Study of Digital Watermarking Algorithms for Digital Rights Management and their Attacks

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-1
Year of Publication : 2019
Authors : Mrs.Kavitha Soppari, Dr.N.Subhash Chandra
  10.14445/22312803/IJCTT-V67I1P104

MLA

MLA Style: Mrs.Kavitha Soppari, Dr.N.Subhash Chandra "Study of Digital Watermarking Algorithms for Digital Rights Management and their Attacks" International Journal of Computer Trends and Technology 67.1 (2019): 16-24.

APA Style: Mrs.Kavitha Soppari, Dr.N.Subhash Chandra (2019). Study of Digital Watermarking Algorithms for Digital Rights Management and their Attacks. International Journal of Computer Trends and Technology, 67(1), 16-24.

Abstract
Sharing multimedia data (image, audio, video, graphics, animation, text etc.,) using different apps has become very common in social media and digital media of this internet era. This has raised the major problem for multimedia content developers. Proving Ownership rights on multimedia data has made researchers to develop different techniques. Digital watermarking has given solutions to many problems like data authentication, ownership identification, content protection, Tamper proofing, copyright protection et,. This paper discusses most of the techniques used in digital watermarking and attacks on those techniques

Reference
[1] Rinaldi Munir, “A Chaos-based Fragile Watermarking Method in Spatial Domain for Image Authentication”, 2015 International Seminar on Intelligent Technology and Its Applications, 2015 IEEE.
[2] Zhu Xi’an , “A Semi-Fragile Digital Watermarking Algorithm in Wavelet Transform Domain Based on Arnold Transform” , ICSP2008 Proceedings.
[3] Dekun Zou, Yun Q. Shi, Zhicheng Ni,Wei Su, “A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet transform”, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 16, NO. 10, OCTOBER 2006.
[4] A.Giakoumaki, S. Pavlopoulos, D. Koutsouris, “Multiple Digital Watermarking Applied to Medical Imaging”, Proceedings of the 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference Shanghai, China, September 1-4, 2005.
[5] N.Nikolaidis!, I. Pitas” Robust image watermarking in the spatial domain",Signal Processing 66 (1998) 385Ð403, Elsevier.
[6] Mehmet Utku Celik, Ahmet Murat Tekalp, “Lossless Generalized-LSB Data Embedding”, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 2, FEBRUARY 2005.
[7] Abdulmawla M A e.tal.,”A new colour image watermarking technique using spatial Domain”, IEEE 2015.
[8] Cik Ku Haroswati Che Ku Yahaya, Harnani Hassan, Mohd Izwan Bin Md Kahmi, “Investigation on Perceptual and Robustness of LSB Digital Watermarking Scheme on Halal Logo Authentication”, 2012 International Conference on System Engineering and Technology September 11-12, 2012, Bandung, Indonesia,IEEE 2012
[9] Mahalingam Ramkumar, Ali N. Akansu and A Aydan Alatan , “A Robust Data Hiding Scheme For Images Using DFT”, 1999 IEEE.
[10] M. Ramkumar, A.N. Akansu, A.A. Alatan, ”A Robust data hiding scheme for images using DFT” , IEEE Proceedings 1999 International Conference on Image Processing .
[11] Methaq T. Gaata, “An Efficient Image Watermarking Approach based on Fourier Transform”, International Journal of Computer Applications (0975 – 8887) Volume 136 – No.9, February 2016
[12] Manuel Cedillo-Hernandez, Francisco J. Garcia-Ugalde, Mariko Nakano-Miyatake, Hector M. Perez-Meana, “DFT-Based Watermarking Method for Medical Images”, 2012 Ninth Electronics, Robotics and Automotive Mechanics Conference, IEEE 2012.
[13] Adrian G. Borg Ioannis Pitas, “ Image Watermarking Using DCT Domain Constraints”, 1996 IEEE.
[14] Yuan-Liang Tang and Chih-Peng Wang, “A Robust Watermarking Algorithm Based on Salient Image Features”, 2008 IEEE.
[15] Liwei Chen, Mingfu Li, “An Effective Blind Watermark Algorithm Based on DCT”, IEEE Proceedings of the 7th World Congress on Intelligent Control and Automation June 25 - 27, 2008, Chongqing, China.
[16] Jagdish Prasad Maheshwari, Mahendra Kumar, Garima Mathur, R P Yadav, Rajesh Kumar Kakerda, “Robust Digital Image Watermarking using DCT based Pyramid Transform via image Compression”, IEEE ICCSP 2015
[17] Bang Guannan Wang Shuwn Nian Guijun, “A Blind Watermarking Algorithm Based on DWT for Color Image”,2004 IEEE.
[18] Gengming Zhu , Nong Sang ,DeshegXiang ,Shaobo Zhang, “ Watermark Algorithm Research and Simulation Based on Different Frequency Coefficients”, 2008 IEEE.
[19] FU Yu, WU Xiaoping, Chen Zemao, Ye Qing, “A Wavelet Digital Watermarking Algorithm Based on Chaotic Mapping”, 2008 IEEE
[20] Jayprakash Upadhyay Dr. Bharat Mishra Dr. Prabhat Patel, “A Modified Approach Of Video WatermarkingUsing DWT-BP Based LSB Algorithm”, IEEE,2017
[21] Rita Choudhary, Girish Parmar, “A Robust image Watermarking Technique using 2-level Discrete Wavelet Transform (DWT)”, IEEE 2nd International Conference on Communication, Control and Intelligent Systems (CCIS).2016.
[22] Johnson C. Lee , “Analysis of Attacks on Common Watermarking Techniques”,IEEE
[23] Wang Gang, Rao Ni-ni, “A Fragile Watermarking Scheme for Medical Image”, 2005 IEEE.
[24] Anthony T.S. Ho, “Semi-fragile Watermarking and Authentication for Law Enforcement Applications”, 2007 IEEE.
[25] W.K. ElSaid, “Watermarking Digital Artworks”, International Journal of Computer Applications (0975 – 8887) Volume 125 – No.12, September 2015
[26] Ashraf M.A. Ahmad, Ismail Khalil Ibrahim,Textbook on “Multimedia Transcoding in Mobile and Wireless Networks”, Published by Information science reference, Hershey , New York, 2009 by IGI Global
[27] Jobin Abraham , Varghese Paul, “ An imperceptible spatial domain color image watermarking scheme”, Journal of King Saud University – Computer and Information Sciences (2017)
[28] L.De Strycker, P.Termont, J.Vandewege, J.Haitsma, A.Kalker, M.Maes and G.Depovere,” Implementation of a real-time digital watermarking process for broadcast monitoring on a TriMediaVLlW processor”, IEE Proceedings,2000
[29] Zhou Wang et.al., “ Image Quality Assessment: From Error Visibility to Structural Similarity”, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 4, APRIL 2004

Keywords
Digital Rights Management, Image Watermarking, Applications, PSNR, SSIM