Abstract
In this paper, we have reviewed the state-of-art of the various wavelet based image watermarking techniques in spatial as well as in transform domain based on the robustness, imperceptibility, capacity and security. The embedding and extraction methods suggested by various researchers/scientists have been studied along with their advantages and disadvantages. We have also discussed some important research challenges and requirements for making the watermarking system more efficient. It will be more important for researchers to implement effective watermarking method.
Similar content being viewed by others
References
Simmons GJ (1984) The prisoners’ problem and the subliminal channel. In: Chaum D (ed) Advances in cryptology, proceedings of CRYPTO ‘83. Plenum Press, New York, pp 51–67
Craver S (1997) On public-key steganography in the presence of an active warden. IBM technical report RC 20931
Bender W, Gruhl D, Morimoto N (1996) Techniques for data hiding. IBM Syst J 35:313–336
Katzenbeisser S, Petitcolas F (2000) Information hiding techniques for steganography and digital watermarking. Artech House, London
Armstrong T, Yetsko K (2004) Steganography, CS-6293 research paper, Instructor: Dr. Andy JuAn Wang
Liao K, Lian S, Guo Z, Wang J (2010) Efficient information hiding in H.264/AVC video coding. Telecommun Syst 49:261–269
Mohanty SP (2000) Watermarking of digital images. M.S. thesis, Indian Institute of Science, India
Wolak CM (2000) Digital watermarking. Preliminary proposal, Nova Southeastern University, USA
Nikolaidis N, Pitas I (1999) Digital image watermarking: an overview. In: IEEE international conference on multimedia computing and systems, pp 1–6
Cox IJ, Miller M (2002) The first 50 years of electronic watermarking. J Appl Signal Process 2002:126–132
Meerwald P, Uhl A (2001) Survey of wavelet-domain watermarking algorithms. In: Proceedings of the SPIE security and watermarking of multimedia contents III, San Jose, pp 505–516
Suhad H, Moussa A, Amjad H (2009) Digital image watermarking using localized biorthogonal wavelets. Eur J Sci Res 26:594–608
Paquet AH, Ward RK (2002) Wavelet-based digital watermarking for authentication. In: Proceedings of the IEEE Canadian conference on electrical and computer engineering, Winnipeg, pp 879–884
Feng J-B, Lin I-C, Tsai C-S, Chu Y-P (2006) Reversible watermarking: current and key issues. Int J Netw Secur 2:161–170
Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans Inf Forensics Secur 2:321–330
Terry M (2009) Medical identity theft and telemedicine security. Telemed e-Health 15:1–5
Langelaar GC, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data: a state-of-the-art overview. IEEE Signal Process Mag 17:20–46
Ye C, Ling H, Zou F, Lu Z (2013) A new fingerprint scheme using social network analysis for majority attack. Telecommun Syst 54:315–331
Cayre F, Fontaine C, Furon T (2005) Watermarking security: theory and practice. IEEE Trans Signal Process 53:3976–3987
Freire LP, Comesana P, Troncoso-Pastoriza JR, Perez-Gonzalez F (2006) Watermarking security: a survey. In: Shi YQ (ed) Transactions on data hiding and multimedia security. LNCS. Springer, Berlin, pp 41–72
Huang H-C, Fang W-C (2010) Techniques and application of intelligent multimedia data hiding. Telecommun Syst 44:241–251
Vallabha VH (2003) Multiresolution watermark based on wavelet transform for digital images. Cranes Software International Limited, Bangalore
Singh AK, Dave M, Mohan A (2013) A hybrid algorithm for image watermarking against signal processing attacks. In: Ramanna S, Lingras P, Sombattheera C, Krishna A (eds) The 7th multi-disciplinary international workshop on artificial intelligence, Krabi, Thailand. LNCS, vol 8271. Springer, Berlin, pp 235–246
Terzjia N, Repges M, Luck K, Geisselhardt W (2002) Digital image watermarking using discrete wavelet transform: performance comparison of error correction codes. International Association of Science and Technology for Development
Tian J (2002) Wavelet based reversible watermarking for authentication. In: Proceedings of SPIE security watermarking multimedia contents IV, San Jose, CA, pp 679–690
Giakoumaki A, Pavlopoulos S, Koutsouris D (2003) A medical image watermarking scheme based on wavelet transform. In: Proceedings of 25th annual international conference of IEEE-EMBS, pp 856–859
Lou D-C, Sung C-H (2003) Robust image watermarking based on hybrid transformation. In: IEEE International Carnahan conference on security technology, Taiwan, pp 394–399
Dandapat S, Xu J, Chutatape O, Krishnan SM (2004) Wavelet transform domain data embedding in a medical image. In: Proceedings 26th annual international conference of IEEE EMBS, San Francisco, pp 1541–1544
Xuan G, Yang C, Zheng Y, Shi Y Q, Ni Z (2004) Reversible data hiding based on wavelet spread spectrum. In: IEEE international workshop on multimedia signal processing, Siena
Reddy AA, Chatterji BN (2005) A new wavelet based logo-watermarking scheme. Pattern Recogn Lett 26:1019–1027
Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Secure and efficient health data management through multiple watermarking on medical images. Med Biol Eng Comput 44:619–631
Lin C-Y, Ching Y-T (2006) A robust image hiding method using wavelet technique. J Inf Sci Eng 22:163–174
Chang C-C, Tai W-L, Lin C-C (2006) A multipurpose wavelet-based image watermarking. In: Proceedings of international conference on innovative computing, information and control, pp 70–73
Ouhsain M, Abdallah EE, Hamza AB (2007) An image watermarking scheme based on wavelet and multiple-parameter fractional fourier transform. In: IEEE international conference on signal processing and communications, Dubai, United Arab Emirates, pp 1375–1378
Yusnita Y, Khalifa OO (2008) Imperceptibility and robustness analysis of dwt-based digital image watermarking. In: International conference on computer and communication engineering, Kuala Lumpur, Malaysia, pp 1325–1330
Navas KA, Thampy A, Sasikumar M (2008) ERP hiding in medical images for telemedicine. Proc World Acad Sci Technol 3:44–47
Jiansheng M, Sukang L, Xiaomei T (2009) A digital watermarking algorithm based on DCT and DWT. In: International symposium on web information systems and applications, Nanchang, China, pp 104–107
Hadi AS, Mushgil BM, Fadhil HM (2009) Watermarking based Fresnel transform, wavelet transform, and chaotic sequence. J Appl Sci Res 5:1463–1468
Mostafa SAK, El-sheimy N, Tolba AS, Abdelkader FM, Elhindy HM (2010) Wavelet packets-based blind watermarking for medical image management. Open Biomed Eng J 4:93–98
Yeh JP, Lu C-W, Lin H-J, Wu H-H (2010) Watermarking technique based on DWT associated with embedding rule. Int J Circuits Syst Signal Process 2:23–28
Cao C, Wang R, Huang M, Chen R (2010) A new watermarking method based on DWT and Fresnel diffraction transforms. In: IEEE international conference on information theory and information security, Beijing, pp 430–433
Lai C-C, Tsai C-C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59:3060–3063
Yang C-Y, Hu W-C (2010) Reversible data hiding in the spatial and frequency domains. Int J Image Process 3:373–382
Peng H, Wang J, Wang W (2010) Image watermarking method in multiwavelet domain based on support vector machines. J Syst Softw 83:1470–1477
Kumar B, Singh HV, Singh SP, Mohan A (2011) Secure spread-spectrum watermarking for telemedicine applications. J Inf Secur 2:91–98
Nakhaie AA, Shokouhi SB (2011) No reference medical image quality measurement based on spread spectrum and discrete wavelet transform using ROI processing. J Inf Secur Res 2:121–125
Abdallah HA, Hadhoud MM, Shaalan AA, El-samie FEA (2011) Blind wavelet-based image watermarking. Int J Signal Process Image Process Pattern Recogn 4:15–28
Dugad R, Ratakonda K, Ahuja N (1998) A new wavelet-based scheme for watermarking images. In: IEEE international conference on image processing, Chicago, IL, USA, pp 419–423
Ahire VK, Kshirsagar V (2011) Robust watermarking scheme based on discrete wavelet transform (DWT) and discrete cosine transform (DCT) for copyright protection of digital images. Int J Comput Sci Netw Secur 11:208–213
Bekkouche S, Chouarfia A (2011) A new watermarking approach—combined RW/CDMA in spatial and frequency domain. Int J Comput Sci Telecommun 2:1–8
Umaamaheshvari A, Thanushkodi K (2012) High performance and effective watermarking scheme for medical images. Eur J Sci Res 67:283–293
Soliman MM, Hassanien AE, Ghali NI, Onsi HM (2012) An adaptive watermarking approach for medical imaging using swarm intelligence. Int J Smart Home 6:37–50
Kannamma A, Pavithra K, SubhaRani S (2012) Double watermarking of DICOM medical images using wavelet decomposition technique. Eur J Sci Res 70:46–55
Pal K, Ghosh G, Bhattacharya M (2012) Biomedical image watermarking in wavelet domain for data integrity using bit majority algorithm and multiple copies of hidden information. Am J Biomed Eng 2:29–37
Bhatnagar G, Wu QMJ, Raman B (2012) Robust gray-scale logo watermarking in wavelet domain. Comput Electr Eng 38:1164–1176
Zhang Q, Sun Y, Yan Y, Liu H, Shang Q (2013) Research on algorithm of image reversible watermarking based on compressed sensing. J Inf Comput Sci 10:701–709
Lin W (2011) Reconstruction algorithms for compressive sensing and their applications to digital watermarking. Beijing Jiaotong University, Beijing
Selvy PT, Palanisamy V, Soundar E (2013) A novel biometrics triggered watermarking of images based on wavelet based contourlet transform. Int J Comput Appl Inf Technol 2:19–24
Sang J, Zhang B, Hong D, Xiang H, Xu H, Sang N (2013) An image watermarking technique based on cascaded iterative fourier transform. Int J Light Electron Opt 124:4522–4525
Liu S, Hennelly BM, Sheridan JT (2013) Digital image watermarking spread-space spread-spectrum technique based on double random phase encoding. Opt Commun 300:162–177
Vafaei M, Mahdavi-Nasab H, Pourghassem H (2013) A new robust blind watermarking method based on neural networks in wavelet transform domain. World Appl Sci J 22:1572–1580
Sridevi T, Fatima SS (2013) Watermarking algorithm using genetic algorithm and HVS. Int J Comput Appl 74:26–30
Carli M, Campisi P, Neri A (2006) Perceptual aspects in data hiding. Telecommun Syst 33:117–129
Bamerger RH, Smith MJT (1992) A filter bank for the directional decomposition of images: theory and design. IEEE Trans Signal Process 40:882–893
Yang S-H (2003) Filter evaluation for DWT-domain image watermarking. Electron Lett 39:1723–1725
Do MN, Vetterli M (2005) The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14:2091–2106
Jaylakshmi M, Merchant SN, Desai UB (2006) Blind watermarking in contourlet domain with improved detection. In: International conference on intelligent information hiding and multimedia signal processing, pp 449–452
Do MN, Vetterli M (2006) Contourlets: a directional multiresoluational image representation. In: International conference on image processing, pp 497–501
Sahraeian SME, Akhaee MA, Hejazi SA, Marvasti F (2010) Contourlet-based image watermarking using optimum detector in a noisy environment. IEEE Trans Image Process 19:967–980
Rahman SMM, Ahmad MO, Swamy MNS (2009) A new statistical detector for DWT-based additive image watermarking using the Gauss–Hermite expansion. IEEE Trans Image Process 18:1782–1796
Nanavati SP, Panigrahi PK (2005) Wavelets: applications to image compression-I. Resonance 10:52–61
Guo J-M, Liu Y-F (2010) Joint compression/watermarking scheme using majority-parity guidance and halftoning-based block truncation coding. IEEE Trans Image Process 19:2056–2069
Ridzon R, Levicky D (2011) Content protection in grayscale and color images based on robust digital watermarking. Telecommun Syst 52:163–1617
Zhang L, Zhou P-P (2010) Localized affine transform resistant watermarking in region-of-interest. Telecommun Syst 44:205–220
Zain J, Clarke M (2005) Security in telemedicine: issue in watermarking medical images. In: International conference: science of electronic, technologies of information and telecommunications
Memon NA, Gilani SAM (2008) NROI watermarking of medical images for content authentication. In: Proceedings of 12th IEEE international multitopic conference, Karachi, Pakistan, pp 106–110
Seo Y-S, Kim M-S, Park HJ, Jung H-Y, Chung H-Y, Hug Y, Lee J-D (2001) A secure watermarking for JPEG2000. Int Conf Image Process 2:530–533
Blake J, Latifi S (2011) Digital watermarking security. Def Sci J 61:408–414
Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6:1673–1687
Malvar HS, Florencio DAF (2003) Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans Signal Process 51:898–905
Perez-Freire L, Perez-Gonzalez F (2009) Spread-spectrum watermarking security. IEEE Trans Inf Forensics Secur 4:2–24
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Singh, A.K., Dave, M. & Mohan, A. Wavelet Based Image Watermarking: Futuristic Concepts in Information Security. Proc. Natl. Acad. Sci., India, Sect. A Phys. Sci. 84, 345–359 (2014). https://doi.org/10.1007/s40010-014-0140-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40010-014-0140-x