Abstract
This article presents a detailed discussion of different prospects of digital image watermarking. This discussion of watermarking included: brief comparison of similar information security techniques, concept of watermark embedding and extraction process, watermark characteristics and applications, common types of watermarking techniques, major classification of watermarking attacks, brief summary of various secure watermarking techniques. Further, potential issues and some existing solutions are provided. Furthermore, the performance comparisons of the discussed techniques are presented in tabular format. Authors believe that this article contribution will provide as catalyst for potential researchers to implement efficient watermarking systems.
Similar content being viewed by others
References
Ahmad S, Lu ZM. (2007) A joint biometrics and watermarking based framework for fingerprinting, copyright protection, proof of ownership, and security applications. In Computational Intelligence and Security Workshops, IEEE CISW; 676–679
Ahmad S, Mirza SM, Qamar S. (2004) A spread spectrum based scalable blind digital watermarking technique for multi-purpose multimedia applications. In: E-Tech 2004, Karachi, Pakistan 10–16
Bartlow N, Kalka N, Cukic B, Ross A. (2007) Protecting iris images through asymmetric digital watermarking. 2007 IEEE Workshop on Automatic Identification Advanced Technologies; 192–197
Bhowmik D, Oakes M, Abhayaratne C (2016) Visual attention-based image watermarking. IEEE Access 4:8002–8018
Bianchi T, Piva A (2013) Secure watermarking for multimedia content protection: a review of its benefits and open issues. IEEE Signal Process Mag 30(2):87–96
Bianchi T, Piva A, Barni M (2009) Encrypted domain DCT based on homomorphic cryptosystems. EURASIP J Inf Secur 2009(1):716357
Caldelli R, Filippini F, Barni M (2006) Joint near-lossless compression and watermarking of still images for authentication and tamper localization. Signal Process Image Commun 21(10):890–903
Cao X, Fu Z, Sun X. (2016) A privacy-preserving outsourcing data storage scheme with fragile digital watermarking-based data auditing. Journal of Electrical and Computer Engineering (2016), Article ID: 3219042;1–7
Chang CC, Tsai P, Lin CC (2005) SVD-based digital image watermarking scheme. Pattern Recogn Lett 26(10):1577–1586
Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470
Chang IC, Hu YC, Chen WL, Lo CC (2015) High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding. Signal Process 108:376–388
Chen YY, Chi KY (2017) Cloud image watermarking: high quality data hiding and blind decoding scheme based on block truncation coding. Multimedia Systems :1–3. https://doi.org/10.1007/s00530-017-0560-y
Chen J, Hong W, Chen TS, Shiu CW (2010) Steganography for BTC compressed images using no distortion technique. The Imaging Science Journal 58(4):177–185
Dagadu JC, Li J (2018) Context-based watermarking cum chaotic encryption for medical images in telemedicine applications. Multimedia Tools and Applications; 1–24
Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU-International Journal of Electronics and Communications 68(3):244–253
Dharwadkar NV, Amberker BB (2010) Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. International Journal of Signal Processing 6(2):93–100
Fridrich J, Goljan M, Chen Q, Pathak V. (2004) Lossless data embedding with file size preservation. In Security, Steganography, and Watermarking of Multimedia Contents VI 2004 International Society for Optics and Photonics; 5306: 354–365
Golea NE, Seghir R, Benzid R. (2010) A bind RGB color image watermarking based on singular value decomposition. 2010 IEEE/ACS International Conference on Computer Systems and Applications, Hammamet, Tunisia; 1–5
Gordy JD, Bruton LT. (2000) Performance evaluation of digital audio watermarking algorithms In: Proc. of the 43rd IEEE Midwest Symposium on Circuits and Systems, 1; 456–459
Gunjal BL, Mali SN (2015) MEO based secured, robust, high capacity and perceptual quality image watermarking in DWT-SVD domain. Springer Plus 5(9):1–16
Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125–135
Gupta R, Jain S, Mishra A. (2015) Watermarking system for encrypted images at cloud to check reliability of images. 2015 1st International Conference on Next Generation Computing Technologies, Dehradun, India 46–49
Gupta R, Mishra A, Jain S. (2017) A semi-blind HVS based image watermarking scheme using elliptic curve cryptography. Multimedia Tools and Applications 1–26
Haddad S, Coatrieux G, Cozic M, Bouslimi D (2017) Joint watermarking and lossless JPEG-LS compression for medical image security. IRBM 38(4):198–206
Hien TD, Nakao Z, Chen YW (2006) Robust multi-logo watermarking by RDWT and ICA. Signal Processing Elsevier 86(10):2981–2993
Hong W, Chen TS, Shiu CW (2008) Lossless steganography for AMBTC-compressed images. In Image and Signal Processing. CISP '08. Congress on Image and Signal Processing, 2008. 2:13–17
Hossain MS, Muhammad G (2016) Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring. Comput Netw 101(4):192–202
Hsieh SL, Tsai IJ, Huang BY, Jian JJ (2008) Protecting copyrights of color images using a watermarking scheme based on secret sharing and wavelet transform. J Multimed 3(4):42–49
Hsu CS, Hou YC (2005) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44(7):077003
Hsu CS, Tu SF (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283(9):1737–1743
Huang CH, Chuang SC, Huang YL, Wu JL (2009) Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents. IEEE Transactions on Information Forensics and Security 4(2):193–206
Jiang L (2018) The identical operands commutative encryption and watermarking based on homomorphism. Multimedia Tools and Applications. Springer, 1–20. https://doi.org/10.1007/s11042-018-6142-y
Juarez-Sandoval O, Fragoso-Navarro E, Cedillo-Hernandez M, Nakano M, Perez-Meana H and Cedillo-Hernandez A. (2017) Improved unseen-visible watermarking for copyrigth protection of digital image. 5th International Workshop in Biometrics and Forensics (IWBF). IEEE, Coventry, UK: 1–5
Kalra GS, Talwar R, Sadawarti H (2015) Adaptive digital image watermarking for color images in frequency domain. Multimedia Tools and Applications 74(17):6849–6869
Thakur S, Singh AK, Ghrera SP, Elhoseny Md (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools and Applications :1–14. https://doi.org/10.1007/s11042-018-6263-3
Kaur G, Kaur K (2013) Digital watermarking and other data hiding techniques. International Journal of Innovative Technology and Exploring Engineering 2(5):181–183
Kim WG, Lee H (2009, Elsevier) Multimodal biometric image watermarking using two-stage integrity verification. Signal Process 89(12):2385–2399
Kim J, Kim N, Lee D, Park S, Lee S (2010) Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents. Signal Process Image Commun 25(8):559–576
Kittawi N, Al-Haj A. (2017) Reversible data hiding in encrypted images. 2017 8th International Conference on Information Technology, Amman, Jordan, 808–813
Komninos N, Dimitriou T. (2007) Protecting biometric templates with image watermarking techniques. In International Conference on Biometrics, Berlin, Heidelberg, 114–123
Kumar GD, Teja DP, Reddy SS, Sasikaladevi N (2017) An efficient watermarking technique for biometric images. Procedia Computer Science 115:423–430
Lei B, Song I, Rahman SA (2013) Robust and secure watermarking scheme for breath sound. Journal of Systems and Software Elsevier 86(6):1638–1649
Lei B, Zhao X, Lei H, Ni D, Chen S, Zhou F, Wang T. (2017) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimedia Tools and Applications, 1–23
Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tampers detection and recovery. Pattern Recogn 38(12):2519–2529
Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS. Fortune Teller: Predicting Your Career Path. In AAAI 2016; (2016):201–207
Majumder S, Devi KJ, Sarkar SK (2013) Singular value decomposition and wavelet-based iris biometric watermarking. IET biometrics 2(1):21–27
Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075–1083
Mohanty SP (1999) Digital watermarking: A tutorial review
Mohanty SP, Ramakrishnan KR, Kankanhalli M. (1999) A dual watermarking technique for images. In Proceedings of the seventh ACM international conference on Multimedia (Part 2), 49–51
Mohanty SP, Sengupta A, Guturu P, Kougianos E (2017) Everything you want to know about watermarking. IEEE Consumer Electronics Magazine 6(3):83–91
Moon D, Kim T, Jung S, Chung Y, Moon K, Ahn D, Kim SK (2005) Performance evaluation of watermarking techniques for secure multimodal biometric systems. In Proc. of the International Conference on Computational and Information Science. Springer, Berlin, Heidelberg, 635–642
Naderahmadian Y, Hosseini-Khayat S. (2010) Fast watermarking based on QR decomposition in wavelet domain. In proc. of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany; 127–130
Narayana S, Prasad G (2010) Two new approaches for secured image steganography using cryptographic techniques and type conversions. Signal & Image Processing: An International Journal (SIPIJ) 1(2):60–73
Ou D, Sun W (2015) High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimedia Tools and Applications 74(21):9117–9139
Park KR, Jeong DS, Kang BJ, Lee EC. (2007) A study on iris feature watermarking on face data. In International Conference on Adaptive and Natural Computing Algorithms. Berlin, Heidelberg; 415–423
Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Processing 20(6):1597–1611
Patra JC, Karthik A, Bornand C (2010) A novel CRT-based watermarking technique for authentication of multimedia contents. Digital Signal Processing 20(2):442–453
Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU-International Journal of Electronics and Communications 65(10):840–847
Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal Process 92(6):1480–1491
Seenivasagam V, Velumani R (2013) A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud. Computational and mathematical methods in medicine. 2013 516465:1–16
Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278
Singh AK (2015) Some new techniques of improved wavelet domain watermarking for medical images, PhD thesis, Department of Computer Engineering, NIT Kurukshetra, Haryana, India
Singh AK, Kumar B, Dave M, Ghrera SP and Mohan A (2016) Digital Image Watermarking: Techniques and Emerging Applications. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security.IGI Global, USA; 246–272
Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2018) Multiple watermarking technique for securing online social network contents using back propagation neural network. Futur Gener Comput Syst 86:926–939. https://doi.org/10.1016/j.future.2016.11.023
Singh AK, Kumar B, Singh G and Mohan A (2017) Medical Image Watermarking: Techniques and Applications. Book series on Multimedia Systems and Applications, Springer, USA
Song W, Hou JJ, Li ZH, Huang L (2011) Chaotic system and QR factorization based robust digital image watermarking algorithm. J Cent S Univ Technol 18(1):116–124
Su Q, Chen B (2017) A novel blind color image watermarking using upper Hessenberg matrix. AEU-International Journal of Electronics and Communications 78:64–71
Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91–106
Su Q, Niu Y, Zou H, Zhao Y, Yao T (2014) A blind double color image watermarking algorithm based on QR decomposition. Multimedia tools and applications 72(1):987–1009
Tanha M, Torshizi SD, Abdullah MT, Hashim F. (2012) An overview of attacks against digital watermarking and their respective countermeasures. In proc. of 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) , IEEE, Kuala Lumpur, Malaysia 265–270
Vatsa M, Singh R, Noore A, Houck MM, Morris K (2006) Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 3(2):23–28
Vatsa M, Singh R, Noore A (2009) Feature based RDWT watermarking for multimodal biometric system. Image Vis Comput 27(3):293–304
Wang MS, Chen WC (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Computer Standards & Interfaces 31(4):757–762
Wildes RP (1997) Iris recognition: an emerging biometric technology. Proc IEEE 85(9):1348–1363
Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(11):2594–2608
Yeung MM, Mintzer FC (1998) Invisible watermarking for image verification. Journal of Electronic imaging 7(3):578–592
Yin Z, Luo B, Hong W (2014) Separable and error-free reversible data hiding in encrypted image with high payload. The Scientific World Journal, (2014), Article ID: 604876;1–8
Zhang X (2011) Reversible data hiding in encrypted image. IEEE signal processing letters 18(4):255–258
Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE transactions on information forensics and security 7(2):826–832
Zhang J, Xiang Y, Zhou W, Ye L, Mu Y (2011) Secure image retrieval based on visual content and watermarking protocol. Comput J 54(10):1661–1674
Acknowledgements
The authors thank the potential reviewer’s for their constructive comments and suggestions that greatly contributed to improving this article.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Singh, L., Singh, A.K. & Singh, P.K. Secure data hiding techniques: a survey. Multimed Tools Appl 79, 15901–15921 (2020). https://doi.org/10.1007/s11042-018-6407-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6407-5