Skip to content
2000
Volume 1, Issue 1
  • ISSN: 2666-4844
  • E-ISSN: 2666-4852

Abstract

There has been remarkable growth in the digital domain. This has led to the production of a huge amount of digital data in the form of text messages, documents, audio/speech signals, digital images, videos, In forensics, digital information ( images of crime scenes, ) is very important to examine cases and collect the proof regarding the incident. This further leads to judge the victims and culprits by the court for appropriate actions. So, even a slight change (intentional/unintentional) may lead to the wrong judgement. Several digital signal processing tools are easily available to process this type of digital data, which means data may get disrupted, altered, or deform in such a way that the authenticity gets compromised. In such cases, it can be difficult to recognize the source information as well as to check the originality/intactness of the digital data. In the recent past, several techniques have come into existence to protect digital data against security issues. Steganography, cryptography, and watermarking are examples of security techniques, which have been widely used for data security and forensic applications for a long time. Specifically, digital watermarking techniques provide many useful features to help users regarding data security and authentication without affecting other data characteristics. This work is an attempt to provide a review of recent digital image watermarking approaches for forensic applications.

Loading

Article metrics loading...

/content/journals/cfs/10.2174/2666484401666230202121526
2023-01-01
2024-11-22
Loading full text...

Full text loading...

References

  1. SchmidtE. CohenJ. The new digital age: Reshaping the future of people, nations and business.Hachette UK Limited2013
    [Google Scholar]
  2. WójcikO.P. BrownsteinJ.S. ChunaraR. JohanssonM.A. Public health for the people: participatory infectious disease surveillance in the digital age.Emerg. Themes Epidemiol.2014111710.1186/1742‑7622‑11‑724991229
    [Google Scholar]
  3. R D. R D. Light weight CNN based robust image watermarking scheme for security.J Info Technol Digital World20213211813210.36548/jitdw.2021.2.005
    [Google Scholar]
  4. SharmaR. DavuluriK. Security Analysis for Machine Learning and Image Processing Related Information Systems.InImage Processing and Capsule Networks: ICIPCN 2020.Springer International Publishing202113514710.1007/978‑3‑030‑51859‑2_13
    [Google Scholar]
  5. FianyiI. Curbing cyber-crime and Enhancing e-commerce security with digital forensics. arXiv preprint arXiv:1610.08369.2016Jan1810.48550/arXiv.1610.08369
    [Google Scholar]
  6. RaghavanS. Digital forensic research: current state of the art.CSI Trans ICT2013119111410.1007/s40012‑012‑0008‑7
    [Google Scholar]
  7. ChangC.C. LinP.Y. Adaptive watermark mechanism for rightful ownership protection.J. Syst. Softw.20088171118112910.1016/j.jss.2007.07.036
    [Google Scholar]
  8. AnandA. SinghA.K. Watermarking techniques for medical data authentication: a survey.Multimedia Tools Appl.20218020301653019710.1007/s11042‑020‑08801‑0
    [Google Scholar]
  9. FridrichJ. Image watermarking for tamper detection.InProceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269)1998 Oct 7(Vol. 2pp. 404408)IEEE.10.1109/ICIP.1998.723401
    [Google Scholar]
  10. SinhalR SharmaTK AnsariIA BajajV Blind image watermarking with efficient dual restoration feature.InAdvanced Security Solutions for Multimedia.2021Sep 1. IOP Publishing.10.1088/978‑0‑7503‑3735‑9ch1
    [Google Scholar]
  11. MasromM. RahimlyA. Overview of data security issues in hospital information systems.Pac Asia J Assoc Info Syst201574516610.17705/1pais.07404
    [Google Scholar]
  12. KahnD. The history of steganography. InInformation Hiding: First International Workshop Cambridge, UK, May 30-June 1, 1996Proceedings2005 Jun 9(pp. 15) Berlin, Heidelberg: Springer Berlin Heidelberg.10.1007/3‑540‑61996‑8_27
    [Google Scholar]
  13. MenezesA.J. Van OorschotP.C. VanstoneS.A. Handbook of applied cryptography.CRC Press2018
    [Google Scholar]
  14. CoxI.J. MillerM.L. BloomJ.A. HonsingerC. Digital watermarking.San Francisco: Morgan Kaufmann200253
    [Google Scholar]
  15. HaririM. KarimiR. NosratiM. An introduction to steganography methods.World Appl. Program.201113191195
    [Google Scholar]
  16. CheddadA. CondellJ. CurranK. Mc KevittP. Digital image steganography: Survey and analysis of current methods.Signal Process201090372775210.1016/j.sigpro.2009.08.010
    [Google Scholar]
  17. ProvosN. HoneymanP. Hide and seek: an introduction to steganography.IEEE Secur. Priv.200313324410.1109/MSECP.2003.1203220
    [Google Scholar]
  18. SalleeP. Model-based steganography.InIWDW2003Oct20(Vol. 2939pp. 154167)10.1007/978‑3‑540‑24624‑4_12
    [Google Scholar]
  19. KesslerG. C. An overview of cryptography. In:Handbook on Local Area Networks2003
    [Google Scholar]
  20. DolevD. DworkC. NaorM. Nonmalleable cryptography.SIAM Rev.200345472778410.1137/S0036144503429856
    [Google Scholar]
  21. DiffieW. HellmanM.E. New directions in cryptography. In:Secure communications and asymmetric cryptosystems.Routledge2019143180
    [Google Scholar]
  22. KatzenbeisserS. PetitcolasF.A.P. Digital watermarking.LondonArtech House2000
    [Google Scholar]
  23. PodilchukC.I. DelpE.J. Digital watermarking: algorithms and applications.IEEE Signal Process. Mag.2001184334610.1109/79.939835
    [Google Scholar]
  24. MohantyS.P. 1999. Digital watermarking: A tutorial review.1999Available from: http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey 1999Mohanty.pdf
  25. CoxI MillerM BloomJ FridrichJ KalkerT Digital watermarking and steganography.Morgan Kaufmann;2007Nov23
    [Google Scholar]
  26. DesaiH.V. Steganography, cryptography, watermarking: A comparative study.J Global Res Comput Sci20123123335
    [Google Scholar]
  27. RazzaqM.A. ShaikhR.A. BaigM.A. MemonA.A. Digital image security: Fusion of encryption, steganography and watermarking.Int. J. Adv. Comput. Sci. Appl.201785
    [Google Scholar]
  28. AliZ. ImranM. McCleanS. KhanN. ShoaibM. Protection of records and data authentication based on secret shares and watermarking.Future Gener. Comput. Syst.20199833134110.1016/j.future.2019.01.050
    [Google Scholar]
  29. SinhalR. SharmaS. AnsariI.A. BajajV. Multipurpose medical image watermarking for effective security solutions.Multimedia Tools Appl.20228110140451406310.1007/s11042‑022‑12082‑035233177
    [Google Scholar]
  30. BerghelH. O’GormanL. Protecting ownership rights through digital watermarking.Computer199629710110310.1109/2.511977
    [Google Scholar]
  31. HalderR. PalS. CortesiA. Watermarking techniques for relational databases: Survey, classification and comparison.J. Univers. Comput. Sci.2010162131643190
    [Google Scholar]
  32. LeeS.J. JungS.H. A survey of watermarking techniques applied to multimedia. InISIE 2001.2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No. 01TH8570)2001 Jun 12(Vol. 1pp. 272277) IEEE10.1109/ISIE.2001.931796
    [Google Scholar]
  33. SongC. SudirmanS. MerabtiM. Recent advances and classification of watermarking techniques in digital images.Proceedings of Post Graduate Network Symposium200916
    [Google Scholar]
  34. BarnettR. Digital watermarking: applications, techniques and challenges.Electron. Commun. Eng. J.199911417318310.1049/ecej:19990401
    [Google Scholar]
  35. RashidA. Digital watermarking applications and techniques: A brief review.Int J Comput Appl Technol Res20165314715010.7753/IJCATR0503.1006
    [Google Scholar]
  36. SharmaR.K. DeckerS. Practical challenges for digital watermarking applications.EURASIP J. Adv. Signal Process.20022002217
    [Google Scholar]
  37. BegumM. UddinM.S. Digital image watermarking techniques: A review.Information (Basel)202011211010.3390/info11020110
    [Google Scholar]
  38. SetiadiD.R.I.M. PSNR vs. SSIM: Imperceptibility quality assessment for image steganography.Multimed Tools Appl.2021808423844410.1007/s11042‑020‑10035‑z
    [Google Scholar]
  39. SinhalR. AnsariI.A. Multipurpose image watermarking: Ownership check, tamper detection and self-recovery.Circuits Syst. Signal Process.20224163199322110.1007/s00034‑021‑01926‑z
    [Google Scholar]
  40. SinhalR. AnsariI.A. Tunable Q-factor wavelet transform-based robust image watermarking scheme using logistic mapping and antlion optimization.Circuits Syst. Signal Process.202241116370641010.1007/s00034‑022‑02090‑8
    [Google Scholar]
  41. ErnawanF KabirMN A robust image watermarking technique with an optimal DCT-psychovisual threshold.IEEE Access20186204642048010.1109/ACCESS.2018.2819424
    [Google Scholar]
  42. LiuD. SuQ. YuanZ. ZhangX. A blind color digital image watermarking method based on image correction and eigenvalue decomposition.Signal Process. Image Commun.20219511629210.1016/j.image.2021.116292
    [Google Scholar]
  43. PrajwalasimhaS.N. Chethan SuputhraS. MohanC.S. Performance analysis of DCT and successive division based digital image watermarking scheme.Ind J Electr Eng Comput Sci201915275075710.11591/ijeecs.v15.i2.pp750‑757
    [Google Scholar]
  44. FerreiraW.D. FerreiraC.B.R. da Cruz JúniorG. SoaresF. A review of digital image forensics.Comput. Electr. Eng.20208510668510.1016/j.compeleceng.2020.106685
    [Google Scholar]
  45. KoleyS. A feature adaptive image watermarking framework based on phase congruency and symmetric key cryptography.J King Saud Univ - Comput Inf. Sci.2019343636645
    [Google Scholar]
  46. SinhalR. JainD.K. AnsariI.A. Machine learning based blind color image watermarking scheme for copyright protection.Pattern Recognit. Lett.202114517117710.1016/j.patrec.2021.02.011
    [Google Scholar]
  47. HosnyKM DarwishMM LiK SalahA Parallel multi-core CPU and GPU for fast and robust medical image watermarking.IEEE Access20186772127722510.1109/ACCESS.2018.2879919
    [Google Scholar]
  48. VoloshynovskiyS. PereiraS. PunT. EggersJ.J. SuJ.K. Attacks on digital watermarks: classification, estimation based attacks, and benchmarks.IEEE Commun. Mag.200139811812610.1109/35.940053
    [Google Scholar]
  49. NyeemH. BolesW. BoydC. Digital image watermarking: Its formal model, fundamental properties and possible attacks.EURASIP J. Adv. Signal Process.201420141122
    [Google Scholar]
  50. AgarwalN. SinghA.K. SinghP.K. Survey of robust and imperceptible watermarking.Multimedia Tools Appl.20197878603863310.1007/s11042‑018‑7128‑5
    [Google Scholar]
  51. NikolaidisN. PitasI. Robust image watermarking in the spatial domain.Signal Process199866338540310.1016/S0165‑1684(98)00017‑6
    [Google Scholar]
  52. BarniM. BartoliniF. CappelliniV. PivaA. A DCT-domain system for robust image watermarking.Signal Process199866335737210.1016/S0165‑1684(98)00015‑2
    [Google Scholar]
  53. LaiC.C. An improved SVD-based watermarking scheme using human visual characteristics.Opt. Commun.2011284493894410.1016/j.optcom.2010.10.047
    [Google Scholar]
  54. MehtaR. RajpalN. VishwakarmaV.P. LWT- QR decomposition based robust and efficient image watermarking scheme using Lagrangian SVR.Multimedia Tools Appl.20167574129415010.1007/s11042‑015‑3084‑5
    [Google Scholar]
  55. MishraA. RajpalA. BalaR. Bi-directional extreme learning machine for semi-blind watermarking of compressed images.J Info Secur Appl201838718410.1016/j.jisa.2017.11.008
    [Google Scholar]
  56. SrivastavaR. KumarB. SinghA.K. MohanA. Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach.Multimedia Tools Appl.20187713164471645910.1007/s11042‑017‑5214‑8
    [Google Scholar]
  57. MoosazadehM. EkbatanifardG. A new DCT-based robust image watermarking method using teaching-learning-Based optimization.J Info Secur Appl201947283810.1016/j.jisa.2019.04.001
    [Google Scholar]
  58. ErnawanF. KabirM.N. A block-based RDWT-SVD image watermarking method using human visual system characteristics.Vis. Comput.2020361193710.1007/s00371‑018‑1567‑x
    [Google Scholar]
  59. PourhadiA. Mahdavi-NasabH. A robust digital image watermarking scheme based on bat algorithm optimization and SURF detector in SWT domain.Multimedia Tools Appl.20207929-30216532167710.1007/s11042‑020‑08960‑0
    [Google Scholar]
  60. SisaudiaV. VishwakarmaV.P. Copyright protection using KELMPSO based multi-spectral image watermarking in DCT domain with local texture information based selection.Multimedia Tools Appl.2020122
    [Google Scholar]
  61. NiuP. WangL. ShenX. ZhangS. WangX. A novel robust image watermarking in quaternion wavelet domain based on superpixel segmentation.Multidimens. Syst. Signal Process.15093141509153010.1007/s11045‑020‑00718‑z
    [Google Scholar]
  62. WangJ. LiuG. DaiY. SunJ. WangZ. LianS. Locally optimum detection for Barni’s multiplicative watermarking in DWT domain.Signal Process200888111713010.1016/j.sigpro.2007.07.012
    [Google Scholar]
  63. PengH. WangJ. WangW. Image watermarking method in multiwavelet domain based on support vector machines.J. Syst. Softw.20108381470147710.1016/j.jss.2010.03.006
    [Google Scholar]
  64. AliM. AhnC.W. SiarryP. Differential evolution algorithm for the selection of optimal scaling factors in image watermarking.Eng. Appl. Artif. Intell.201431152610.1016/j.engappai.2013.07.009
    [Google Scholar]
  65. AnsariI.A. PantM. AhnC.W. ABC optimized secured image watermarking scheme to find out the rightful ownership.Optik (Stuttg.)2016127145711572110.1016/j.ijleo.2016.03.070
    [Google Scholar]
  66. GaoY. WangJ. ShiY.Q. Dynamic multi-watermarking and detecting in DWT domain.J. Real-Time Image Process.201916356557610.1007/s11554‑018‑0812‑x
    [Google Scholar]
  67. ZhuX. HoA.T.S. MarzilianoP. A new semi-fragile image watermarking with robust tampering restoration using irregular sampling.Signal Process. Image Commun.200722551552810.1016/j.image.2007.03.004
    [Google Scholar]
  68. ZhangX. WangS. Fragile watermarking with error-free restoration capability.IEEE Trans. Multimed.20081081490149910.1109/TMM.2008.2007334
    [Google Scholar]
  69. ZhangX. WangS. QianZ. FengG. Reference sharing mechanism for watermark self-embedding.IEEE Trans. Image Process.201120248549510.1109/TIP.2010.206698120716503
    [Google Scholar]
  70. ZhangX. QianZ. RenY. FengG. Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction.IEEE Trans. Inf. Forensics Secur2011641223123210.1109/TIFS.2011.2159208
    [Google Scholar]
  71. HeH. ChenF. TaiH.M. KalkerT. ZhangJ. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme.IEEE Trans. Inf. Forensics Secur20127118519610.1109/TIFS.2011.2162950
    [Google Scholar]
  72. QinC. ChangC.C. ChenP.Y. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism.Signal Process20129241137115010.1016/j.sigpro.2011.11.013
    [Google Scholar]
  73. ChangJ.D. ChenB.H. TsaiC.S. LBP-based fragile watermarking scheme for image tamper detection and recovery.In2013 international symposium on next-generation electronics2013Feb 25 (pp. 173-176). IEEE.10.1109/ISNE.2013.6512330
    [Google Scholar]
  74. DasS. KunduM.K. Effective management of medical information through ROI-lossless fragile image watermarking technique.Comput. Methods Programs Biomed.2013111366267510.1016/j.cmpb.2013.05.02723816251
    [Google Scholar]
  75. EswaraiahR. Sreenivasa ReddyE. Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI.Int. J. Telemed. Appl.2014201411010.1155/2014/98464625328515
    [Google Scholar]
  76. AnsariI.A. PantM. AhnC.W. SVD based fragile watermarking scheme for tamper localization and self-recovery.Int. J. Mach. Learn. Cybern.2016761225123910.1007/s13042‑015‑0455‑1
    [Google Scholar]
  77. WangC. ZhangH. ZhouX. A self-recovery fragile image watermarking with variable watermark capacity.Appl. Sci. (Basel)20188454810.3390/app8040548
    [Google Scholar]
  78. DaneshmandpourN. DanyaliH. HelfroushM.S. Image tamper detection and multi-scale self-recovery using reference embedding with multi-rate data protection.China Commun.2019161115416610.23919/JCC.2019.11.013
    [Google Scholar]
  79. LeeC.F. ShenJ.J. ChenZ.R. AgrawalS. Self-embedding authentication watermarking with effective tampered location detection and high-quality image recovery.Sensors (Basel)20191910226710.3390/s1910226731100886
    [Google Scholar]
  80. Molina-GarciaJ. Garcia-SalgadoB.P. PonomaryovV. Reyes-ReyesR. SadovnychiyS. Cruz-RamosC. An effective fragile watermarking scheme for color image tampering detection and self-recovery.Signal Process. Image Commun.20208111572510.1016/j.image.2019.115725
    [Google Scholar]
  81. BadshahG. LiewS.C. ZainJ.M. AliM. Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) loss-less compression technique.J. Digit. Imaging201629221622510.1007/s10278‑015‑9822‑426429361
    [Google Scholar]
  82. Chun-Shien LuC.S. LiaoH.Y.M. Multipurpose watermarking for image authentication and protection.IEEE Trans. Image Process.200110101579159210.1109/83.95154218255500
    [Google Scholar]
  83. LiuX.L. LinC.C. YuanS.M. Blind dual watermarking for color images’ authentication and copyright protection.IEEE Trans. Circ. Syst. Video Tech.20182851047105510.1109/TCSVT.2016.2633878
    [Google Scholar]
  84. SinghP. AgarwalS. A self recoverable dual watermarking scheme for copyright protection and integrity verification.Multimedia Tools Appl.20177656389642810.1007/s11042‑015‑3198‑9
    [Google Scholar]
  85. AnsariI.A. PantM. Multipurpose image watermarking in the domain of DWT based on SVD and ABC.Pattern Recognit. Lett.20179422823610.1016/j.patrec.2016.12.010
    [Google Scholar]
  86. Bolourian HaghighiB. TaheriniaA.H. HaratiA. RouhaniM. WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II.Appl. Soft Comput.202110110702910.1016/j.asoc.2020.107029
    [Google Scholar]
  87. AnsariI.A. PantM. AhnC.W. JeongJ. PSO optimized multipurpose image watermarking using SVD and chaotic sequence. In:Bioinspired computing-theories and applications.Berlin, HeidelbergSpringer201511710.1007/978‑3‑662‑49014‑3_1
    [Google Scholar]
  88. Zhe-MingLu Dian-GuoXu Sheng-HeSun Multipurpose image watermarking algorithm based on multistage vector quantization.IEEE Trans. Image Process.200514682283110.1109/TIP.2005.84732415971780
    [Google Scholar]
  89. ZhangC. ChengL.L. QiuZ. ChengL.M. Multipurpose watermarking based on multiscale curvelet transform.IEEE Trans. Inf. Forensics Security20083461161910.1109/TIFS.2008.2004288
    [Google Scholar]
  90. LeiB. ZhaoX. LeiH. Multipurpose watermarking scheme via intelligent method and chaotic map.Multimedia Tools Appl.20197819270852710710.1007/s11042‑017‑4743‑5
    [Google Scholar]
  91. AlshanbariH.S. Medical image watermarking for ownership & tamper detection.Multimedia Tools Appl.20218011165491656410.1007/s11042‑020‑08814‑9
    [Google Scholar]
  92. PengY. LanH. YueM. XueY. Multipurpose watermarking for vector map protection and authentication.Multimedia Tools Appl.20187767239725910.1007/s11042‑017‑4631‑z
    [Google Scholar]
/content/journals/cfs/10.2174/2666484401666230202121526
Loading
/content/journals/cfs/10.2174/2666484401666230202121526
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test