Skip to main content

2024 | OriginalPaper | Buchkapitel

Digital Watermark Techniques and Its Embedded and Extraction Process

verfasst von : Satya Narayan Das, Mrutyunjaya Panda

Erschienen in: Intelligent Systems

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The development of the digital communication system is increasing rapidly and all the manual data management process is massively converted to the digital processing system to make faster processing and reduce the valuable time of human users and increase productivity. Now the input and output system of the device is converted to a higher-level interface medium so that the device can communicate with the user and environment through audiovisual components and communicate like a human. Also in the present scenario devices are implemented by human society to deal with very secure and sensitive information like banking, the military, the research environment, the medical sector, etc. Hence there is a chance of misutilization of information through the device. Many Security using mathematical techniques like cryptography, digital signature, etc. are used to make secure information from the unauthentic person, but to protect the copywriting of the digital information watermark technology is used. Through the watermark, we can add the identification of the owner hence the other person can not claim or tamper with the information for its misutilization. In this proposed work we reviewed different techniques to create a watermark with the algorithm associated with it which helps the researcher extend the watermark technique in a better way.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chaughule SS, Megherbi DB (2019) A robust, non-blind high capacity & secure digital watermarking scheme for image secret information, authentication, and tampering localization and recovery via the discrete wavelet transform. In: 2019 IEEE international symposium on technologies for homeland security (HST), pp 1–5. IEEE Chaughule SS, Megherbi DB (2019) A robust, non-blind high capacity & secure digital watermarking scheme for image secret information, authentication, and tampering localization and recovery via the discrete wavelet transform. In: 2019 IEEE international symposium on technologies for homeland security (HST), pp 1–5. IEEE
2.
Zurück zum Zitat Singh P, Chadha RS (2013) A survey of digital watermarking techniques, applications, and attacks. Int J Eng Innov Technol (IJEIT) 2(9):165–175 Singh P, Chadha RS (2013) A survey of digital watermarking techniques, applications, and attacks. Int J Eng Innov Technol (IJEIT) 2(9):165–175
3.
Zurück zum Zitat Lee CF, Shen JJ, Chen ZR (2018) A survey of watermarking-based authentication for the digital image. In: 2018 3rd international conference on computer and communication systems (ICCCS), pp 207–211. IEEE Lee CF, Shen JJ, Chen ZR (2018) A survey of watermarking-based authentication for the digital image. In: 2018 3rd international conference on computer and communication systems (ICCCS), pp 207–211. IEEE
4.
Zurück zum Zitat Ernawan F, Ariatmanto D, Firdaus A (2021) An improved image watermarking by modifying selected DWT-DCT coefficients. IEEE Access 9:45474–45485CrossRef Ernawan F, Ariatmanto D, Firdaus A (2021) An improved image watermarking by modifying selected DWT-DCT coefficients. IEEE Access 9:45474–45485CrossRef
5.
Zurück zum Zitat Yadav AS, Kumar S (2018) Comparative analysis of digital image watermarking based on DCT, DWT, and SVD with image scrambling technique for information security. In: 2018 international conference on computational and characterization techniques in engineering & sciences (CCTES), pp 89–93. IEEE Yadav AS, Kumar S (2018) Comparative analysis of digital image watermarking based on DCT, DWT, and SVD with image scrambling technique for information security. In: 2018 international conference on computational and characterization techniques in engineering & sciences (CCTES), pp 89–93. IEEE
6.
Zurück zum Zitat Nerurkar PP, Phadke AC (2018) Digital image watermarking using firefly algorithm. In: 2018 fourth international conference on computing communication control and automation (ICCUBEA), pp 1–5. IEEE Nerurkar PP, Phadke AC (2018) Digital image watermarking using firefly algorithm. In: 2018 fourth international conference on computing communication control and automation (ICCUBEA), pp 1–5. IEEE
7.
Zurück zum Zitat Evsutin OO, Melman AS, Meshcheryakov RV (2020) Digital steganography and watermarking for digital images: a review of current research directions. IEEE Access Evsutin OO, Melman AS, Meshcheryakov RV (2020) Digital steganography and watermarking for digital images: a review of current research directions. IEEE Access
8.
Zurück zum Zitat Yuan G, Hao Q (2020) Digital watermarking secure scheme for remote sensing image protection. China Commun 17(4):88–98CrossRef Yuan G, Hao Q (2020) Digital watermarking secure scheme for remote sensing image protection. China Commun 17(4):88–98CrossRef
9.
Zurück zum Zitat Sharma S, Singh AK, Kumar P, Pradesh-India H (2016) digital image watermarking using machine learning techniques: a technical review. GRENZE Int J Comput Theory Eng 2(3):1–6 Sharma S, Singh AK, Kumar P, Pradesh-India H (2016) digital image watermarking using machine learning techniques: a technical review. GRENZE Int J Comput Theory Eng 2(3):1–6
10.
Zurück zum Zitat Abdulla NB, Navas KA (2020) High-security watermarking techniques for digital rights management: a review. In: 2020 international conference on communication and signal processing (ICCSP), pp 162–166. IEEE Abdulla NB, Navas KA (2020) High-security watermarking techniques for digital rights management: a review. In: 2020 international conference on communication and signal processing (ICCSP), pp 162–166. IEEE
11.
Zurück zum Zitat Zainol Z, Teh JS, Alawida M, Alabdulatif A (2021) Hybrid SVD-based image watermarking schemes: a review. IEEE Access 9:32931–32968CrossRef Zainol Z, Teh JS, Alawida M, Alabdulatif A (2021) Hybrid SVD-based image watermarking schemes: a review. IEEE Access 9:32931–32968CrossRef
12.
Zurück zum Zitat Pal P, Singh HV, Verma SK (2018) Study on watermarking techniques in digital images. In: 2018 2nd international conference on trends in electronics and informatics (ICOEI), pp 372–376. IEEE Pal P, Singh HV, Verma SK (2018) Study on watermarking techniques in digital images. In: 2018 2nd international conference on trends in electronics and informatics (ICOEI), pp 372–376. IEEE
13.
Zurück zum Zitat Singh AK, Dave M, Mohan A (2014) Wavelet-based image watermarking: futuristic concepts in information security. Proc Natl Acad Sci India Sect A Phy Sci 84(3):345–359 Singh AK, Dave M, Mohan A (2014) Wavelet-based image watermarking: futuristic concepts in information security. Proc Natl Acad Sci India Sect A Phy Sci 84(3):345–359
14.
Zurück zum Zitat Jagadeesh B, Rajesh Kumar P, Chenna Reddy P (2013) Robust digital image watermarking scheme in discrete wavelet transform domain using support vector machine. Int J Comput Appl 73(14) Jagadeesh B, Rajesh Kumar P, Chenna Reddy P (2013) Robust digital image watermarking scheme in discrete wavelet transform domain using support vector machine. Int J Comput Appl 73(14)
15.
Zurück zum Zitat Yahya S, Hussain HS, Ali FHM (2015) DCT Domain Stega SVMshifted LSB Model for highly Imperceptible and robust cover image. In: International conference on computing and informatics, vol 43 Yahya S, Hussain HS, Ali FHM (2015) DCT Domain Stega SVMshifted LSB Model for highly Imperceptible and robust cover image. In: International conference on computing and informatics, vol 43
16.
Zurück zum Zitat Mohindru P, Gill MS, Pooja (2014) A new image fusion algorithm based on wavelet transform and adaptive neuro-fuzzy logic approach. Int J Adv Res Electr Electron Instrum Eng 3(8) Mohindru P, Gill MS, Pooja (2014) A new image fusion algorithm based on wavelet transform and adaptive neuro-fuzzy logic approach. Int J Adv Res Electr Electron Instrum Eng 3(8)
Metadaten
Titel
Digital Watermark Techniques and Its Embedded and Extraction Process
verfasst von
Satya Narayan Das
Mrutyunjaya Panda
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-3932-9_47

Premium Partner