CFP last date
20 January 2025
Reseach Article

An Extensive Review on Digital Image Watermarking

by Prashant Yadav, Rajesh Kumar Rai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 19
Year of Publication: 2015
Authors: Prashant Yadav, Rajesh Kumar Rai
10.5120/20662-3375

Prashant Yadav, Rajesh Kumar Rai . An Extensive Review on Digital Image Watermarking. International Journal of Computer Applications. 117, 19 ( May 2015), 18-21. DOI=10.5120/20662-3375

@article{ 10.5120/20662-3375,
author = { Prashant Yadav, Rajesh Kumar Rai },
title = { An Extensive Review on Digital Image Watermarking },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 19 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 18-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number19/20662-3375/ },
doi = { 10.5120/20662-3375 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:49.307433+05:30
%A Prashant Yadav
%A Rajesh Kumar Rai
%T An Extensive Review on Digital Image Watermarking
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 19
%P 18-21
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the past decade, application of digital multimedia contents has grown rapidly because of their advantages over analog contents. Ease of transferring and broadcasting over networks, higher quality and durability, online/offline easy editing, copying, and simplicity of archiving or storing are just a few advantages of digital multimedia over analog contents. Ironically, all the above advantageous properties have raised the main concerns in copyright management and privacy protection of such contents. Encryption methods such as conventional connection-based security systems cannot carry out the required proper protection level as it is impossible to monitor how a legitimate user handles the content after decryption, which makes it possible for hackers and adversaries to illegally redistribute or manipulate the content.

References
  1. Lingling An , Xinbo Gao,Xuelong Li; Dacheng Tao; Cheng Deng; Jie Li 2012. Robust Reversible Watermarking via Clustering and Enhanced Pixel-Wise Masking.
  2. Kavipriya, R. Maheswari, S. 2014 Statistical quantity based reversible watermarking for copyright protection of digital images.
  3. Rongrong Ni, Cheng, H. D. Yao Zhao, Yu Hou. 2013. Error-free authentication watermarking based on prediction-error-expansion reversible methodology.
  4. Hyobin Lee, Seongwan Kim, Jaeho Lee, Sooyeon Kim Sangyoun Lee . 2008. Reversible watermarking with localization for biometric images,Control, Automation, Robotics and Vision.
  5. Zhiguo Chang; Jian Xu, Authorsidong Kou,2008. Reversible Watermarking Schemes Using Spatial Quad-Based Difference Expansion.
  6. Haifeng Zhu, Chunhui Zhao, Chunming Tang 2006. A Fragile Watermarking Scheme For Tamper Detection and Recovery of Image.
  7. Bausys, R. , Kriukovas, A. 2006. Reversible watermarking scheme for image authentication in frequency domain
  8. Puhan, N. B. Ho, A. T. S. ,2005. Binary document image watermarking for secure authentication using perceptual modeling.
  9. L. An, X. Gao, C. Deng, and F. Ji,2010. Robust lossless data hiding:
  10. C. De Vleeschouwer, J. Delaigle, and B. Macq, 2001. Circular interpretation of histogram for reversible watermarking.
  11. C. De Vleeschouwer, J. Delaigle, and B. Macq, 2003. Circular interpretation of bijective transformations in lossless watermarking for media asset management.
  12. Z. Ni, Y. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin, 2008. Robust lossless image data hiding designed for semi-fragile image authentication
  13. D. Zou, Y. Shi, Z. Ni, and W. Su, 2006. A semi-fragile lossless digital watermarking scheme based on integer wavelet transform.
  14. X. Gao, L. An, Y. Yuan, D. Tao, and X. Li,2011. Lossless data embedding using generalized statistical quantity histogram.
  15. N. Dalal and B. Triggs,2005. Histograms of oriented gradients for human detection.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Watermarking k-means clustering and Masking.