Survey on Multipurpose Digital Image Watermarking

被引:0
|
作者
Zhao L. [1 ]
Gui X. [1 ]
Shao Y. [1 ]
Dai H. [1 ]
机构
[1] 1) (Faculty of Electronic and Information Engineering, Xi'an Jiaotong University, Xi’an 710049) 2) (Shaanxi Province Key Laboratory of Computer Network, Xi’an 710049)
关键词
content authentication; copyright protection; digital image watermarking; multipurpose watermark; tampered recovery;
D O I
10.3724/SP.J.1089.2024.20078
中图分类号
学科分类号
摘要
Multipurpose image watermarking aims to provide two or more image protection functionalities by embedding various types of watermarks into the same image, including capabilities of copyright protection, content authentication, and tampered recovery. But it still faces challenges in terms of performance and application scenarios nowadays. To promote the study of multipurpose image watermarking, this paper reviews digital image watermarking first, covering its system characteristics, classifications, key technologies, achievable functions, and application scenarios. Furthermore, multipurpose image watermarking methods developed in the past decade are compared and analyzed in terms of fusion-watermark embedding, zero-watermark embedding, serial-watermark embedding, and parallel-watermark embedding. Finally, the future research prospects and development trends are discussed. It is important to note that embedding multiple watermarks results in performance losses in most cases, and further improvements are needed to enhance its effectiveness in real-world application scenarios. Leveraging artificial intelligence techniques in image multipurpose watermarking holds the promising potential to enhance performance. © 2024 Institute of Computing Technology. All rights reserved.
引用
下载
收藏
页码:195 / 222
页数:27
相关论文
共 169 条
  • [1] Wan W B, Wang J, Zhang Y M, Et al., A comprehensive survey on robust image watermarking, Neurocomputing, 488, pp. 226-247, (2022)
  • [2] Zhang Yi, Luo Xiangyang, Wang Jinwei, Et al., Research progress on digital image robust steganography, Journal of Image and Graphics, 27, 1, pp. 3-26, (2022)
  • [3] Barnett R., Digital watermarking: applications, techniques and challenges, Electronics & Communication Engineering Journal, 11, 4, pp. 173-183, (1999)
  • [4] Begum M, Ferdush J, Uddin M S., A hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition, Journal of King Saud University-Computer and Information Sciences, 34, 8, pp. 5856-5867, (2022)
  • [5] Moosazadeh M, Ekbatanifard G., A new DCT-based robust image watermarking method using teaching-learning-based optimization, Journal of Information Security and Applications, 47, pp. 28-38, (2019)
  • [6] Liu Y, Tang S Y, Liu R, Et al., Secure and robust digital image watermarking scheme using logistic and RSA encryption, Expert Systems with Applications, 97, pp. 95-105, (2018)
  • [7] Molina-Garcia J, Garcia-Salgado B P, Ponomaryov V, Et al., An effective fragile watermarking scheme for color image tampering detection and self-recovery, Signal Processing: Image Communication, 81, (2020)
  • [8] Qin C, Ji P, Zhang X P, Et al., Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy, Signal Processing, 138, pp. 280-293, (2017)
  • [9] Haghighi B B, Taherinia A H, Harati A., TRLH: fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique, Journal of Visual Communication and Image Representation, 50, pp. 49-64, (2018)
  • [10] Huo Y R, Liu J J, Zhang Q, Et al., Semi-fragile watermarking for color image authentication in power internet of things, Proceedings of the IEEE Innovative Smart Grid Technologies-Asia, pp. 2865-2869, (2019)