2014
DOI: 10.14257/ijsip.2014.7.6.10
|View full text |Cite
|
Sign up to set email alerts
|

A Survey: Digital Image Watermarking Techniques

Abstract: Multimedia security is extremely significant concern for the internet technology because of the ease of the duplication, distribution and manipulation of the multimedia data. The digital watermarking is a field of information hiding which hide the crucial information in the original data for protection illegal duplication and distribution of multimedia data. This paper presents a survey on the existing digital image watermarking techniques. The results of various digital image watermarking techniques have been… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0
2

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(21 citation statements)
references
References 13 publications
0
19
0
2
Order By: Relevance
“…LL2, LH2, HL2 and HH2 and LL2 can be further decomposed into LL3, LH3, HL3 and HH3 until the signal is fully decomposed (Kashyap and Sinha, 2012;Kaur and Jindal, 2013;Ganic and Eskicioglu, 2004). The coefficients obtained by applying DWT to host image (H) are (Parashar and Singh, 2014):…”
Section: Discrete Wavelet Transformmentioning
confidence: 99%
See 1 more Smart Citation
“…LL2, LH2, HL2 and HH2 and LL2 can be further decomposed into LL3, LH3, HL3 and HH3 until the signal is fully decomposed (Kashyap and Sinha, 2012;Kaur and Jindal, 2013;Ganic and Eskicioglu, 2004). The coefficients obtained by applying DWT to host image (H) are (Parashar and Singh, 2014):…”
Section: Discrete Wavelet Transformmentioning
confidence: 99%
“…In transform domain watermarking such as discrete cosine transform (DCT), discrete wavelet transform (DWT), discrete Fourier transform (DFT) and singular value decomposition (SVD) (Parashar and Singh, 2014;Ahmidi and Safabakhsh, 2004;Ahmed et al, 2009), cover image is converted into transform domain and then watermark is embedded into transformed coefficients. The important characteristics of the watermarks are robustness, imperceptibility, capacity, computational cost and security (Singh and Chadha, 2013).…”
Section: Introductionmentioning
confidence: 99%
“…This method is easy to implement but it is not very robust against attack which means the watermark may be destroyed. The watermarking is done by choosing a subset of image pixels and substituting the LSB of each of the chosen pixels with watermark bits [10].…”
Section: Watermarking Techniquesmentioning
confidence: 99%
“…Preeti Parashar [13] et al, now a days mostly data travels over the internet for the purpose of communication. Thus the security of digital data is the main concern.…”
Section: Bhattacharjee T [6] Et Alin This Author Defines Atechniquementioning
confidence: 99%