Survey of robust and imperceptible watermarking

  • Namita Agarwal
  • Amit Kumar SinghEmail author
  • Pradeep Kumar Singh


Robustness, imperceptibility and embedding capacity are the preliminary requirements of any watermarking technique. However, research concluded that these requirements are difficult to achieve at same time. In this paper, we review various recent robust and imperceptible watermarking methods in spatial and transform domain. Further, the paper introduces elementary concepts of digital watermarking, characteristics and novel applications of watermark in detail. Furthermore, various analysis and comparison of different notable watermarking techniques are discussed in tabular format. We believe that our survey contribution will helpful for fledgling researchers to develop robust and imperceptible watermarking algorithms for various practical applications.


Watermarking Imperceptible Robustness Security Capacity 



  1. 1.
    Ali M, Ahn CW (2018) An optimal image watermarking approach through cuckoo search algorithm in wavelet domain. Int J Syst Assur Eng Manag 9(3):602–611CrossRefGoogle Scholar
  2. 2.
    Al-Nabhani Y, Lalab HA, Wahid A, Noor RM (2015) Robust Watermarking Algorithm for Digital Images using Discrete Wavelet and Probabilistic Neural Network. Journal of King Saud University -Computer, and Information Sciences 27(4):393–401CrossRefGoogle Scholar
  3. 3.
    Andalibi M, Chandler DM (2015) Digital Image Watermarking via Adaptive Logo Texturization. IEEE Trans Image Process 24(12):5060–5073CrossRefGoogle Scholar
  4. 4.
    Aslantas V (2008) A Singular-value Decomposition –based Image Watermarking using Genetic Algorithm. Int J Electron Commun 62(5):386–394CrossRefGoogle Scholar
  5. 5.
    Bas P, Chassery JM, Macq B (2002) Geometrically invariant watermarking using feature points. IEEE Trans Image Process 11(6):1014–1028CrossRefGoogle Scholar
  6. 6.
    Bhatnagar G, Wu QMJ, Raman B (2012) A new robust adjustable logo watermarking scheme. Computers and Security 31(1):40–58CrossRefGoogle Scholar
  7. 7.
    Bouslimi D, Coatrieux G, Roux C (2011) A Joint Watermarking/Encryption Algorithm for Verifying Medical Image Integrity and Authenticity in Both Encrypted and Spatial domains. International Conference of the IEEE EMBS:8066–8069Google Scholar
  8. 8.
    Celik MU, Lemma AN, Katzenbeisser S, Veen MV (2007) Secure Embedding of Spread Spectrum Watermarks Using Look-Up-Tables. IEEE-ICASSP 2:II-153–II-156Google Scholar
  9. 9.
    Chang CC, Chen TS, Chung LZ (2002) A Steganographic method Based upon JPEG and quantization table modification. Inf Sci 141(1-2):123–138zbMATHCrossRefGoogle Scholar
  10. 10.
    Chang CC, Tsai P, Lin CC (2005) SVD- based digital image watermarking scheme. Pattern Recogn Lett 26(10):1577–1586CrossRefGoogle Scholar
  11. 11.
    Chauhan DS, Singh AK, Adarsh A, Kumar B, Saini JP (2017) Combining Mexican hat wavelet and spread spectrum for adaptive watermarking and its statistical detection using medical images. Multimedia Tool and Applications, pp.1-15Google Scholar
  12. 12.
    Chen TS, Lee WB, Chen J, Kao YH, Hou PW (2013) Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving. J Supercomput 66(2):907–917CrossRefGoogle Scholar
  13. 13.
    Coatrieux G, Guillou CL, Cauwin JM (2009) Reversible Watermarking for Knowledge Digest Embedding and Reliability control in Medical Images. IEEE Trans Inf Technol Biomed 13(2):158–165CrossRefGoogle Scholar
  14. 14.
    Cox IJ, Kilian J, Leighton T, Shamoon TG (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRefGoogle Scholar
  15. 15.
    Delaigle JF, Vleeschouwer CD, Macq B (1998) Watermarking Algorithm Based on a Human Visual Model. Signal Processing (Elsevier) 66(3):319–335zbMATHCrossRefGoogle Scholar
  16. 16.
    Deng C, Gao X, Li X, Tao D (2010) Local histogram based geometric invariant image watermarking. Signal Process 90(12):3256–3264zbMATHCrossRefGoogle Scholar
  17. 17.
    Dharwadkar NV, Kulkarni GK, Melligeri TY, Amberker BB (2012) The image watermarking scheme using edge information in YCbCr color space. International Proceedings of Computer Science and Information Technology 56Google Scholar
  18. 18.
    Dhole VS, Patil NN (2015) Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks. In: Computing Communication Control and Automation, International Conference on IEEE (ICCUBEA), pp. 752-757Google Scholar
  19. 19.
    Dittmann J, Ferri LC, Vielhauer C (2001) Hologram watermarks for document authentications. IEEE International Conference on Information Technology: Coding and Computing: 60-64Google Scholar
  20. 20.
    Duy TP, Tran D, Ma W (2017) An intelligent learning- based watermarking scheme for outsourced biomedical time series data. IEEE- IJCNN, pp. 4408-4415Google Scholar
  21. 21.
    El’arbi M, Amar CB (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Image Process 8(11):619–626CrossRefGoogle Scholar
  22. 22.
    Fan MQ, Wang HX, Li SK (2008) Restudy on SVD-based watermarking scheme. Appl Math Comput 203(2):926–930MathSciNetzbMATHGoogle Scholar
  23. 23.
    Fazli S, Moeini M (2016) A robust image watermarking method based on DWT, DCT and SVD using a new technique for correction of main geometric attacks. Optik 127(2):964–972CrossRefGoogle Scholar
  24. 24.
    Feng LP, Zheng LB, Cao P (2010) A DWT-DCT based blind watermarking algorithm for copyright protection. In: Computer Science and Information Technology (ICCSIT), 3rd International Conference on IEEE, vol.7, pp. 455-458Google Scholar
  25. 25.
    Fist E, Qi X (2007) A composite approach for blind grayscale logo watermarking. Proc IEEE International Conference on Image Processing 3:III–265Google Scholar
  26. 26.
    Fung BCM, Wang K, Yu PS (2007) Anonymizing classification data for privacy preservation. IEEE Trans Knowl Data Eng 19(5):711–725CrossRefGoogle Scholar
  27. 27.
    Ganic E, Eskicioglu AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies. In: Proceedings of the 2004 Workshop on Multimedia and Security, ACM, vol. 166-174Google Scholar
  28. 28.
    Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. Journal of electronic imaging 14(4):043004CrossRefGoogle Scholar
  29. 29.
    Gao X, Deng C, Li X (2010) Geometric Distortion Insensitive Image Watermarking in Affine Covariant regions. IEEE Transactions on Systems, Man, And Cybernetics 40(3):278–286CrossRefGoogle Scholar
  30. 30.
    Ghafoor A, Imran M (2012) A non-blind color image watermarking scheme resistent against geometric attacks. Radioengineering 21(4):1246–1251Google Scholar
  31. 31.
    Gunjal BL (2011) Wavelet based color image watermarking scheme giving high robustness and exact correlation. International Journal of Emerging Trends in Engineering and Technology 1(1):21–30Google Scholar
  32. 32.
    Gupta AK, Raval MS (2012) A robust and secure watermarking scheme based on singular values replacement. Sadhana 37(4):425–440MathSciNetzbMATHCrossRefGoogle Scholar
  33. 33.
    Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The WEKA data mining software: an update. ACM SIGKDD Explorations Newsletter 11(1):10–18CrossRefGoogle Scholar
  34. 34.
    Harish NJ, Kumar BBS, Kusagur A (2013) Hybrid robust watermarking techniques based on DWT, DCT and SVD. International Journal of Advanced Electrical and Electronics Engineering 2(5):137–143Google Scholar
  35. 35.
    Hel-Or HZ (2001) Watermarking and copyright labelling of printed images. Journal of Electronic Imaging 10(3):794–803CrossRefGoogle Scholar
  36. 36.
    Hong W, Chen TS, Shiu CW (2009) Reversible Data Hiding for High-Quality Images using Modification of Prediction Errors. The Journal of Systems and Software 82(11):1833–1842CrossRefGoogle Scholar
  37. 37.
    Iftikhar S, Kamran M, Anwar Z (2015) RRW- A Robust and Reversible Watermarking Technique for Relational Data. IEEE Trans Knowl Data Eng 27(4):1132–1145CrossRefGoogle Scholar
  38. 38.
    Iftikhar S, Kamran M, Munir EU, Khan SU (2017) A Reversible Watermarking Technique for Social Network Data Sets for Enabling Data Trust in Cyber, Physical and Social Computing. IEEE Syst J 11(1):197–206CrossRefGoogle Scholar
  39. 39.
    Jero SE, Ramu P, Ramakrishnan S (2014) Discrete Wavelet Transform and Singular Value Decomposition Based ECG Steganography for Secured Patient Information Transmission. J Med Syst 38(10):1–11Google Scholar
  40. 40.
    Jero E, Ramu P, Swaminathan R (2016) Imperceptibility-Robustness tradeoff studies for ECG steganography using Continuous Ant Colony Optimization. Expert Syst Appl 49:123–135CrossRefGoogle Scholar
  41. 41.
    Jin C, Tao F, Fu Y (2006) Image watermarking based HVS characteristic of wavelet transform. Intelligent Information Hiding and Multimedia Signal Processing, pp. 71-74Google Scholar
  42. 42.
    Kamran M, Farooq M (2012) An information-preserving watermarking scheme for right protection of EMR systems. IEEE Trans Knowl Data Eng 24(11):1950–1962CrossRefGoogle Scholar
  43. 43.
    Kamran M, Farooq M (2013) A Formal Usability Constraints Model for Watermarking of Outsourced Datasets. IEEE Transactions on Information Forensic and Security 8(6):1061–1072CrossRefGoogle Scholar
  44. 44.
    Kamstra LHJ, Heijmans AM (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090MathSciNetCrossRefGoogle Scholar
  45. 45.
    Kapoor P, Sharma KK, Bedi SS, Kumar A (2011) Colored Image Watermarking Technique based on HVS using HSV color model. In: Proceedings of International Conference on Advances in Computer Engineering, pp. 20-24Google Scholar
  46. 46.
    Khan MI, Rahman M, Sarker M, Hasan I (2013) Digital watermarking for image authentication based on combined DCT, DWT and SVD transformation. Int J Comput Sci Math 10(5):223–230Google Scholar
  47. 47.
    Kirovski D, Malvar HS (2003) Spread Spectrum Watermarking for Audio Signals. IEEE Trans Signal Process 51(4):1020–1033MathSciNetzbMATHCrossRefGoogle Scholar
  48. 48.
    Koch E, Zhao J (1995) Towards robust and hidden image copyright labelling. IEEE Workshop on Nonlinear Signal and Image Processing Marmaras Greece 1174:452–455Google Scholar
  49. 49.
    Kulkarni AS, Lokhande SS (2013) Imperceptible and Robust Digital Image Watermarking Techniques in Frequency Domain. International Journal of Computer Technology and Electronics Engineering (IJCTEE) 3:33–36Google Scholar
  50. 50.
    Kumar C, Singh AK, Kumar P (2017) A Recent Survey on Image Watermarking Techniques and Its Applications in e-governance. Multimed Tools Appl 77(3):3597–3622CrossRefGoogle Scholar
  51. 51.
    Kumar C, Singh AK, Kumar P (2018) Improved wavelet-based image watermarking through SPIHT. Multimedia Tools and Applications 1-14Google Scholar
  52. 52.
    Kundur D, Hatzinakos D (1998) Digital watermarking using multiresolution wavelet decomposition. ICASSP 5:2969–2972Google Scholar
  53. 53.
    Kutter M, Jordan F, Bossen F (1997) Digital Signature of color images using amplitude modulation. Storage and retrieval for Image and Video Databases 2952:518–526CrossRefGoogle Scholar
  54. 54.
    Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063CrossRefGoogle Scholar
  55. 55.
    Langelaar GC, Lagendijk RL, Biemond J (1997) Robust labelling methods for copy protection of images. Storage and retrieval for Image and Video Databases 3022:289–309Google Scholar
  56. 56.
    Lee SH, Kim TS, Kim BJ, Kwon SG, Kwon KR, Lee K (2003) 3D Polygon Meshes Watermarking Using Normal Vector Distributions. IEEE-ICME 3:III–105Google Scholar
  57. 57.
    Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Transaction on Information Forensics Security 2(3):321–330CrossRefGoogle Scholar
  58. 58.
    Li CT, Yang FM (2003) One-Dimensional Neighbourhood Forming Strategy for Fragile Watermarking. Journal of Electronic Imaging 12(2):284–292CrossRefGoogle Scholar
  59. 59.
    Li J, Yu C, Gupta BB, Ren X (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545–4561CrossRefGoogle Scholar
  60. 60.
    Lin CY (2006) A Reversible Data Transform Algorithm Using Integer Transform for Privacy Preserving Data Mining. The Journal of Systems & Software 117(7):104–112Google Scholar
  61. 61.
    Lin SD, Shie S, Guo JY (2010) Improving the robustness of DCT- based image watermarking against JPEG compression. Computer Standards and Interfaces 32(1-2):54–60CrossRefGoogle Scholar
  62. 62.
    Liu Y, Ju L, Hu M, Ma X, Zhao H (2015) A robust Reversible Data Hiding Scheme For H.264 without Distortion Drift. Neurocomputing (Elsevier) 151(3):1053–1062CrossRefGoogle Scholar
  63. 63.
    Liu Y, Li Z, Ma X (2012) Reversible data hiding scheme based on H.264/AVC without distortion drift. JSW 7(5):1059–1065CrossRefGoogle Scholar
  64. 64.
    Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting right ownership. IEEE Transactions on Multimedia 4(1):121–128CrossRefGoogle Scholar
  65. 65.
    Loukhaoukha K, Nabti M, Zebbiche K (2014) A Robust SVD- based Image Watermarking Using a Multi-Objective Particle Swarm Optimization. Opto-Electronics Review 22(1):45–54CrossRefGoogle Scholar
  66. 66.
    Malakooti M, Majlesi J (2012) Digital image watermarking based on the multiple discrete wavelets transform and singular value decomposition. Multimedia Process 1(4)Google Scholar
  67. 67.
    Mathon B, Cayre F, Bas P (2014) Optimal Transport for Secure Spread – Spectrum Watermarking for Still Images. IEEE Trans Image Process 23(4):1694–1705MathSciNetzbMATHCrossRefGoogle Scholar
  68. 68.
    Meerwald P (2001) Digital watermarking in the wavelet transform domain. Master’s Thesis, Department of Scientific Computing, University of SalzburgGoogle Scholar
  69. 69.
    Mehta R, Rajpal N (2016) LWT-QR Decomposition based Robust and Efficient Image Watermarking scheme using Lagrangian SVR. Multimedia Tools and Applications (Springer) 75(7):4129–4150CrossRefGoogle Scholar
  70. 70.
    Mohammad AA, Alhaj A, Shaltaf S (2008) An improved SVD- based watermarking scheme for protecting rightful ownership. Signal Process 88(9):2158–2180zbMATHCrossRefGoogle Scholar
  71. 71.
    Mohanty SP, Sengupta A, Guturu P, Kougianos E (2017) Everything you want to know about watermarking: From Paper marks to hardware protection. IEEE Consumer Electronics Magazine 6(3):83–91CrossRefGoogle Scholar
  72. 72.
    Naderahmadian Y, Hosseini-Khayat S (2010) Fast watermarking based on QR decomposition in wavelet domain. In: Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 127-130Google Scholar
  73. 73.
    Najih A, Al-Haddad SAR, Ramli AR, Hashim SJ, Nematollahi MA (2017) Digital Image watermarking based on Angle Quantization in Discrete Contourlet Transform. Journal of King Saud University-Computer and Information Sciences 29(3):288–294CrossRefGoogle Scholar
  74. 74.
    Neviere XR, Doerr G, Alliez P (2014) Spread transform and roughness-based shaping to improve 3D watermarking based on quadratic programming. IEEE- ICIP, 4777-4781Google Scholar
  75. 75.
    Nguyen TV, Patra JC (2008) A Simple ICA-based Digital Image Watermarking Scheme. Digital Image Processing 18:762–776CrossRefGoogle Scholar
  76. 76.
    Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible Data Hiding. IEEE Transactions on circuits and systems for video technology 16(3):354–362CrossRefGoogle Scholar
  77. 77.
    Noore A, Tungala N, Houck MM (2004) Embedding Biometric identifiers in 2D barcodes for improved security. Computers & Security (Elsevier) 23(8):679–686CrossRefGoogle Scholar
  78. 78.
    Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images:a robust medical image watermarking system for E-healthcare. Multimed Tools Appl 76(8):10599–10633CrossRefGoogle Scholar
  79. 79.
    Patel SB, Mehta TB, Pradhan SN (2011) A Unified Technique for Robust Digital Watermarking of Colour Images using Data Mining and DCT. International Journal Internet Technology and Secured Transactions 3(1):81–96CrossRefGoogle Scholar
  80. 80.
    Patra B, Patra JC (2012) CRT-based fragile self-recovery watermarking scheme for image authentication and recovery. In: IEEE International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS), pp. 430-435Google Scholar
  81. 81.
    Pei SC, Guo JM (2003) Hybrid Pixel-Based Data Hiding and Block-Based Watermarking for Error-Diffused Halftone Images. IEEE transactions on Circuits and Systems for Video Technology 13(8):867–884CrossRefGoogle Scholar
  82. 82.
    Peng H, Wang J, Wang W (2010) Image watermarking method in multiwavelet domain based on support vector machines. J Syst Softw 83(8):1470–1477CrossRefGoogle Scholar
  83. 83.
    Pham TD, Tran D, Ma W (2015) A proposed blind DWT-SVD watermarking scheme for EEG data. In: International Conference on Neural Information Processing, pp. 69-76Google Scholar
  84. 84.
    Preda RO (2014) Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain. In: Communications 10th International conference on IEEE, pp. 1-4Google Scholar
  85. 85.
    Qiang YZ, Ip HHS, Kowk LF (2003) Robust watermarking of 3D polygonal models based on vertice scrambling. Proceedings of Computer Graphics International IEEE, pp. 254-257Google Scholar
  86. 86.
    Reddy VP, Varadarajan S (2010) An effective wavelet-based watermarking scheme using human visual system for protecting copyrights of digital images. International Journal of Computer and Electrical Engineering 2(1):32–40CrossRefGoogle Scholar
  87. 87.
    Rosiyadi D, Horng SJ, Fan P, Wang X (2012) Copyright protection for e-government document images. IEEE Multimedia 19(3):62–73CrossRefGoogle Scholar
  88. 88.
    Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible Watermarking Algorithm Using Sorting and Prediction. IEEE Transactions on Circuits and Systems for Video Technology 19(7):989–999CrossRefGoogle Scholar
  89. 89.
    Said A, Pearlman AW (1996) A new, fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Transactions on Circuits and Systems for Video Technology 6(3):243–250CrossRefGoogle Scholar
  90. 90.
    Santhi V, Thangavelu A (2011) DC coefficients based watermarking technique for color images using singular value decomposition. International Journal of Computer and Electrical Engineering 3(1):8–16CrossRefGoogle Scholar
  91. 91.
    Senapati RK, Patil UC, Mahapatra KK (2014) Reduced memory, low complexity embedded image compression algorithm using hierarchical listless discrete Tchebichef transform. IET Image Process 8(4):213–238CrossRefGoogle Scholar
  92. 92.
    Seo JS, Yoo CD (2004) Localized image watermarking based on feature points of scale-space representation. Pattern Recogn 37(7):1365–1375zbMATHCrossRefGoogle Scholar
  93. 93.
    Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and Robust fragile watermarking scheme for medical images. IEEE-Access 6:10269–10278CrossRefGoogle Scholar
  94. 94.
    Shen JJ, Hsu PW (2008) A Fragile Associative Watermarking on 2D Barcode for Data Authentication. International Journal of Network Security 7(3):301–309Google Scholar
  95. 95.
    Shen JJ, Ren JM (2010) A robust associative watermarking technique- based on vector quantization. Digital Signal Processing, pp. 1408-1423Google Scholar
  96. 96.
    Sherekar S, Thakare VM, Jain S (2011) Attacks and Countermeasures on Digital Watermarks: Classification, Implications, Benchmarks. Int J Comput Sci Appl 4(2):32–45Google Scholar
  97. 97.
    Shi H, Lv F, Cao Y (2014) A Blind Watermarking technique for color image based on SVD with circulation. Journal of software 9(7):1749–1756Google Scholar
  98. 98.
    Shivani JLD, Senapati RK (2017) Robust Image Embedded Watermarking using DCT and Listless SPIHT. Future Intermet 9(3):33CrossRefGoogle Scholar
  99. 99.
    Singh AK (2017) Improved Hybrid Algorithm for Robust and Imperceptible Multiple Watermarking using Digital Images. Multimedia Tools Applications (Springer) 76(6):8881–8900CrossRefGoogle Scholar
  100. 100.
    Singh AK, Dave M, Mohan A (2014) Wavelet-Based Image Watermarking: futuristic concepts in Information Security. Proceedings of National Academy emerging of Sciences India Section A: Physical Sciences 84(3):345–359zbMATHCrossRefGoogle Scholar
  101. 101.
    Singh AK, Dave M, Mohan A (2014) Hybrid Technique for Robust and Imperceptible image watermarking in DWT-DCT-SVD domain. National Academy Science Letters 37(4):351–358CrossRefGoogle Scholar
  102. 102.
    A.K. Singh, M. Dave and, A. Mohan, " Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain," Wireless Personal Communication (Springer), vol. 83, issue 3, pp. 2133-2150, 2015Google Scholar
  103. 103.
    Singh AK, Dave M, Mohan A (2016) Hybrid Technique for robust and imperceptible multiple watermarking using medical images. Journal of Multimedia Tools and Applications (Springer) 75(14):8381–8401CrossRefGoogle Scholar
  104. 104.
    Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5(3):607–614CrossRefGoogle Scholar
  105. 105.
    Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple Watermarking Technique for Securing Online Social Network Contents using Back Propagation Neural Network. Future Generation Computer Systems (Elsevier) 86:926–939CrossRefGoogle Scholar
  106. 106.
    Singh AK, Kumar B, Singh G, Mohan A (2017) Medical image watermarking: techniques and applications. Book series on Multimedia Systems and Applications, Springer, ISBN: 978-3319576985Google Scholar
  107. 107.
    Singh D, Singh SK (2017) DWT-SVD and DCT based Robust and Blind Watermarking Scheme for Copyright Protection. Multimed Tools Appl 76(11):13001–13024CrossRefGoogle Scholar
  108. 108.
    Singh A, Tayal A (2012) Choice of wavelet from wavelet families for DWT-DCT-SVD image watermarking. Int J Comput Appl 48(17):9–14Google Scholar
  109. 109.
    Song W, Hou JJ, Li ZH, Huang L (2011) Chaotic system and QR factorization based robust digital image watermarking algorithm. J Cent S Univ Technol 18(1):116–124CrossRefGoogle Scholar
  110. 110.
    Srivastava A, Saxena P (2013) DWT-DCT-SVD based semiblind image watermarking using middle frequency bands. IOSR Journal of Computer Engineering 12(2):63–66CrossRefGoogle Scholar
  111. 111.
    Su Q, Niu Y, Wang Q, Sheng G (2013) A blind color image watermarking based on DC component in the spatial domain. Optik 124(23):6255–6260CrossRefGoogle Scholar
  112. 112.
    Tang CW, Hang HM (2003) A feature- based robust digital image watermarking scheme. IEEE Trans Signal Process 51(4):950–959MathSciNetzbMATHCrossRefGoogle Scholar
  113. 113.
    Thakkar FN, Srivastava VK (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76(3):3669–3697CrossRefGoogle Scholar
  114. 114.
    Thakur S, Singh AK, Ghrera SP, Mohan A (2018) Chaotic based secure watermarking approach for medical images. Multimed Tools Appl:1–14.
  115. 115.
    Thodi DM, Rodriguez JJ (2004) Reversible watermarking by prediction-error expansion. IEEE Southwest Symposium on Image Analysis and Interpretation: 21-25Google Scholar
  116. 116.
    Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730MathSciNetCrossRefGoogle Scholar
  117. 117.
    Tian J (2003) Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13(8):890–896CrossRefGoogle Scholar
  118. 118.
    Tsai JS, Huang WB, Kuo YH, Horng MF (2012) Joint Robustness and Security Enhancement for Feature-based Image Watermarking Using Invariant feature regions. Signal Processing (Elsevier) 92(6):1431–1445CrossRefGoogle Scholar
  119. 119.
    Tsai HH, Jhuang YJ, Lai YS (2012) An SVD-based Image Watermarking in Wavelet Domain using SVR and PSO. Applied Soft Computing (Elsevier) 12(8):2442–2453CrossRefGoogle Scholar
  120. 120.
    Vacavant A (2016) A novel definition of robustness for image processing algorithms. In: International Workshop on Reproducible Research in Pattern Recognition (pp. 75-87). Springer, ChamGoogle Scholar
  121. 121.
    Vallabha VH (2003) Multiresolution watermark based on wavelet transform for digital images. Cranes Software International Limited, BangaloreGoogle Scholar
  122. 122.
    Van DWD, Nachtegael M, Kerre EE (2003) A new similarity measure for image processing. Journal of Computational Methods in Sciences and Engineering 3(2):209–222zbMATHGoogle Scholar
  123. 123.
    Voloshynovskiy S, Pereira S, Pun T, Eggers JJ, Su JK (2001) Attacks on digital watermarks: classification, estimation-based attacks, and benchmarks. IEEE Communication Magazine 39(8):118–126CrossRefGoogle Scholar
  124. 124.
    Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Processing Letters 9(3):81–84CrossRefGoogle Scholar
  125. 125.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
  126. 126.
    Wang HJ, Su PC, Kuo CCJ (1998) Wavelet based digital image watermarking. Opt Express 3(12):491–496CrossRefGoogle Scholar
  127. 127.
    Wang X, Wu J, Niu P (2007) A new digital image watermarking algorithm resilient to desynchronization attacks. IEEE Transaction on Information Forensics Security 2(4):633–655Google Scholar
  128. 128.
    Wu HC, Chang CC (2005) A novel digital image watermarking scheme based on the vector quantization technique. Computers and Security 24(6):460–471CrossRefGoogle Scholar
  129. 129.
    Wu X, Guan ZH (2007) A novel digital watermark algorithm based on chaotic maps. Phys Lett A 365(5-6):403–406CrossRefGoogle Scholar
  130. 130.
    Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy preserving and copy deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(11):2594–2608CrossRefGoogle Scholar
  131. 131.
    Xing Y, Tan J (2010) A color image watermarking scheme resistent against Geometrical Attacks. Radioengineering 19(1):62–67Google Scholar
  132. 132.
    Xiong X (2015) A new robust color image watermarking scheme based on 3D-DCT. World Journal of Engineering and Technology 3(03):177–183CrossRefGoogle Scholar
  133. 133.
    Xuan G, Shi YQ, Chai P, Cui X, Ni Z, Tong X (2007) Optimum histogram pair based image lossless data embedding. International Workshop on Digital Watermarking: 264-278Google Scholar
  134. 134.
    Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882CrossRefGoogle Scholar
  135. 135.
    Zhao M, Dang Y (2008) Color image copyright protection digital watermarking algorithm based on DWT and DCT. In: Wireless Communications, Networking and Mobile Computing 4th international conference on IEEE, pp. 1-4Google Scholar
  136. 136.
    Zheng Z, Saxena N, Mishra KK, Sangaiah AK (2018) Guided Dynamic Particle Swarm Optimization for Optimizing Digital Image Watermarking in Industry Applications. Futur Gener Comput Syst 88:92–106CrossRefGoogle Scholar
  137. 137.
    Zhou X, Zhang H, Wang C (2018) A Robust Image Watermarking Technique Based on DWT, APDCBT, and SVD. Symmetry MDPI 10(3):1–15Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Namita Agarwal
    • 1
  • Amit Kumar Singh
    • 2
    Email author
  • Pradeep Kumar Singh
    • 1
  1. 1.Department of CSE & ITJUITSolanIndia
  2. 2.Department of CSENIT PatnaPatnaIndia

Personalised recommendations