Skip to main content
Log in

Watermarking approach for source authentication of web content in online social media: a systematic literature review

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Online Social Media (OSM) enables users to create a powerful virtual bond that facilitates global forwarding/sharing of messages, decision-making, analysis, or voting. Along with the ease of internet services, one may easily forward/share web content over OSM such as WhatsApp, Facebook, Twitter, or Instagram, to name a few. The practice of forwarding these web contents without verifying the source's authenticity could have serious political, social, or financial consequences for society. Thus, it is significant to know about the epicenter of the misinformation or disinformation spread over social media. In this research article, through a Systematic Literature Review (SLR), we analyze various watermarking techniques along with their performance metrics for source authentication of web content in OSM. Based on several inclusion and exclusion criteria, this study critically analyses the findings of 82 selected research papers published between 2016 to 2022. As a result of SLR, we have explored and analyzed a total of 18 various watermarking techniques in spatial and transform domains with their properties and 22 performance metrics. Finally, the research questions are answered, and conclusive trends are reported.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Data availability

Data will be available on reasonable request.

References

  1. Number of social media users 2025 | Statista. Available: https://www.statista.com/statistics/278414/number-of-worldwide-social-network-users/. Accessed 19 Feb 2022

  2. Muzaffarnagar riots: International help sought to nail fake video sharers on Facebook | India News - Times of India. Available: https://timesofindia.indiatimes.com/india/muzaffarnagar-riots-international-help-sought-to-nail-fake-video-sharers-on-facebook/articleshow/26667527.cms. Accessed 22 Feb 2023

  3. Indian WhatsApp lynchings - Wikipedia. Available: https://en.wikipedia.org/wiki/Indian_WhatsApp_lynchings. Accessed 22 Feb 2023

  4. Banaji, S., Bhat, R., Agarwal, A., Passanha, N., & Sadhana Pravin, M. (2019). WhatsApp vigilantes: An exploration of citizen reception and circulation of WhatsApp misinformation linked to mob violence in India

  5. Tiwari A, Sharma M (2012) A survey of transform domain based semifragile watermarking schemes for image authentication. J Inst Eng (India): Ser B 93(3):185–191. Springer India. https://doi.org/10.1007/s40031-012-0021-0

  6. Tayan O, Alginahi YM (2014) A review of recent advances on multimedia watermarking security and design implications for digital Quran computing, International Symposium on Biometrics and Security Technologies (ISBAST). International Symposium on Biometrics and Security Technologies (ISBAST) 2014:304–309. Kuala Lumpur, Malaysia. https://doi.org/10.1109/ISBAST.2014.7013139

  7. Anand A, Singh AK (2020) Watermarking techniques for medical data authentication: a survey. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-08801-0

    Article  Google Scholar 

  8. Qasim AF, Meziane F, Aspin R (2018) Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review. Comput Sci Rev 27:45–60. https://doi.org/10.1016/j.cosrev.2017.11.003. Elsevier Ireland Ltd

    Article  MathSciNet  Google Scholar 

  9. Korus P (2017) Digital image integrity – a survey of protection and verification techniques. Digit Signal Process A Rev J 71:1–26. https://doi.org/10.1016/j.dsp.2017.08.009

    Article  MathSciNet  Google Scholar 

  10. Agarwal N, Singh AK, Singh PK (2019) Survey of robust and imperceptible watermarking. Multimed Tools Appl 78(7):8603–8633. https://doi.org/10.1007/s11042-018-7128-5

    Article  Google Scholar 

  11. Ray A, Roy S (2020) Recent trends in image watermarking techniques for copyright protection: a survey. Int J Multimed Inf Retriev 9(4):249–270. https://doi.org/10.1007/s13735-020-00197-9

    Article  Google Scholar 

  12. Rakhmawati L, Wirawan W, Suwadi S (2019) A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. Eurasip J Image Video Process 2019(1):1. https://doi.org/10.1186/s13640-019-0462-3. Springer International Publishing

    Article  Google Scholar 

  13. Garg P, Kishore RR (2020) Performance comparison of various watermarking techniques. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09262-1

    Article  Google Scholar 

  14. Giri KJ, Quadri SMK, Bashir R, Bhat JI (2020) DWT based color image watermarking: a review. Multimed Tools Appl 79(43–44):32881–32895. https://doi.org/10.1007/s11042-020-09716-6

    Article  Google Scholar 

  15. Evsutin O, Melman A, Meshcheryakov R (2020) Digital steganography and watermarking for digital images: a review of current research directions. IEEE Access 8:166589–166611. https://doi.org/10.1109/access.2020.3022779

    Article  Google Scholar 

  16. Kitchenham (2007) Guidelines for performing systematic literature reviews in software engineering. Tech. rep., Software Engineering Group, School of Computer Science and Mathematics, Keele University, Keele, UK

  17. Liu L, Long Y, Fieguth PW, Lao S, Zhao G (2014) BRINT: Binary rotation invariant and noise tolerant texture classification. IEEE Trans Image Process 23(7):3071–3084. https://doi.org/10.1109/TIP.2014.2325777

    Article  MathSciNet  Google Scholar 

  18. Tarhouni N, Charfeddine M, Ben Amar C (2020) Novel and robust image watermarking for copyright protection and integrity control. Circ Syst Signal Process 39(10):5059–5103. https://doi.org/10.1007/s00034-020-01401-1

    Article  Google Scholar 

  19. Tsolis DK, Sioutas S, Papatheodorou TS (2010) A multimedia application for watermarking digital images based on a content based image retrieval technique. Multimed Tools Appl 47(3):581–597. https://doi.org/10.1007/s11042-009-0338-0

    Article  Google Scholar 

  20. AlShehri L, Hussain M, Aboalsamh H, Wadood A (2020) Fragile watermarking for image authentication using BRINT and ELM. Multimed Tools Appl 79(39–40):29199–29223. https://doi.org/10.1007/s11042-020-09441-0

    Article  Google Scholar 

  21. Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91–106. https://doi.org/10.1007/s00500-017-2489-7

    Article  Google Scholar 

  22. Shih FY, Zhong X, Chang IC, Satoh S (2018) An adjustable-purpose image watermarking technique by particle swarm optimization. Multimed Tools Appl 77(2):1623–1642. https://doi.org/10.1007/s11042-017-4367-9

    Article  Google Scholar 

  23. Prasanth Vaidya S, Chandra Mouli PVSSR (2018) Adaptive, robust and blind digital watermarking using Bhattacharyya distance and bit manipulation. Multimed Tools Appl 77(5):5609–5635. https://doi.org/10.1007/s11042-017-4476-5

    Article  Google Scholar 

  24. Veni M, Meyyappan T (2019) Digital image watermark embedding and extraction using oppositional fruit fly algorithm. Multimed Tools Appl 78(19):27491–27510. https://doi.org/10.1007/s11042-019-7650-0

    Article  Google Scholar 

  25. Shen JJ, Lee CF, Hsu FW, Agrawal S (2020) A self-embedding fragile image authentication based on singular value decomposition. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09254-1

    Article  Google Scholar 

  26. Sinhal R, Ansari IA, Jain DK (2020) Real-time watermark reconstruction for the identification of source information based on deep neural network. J Real-Time Image Proc 17(6):2077–2095. https://doi.org/10.1007/s11554-019-00937-z

    Article  Google Scholar 

  27. Rayachoti E, Tirumalasetty S, Prathipati SC (2020) SLT based watermarking system for secure telemedicine. Cluster Comput 23(4):3175–3184. https://doi.org/10.1007/s10586-020-03078-2

    Article  Google Scholar 

  28. Bamal R, Kasana SS (2018) Slantlet based hybrid watermarking technique for medical images. Multimed Tools Appl 77(10):12493–12518. https://doi.org/10.1007/s11042-017-4898-0

    Article  Google Scholar 

  29. Maitra M, Chatterjee A (2006) A Slantlet transform based intelligent system for magnetic resonance brain image classification. Biomed Signal Process Control 1(4):299–306. https://doi.org/10.1016/j.bspc.2006.12.001.1007/s11227-021-03886-2

    Article  Google Scholar 

  30. Selesnick IW (1999) "The slantlet transform," in IEEE Transactions on Signal Processing 47(5):1304-1313. https://doi.org/10.1109/78.757218

  31. Namias, V. (1980). The fractional order Fourier transform and its application to quantum mechanics. IMA Journal of Applied Mathematics, 25(3), 241-265. https://doi.org/10.1093/imamat/25.3.241

  32. Abdelhakim AM, Saad MH, Sayed M, Saleh HI (2018) Optimized SVD-based robust watermarking in the fractional Fourier domain. Multimed Tools Appl 77(21):27895–27917. https://doi.org/10.1007/s11042-018-6014-5

    Article  Google Scholar 

  33. Elhoseny HM, Faragallah OS, Ahmed HEH, Kazemian HB, El-Sayed HS, Abd El-Samie FE (2016) The effect of fractional fourier transform angle in encryption quality for digital images. Optik (Stuttg) 127(1):315–319. https://doi.org/10.1016/j.ijleo.2015.08.152

    Article  Google Scholar 

  34. Shi J, Zheng J, Liu X, Xiang W, Zhang Q (2020) Novel short-time fractional fourier transform: theory, implementation, and applications. IEEE Trans Signal Process 68:3280–3295. https://doi.org/10.1109/TSP.2020.2992865

    Article  MathSciNet  Google Scholar 

  35. Pei SC, Yeh MH (1998) Two dimensional discrete fractional Fourier transform. Signal Processing 67(1):99-108. https://doi.org/10.1016/S0165-1684(98)00024-3

  36. Ustubioglu A, Ulutas G, Ustubioglu B (2019) IWT-MDE based reversible thermal image watermarking enhanced with secret sharing mechanism. Multimed Tools Appl 78(16):22269–22299. https://doi.org/10.1007/s11042-019-7529-0

    Article  Google Scholar 

  37. AlZubi S, Islam N, Abbod M (2011) Multiresolution analysis using wavelet, ridgelet, and curvelet transforms for medical image segmentation. Journal of Biomedical Imaging p, 1-18 https://doi.org/10.1155/2011/136034

  38. Candès EJ, Donoho DL (1999) Ridgelets: A key to higher-dimensional intermittency? Philos Trans R Soc A Math Phys Eng Sci 357(1760):2495–2509. https://doi.org/10.1098/rsta.1999.0444

    Article  MathSciNet  Google Scholar 

  39. Salomon, D. (2007). A concise introduction to data compression. Springer Science & Business Media.

  40. Dappuri B, Rao MP, Sikha MB (2020) Non-blind RGB watermarking approach using SVD in translation invariant wavelet space with enhanced Grey-wolf optimizer. Multimed Tools Appl 79(41–42):31103–31124. https://doi.org/10.1007/s11042-020-09433-0

    Article  Google Scholar 

  41. Donoho, D. L. (2001). Ridge functions and orthonormal ridgelets. Journal of Approximation Theory, 111(2), 143-179. https://doi.org/10.1006/jath.2001.3568

  42. Swaraja K, Meenakshi K, Kora P (2020) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control 55. https://doi.org/10.1016/j.bspc.2019.101665

  43. Mohan, B. C., Swamy, K. V., & Kumar, S. S. (2011, April). A Comparative performance evaluation of SVD and Schur Decompositions for Image Watermarking. In IJCA Proceedings on International Conference on VLSI, Communications and Instrumentation (ICVCI) (Vol. 14, pp. 25-29).

  44. Candès E, Demanet L, Donoho D, Ying L (2006) Fast discrete curvelet transforms. Multiscale Model Simul 5(3):861–899. https://doi.org/10.1137/05064182X

    Article  MathSciNet  Google Scholar 

  45. Fowler JE (2005) The redundant discrete wavelet transform and additive noise. IEEE Signal Process Lett 12(9):629–632. https://doi.org/10.1109/LSP.2005.853048

    Article  Google Scholar 

  46. Kumar C, Singh AK, Kumar P, Singh R, Singh S (2020) SPIHT‐based multiple image watermarking in NSCT domain. Concurrency and Computation: Practice and Experience 32(1):e4912. https://doi.org/10.1002/cpe.4912

  47. Da Cunha AL, Zhou J, Do MN (2006) The nonsubsampled contourlet transform: Theory, Design, and Applications," in IEEE Transactions on Image Processing 15(10):3089–3101. https://doi.org/10.1109/TIP.2006.877507

  48. Sinhal R, Ansari IA (2020) A multipurpose image watermarking scheme for digital image protection. Int J Syst Assur Eng Manag 11(2):274–286. https://doi.org/10.1007/s13198-019-00855-0

    Article  Google Scholar 

  49. Prasad S, Pal AK (2020) A secure fragile watermarking scheme for protecting integrity of digital images. Iran J Sci Technol - Trans Electr Eng 44(2):703–727. https://doi.org/10.1007/s40998-019-00275-7

    Article  Google Scholar 

  50. Baluja S (2019) Hiding images within images. IEEE Trans Pattern Anal Mach Intell 42(7):1685–1697. https://doi.org/10.1109/tpami.2019.2901877

    Article  Google Scholar 

  51. Fan MQ, Wang HX (2018) An enhanced fragile watermarking scheme to digital image protection and self-recovery. Signal Process Image Commun 66:19–29. https://doi.org/10.1016/j.image.2018.04.003

    Article  Google Scholar 

  52. Sinhal R, Ansari IA, Ahn CW (2020) Blind image watermarking for localization and restoration of color images. IEEE Access 8:200157–200169. https://doi.org/10.1109/ACCESS.2020.3035428

    Article  Google Scholar 

  53. Dagadu JC, Li J (2018) Context-based watermarking cum chaotic encryption for medical images in telemedicine applications. Multimed Tools Appl 77(18):24289–24312. https://doi.org/10.1007/s11042-018-5725-y

    Article  Google Scholar 

  54. Koley S (2020) Visual attention model based dual watermarking for simultaneous image copyright protection and authentication. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09918-y

    Article  Google Scholar 

  55. Su Q, Wang H, Liu DC, Yuan Z, Zhang X (2020) A combined domain watermarking algorithm of color image. Multimed Tools Appl 79(39–40):30023–30043. https://doi.org/10.1007/s11042-020-09436-x

    Article  Google Scholar 

  56. Balasamy K, Ramakrishnan S (2019) An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO. Cluster Comput 22:4431–4442. https://doi.org/10.1007/s10586-018-1991-8

    Article  Google Scholar 

  57. Liu H, Xiao D, Zhang R, Zhang Y, Bai S (2016) Robust and hierarchical watermarking of encrypted images based on compressive sensing. Signal Process Image Commun 45:41–51. https://doi.org/10.1016/j.image.2016.04.002

    Article  Google Scholar 

  58. Giri KJ, Bashir R (2018) A block based watermarking approach for color images using discrete wavelet transformation. Int J Inf Technol 10(2):139–146. https://doi.org/10.1007/s41870-017-0075-y

    Article  Google Scholar 

  59. Yazdan Bakhsh F, Moghaddam ME (2018) A robust HDR images watermarking method using artificial bee colony algorithm. J Inf Secur Appl 41:12–27. https://doi.org/10.1016/j.jisa.2018.05.003

    Article  Google Scholar 

  60. Chauhan DS, Singh AK, Kumar B, Saini JP (2019) Quantization based multiple medical information watermarking for secure e-health. Multimed Tools Appl 78(4):3911–3923. https://doi.org/10.1007/s11042-017-4886-4

    Article  Google Scholar 

  61. Gupta R, Mishra A, Jain S (2018) A semi-blind HVS based image watermarking scheme using elliptic curve cryptography. Multimed Tools Appl 77(15):19235–19260. https://doi.org/10.1007/s11042-017-5351-0

    Article  Google Scholar 

  62. Darwish SM, Al-Khafaji LDS (2020) Dual watermarking for color images: a new image copyright protection model based on the fusion of successive and segmented watermarking. Multimed Tools Appl 79(9–10):6503–6530. https://doi.org/10.1007/s11042-019-08290-w

    Article  Google Scholar 

  63. Balasamy K, Suganyadevi S (2020) A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09981-5

    Article  Google Scholar 

  64. Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76(6):8881–8900. https://doi.org/10.1007/s11042-016-3514-z

    Article  Google Scholar 

  65. Al-Haj A, Mohammad A, Amer A (2017) Crypto-Watermarking of Transmitted Medical Images. J Digit Imaging 30(1):26–38. https://doi.org/10.1007/s10278-016-9901-1

    Article  Google Scholar 

  66. Tuncer T (2018) A probabilistic image authentication method based on chaos. Multimed Tools Appl 77(16):21463–21480. https://doi.org/10.1007/s11042-017-5569-x

    Article  Google Scholar 

  67. Anand A, Singh AK (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72–80. https://doi.org/10.1016/j.comcom.2020.01.038

    Article  Google Scholar 

  68. Araghi TK, Manaf AA (2019) An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Futur Gener Comput Syst 101:1223–1246. https://doi.org/10.1016/j.future.2019.07.064

    Article  Google Scholar 

  69. Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95–105. https://doi.org/10.1016/j.eswa.2017.12.003

    Article  Google Scholar 

  70. Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2018) Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network. Futur Gener Comput Syst 86:926–939. https://doi.org/10.1016/j.future.2016.11.023

    Article  Google Scholar 

  71. Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381–8401. https://doi.org/10.1007/s11042-015-2754-7

    Article  Google Scholar 

  72. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882. https://doi.org/10.1007/s11042-016-3862-8

    Article  Google Scholar 

  73. Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78(3):3457–3470. https://doi.org/10.1007/s11042-018-6263-3

    Article  Google Scholar 

  74. Kumar C, Singh AK, Kumar P (2020) Dual watermarking: an approach for securing digital documents. Multimed Tools Appl 79(11–12):7339–7354. https://doi.org/10.1007/s11042-019-08314-5

    Article  Google Scholar 

  75. Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking for medical images. Wirel Pers Commun 92(4):1611–1624. https://doi.org/10.1007/s11277-016-3625-x

    Article  Google Scholar 

  76. Ansari IA, Pant M (2017) Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recognit Lett 94:228–236. https://doi.org/10.1016/j.patrec.2016.12.010

    Article  Google Scholar 

  77. Ansari IA, Pant M, Ahn CW (2016) ABC optimized secured image watermarking scheme to find out the rightful ownership. Optik (Stuttg) 127(14):5711–5721. https://doi.org/10.1016/j.ijleo.2016.03.070

    Article  Google Scholar 

  78. Ansari IA, Pant M, Ahn CW (2016) PSO optimized and secured watermarking scheme based on DWT and SVD. Adv Intell Syst Comput 437:411–424. https://doi.org/10.1007/978-981-10-0451-3_38

    Article  Google Scholar 

  79. Zermi N, Khaldi A, Kafi R, Kahlessenane F, Euschi S (2021) A DWT-SVD based robust digital watermarking for medical image security. Forensic science international 320:110691. https://doi.org/10.1016/j.forsciint.2021.110691

  80. Zermi N, Khaldi A, Kafi MR, Kahlessenane F, Euschi S (2021) A lossless DWT-SVD domain watermarking for medical information security. Multimed Tools Appl 80(16):24823–24841. https://doi.org/10.1007/s11042-021-10712-7

    Article  Google Scholar 

  81. Gao H, Chen Q (2021) A robust and secure image watermarking scheme using SURF and improved artificial bee colony algorithm in DWT domain. Optik (Stuttg) 242:1. https://doi.org/10.1016/j.ijleo.2021.166954

    Article  Google Scholar 

  82. Kahlessenane F, Khaldi A, Kafi R, Euschi S (2021) A robust blind medical image watermarking approach for telemedicine applications. Cluster Comput 24(3):2069–2082. https://doi.org/10.1007/s10586-020-03215-x

    Article  Google Scholar 

  83. Wang K, Gao T, You D, Wu X, Kan H (2022) A secure dual-color image watermarking scheme based 2D DWT, VD and Chaotic map. Multimed Tools Appl 81(5):6159–6190. https://doi.org/10.1007/s11042-021-11725-y

    Article  Google Scholar 

  84. Fares K, Khaldi A, Redouane K, Salah E (2021) DCT & DWT based watermarking scheme for medical information security. Biomed Signal Process Control 66:102403. https://doi.org/10.1016/j.bspc.2020.102403

  85. Alzahrani A (2022) Enhanced invisibility and robustness of digital image watermarking based on DWT-SVD. Appl Bionics Biomech. https://doi.org/10.1155/2022/5271600

  86. Nguyen TS (2021) Fragile watermarking for image authentication based on DWT-SVD-DCT techniques. Multimed Tools Appl 80(16):25107–25119. https://doi.org/10.1007/s11042-021-10879-z

    Article  Google Scholar 

  87. Mohan A, Anand A, Singh AK, Dwivedi R, Kumar B (2021) Selective encryption and optimization based watermarking for robust transmission of landslide images. Comput Electr Eng 95:107385. https://doi.org/10.1016/j.compeleceng.2021.107385

  88. Altay ŞY, Ulutaş G (2021) Self-adaptive step firefly algorithm based robust watermarking method in DWT-SVD domain. Multimed Tools Appl 80(15):23457–23484. https://doi.org/10.1007/s11042-020-10251-7

    Article  Google Scholar 

  89. Sanivarapu PV (2022) Adaptive tamper detection watermarking scheme for medical images in transform domain. Multimed Tools Appl 81(8):11605-11619. https://doi.org/10.1007/s11042-022-12273-9

  90. Vaidya SP (2022) Fingerprint-based robust medical image watermarking in hybrid transform. Vis Comput. https://doi.org/10.1007/s00371-022-02406-4

    Article  Google Scholar 

  91. Ding W, Xie Y, Wang Y (2019) Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value. Multimed Tools Appl 78(5):5305–5328. https://doi.org/10.1007/s11042-018-5732-z

    Article  Google Scholar 

  92. Juarez-Sandoval OU, Cedillo-Hernandez M, Nakano-Miyatake M, Cedillo-Hernandez A, Perez-Meana H (2018) Digital image ownership authentication via camouflaged unseen-visible watermarking. Multimed Tools Appl 77(20):26601–26634. https://doi.org/10.1007/s11042-018-5881-0

    Article  Google Scholar 

  93. Chen F, He H, Huo Y (2017) Self-embedding watermarking scheme against JPEG compression with superior imperceptibility. Multimed Tools Appl 76(7):9681–9712. https://doi.org/10.1007/s11042-016-3574-0

    Article  Google Scholar 

  94. Draganić A, Marić M, Orović I, Stanković S (2017) Identification of image source using serial-number-based watermarking under Compressive Sensing conditions. In 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) pp 1227-1232. https://doi.org/10.23919/MIPRO.2017.7973611

  95. Thanki R, Borra S, Dwivedi V, Borisagar K (2017) An efficient medical image watermarking scheme based on FDCuT–DCT. Eng Sci Technol an Int J 20(4):1366–1379. https://doi.org/10.1016/j.jestch.2017.06.001

    Article  Google Scholar 

  96. Faiz Bin Jeffry MA, Mammi HK (2017) A study on image security in social media using digital watermarking with metadata. 2017 IEEE Conf Appl Inf Netw Secur AINS 2017 2018-Janua:118–123. https://doi.org/10.1109/AINS.2017.8270435

  97. Singh AK (2019) Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed Tools Appl 78(21):30523–30533. https://doi.org/10.1007/s11042-018-7115-x

    Article  Google Scholar 

  98. Laishram D, Manglem Singh K (2021) A watermarking scheme for source authentication, ownership identification, tamper detection and restoration for color medical images. Multimed Tools Appl 80(16):23815–23875. https://doi.org/10.1007/s11042-020-10389-4

    Article  Google Scholar 

  99. Sinhal R, Jain DK, Ansari IA (2021) Machine learning based blind color image watermarking scheme for copyright protection. Pattern Recognit Lett 145:171–177. https://doi.org/10.1016/j.patrec.2021.02.011

    Article  Google Scholar 

  100. Al-Haj A, Amer A (2014) secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 27(6):737–750. https://doi.org/10.1007/s10278-014-9709-9

    Article  Google Scholar 

  101. Khor HL, Liew SC, Zain JM (2017) Region of interest-based tamper detection and lossless recovery watermarking scheme (ROI-DR) on ultrasound medical images. J Digit Imaging 30(3):328–349. https://doi.org/10.1007/s10278-016-9930-9

    Article  Google Scholar 

  102. Thabit R, Khoo BE (2017) Medical image authentication using SLT and IWT schemes. Multimed Tools Appl 76(1):309–332. https://doi.org/10.1007/s11042-015-3055-x

    Article  Google Scholar 

  103. Thanki R, Kothari A (2021) Multi-level security of medical images based on encryption and watermarking for telemedicine applications. Multimed Tools Appl 80(3):4307–4325. https://doi.org/10.1007/s11042-020-09941-z

    Article  Google Scholar 

  104. Ansari IA, Pant M, Ahn CW (2016) Robust and false positive free watermarking in IWT domain using SVD and ABC. Eng Appl Artif Intell 49:114–125. https://doi.org/10.1016/j.engappai.2015.12.004

    Article  Google Scholar 

  105. Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239. https://doi.org/10.1007/s13042-015-0455-1

    Article  Google Scholar 

  106. Makbol NM, Khoo BE, Rassem TH, Loukhaoukha K (2017) A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inf Sci (Ny) 417:381–400. https://doi.org/10.1016/j.ins.2017.07.026

    Article  Google Scholar 

  107. Thakur S, Singh AK, Ghrera SP, Mohan A (2020) Chaotic based secure watermarking approach for medical images. Multimed Tools Appl 79(7–8):4263–4276. https://doi.org/10.1007/s11042-018-6691-0

    Article  Google Scholar 

  108. Ansari IA, Pant M, Ahn CW (2018) Secured and optimized robust image watermarking scheme. Arab J Sci Eng 43(8):4085–4104. https://doi.org/10.1007/s13369-017-2777-7

    Article  Google Scholar 

  109. Singh OP, Kumar C, Singh AK, Singh MP, Ko H (2021) Fuzzy-based secure exchange of digital data using watermarking in NSCT-RDWT-SVD domain. Concurr Comput. https://doi.org/10.1002/cpe.6251

    Article  Google Scholar 

  110. Zhu T, Qu W, Cao W (2022) An optimized image watermarking algorithm based on SVD and IWT. J Supercomput 78(1):222–237. https://doi.org/10.1007/s11227-021-03886-2

    Article  Google Scholar 

  111. Bhalerao S, Ansari IA, Kumar A (2020) A secure image watermarking for tamper detection and localization. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02135-3

    Article  Google Scholar 

  112. Lei B et al (2019) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimed Tools Appl 78(19):27085–27107. https://doi.org/10.1007/s11042-017-4743-5

    Article  Google Scholar 

  113. Zhang Z, Wu L, Xiao S, Gao S (2017) Adaptive reversible image watermarking algorithm based on IWT and level set. EURASIP J Adv Signal Process 2017(1):1. https://doi.org/10.1186/s13634-017-0450-7

    Article  Google Scholar 

  114. Gupta G, Khunteta A (2018) Hiding text data in image through image watermarking using DCT & DWT: A research paper. In: IEEE Int. Conf. Power, Control. Signals Instrum. Eng. ICPCSI 2017. pp 447–450. https://doi.org/10.1109/ICPCSI.2017.8392335

  115. Bhalerao S, Ansari IA, Kumar A, Jain DK (2019) A reversible and multipurpose ECG data hiding technique for telemedicine applications. Pattern Recognit Lett 125:463–473. https://doi.org/10.1016/j.patrec.2019.06.004

    Article  Google Scholar 

  116. Thanki R, Kothari A, Borra S (2021) Hybrid, blind and robust image watermarking: RDWT – NSCT based secure approach for telemedicine applications. Multimed Tools Appl 80(18):27593–27613. https://doi.org/10.1007/s11042-021-11064-y

    Article  Google Scholar 

  117. Sinhal R, Ansari IA (2022) Multipurpose image watermarking: ownership check, tamper detection and self-recovery. Circuits Syst Signal Process. https://doi.org/10.1007/s00034-021-01926-z

    Article  Google Scholar 

  118. Singh P, Chadha RS (2013) A survey of digital watermarking techniques, applications and attacks. International Journal of Engineering and Innovative Technology (IJEIT) 2(9):165-175.

  119. Laouamer L, Tayan O (2013) An enhanced SVD technique for authentication and protection of text-images using a case study on digital Quran content with sensitivity constraints. Life Science Journal 10(2):2591-2597

  120. Damera-Venkata N, Kite, TD, Geisler, WS, Evans, BL, Bovik AC (2000) Image quality assessment based on a degradation model. IEEE transactions on image processing 9(4):636-650. https://doi.org/10.1109/83.841940

  121. Wang Z, Bovik AC (2002) A universal image quality index. IEEE signal processing letters 9(3):81-84. https://doi.org/10.1109/97.995823

  122. Sheikh HR, Bovik AC (2006) Image information and visual quality. IEEE Trans Image Process 15(2):430–444. https://doi.org/10.1109/TIP.2005.859378

    Article  Google Scholar 

  123. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing 13(4):600-612. https://doi.org/10.1109/TIP.2003.819861

  124. Perwej Y (2012) An Adaptive watermarking technique for the copyright of digital images and digital image protection. Int J Multimed Its Appl 4(2):21–38. https://doi.org/10.5121/ijma.2012.4202

    Article  Google Scholar 

  125. Wohlin C (2014) Guidelines for snowballing in systematic literature studies and a replication in software engineering. In Proceedings of the 18th international conference on evaluation and assessment in software engineering 1-10). https://doi.org/10.1145/2601248.2601268

  126. Shabir A, Parah Nazir A, Loan Asif A, Shah Javaid A, Sheikh GM, Bhat (2018) A new secure and robust watermarking technique based on logistic map and modification of DC coefficient Nonlinear Dynamics 93(4):1933-1951. https://doi.org/10.1007/s11071-018-4299-6

  127. Rohini, Srivastava Basant, Kumar Amit Kumar, Singh Anand, Mohan (2018) Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach Multimedia Tools and Applications 77(13):16447-16459. https://doi.org/10.1007/s11042-017-5214-8

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohd Shaliyar.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Conflict of interests

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shaliyar, M., Mustafa, K. Watermarking approach for source authentication of web content in online social media: a systematic literature review. Multimed Tools Appl 83, 54027–54079 (2024). https://doi.org/10.1007/s11042-023-17559-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17559-0

Keywords

Navigation