authentication and self-recovery of image tampering. EURASIP Journal on Advances in Signal Processing 2008:1–17
Chang CC, Lu TC, Zhu ZH, Tian H (2018) An effective authentication scheme using DCT for Mobile devices. Symmetry 10(1):13
Charkari NM, Chahooki MAZ (2007) " A robust high capacity watermarking based on DCT and spread spectrum," In 2007 IEEE International Symposium on Signal Processing and Information Technology. IEEE., pp. 194–197
Chaughule SS, Megherbi DB (2019) "A robust, non-blind high capacity & secure digital watermarking scheme for image secret information, authentication and tampering localization and recovery via the discrete wavelet transform," 2019 IEEE international symposium on Technologies for Homeland Security (HST).IEEE, pp. 1-5
Chen J, Kang X, Liu Y, Wang ZJ (2015) Median filtering forensics based on convolutional neural networks. IEEE Signal Process Lett 22(11):1849–1853
Coronel SLG, Ramírez BE, Mosqueda MAA (2016) Robust watermark technique using masking and Hermite transform. SpringerPlus 5(1):1–20
Cozzolino D, Poggi G, Verdoliva L (2015) Efficient Dense-Field Copy–Move Forgery Detection. IEEE Trans Inf Forensic Secur 10(11):2284–2297
Eugene B (2021) Data breaches: most significant breaches of the year 2021. https://www.identityforce.com/blog/2021-data-breaches
Dobre RA, Preda RO, Marcu AE (2018) "Improved active method for image forgery detection and localization on Mobile devices," 2018 IEEE 24th international symposium for design and Technology in Electronic Packaging(SIITME). IEEE, pp. 255–260
Dogan S, Tuncer T, Avci E, Gulten A (2011) A robust color image watermarking with singular value decomposition method. Adv Eng Softw 42(6):336–346
Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: 2013 IEEE China summit and international conference on signal and information processing. IEEE, China, pp 422–426
Cao Q, Xu L (2019) Unsupervised greenhouse tomato plant segmentation based on self-adaptive iterative latent dirichlet allocation from surveillance camera. Agronomy 9(2): 91. https://www.researchgate.net/publication/331168576/figure/fig1/AS:727678764199949@1550503545624/Sub-bands-separated-by-a-three-level-dyadic-discrete-wavelet-transform-DWT.png
Elshoura SM, Megherbi DB (2013) Analysis of noise sensitivity of Tchebichef and Zernike moments with application to image watermarking. J Vis Commun Image Represent 24(5):567–578
Fang H, Zhang W, Zhou H, Cui H, Yu N (2018) Screen-shooting resilient watermarking. IEEE Trans Inf Forensics Secur 14(6):1403–1418
Prabukumar M, Agilandeeswari L, Ganesan K (2019) An intelligent lung cancer diagnosis system using cuckoo search optimization and support vector machine classifier. J Ambient Intell Human Comput 10:267–293
Fita A, Endebu B (2019) Watermarking colored digital image using singular value decomposition for data protection. J Math Stat Anal 127:964–9726
Gao H, Chen Q (2021) A robust and secure image watermarking scheme using SURF and improved artificial bee colony algorithm in DWT domain. Optik 242:166954
Gómez-Moreno H, Gil-Jiménez P, Lafuente-Arroyo S, López-Sastre R, Maldonado-Bascón S (2014) A salt and pepper noise reduction scheme for digital images based on support vector machines classification and regression. Sci World J 2014:826405
Sunny S, Agilandeeswari L (2013) Secure data sharing of patient record in cloud environment using attribute based encryption. Int J Appl Eng Res 8(19)
"Growth Rate of Facebook," (n.d.) https://cdn.statcdn.com/Infographic/images/normal/10047.jpeg
Guo JM, Prasetyo H (2014) Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int J Electron Commun 68(9):816–834
Guo JM, Prasetyo H (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent 25(5):1149–1163
Hamidi M, El Haziti M, Cherifi H, El Hassouni M (2018) Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform. Multimed Tools Appl 77(20):27181–27214
Han B, Du J, Jia Y, Zhu H (2021) Zero-watermarking algorithm for medical image based on VGG19 deep convolution neural network. J Health Eng 2021
Hartung F, Girod B (1998) Watermarking of uncompressed and compressed video. Signal Process 66(3):283–301
Hatami E, Rashidy Kanan H, Layeghi K, Harounabadi A (2023) An optimized robust and invisible digital image watermarking scheme in Contourlet domain for protecting rightful ownership. Multimed Tools Appl 82(2):2021–2051
Hongbo BI, Xueming LI, Zhang Y (2013) A novel HVS-based watermarking scheme in contourlet transform domain. Telkomnika Indonesian J Electr Eng 11(12):7516–7524
Hoshi AR, Zainal N, Ismail M, Rahem AART, Wadi SM (2021) A robust watermark algorithm for copyright protection by using 5-level DWT and two logos. Indonesian J Electric Eng Comput Sci 22(2):842–856
Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1–3):178–184
Hurrah NN, Parah SA, Loan NA, Sheikh JA, Elhoseny M, Muhammad K (2019) Dual watermarking framework for privacy protection and content authentication of multimedia. Futur Gener Comput Syst 94:654–673
Islam SM, Debnath R, Hossain S. A (2007) "DWT based digital watermarking technique and its robustness on image rotation, scaling, JPEG compression, cropping, and multiple watermarking," 2007 international conference on information and communication technology. IEEE., pp. 246-249
Issa M (2018) "Digital image watermarking performance improvement using bio-inspired algorithms," In: Hassanien, A., Oliva, D. (eds) Advances in Soft Computing and Machine Learning in Image Processing, Advances in Soft Computing and Machine Learning in Image Processing Studies in Computational Intelligence,730. Springer, Cham., vol. 730
Jana M, Jana B, Joardar S (2022) Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic. J King Saud Univ-Comput Inform Sci 34(10):9822–9835
Jayamalar T, Radha V (2010) Survey on digital video watermarking techniques and attacks on watermarks. Int J Eng Sci Technol 2(12):6963–6967
Jeffry B, Mammi H (2017) "A study on image security in social media using digital watermarking with metadata.," In 2017 IEEE conference on application, Information and Network Security (AINS) IEEE, pp 118–123
Jyothika A, Geetharanjin PR (2018) "Robust watermarking scheme and tamper detection using integer wavelet transform," 2018 2nd international conference on trends in electronics and informatics (ICOEI), pp. 676-679, May
Kang H, Leng L, Kim BG (2022) Data hiding of multicompressed images based on Shamir threshold sharing. Appl Sci 12(19):9629
Kessler B (2002) Constructions of orthogonal and biorthogonal scaling functions and multiwavelets using fractal. Adv Imaging Electron Phys 124:195–252
Kim C, Yang CN (2021) Self-embedding fragile watermarking scheme against tampering image by using AMBTC and OPAP approaches. Appl Sci 11(3):1146
Kim C, Shin D, Yang C, Leng L (2021) Data hiding method for color AMBTC compressed images using color difference. Appl Sci 11(8):3418
Kim C, Yang CN, Baek J, Leng L (2021) Survey on data hiding based on block truncation coding. Appl Sci 11(19):9209
"Kinetics datasets:" (n.d.) https://paperswithcode.com/dataset/kinetics-700
Korus P, Huang J Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization. IEEE Trans Inf Forensic Secur 12(4):809–824
Kourkchi H, Ghaemmaghami S (2008) Image adaptive semi-fragile watermarking scheme based on RDWT-SVD. In: 2008 International Conference on Innovations in Information Technology. IEEE, pp 130–134
Lancini R, Mapelli F, Tubaro S (2002) " A robust video watermarking technique in the spatial domain," In International symposium on VIPromCom video/image processing and multimedia communications. IEEE
Laouamer L (2022) New informed non-blind medical image watermarking based on local binary pattern
Laouamer L, AlShaikh M, Nana L, Pascu AC (2015) Robust watermarking scheme and tamper detection based on threshold versus intensity. J Innov Digit Ecosyst 2(1–2):1–12
Lee GJ, Yoon EJ, Yoo KY (2008) A new LSB based digital watermarking scheme with random mapping function. In: 2008 International Symposium on Ubiquitous Multimedia Computing. IEEE, pp 130–134
Lefèvre P, Carré P, Fontaine C, Gaborit P, Huang J (2022) Efficient image tampering localization using semi-fragile watermarking and error control codes. Signal Process 190:108342
Li W, Yu N (2010) "Rotation robust detection of copy-move forgery," 2010 IEEE International Conference on Image Processing, pp. 2113–2116
Lin CH, Liu JC, Shih CH, Lee YW (2008) " A robust watermark scheme for copyright protection," 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008) IEEE, pp. 132–137
Luo H, Yu FX, Huang ZL, Lu ZM (2011) Blind image watermarking based on discrete fractional random transform and subsampling. Optik 1:311–316
Maheshwari JP, Kumar M, Mathur G, Yadav RP, Kakerda RK.(2015) Robust digital image watermarking using DCT based pyramid transform via image compression. In: 2015 International conference on communications and signal processing (ICCSP). IEEE, pp 1059–1063
Maji P, Pal M, Ray R, Shil R (2020) "Image tampering issues in social media with proper detection," 2020 8th international conference on reliability, IEEE Infocom technologies and optimization (trends and future directions)(ICRITO), pp. 1272-1275
Manjunatha S, Patil MM (2021) Deep learning-based Technique for Image Tamper Detection. In: 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV). IEEE, pp 1278-1285
Mo J, Ma ZF, Huang QL (2012) An adaptive watermarking scheme using SVD in Contourlet domain. Adv Inf Sci Serv Sci 4(15):221–232
Mobasseri BG (2000) "A spatial digital video watermark that survives MPEG," Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540) , pp. 68–73
Mohanrajan SN, Loganathan A (2022) Novel vision transformer–based bi-LSTM model for LU/LC prediction—Javadi Hills. Appl Sci 12(13):6387
Molina J, Ponomaryov V, Reyes R, Cruz C (2019) "Watermarking-based self-recovery and authentication framework for colour images," 2019 7th international workshop on biometrics and forensics (IWBF), pp. 1-6
Moltisanti M, Paratore A, Battiato S, Saravo L (2015) Image manipulation on facebook for forensics evidence. In: Image Analysis and Processing—ICIAP 2015: 18th International Conference, Genoa, Italy, September 7-11, 2015, Proceedings, Part II 18. Springer International Publishing, Italy, pp 506–517
Mun, S. M., Nam, S. H., Jang, H., Kim, D., & Lee, H. K. (2019). Finding robust domain from attacks: A learning framework for blind watermarking. Neurocomputing, 337, 191-202.
Munir R, Harlili H (2020) Application of Chaos-Based Fragile Watermarking to Authenticate Digital Video. In: Digital Forensic Science. IntechOpen
Ng T, Chang S, Sun Q (2004) Colombia gray: a data set of authentic and spliced image blocks. Columbia University, ADVENT Technical Report, 4
Ng TT, Hsu J, Chang SF (2009) Columbia image splicing detection evaluation dataset. DVMM lab. Columbia Univ Cal Photos Digit Libr. "Colombia color dataset:," (n.d.). https://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm
NR NR, Shreelekshmi R (2022) Fragile watermarking scheme for tamper localization in images using logistic map and singular value decomposition. J Visual Commun Image Represent 85:103500
D. T. Nguyen, Z. Zong, P. Ogunbona and W. Li, "Object detection using Non-Redundant Local Binary Patterns," 2010 IEEE International Conference on Image Processing, Hong Kong, China, 2010, pp. 4609-4612, doi: 10.1109/ICIP.2010.5651633."Local binary pattern image," (n.d.) no. https://ckyrkou.medium.com/object-detection-using-local-binary-patterns-50b165658368
Patel, M., Sajja, P. S., & Sheth, R. K. (2013). Analysis and survey of digital watermarking techniques. International Journal of Advanced Research in Computer Science and Software Engineering, 3(10), 1-15.
Patil RD, Metkar S (2015) "Fragile video watermarking for tampering detection and localization," in 2015 international conference on advances in computing, communications and informatics (ICACCI). IEEE., pp. 1661-1666
Plata M, Syga P (2020) " Robust spatial-spread deep neural image watermarking," In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE., pp. 62–70
Prakash C, Kumar A, Maheshkar SEA (2018) An integrated method of copy-move and splicing for image forgery detection. Multimed Tools Appl 77:26939–26963
Preda RO (2014) Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain. In: 2014 10th international conference on communications (COMM). IEEE, pp 1–4
Rafigh M, Moghaddam ME (2010) A robust evolutionary based digital image watermarking technique in DCT domain. In: 2010 Seventh International Conference on Computer Graphics, Imaging and Visualization. IEEE, pp 105–109
Rakhmawati L (2018) "Image fragile watermarking with two authentication components for tamper detection and recovery," in 2018 international conference on intelligent autonomous systems (ICoIAS). IEEE, pp. 35–38
Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 1–6
Rezaei M, Taheri H (2022) Digital image self-recovery using CNN networks. Optik 264:169345
Rhayma AH, Makhloufi, HH, Hmida AB (2018) "Semi fragile watermarking scheme for image recovery in wavelet domain," 2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), pp. 1–5
Sawant S.S, Manoharan P, Loganathan A (2021) Band selection strategies for hyperspectral image classification based on machine learning and artificial intelligent techniques–Survey. Arab J Geosci 14:1–10
Saini P, Ahuja R, Kaur A (2021) A review on video authentication technique exploiting watermarking methods. In: 2021 9th international conference on reliability Infocom technologies and optimization (trends and future directions)(ICRIT). ICRIT, pp 1–5
Sang J, Liu Q, Song CL (2020) Robust video watermarking using a hybrid DCT-DWT approach. J Electron Sci Technol 18(2):100052
Sawant SS, Prabukumar M, Loganathan A, Alenizi FA, Ingaleshwar S (2022) Multi-objective multi-verse optimizer based unsupervised band selection for hyperspectral image classification. Int J Remote Sens 43(11):3990–4024
Scheibenreif L, Hanna J, Mommert M, Borth D (2022) "Self-supervised vision transformers for land-cover segmentation and classification," In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 1422–1431
Setiadi DRIM (2020) PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80(6):8423–8444
Sharma V, Gangarde M, Oza S (2019) A spatial domain based secure and robust video watermarking technique using modified LSB and secret image sharing. ICTACT J Image Vid Process 10(1):2061–2070
Shukla D, Sharma M (2018) A novel scene-based video watermarking scheme for copyright protection. J Intell Syst 27(1):47–66
Singh B, Sharma MK (2021) Tamper detection technique for document images using zero watermarking in wavelet domain. Comput Electric Eng 89:106925
Singh B, Sharma DK (2021) SiteForge: Detecting and localizing forged images on microblogging platforms using deep convolutional neural network. Comput Industri Eng 162:107733
Sinhal R, Ansari IA, Ahn CW (2020) Blind image watermarking for localization and restoration of color images. IEEE Access 8:200157–200169
SIPI dataset: Allan Weber, 213-740-4147 (n.d.). https://sipi.usc.edu/database/database.php?volume=misc.
"Social Media Growth," (n.d.) https://www.smartinsights.com/social-media-marketing/social-media-strategy/new-global-social-media-research/
Song C, Sudirman S, Merabti M, Al-Jumeily D (2011) "Region-Adaptive Watermarking System and Its Application," 2011 Developments in E-systems engineering. IEEE, pp 215–220
Soni B, Das PK, Thounaojam DM (2017) CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Process 12(2):167–178
Soppari K, Chandra NS (2020) Development of improved whale optimization-based FCM clustering for image watermarking. Comput Sci Rev 37:100287
Standard test dataset-SIPI (n.d.). https://www.imageprocessingplace.com/root_files_V3/image_databases.htm
Sun W, Zhou J, Li Y, Cheung M, She J (2020) Robust high-capacity watermarking over online social network shared images. IEEE Trans Circ Syst Vid Technol 31(3):1208–1221
Tan L, He Y, Wu F, Zhang D (2020) A blind watermarking algorithm for digital image based on DWT. J Phys: Confer Ser 1518(1):012068
Tang W, Tan SLB, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process Lett 24(10):1547–1551
Thakur R, Rohilla R (2020) Recent advances in digital image manipulation detection techniques: A brief review. Forens Sci Int 312:110311
"The Copy-Move Forgery Database with Similar but Genuine Objects (COVERAGE) accompanies the following publication: COVERAGE– A NOVEL DATABASE FOR COPY-MOVE FORGERY DETECTION," (2016) IEEE International Conference on Image processing (ICIP)
Tohidi F, Paul M, Hooshmandasl MR (2021) Detection and recovery of higher tampered images using novel feature and compression strategy. IEEE Access 9:57510–57528
Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD—New database for copy-move forgery detection. In: Proceedings ELMAR-2013. IEEE, "CoMoFoD Dataset:," (n.d.), pp 49–54. https://www.vcl.fer.hr/comofod/examples.html
Tsai MJ, Chien CC (2008) "A wavelet-based semi-fragile watermarking with recovery mechanism," in 2008 IEEE international symposium on circuits and systems (ISCAS). IEEE, pp. 3033-3036
Vahedi E, Lucas C, Zoroofi RA, Shiva M (2007) "A new approach for image watermarking by using particle swarm optimization," 2007 IEEE International Conference on Signal Processing and Communications, pp. 1383–1386
Vassaux PB, Nguyen S, Baudry PB, Chassery J (2002) "Scrambling technique for video object watermarking resisting to MPEG-4," International Symposium on VIPromCom Video/Image Processing and Multimedia Communication, pp. 239–244
Venu KN, Sujatha BK (2021) Enhanced block based copy paste image forgery detection. Mater Today:Proc 2021. https://doi.org/10.1016/j.matpr.2021.01.189
Verma VS, Jha RK, Ojha A (2015) Digital watermark extraction using support vector machine with principal component analysis based feature reduction. J Vis Commun Image Represent 31:75–85
Verma V, Srivastava VK, Thakkar F (2016) "DWT-SVD based digital image watermarking using swarm intelligence," 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 3198–3203
"Video Dataset:," (n.d.) https://paperswithcode.com/datasets?mod=videos
"VIPP dataset:," (n.d.) http://clem.dii.unisi.it/~vipp/datasets.html
Wan W, Wang J, Zhang Y, Li J, Yu H, Sun J (2022) A comprehensive survey on robust image watermarking. Neurocomputing 448:226–247
Wang X, Wang J, Peng H (2009) "A semi-fragile image watermarking resisting to JPEG compression," in 2009 international conference on management of e-commerce and e-government. IEEE., pp. 498-502
Wang XY, Jiao LX, Wang XB, Yang HY, Niu PP (2018) A new keypoint-based copy-move forgery detection for color image. Appl Intell 48(10):3630–3652
Wang XY, Liu YN, Xu H, Wang P, Yang HY (2018) Robust copy–move forgery detection using quaternion exponent moments. Pattern Anal Applic 21(2):451–467
Xu H, Kang X, Chen Y, Wang Y (2019) Rotation and scale invariant image watermarking based on polar harmonic transforms. Optik 183:401–414
Yao B, Jiang X, Khosla A, Lin AL, Guibas L, Fei-Fei L (2011) Human action recognition by learning bases of action attributes and parts. In: 2011 International conference on computer vision. IEEE, pp 1331–1338
Yeo IK, Kim HJ (2003) Generalized patchwork algorithm for image watermarking. Multimed Syst 9(3):261–265
Yu C (2020) "Attention based data hiding with generative adversarial networks," in Proceedings of the AAAI conference on artificial intelligence, Vol. 34, No. 01, pp. 1120–1128
Yu X, Wang C, Zhou X (2017) Review on semi-fragile watermarking algorithms for content authentication of digital images. Future Int 9(4):56
Zampoglou M, Papadopoulos S, Kompatsiaris Y (2015) " Detecting image splicing in the wild (WEB)," IEEE International Conference on Multimedia & Expo Workshops (ICMEW)
Zhang Y, Thing VL (2017) A multi-scale noise-resistant feature adaptation approach for image tampering localization over Facebook. In: 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP). IEEE, pp 272–276
Zhang X, Cui L, Shao L (2012) "A fast semi-fragile watermarking scheme based on quantizing the weighted mean of integer Haar wavelet coefficients," in 2012 symposium on photonics and optoelectronics. IEEE, pp. 1-4
Zhang H, Wang C, Zhou X (2017) Fragile watermarking for image authentication using the characteristic of SVD. Algorithms 10(1):27
Zheng PP, Feng J, Li Z, Zhou MQ (2014) A novel SVD and LS-SVM combination algorithm for blind watermarking. Neurocomputing 142:520–528
Zhou G, Lv D (2011) An overview of digital watermarking in image forensics. In: 2011 fourth international joint conference on computational sciences and optimization. IEEE, Kunming and Lijiang City, China, pp 332–335
Zhou X, Ma J, Du W (2013) "SoW: a hybrid DWT-SVD based secured image watermarking," In PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System ,IEEE, pp. 197–200
Zhou N, Luo A, Zou W (2019) Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multimed Tools Appl 78:2507–2523
Zhu J, Kaplan R, Johnson J, Fei-Fei L (2018) "Hidden: Hiding data with deep networks," In Proceedings of the European conference on computer vision (ECCV), pp. 657–672
Zigomitros A, Papageorgiou A, Patsakis C (2012) Social network content management through watermarking. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications. IEEE, Liverpool, UK, pp 1381–1386
Zong T, Xiang Y, Natgunanathan I, Guo S, Zhou W, Beliakov G (2015) Robust histogram shape-based method for image watermarking. Circuits and Systems for Video Technology. IEEE Trans 25:717–729
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests/competing interests
The authors have no Funding and/or Conflicts of interests/Competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Aberna, P., Agilandeeswari, L. Digital image and video watermarking: methodologies, attacks, applications, and future directions. Multimed Tools Appl 83, 5531–5591 (2024). https://doi.org/10.1007/s11042-023-15806-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15806-y