Image Watermarking

  • Mohammad Ali Nematollahi
  • Chalee Vorakulpipat
  • Hamurabi Gamboa Rosales
Part of the Springer Topics in Signal Processing book series (STSP, volume 11)


Visual system is the most critical sense for human as it brings human memories, learning, and interfering about an event. An image can reveal more information about an event in which even one hundred sentences cannot explain. Therefore, images and pictures are becoming one of the most conventional parts of human life worldwide. This is due to the ability of imaging devices which facilitate easy imaging skill for people to record every moment of their life.


Singular Value Decomposition Image Watermark JPEG Compression Watermark Extraction Image Authentication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Zeng, W., and B. Liu. 1999. A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images. IEEE Transactions on Image Processing 8(11): 1534–1548.MathSciNetCrossRefGoogle Scholar
  2. 2.
    Akhaee, M.A., et al. 2009. Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor. IEEE Transactions on Multimedia 11(5): 822–833.CrossRefGoogle Scholar
  3. 3.
    Akhaee, M.A., S. Sahraeian, and F. Marvasti. 2010. Contourlet-based image watermarking using optimum detector in a noisy environment. IEEE Transactions on Image Processing 19(4): 967–980.MathSciNetCrossRefGoogle Scholar
  4. 4.
    Xiang, S., H.J. Kim, and J. Huang. 2008. Invariant image watermarking based on statistical features in the low-frequency domain. IEEE Transactions on Circuits and Systems for Video Technology 18(6): 777–790.CrossRefGoogle Scholar
  5. 5.
    Ghazy, R.A., et al. 2015. Block-based SVD image watermarking in spatial and transform domains. International Journal of Electronics 102(7): 1091–1113.CrossRefGoogle Scholar
  6. 6.
    Yassin, N.I., N.M. Salem, and M.I. El Adawy. 2014. QIM blind video watermarking scheme based on wavelet transform and principal component analysis. Alexandria Engineering Journal 53(4): 833–842.CrossRefGoogle Scholar
  7. 7.
    Khan, M.K., L. Xie, and J. Zhang. 2007. Robust hiding of fingerprint-biometric data into audio signals. In Advances in biometrics, 702–712. Springer.Google Scholar
  8. 8.
    Vatsa, M., R. Singh, and A. Noore. 2009. Feature based RDWT watermarking for multimodal biometric system. Image and Vision Computing 27(3): 293–304.CrossRefGoogle Scholar
  9. 9.
    Gopalakrishnan, K., N. Memon, and P.L. Vora. 2001. Protocols for watermark verification. IEEE Multimedia 8(4): 66–70.CrossRefGoogle Scholar
  10. 10.
    Huang, Y.F., S. Tang, and J. Yuan. 2011. Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Transactions on Information Forensics and Security 6(2): 296–306.CrossRefGoogle Scholar
  11. 11.
    Swanson, M.D., et al. 1998. Robust audio watermarking using perceptual masking. Signal Processing 66(3): 337–355.CrossRefzbMATHGoogle Scholar
  12. 12.
    Coatrieux, G., et al. 2000. Relevance of watermarking in medical imaging. In Proceedings of 2000 IEEE EMBS international conference on information technology applications in biomedicine, 2000. IEEE.Google Scholar
  13. 13.
    Nyeem, H., W. Boles, and C. Boyd. 2013. A review of medical image watermarking requirements for teleradiology. Journal of Digital Imaging 26(2): 326–343.Google Scholar

Copyright information

© Springer Science+Business Media Singapore 2017

Authors and Affiliations

  • Mohammad Ali Nematollahi
    • 1
  • Chalee Vorakulpipat
    • 1
  • Hamurabi Gamboa Rosales
    • 2
  1. 1.National Electronics and Computer Technology Center (NECTEC)PathumthaniThailand
  2. 2.Universidad Autónoma de ZacatecasZacatecasMexico

Personalised recommendations