Abstract
In today’s digital era, it is very easy to copy, manipulate and distribute multimedia data over an open channel. Copyright protection, content authentication, identity theft, and ownership identification have become challenging issues for content owners/distributors. Off late data hiding methods have gained prominence in areas such as medical/healthcare, e-voting systems, military, communication, remote education, media file archiving, insurance companies, etc. Digital watermarking is one of the burning research areas to address these issues. In this survey, we present various aspects of watermarking. In addition, various classification of watermarking is presented. Here various state-of-the-art of multimedia and database watermarking is discussed. With this survey, researchers will be able to implement efficient watermarking techniques for the security of multimedia and database.
Similar content being viewed by others
References
Agarwal H, Raman B, Venkat I (2015) Blind reliable invisible watermarking method in wavelet domain for face image watermark. Multimedia Tools and Applications 74(17):6897–6935
Agarwal N, Singh AK, Singh PK Survey of robust and imperceptible watermarking. Multimedia Tools and Applications pp. 1–31
Agrawal R, Haas PJ, Kiernan J (2003) Watermarking relational data: framework, algorithms and analysis. The VLDB Journal—The International Journal on Very Large Data Bases 12(2):157–169
Akhtar Z, Khan E (2016) Identifying high quality jpeg compressed images through exhaustive recompression technique. In: 2016 International conference on advances in computing, communications and informatics (ICACCI), pp. 652–656. IEEE
Akhtar Z, Khan E (2017) Revealing the traces of histogram equalisation in digital images. IET Image Process 12(5):760–768
Al-Sewadi HA, Aldakari ANA (2018) Improved processing speed for text watermarking algorithm in color images. In: Proceedings of the 8th International Conference on Information Systems and Technologies, p. 7. ACM
Ali Z, Imran M, Alsulaiman M, Zia T, Shoaib M (2018) A zero-watermarking algorithm for privacy protection in biomedical signals. Futur Gener Comput Syst 82:290–303
Alotaibi RA, Elrefaei LA (2018) Improved capacity arabic text watermarking methods based on open word space. Journal of King Saud University-Computer and Information Sciences 30(2):236–248
Alromih A, Al-Rodhaan M, Tian Y (2018) A randomized watermarking technique for detecting malicious data injection attacks in heterogeneous wireless sensor networks for internet of things applications. Sensors 18(12):4346
Asikuzzaman M, Alam MJ, Lambert AJ, Pickering MR (2014) Imperceptible and robust blind video watermarking using chrominance embedding: a set of approaches in the dt cwt domain. IEEE transactions on Information Forensics and Security 9 (9):1502–1517
Cedillo-Hernandez A, Cedillo-Hernandez M, Miyatake MN, Meana HP (2018) A spatiotemporal saliency-modulated jnd profile applied to video watermarking. J Vis Commun Image Represent 52:106–117
Chen J, Yang F, Ma H, Lu Q (2016) Text watermarking algorithm based on semantic role labeling 2016 Third international conference on digital information processing, data mining, and wireless communications (DIPDMWC), pp. 117–120. IEEE
Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography Morgan kaufmann
Dhar PK, Shimamura T (2015) Blind svd-based audio watermarking using entropy and log-polar transformation. Journal of Information Security and Applications 20:74–83
Doncel VR, Nikolaidis N, Pitas I (2007) An optimal detector structure for the fourier descriptors domain watermarking of 2d vector graphics. IEEE Trans Vis Comput Graph 13(5):851–863
Fallahpour M, Megías D (2015) Audio watermarking based on fibonacci numbers. IEEE Transactions on Audio Speech, and Language Processing 23 (8):1273–1282
Farri E, Ayubi P (2018) A blind and robust video watermarking based on iwt and new 3d generalized chaotic sine map. Nonlinear Dynamics 93:1875–1897
Gangadhar Y, Akula VG, Reddy PC (2018) An evolutionary programming approach for securing medical images using watermarking scheme in invariant discrete wavelet transformation. Biomedical Signal Processing and Control 43:31–40
Gross-Amblard D (2011) Query-preserving watermarking of relational databases and xml documents. ACM Transactions on Database Systems (TODS) 36(1):3
Guo F, Wang J, Li D (2006) Fingerprinting relational databases. In: Proceedings of the 2006 ACM symposium on Applied computing, pp. 487–492. ACM
Gupta G, Pieprzyk J (2008) Reversible and blind database watermarking using difference expansion. In: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, p 24, ICST (Institute for Computer Sciences, Social-Informatics and ⋯
Halvani O, Steinebach M, Wolf P, Zimmermann R (2013) Natural language watermarking for german texts. In: Proceedings of the first ACM workshop on Information hiding and multimedia security, pp. 193–202. ACM
Horng SJ, Farfoura ME, Fan P, Wang X, Li T, Guo JM (2014) A low cost fragile watermarking scheme in h. 264/avc compressed domain. Multimedia Tools and Applications 72(3):2469–2495
Horng SJ, Rosiyadi D, Fan P, Wang X, Khan MK (2014) An adaptive watermarking scheme for e-government document images. Multimedia tools and applications 72(3):3085–3103
Horng SJ, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. Journal of Visual Communication and Image Representation 24(7):1099–1105
Hossain MS, Muhammad G, Abdul W, Song B, Gupta B (2018) Cloud-assisted secure video transmission and sharing framework for smart cities. Futur Gener Comput Syst 83:596–606
Hu HT, Chang JR, Lin SJ (2018) Synchronous blind audio watermarking via shape configuration of sorted lwt coefficient magnitudes. Signal Process 147:190–202
Hua G, Goh J, Thing VL (2015) Time-spread echo-based audio watermarking with optimized imperceptibility and robustness. IEEE/ACM Transactions on Audio. Speech, and Language Processing 23(2):227–239
Hua G, Zhao L, Zhang H, Bi G, Xiang Y (2018) Random matching pursuit for image watermarking. IEEE Transactions on Circuits and Systems for Video Technology 29(3):625–639
Huynh-The T, Hua CH, Tu NA, Hur T, Bang J, Kim D, Amin MB, Kang BH, Seung H, Lee S (2018) Selective bit embedding scheme for robust blind color image watermarking. Inf Sci 426:1–18
Hwang MJ, Lee J, Lee M, Kang HG (2017) Svd-based adaptive qim watermarking on stereo audio signals. IEEE Transactions on Multimedia 20(1):45–54
Jain R, Trivedi MC, Tiwari S (2018) Digital audio watermarking: a survey. In: Advances in computer and computational sciences, pp. 433–443. Springer
Khan A, Jabeen F, Naz F, Suhail S, Ahmed M, Nawaz S (2016) Buyer seller watermarking protocols issues and challenges–a survey. J Netw Comput Appl 75:317–334
Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Information sciences 279:251–272
Khanduja V (2017) Database watermarking, a technological protective measure: Perspective, security analysis and future directions. Journal of information security and applications 37:38–49
Kumar C, Singh AK, Kumar P (2018) A recent survey on image watermarking techniques and its application in e-governance. Multimedia Tools and Applications 77 (3):3597–3622
Kumar S, Dutta A (2016) A novel spatial domain technique for digital image watermarking using block entropy. In: 2016 International conference on recent trends in information technology (ICRTIT), pp. 1–4. IEEE
Kumar S, Dutta A (2016) Performance analysis of spatial domain digital watermarking techniques. In: 2016 International conference on information communication and embedded systems (ICICES), pp. 1–4. IEEE
Kumar S, Dutta A (2016) A study on robustness of block entropy based digital image watermarking techniques with respect to various attacks. In: 2016 IEEE International conference on recent trends in electronics, information & communication technology (RTEICT), pp. 1802–1806. IEEE
Kumar S, Singh BK (2018) A review of digital watermarking in healthcare domain. In: 2018 3Rd international conference on computational systems and information technology for sustainable solutions (CSITSS), pp. 156–159. IEEE
Kutter M, Petitcolas FA (1999) Fair benchmark for image watermarking systems. In: Security and watermarking of multimedia contents, vol. 3657, pp. 226–240. International society for optics and photonics
Lai CC (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digital Signal Processing 21(4):522–527
Laouamer L, Tayan O (2018) Performance evaluation of a document image watermarking approach with enhanced tamper localization and recovery. IEEE Access 6(26):144–26,166
Lei B, Zhou F, Tan EL, Ni D, Lei H, Chen S, Wang T (2015) Optimal and secure audio watermarking scheme based on self-adaptive particle swarm optimization and quaternion wavelet transform. Signal Process 113:80–94
Lin WH, Horng SJ, Kao TW, Chen RJ, Chen YH, Lee CL, Terano T (2009) Image copyright protection with forward error correction. Expert systems with applications 36(9):11,888–11,894
Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Transactions on Multimedia 10(5):746–757
Lin WH, Wang YR, Horng SJ (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36(6):9869–9878
Lin WH, Wang YR, Horng SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Systems with Applications 36(9):11,509–11,516
Lin ZX, Peng F, Long M (2017) A reversible watermarking for authenticating 2d vector graphics based on bionic spider web. Signal Processing:, Image Communication 57:134–146
Liu X, Zhang J, Wang H, Gong X, Cheng Y (2014) A novel text watermarking algorithm based on graphic watermarking framework. In: 2014 Ninth international conference on broadband and wireless computing, communication and applications, pp. 84–88. IEEE
Liu X, Zhao R, Li F, Liao S, Ding Y, Zou B (2017) Novel robust zero-watermarking scheme for digital rights management of 3d videos. Signal processing:, Image communication 54:140–151
Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and rsa encryption. Expert Syst Appl 97:95–105
Liu Z, Huang Y, Huang J (2018) Patchwork-based audio watermarking robust against de-synchronization and recapturing attacks. IEEE Transactions on Information Forensics and Security 14(5):1171–1180
Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6(19):876–19,897
Loganathan A, Kaliyaperumal G (2016) An adaptive hvs based video watermarking scheme for multiple watermarks using bam neural networks and fuzzy inference system. Expert Syst Appl 63:412–434
Ma B, Wang Y, Li C, Zhang Z, Huang D (2014) Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking. Multimedia tools and applications 72(1):637–666
Madine F, Akhaee MA, Zarmehi N (2018) A multiplicative video watermarking robust to h. 264/avc compression standard. Signal Processing:, Image Communication 68:229–240
Manikandan V, Masilamani V (2018) Histogram shifting-based blind watermarking scheme for copyright protection in 5g. Computers & Electrical Engineering 72:614–630
Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Transactions on image processing 10(4):643–649
Mir N (2014) Copyright for web content using invisible text watermarking. Comput Hum Behav 30:648–653
Mishra A, Agarwal C, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using dwt–svd and firefly algorithm. Expert Syst Appl 41(17):7858–7867
Najih A, Al-Haddad S, Ramli AR, Hashim S, Nematollahi MA (2017) Digital image watermarking based on angle quantization in discrete contourlet transform. Journal of King Saud University-Computer and Information Sciences 29(3):288–294
Nezhadarya E, Ward RK (2013) Semi-blind quality estimation of compressed videos using digital watermarking. Digital Signal Processing 23(5):1483–1495
Nikolaidis N, Solachidis V, Tefas A, Pitas I (2002) Watermark detection: benchmarking perspectives. In: Proceedings. IEEE international conference on multimedia and expo, vol. 2, pp. 493–496. IEEE
Nouioua I, Amardjia N, Belilita S (2018) A novel blind and robust video watermarking technique in fast motion frames based on svd and mr-svd. Security and Communication Networks, Volume 2018, Article ID 6712065, Pages 1–17
Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in dct domain using inter-block coefficient differencing. Digital Signal Processing 53:11–24
Peng F, Long Q, Lin ZX, Long M (2019) A reversible watermarking for authenticating 2d cad engineering graphics based on iterative embedding and virtual coordinates. Multimedia Tools and Applications 78(19):26,885–26,905
Pérez Gort ML, Feregrino Uribe C, Nummenmaa J (2017) A minimum distortion: High capacity watermarking technique for relational data. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 111–121. ACM
Pournaghshband V (2008) A new watermarking approach for relational data. In: Proceedings of the 46th annual southeast regional conference on XX, pp. 127–131. ACM
Preda RO, Vizireanu DN (2010) A robust digital watermarking scheme for video copyright protection in the wavelet domain. Measurement 43(10):1720–1726
Qin C, Wang H, Zhang X, Sun X (2016) Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf Sci 373:233–250
Rai A, Singh HV (2018) Machine learning-based robust watermarking technique for medical image transmitted over lte network. J Intell Syst 27(1):105–114
Rasti P, Samiei S, Agoyi M, Escalera S, Anbarjafari G (2016) Robust non-blind color video watermarking using qr decomposition and entropy analysis. J Vis Commun Image Represent 38:838–847
Renza D, Lemus C, et al. (2018) Authenticity verification of audio signals based on fragile watermarking for audio forensics. Expert Syst Appl 91:211–222
Rizzo SG, Bertini F, Montesi D, Stomeo C (2017) Text watermarking in social media. In: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, pp. 208–211. ACM
Rosiyadi D, Horng SJ, Fan P, Wang X, Khan MK, Pan Y (2011) Copyright protection for e-government document images. IEEE MultiMedia 19(3):62–73
Rosiyadi D, Horng SJ, Suryana N, Masthurah N (2012) A comparison between the hybrid using genetic algorithm and the pure hybrid watermarking scheme. International Journal of Computer Theory and Engineering 4(3):329
Roy R, Ahmed T, Changder S (2018) Watermarking through image geometry change tracking. Visual Informatics 2(2):125–135
Rubio-Hernan J, De Cicco L, Garcia-Alfaro J (2017) On the use of watermark-based schemes to detect cyber-physical attacks. EURASIP Journal on Information Security 2017(1):8
Rubio-Hernan J, De Cicco L, Garcia-Alfaro J (2018) Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems. Transactions on Emerging Telecommunications Technologies 29(7):e3209
Rui X, XiaoJun C, Jinqiao S (2013) A multiple watermarking algorithm for texts mixed chinese and english. Procedia Computer Science 17:844–851
Saadi S, Merrad A, Benziane A (2019) Novel secured scheme for blind audio/speech norm-space watermarking by arnold algorithm. Signal Process 154:74–86
Sandberg H, Amin S, Johansson KH (2015) Cyberphysical security in networked control systems: an introduction to the issue. IEEE Control Syst Mag 35 (1):20–23
Sarreshtedari S, Akhaee MA (2015) A source-channel coding approach to digital image protection and self-recovery. IEEE Trans Image Process 24(7):2266–2277
Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques CRC press
Song C, Sudirman S, Merabti M, Llewellyn-Jones D (2010) Analysis of digital image watermark attacks 2010 7Th IEEE consumer communications and networking conference, pp. 1–5. IEEE
Sreenivas K, Prasad VK (2018) Fragile watermarking schemes for image authentication: a survey. International Journal of Machine Learning and Cybernetics 9(7):1193–1218
Su Q (2016) Novel blind colour image watermarking technique using hessenberg decomposition. IET image processing 10(11):817–829
Su Q, Liu D, Yuan Z, Wang G, Zhang X, Chen B, Yao T (2019) New rapid and robust color image watermarking technique in spatial domain. IEEE Access 7(30):398–30,409
Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on qr decomposition. Signal Process 94:219–235
Su Q, Niu Y, Wang Q, Sheng G (2013) A blind color image watermarking based on dc component in the spatial domain. Optik 124(23):6255–6260
Su Q, Wang G, Jia S, Zhang X, Liu Q, Liu X (2015) Embedding color image watermark in color image based on two-level dct. SIViP 9(5):991–1007
Su Q, Yuan Z, Liu D (2018) An approximate schur decomposition-based spatial domain color image watermarking method. IEEE Access 7:4358–4370
Sun X, Luo G, Huang H (2004) Component-based digital watermarking of chinese texts. In: Proceedings of the 3rd international conference on Information security, pp. 76–81. ACM
Tao H, Chongmin L, Zain JM, Abdalla AN (2014) Robust image watermarking theories and techniques: a review. Journal of applied research and technology 12 (1):122–138
Thanki R, Dwivedi V, Borisagar K (2017) A hybrid watermarking scheme with cs theory for security of multimedia data Journal of King Saud University-Computer and Information Sciences
Thongkor K, Amornraksa T, Delp EJ (2018) Digital watermarking for camera-captured images based on just noticeable distortion and wiener filtering. J Vis Commun Image Represent 53:146–160
Unnikrishnan K, Pramod K (2017) Robust optimal position detection scheme for relational database watermarking through holpsofa algorithm. Journal of Information Security and Applications 35:1–12
Vahedi E, Zoroofi RA, Shiva M (2012) Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles. Digital Signal Processing 22(1):153–162
Vaidya P, PVSSR CM (2018) Adaptive, robust and blind digital watermarking using bhattacharyya distance and bit manipulation. Multimedia Tools and Applications 77(5):5609–5635
Venugopala P, Sarojadevi H, Chiplunkar NN (2017) An approach to embed image in video as watermark using a mobile device. Sustainable Computing: Informatics and Systems 15:82–87
Verma VS, Jha RK (2015) An overview of robust digital image watermarking. IETE Technical review 32(6):479–496
Voloshynovskiy S, Pereira S, Pun T, Eggers JJ, Su JK (2001) Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE communications Magazine 39(8):118–126
Xiang Y, Natgunanathan I, Guo S, Zhou W, Nahavandi S (2014) Patchwork-based audio watermarking method robust to de-synchronization attacks. IEEE/ACM Transactions on Audio. Speech, and Language Processing 22 (9):1413–1423
Xiang Y, Natgunanathan I, Peng D, Hua G, Liu B (2018) Spread spectrum audio watermarking using multiple orthogonal pn sequences and variable embedding strengths and polarities. IEEE/ACM Transactions on Audio. Speech and Language Processing (TASLP) 26(3):529–539
Xiang Y, Peng D, Natgunanathan I, Zhou W (2011) Effective pseudonoise sequence and decoding function for imperceptibility and robustness enhancement in time-spread echo-based audio watermarking. IEEE Transactions on Multimedia 13 (1):2–13
Xiao D, Hu S, Zheng H (2015) A high capacity combined reversible watermarking scheme for 2-d cad engineering graphics. Multimedia Tools and Applications 74(6):2109–2126
Yassin NI, Salem NM, El Adawy MI (2014) Qim blind video watermarking scheme based on wavelet transform and principal component analysis. Alexandria Engineering Journal 53(4):833–842
Yu X, Wang C, Zhou X (2018) A survey on robust video watermarking algorithms for copyright protection. Appl Sci 8(10):1891
Yuan XC, Pun CM, Chen CP (2015) Robust mel-frequency cepstral coefficients feature detection and dual-tree complex wavelet transform for digital audio watermarking. Inf Sci 298:159–179
Zhang SR, Yao Z, Meng XC, Liu CC (2014) New digital text watermarking algorithm based on new-defined characters. In: 2014 International symposium on computer, consumer and control, pp. 713–716. IEEE
Zhang W, Zeng Z, Pu G, Zhu H (2006) Chinese text watermarking based on occlusive components. In: 2006 2Nd international conference on information & communication technologies, vol. 1, pp. 1850–1854. IEEE
Zhou X, Huang M, Peng Z (2007) An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image. In: Proceedings of the 2007 ACM symposium on Applied computing, pp. 254–258. ACM
Acknowledgment
The authors would like to thank reviewers for their helpful comments. We would also like to thanksthe Ministry of Human Resource Development, India and the National Institute of Technology, Jamshedpur for financial assistance.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kumar, S., Singh, B.K. & Yadav, M. A Recent Survey on Multimedia and Database Watermarking. Multimed Tools Appl 79, 20149–20197 (2020). https://doi.org/10.1007/s11042-020-08881-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08881-y