Skip to main content
Log in

Secure data hiding techniques: a survey

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This article presents a detailed discussion of different prospects of digital image watermarking. This discussion of watermarking included: brief comparison of similar information security techniques, concept of watermark embedding and extraction process, watermark characteristics and applications, common types of watermarking techniques, major classification of watermarking attacks, brief summary of various secure watermarking techniques. Further, potential issues and some existing solutions are provided. Furthermore, the performance comparisons of the discussed techniques are presented in tabular format. Authors believe that this article contribution will provide as catalyst for potential researchers to implement efficient watermarking systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Ahmad S, Lu ZM. (2007) A joint biometrics and watermarking based framework for fingerprinting, copyright protection, proof of ownership, and security applications. In Computational Intelligence and Security Workshops, IEEE CISW; 676–679

  2. Ahmad S, Mirza SM, Qamar S. (2004) A spread spectrum based scalable blind digital watermarking technique for multi-purpose multimedia applications. In: E-Tech 2004, Karachi, Pakistan 10–16

  3. Bartlow N, Kalka N, Cukic B, Ross A. (2007) Protecting iris images through asymmetric digital watermarking. 2007 IEEE Workshop on Automatic Identification Advanced Technologies; 192–197

  4. Bhowmik D, Oakes M, Abhayaratne C (2016) Visual attention-based image watermarking. IEEE Access 4:8002–8018

    Google Scholar 

  5. Bianchi T, Piva A (2013) Secure watermarking for multimedia content protection: a review of its benefits and open issues. IEEE Signal Process Mag 30(2):87–96

    Google Scholar 

  6. Bianchi T, Piva A, Barni M (2009) Encrypted domain DCT based on homomorphic cryptosystems. EURASIP J Inf Secur 2009(1):716357

    Google Scholar 

  7. Caldelli R, Filippini F, Barni M (2006) Joint near-lossless compression and watermarking of still images for authentication and tamper localization. Signal Process Image Commun 21(10):890–903

    Google Scholar 

  8. Cao X, Fu Z, Sun X. (2016) A privacy-preserving outsourcing data storage scheme with fragile digital watermarking-based data auditing. Journal of Electrical and Computer Engineering (2016), Article ID: 3219042;1–7

  9. Chang CC, Tsai P, Lin CC (2005) SVD-based digital image watermarking scheme. Pattern Recogn Lett 26(10):1577–1586

    Google Scholar 

  10. Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470

    Google Scholar 

  11. Chang IC, Hu YC, Chen WL, Lo CC (2015) High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding. Signal Process 108:376–388

    Google Scholar 

  12. Chen YY, Chi KY (2017) Cloud image watermarking: high quality data hiding and blind decoding scheme based on block truncation coding. Multimedia Systems :1–3. https://doi.org/10.1007/s00530-017-0560-y

  13. Chen J, Hong W, Chen TS, Shiu CW (2010) Steganography for BTC compressed images using no distortion technique. The Imaging Science Journal 58(4):177–185

    Google Scholar 

  14. Dagadu JC, Li J (2018) Context-based watermarking cum chaotic encryption for medical images in telemedicine applications. Multimedia Tools and Applications; 1–24

  15. Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU-International Journal of Electronics and Communications 68(3):244–253

    Google Scholar 

  16. Dharwadkar NV, Amberker BB (2010) Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. International Journal of Signal Processing 6(2):93–100

    Google Scholar 

  17. Fridrich J, Goljan M, Chen Q, Pathak V. (2004) Lossless data embedding with file size preservation. In Security, Steganography, and Watermarking of Multimedia Contents VI 2004 International Society for Optics and Photonics; 5306: 354–365

  18. Golea NE, Seghir R, Benzid R. (2010) A bind RGB color image watermarking based on singular value decomposition. 2010 IEEE/ACS International Conference on Computer Systems and Applications, Hammamet, Tunisia; 1–5

  19. Gordy JD, Bruton LT. (2000) Performance evaluation of digital audio watermarking algorithms In: Proc. of the 43rd IEEE Midwest Symposium on Circuits and Systems, 1; 456–459

  20. Gunjal BL, Mali SN (2015) MEO based secured, robust, high capacity and perceptual quality image watermarking in DWT-SVD domain. Springer Plus 5(9):1–16

    Google Scholar 

  21. Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125–135

    Google Scholar 

  22. Gupta R, Jain S, Mishra A. (2015) Watermarking system for encrypted images at cloud to check reliability of images. 2015 1st International Conference on Next Generation Computing Technologies, Dehradun, India 46–49

  23. Gupta R, Mishra A, Jain S. (2017) A semi-blind HVS based image watermarking scheme using elliptic curve cryptography. Multimedia Tools and Applications 1–26

  24. Haddad S, Coatrieux G, Cozic M, Bouslimi D (2017) Joint watermarking and lossless JPEG-LS compression for medical image security. IRBM 38(4):198–206

    Google Scholar 

  25. Hien TD, Nakao Z, Chen YW (2006) Robust multi-logo watermarking by RDWT and ICA. Signal Processing Elsevier 86(10):2981–2993

    MATH  Google Scholar 

  26. Hong W, Chen TS, Shiu CW (2008) Lossless steganography for AMBTC-compressed images. In Image and Signal Processing. CISP '08. Congress on Image and Signal Processing, 2008. 2:13–17

  27. Hossain MS, Muhammad G (2016) Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring. Comput Netw 101(4):192–202

    Google Scholar 

  28. Hsieh SL, Tsai IJ, Huang BY, Jian JJ (2008) Protecting copyrights of color images using a watermarking scheme based on secret sharing and wavelet transform. J Multimed 3(4):42–49

    Google Scholar 

  29. Hsu CS, Hou YC (2005) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44(7):077003

    Google Scholar 

  30. Hsu CS, Tu SF (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283(9):1737–1743

    Google Scholar 

  31. Huang CH, Chuang SC, Huang YL, Wu JL (2009) Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents. IEEE Transactions on Information Forensics and Security 4(2):193–206

    Google Scholar 

  32. Jiang L (2018) The identical operands commutative encryption and watermarking based on homomorphism. Multimedia Tools and Applications. Springer, 1–20. https://doi.org/10.1007/s11042-018-6142-y

  33. Juarez-Sandoval O, Fragoso-Navarro E, Cedillo-Hernandez M, Nakano M, Perez-Meana H and Cedillo-Hernandez A. (2017) Improved unseen-visible watermarking for copyrigth protection of digital image. 5th International Workshop in Biometrics and Forensics (IWBF). IEEE, Coventry, UK: 1–5

  34. Kalra GS, Talwar R, Sadawarti H (2015) Adaptive digital image watermarking for color images in frequency domain. Multimedia Tools and Applications 74(17):6849–6869

    Google Scholar 

  35. Thakur S, Singh AK, Ghrera SP, Elhoseny Md (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools and Applications :1–14. https://doi.org/10.1007/s11042-018-6263-3

  36. Kaur G, Kaur K (2013) Digital watermarking and other data hiding techniques. International Journal of Innovative Technology and Exploring Engineering 2(5):181–183

    Google Scholar 

  37. Kim WG, Lee H (2009, Elsevier) Multimodal biometric image watermarking using two-stage integrity verification. Signal Process 89(12):2385–2399

    MATH  Google Scholar 

  38. Kim J, Kim N, Lee D, Park S, Lee S (2010) Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents. Signal Process Image Commun 25(8):559–576

    Google Scholar 

  39. Kittawi N, Al-Haj A. (2017) Reversible data hiding in encrypted images. 2017 8th International Conference on Information Technology, Amman, Jordan, 808–813

  40. Komninos N, Dimitriou T. (2007) Protecting biometric templates with image watermarking techniques. In International Conference on Biometrics, Berlin, Heidelberg, 114–123

  41. Kumar GD, Teja DP, Reddy SS, Sasikaladevi N (2017) An efficient watermarking technique for biometric images. Procedia Computer Science 115:423–430

    Google Scholar 

  42. Lei B, Song I, Rahman SA (2013) Robust and secure watermarking scheme for breath sound. Journal of Systems and Software Elsevier 86(6):1638–1649

    Google Scholar 

  43. Lei B, Zhao X, Lei H, Ni D, Chen S, Zhou F, Wang T. (2017) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimedia Tools and Applications, 1–23

  44. Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tampers detection and recovery. Pattern Recogn 38(12):2519–2529

    Google Scholar 

  45. Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS. Fortune Teller: Predicting Your Career Path. In AAAI 2016; (2016):201–207

  46. Majumder S, Devi KJ, Sarkar SK (2013) Singular value decomposition and wavelet-based iris biometric watermarking. IET biometrics 2(1):21–27

    Google Scholar 

  47. Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075–1083

    Google Scholar 

  48. Mohanty SP (1999) Digital watermarking: A tutorial review

  49. Mohanty SP, Ramakrishnan KR, Kankanhalli M. (1999) A dual watermarking technique for images. In Proceedings of the seventh ACM international conference on Multimedia (Part 2), 49–51

  50. Mohanty SP, Sengupta A, Guturu P, Kougianos E (2017) Everything you want to know about watermarking. IEEE Consumer Electronics Magazine 6(3):83–91

    Google Scholar 

  51. Moon D, Kim T, Jung S, Chung Y, Moon K, Ahn D, Kim SK (2005) Performance evaluation of watermarking techniques for secure multimodal biometric systems. In Proc. of the International Conference on Computational and Information Science. Springer, Berlin, Heidelberg, 635–642

  52. Naderahmadian Y, Hosseini-Khayat S. (2010) Fast watermarking based on QR decomposition in wavelet domain. In proc. of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany; 127–130

  53. Narayana S, Prasad G (2010) Two new approaches for secured image steganography using cryptographic techniques and type conversions. Signal & Image Processing: An International Journal (SIPIJ) 1(2):60–73

    Google Scholar 

  54. Ou D, Sun W (2015) High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimedia Tools and Applications 74(21):9117–9139

    Google Scholar 

  55. Park KR, Jeong DS, Kang BJ, Lee EC. (2007) A study on iris feature watermarking on face data. In International Conference on Adaptive and Natural Computing Algorithms. Berlin, Heidelberg; 415–423

  56. Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Processing 20(6):1597–1611

    Google Scholar 

  57. Patra JC, Karthik A, Bornand C (2010) A novel CRT-based watermarking technique for authentication of multimedia contents. Digital Signal Processing 20(2):442–453

    Google Scholar 

  58. Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU-International Journal of Electronics and Communications 65(10):840–847

    Google Scholar 

  59. Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal Process 92(6):1480–1491

    Google Scholar 

  60. Seenivasagam V, Velumani R (2013) A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud. Computational and mathematical methods in medicine. 2013 516465:1–16

    MATH  Google Scholar 

  61. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278

    Google Scholar 

  62. Singh AK (2015) Some new techniques of improved wavelet domain watermarking for medical images, PhD thesis, Department of Computer Engineering, NIT Kurukshetra, Haryana, India

  63. Singh AK, Kumar B, Dave M, Ghrera SP and Mohan A (2016) Digital Image Watermarking: Techniques and Emerging Applications. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security.IGI Global, USA; 246–272

  64. Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2018) Multiple watermarking technique for securing online social network contents using back propagation neural network. Futur Gener Comput Syst 86:926–939. https://doi.org/10.1016/j.future.2016.11.023

  65. Singh AK, Kumar B, Singh G and Mohan A (2017) Medical Image Watermarking: Techniques and Applications. Book series on Multimedia Systems and Applications, Springer, USA

  66. Song W, Hou JJ, Li ZH, Huang L (2011) Chaotic system and QR factorization based robust digital image watermarking algorithm. J Cent S Univ Technol 18(1):116–124

    Google Scholar 

  67. Su Q, Chen B (2017) A novel blind color image watermarking using upper Hessenberg matrix. AEU-International Journal of Electronics and Communications 78:64–71

    Google Scholar 

  68. Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91–106

    MathSciNet  Google Scholar 

  69. Su Q, Niu Y, Zou H, Zhao Y, Yao T (2014) A blind double color image watermarking algorithm based on QR decomposition. Multimedia tools and applications 72(1):987–1009

    Google Scholar 

  70. Tanha M, Torshizi SD, Abdullah MT, Hashim F. (2012) An overview of attacks against digital watermarking and their respective countermeasures. In proc. of 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) , IEEE, Kuala Lumpur, Malaysia 265–270

  71. Vatsa M, Singh R, Noore A, Houck MM, Morris K (2006) Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 3(2):23–28

    Google Scholar 

  72. Vatsa M, Singh R, Noore A (2009) Feature based RDWT watermarking for multimodal biometric system. Image Vis Comput 27(3):293–304

    Google Scholar 

  73. Wang MS, Chen WC (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Computer Standards & Interfaces 31(4):757–762

    Google Scholar 

  74. Wildes RP (1997) Iris recognition: an emerging biometric technology. Proc IEEE 85(9):1348–1363

    Google Scholar 

  75. Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(11):2594–2608

    Google Scholar 

  76. Yeung MM, Mintzer FC (1998) Invisible watermarking for image verification. Journal of Electronic imaging 7(3):578–592

    Google Scholar 

  77. Yin Z, Luo B, Hong W (2014) Separable and error-free reversible data hiding in encrypted image with high payload. The Scientific World Journal, (2014), Article ID: 604876;1–8

  78. Zhang X (2011) Reversible data hiding in encrypted image. IEEE signal processing letters 18(4):255–258

    Google Scholar 

  79. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE transactions on information forensics and security 7(2):826–832

    Google Scholar 

  80. Zhang J, Xiang Y, Zhou W, Ye L, Mu Y (2011) Secure image retrieval based on visual content and watermarking protocol. Comput J 54(10):1661–1674

    Google Scholar 

Download references

Acknowledgements

The authors thank the potential reviewer’s for their constructive comments and suggestions that greatly contributed to improving this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. K. Singh.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, L., Singh, A.K. & Singh, P.K. Secure data hiding techniques: a survey. Multimed Tools Appl 79, 15901–15921 (2020). https://doi.org/10.1007/s11042-018-6407-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6407-5

Keywords

Navigation