Multimedia Protection, Authentication and Advanced Digital Watermarking Techniques: A Survey

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-30 Number-3
Year of Publication : 2015
Authors : RanaKhudhair Abbas Ahmed
DOI :  10.14445/22312803/IJCTT-V30P129


RanaKhudhair Abbas Ahmed "Multimedia Protection, Authentication and Advanced Digital Watermarking Techniques: A Survey". International Journal of Computer Trends and Technology (IJCTT) V30(3):162-168, December 2015. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Multimedia contents such as images, videos, audio, and texts are easy to available for download through internet in worldwide. Duplication of multimedia contents is to create using different software. This type of operation some time created problem of copyright and ownership authentication. Digital watermarking techniques are usedto protect multimedia contents. This paper gives various watermarking techniques in transform domain and sparse domain for protection and authentication of multimedia contents.

[1] Mahmoud El-Gayyar., "Watermarking Techniques – Spatial Domain Digital Rights Seminar. Media Informatics", University of Bonn, Germany, May 2006.
[2] Reena, Vandera."Modified Approach of Digital Image Watermarking Using Combined Dct and Dwt Modified Approach of Digital Image Watermarking Using Combined Dct and Dwt", Volume 3, Issue 7, July, 2013.
[3] Munesh Chandra "A DFT-DWT Domain Invisible Blind Watermarking Techniques for Copyright Protection of Digital Images", Advances in Wavelet Theory and Their Applications in Engineering, Physics and Technology 2015.
[4] HamzaA. Ali, Sama’a A. K. khamis, World of Computer Science and Information Technology Journal (WCSIT) Vol. 2, No. 5, 163-168, 2012 ,Robust Digital Image Watermarking Technique Based on Histogram Analysis.
[5] International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014) 218 Vol. 2, Issue 2, Ver. 2 (April - June 2014) ISSN : 2347 - 8446 (Online) ISSN : 2347 - 9817 (Print) © 2014, IJARCST All Rights Reserved Digital Watermarking: Comparing Two Techniques I Jyoti Rani, IIAnupam
[6] Wolfgang, R. &Podilchuk, C., "Perceptual Watermarks for Digital Images and Video". Proceedings of the IEEE, 87(7), 1277 – 1281, July 1999.
[7] Langelaar, G., Setyawan, I. &Lagendijk, R., "Watermarking of Digital Image and Video Data – A State of Art Review", IEEE Signal Processing Magazine, 20 – 46, Sept. 2000.
[8] Li &Drew., "Fundamentals of Multimedia, Chapter 1, Introduction to Multimedia", Prentice Hall, 26. M. Wu and B. Liu, "Watermarking for Image Authentication", IEEE Proc. Of ICIP, Chicago, 2003.
[9] The Oxford English Dictionary, 2nd Ed., Oxford Univ., pp. 795-796, 1989.
[10] The Webster`s New 20th Century Dictionary.
[11] Dattatherya , S. VenkataChalam , Manoj Kumar Singh, A Generalized Image Authentication Based On Statistical Moments of Color Histogram, Int. J. on Recent Trends in Engineering and Technology, Vol. 8, No. 1, Jan 2013.
[12] D. Bearman, and J. Trant, "Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process", D-LibMagazine, June 1998.
[13] M. Yeung and F. Mintzer. "An Invisible Watermarking Technique for Image Verification", IEEE International Conf. on Image Processing, Santa Barbara, Oct. 1997
[14] Ching-Yung Lin. " Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection", Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences Columbia University, 2000.
[15]Clara Cruz Ramos, R. Reyes, Mariko Nakano-Miyatake, He?ctor Manuel Pe?rezMeana, "Watermarking-Based ImageAuthentication System in the Discrete Wavelet Transform Domain", Discrete Wavelet Transforms: Algorithms and Applications, 2011.
[16]JasniZain, and Malcolm Clarke, 3rd International Conference:Sciences of electronic, Technologies of Information andTelecommunications, March 27-31, 2005 –, Mohammad Faizal Ahmad Fauzi, RajasvaranSecurity In Telemedicine: Issues In WatermarkingMedical Images , SETIT 2005
[17] Hadamard Transform ArisMarjuni, International Journal of Computer and Electrical Engineering, Vol. 5, No. 3, June 2013, An Improved DCT-Based Image Watermarking Scheme Using Fast Walsh, Logeswaran, and Swee- HuayHeng.
[18] R. G. van Schyndel, A. Z. Trikel, and C. F. Osborne. "A Digital Watermark", IEEE International Conf. on Image Processing, Austin, Texas, Nov. 1994.
[19] B. Zhu, M. D. Swanson, and A. H. Tewk. "Transparent Robust Authentication and Distortion Measurement Technique for Images", The 7th IEEE Digital Signal Processing Workshop, pp. 45-48, Sep 1999.
[20] R. B. Wolfgang and E. J. Delp. "A Watermark for Digital Images", IEEE International Conf. on Image Processing, Laussane, Switzerland, Oct. 1996.
[21] Heather J. Meeker., "Multimedia and Copyright", Rutgers Computer and Technology Law Journal, 1994.
[22] Lee, Y. & Chen, L, "High Capacity Image Steganographic Model", IEEE proceedings of Vision Image and Signal Processing, 288 – 294, June 2000.
[23] Chan, C. & Cheng, L., "Hiding Data in Images by Simple LSB Substitution", Pattern Recognition, 37, 469 – 474, 2004.
[24]Ramalingam, M., Stego, "Machine – Video Steganography using Modified LSB Algorithm", World Academy of Science, Engineering and Technology, 74, 502 – 505, 2011.
[25] Arena, S., Caramma, M. &Lancini, R., "Digital Watermarking Applied to MPEG-2 Coded Video Sequences Exploiting Space and Frequency Masking", Proceedings of International Conference on Image Processing, 2, 796 – 799, 2000.
[26] Bangaleea, R. &Rughooputh, H., "Performance Improvement of Spread Spectrum Spatial Domain Watermarking Scheme Through Diversity and Attack Characterization", IEEE Conference Africon, 293 – 298, 2002.
[27] Thanki, R., Trivedi, R., Kher, R. &Vyas, D., "Digital Watermarking Using White Gaussian Noise (WGN) in Spatial Domain", Proceedings of International Conference on Innovative Science & Engineering Technology (ICISET), 38 – 42, 2011.
[28] Dajun, H., Qibin, S. &Tian, Q., "A Semi-fragile Object based Video Authentication System", Proceedings of the International Symposium on Circuits and Systems, 814 – 817, 2003.
[29] Hernandez, J., Amado, M. & Perez-Gonzalez, F., "DCT domain Watermarking Techniques for Still Image: Detector Performance Analysis and a New Structure", IEEE Transactions on Image Processing, 9, 55 – 68, Jan 2000.
[30] Lu, C. & Liao, H., "Video Object based Watermarking: A Rotation and Flipping Resilient Scheme", Proceedings of International Conference on Image Processing, 2001.
[31] Huang, F. & Guan, Z., "A Hybrid SVD-DCT Watermarking Method Based on LPSNR", Pattern Recognition Letters 25, 1769 – 1775, 2004.
[32] Preda, R. &Vizireanu, D., "Blind Watermarking Capacity Analysis of MPEG2 Coded Video", Proceedings of Conference of Telecommunications in Modern Satellite, Cable and Broadcasting Services, Serbia, 465 – 468, Sept. 2007.
[33] Koz, A. &Alatan, A., "Oblivious Spatio-Temporal Watermarking of Digital Video by Exploiting the Human Visual System", IEEE Transactions on Circuits and Systems for Video Technology, 18(3), 326 – 337, March 2008.
[34] Sridevi, T., Krishnaveni, B., Vijayakumar, V. &Ramadevi, Y., "A Video Watermarking Algorithm for MPEG Videos", A2CWiC 2010 – Amrita ACM-W Celebration of Women in Computing, Sept. 2010.
[35] Ding, Y., Zheng, X., Zhao, Y. & Liu, G., "A Video Watermarking Algorithm Resistant to Copy Attack", Proceedings of 3rd International Symposium on Electronic Commerce and Security, July 2010,.
[36] Ejima, M. & Miyazaki, A., "A Wavelet Based Watermarking for Digital Images and Videos", IEEE International Conference on Image Processing, 678 – 681, August 2000.
[37] Serdean, C., Ambroze, M., Tomlinson, M. & Wade G., "Combating Geometrical Attacks in a DWT based Blind Video Watermarking System", IEEE Region 8 International Symposium on Video/Image Processing and Multimedia Communications, Zadar, Croatia, 263 – 266, June 2002.
[38] Raval, M. &Rege, P., "Discrete Wavelet Transform Based Multiple Watermarking Scheme", Proceedings of the Convergent Technologies for the Asia-Pacific Region, 3, 935 – 938, 2003.
[39] Fan, L. &Yanmei, F., "A DWT based Video Watermarking Algorithm Applying DS-CAMA", IEEE Region 10 Conference TENCON 2006.
[40] Elbasi, E., "Robust MPEG Video Watermarking in Wavelet Domain", Trakya University Journal of Science, 8(2), 87 – 93, 2007.
[41] Essaouabi, A. &Ibnelhaj, E., "A 3D Wavelet based Method for Digital Video Watermarking", Proceedings of the 4th IEEE Intelligent Information Hiding and Multimedia Signal Processing, July 2009.
[42] Raghavendra, K. &Chetan, K., "A Blind and Robust Watermarking Scheme with Scrambled Watermark for Video Authentication", Proceedings of IEEE International Conference on Internet Multimedia Services Architecture and Applications, Dec. 2009.
[35] Hussein, J. & Mohammed, A., "Robust Video Watermarking using Multiband Wavelet Transform", IJCSI International Journal of Computer Science Issues, 6(1), 44 – 49, 2009.
[44] Mostafa, S., Tolba, A., Abdelkader, F. &Elhindy, H., "Video Watermarking Scheme Based on Principal Component Analysis and Wavelet Transform", IJCSNS International Journal of Computer Science and Network Security, 9(8), 45 – 52, Aug. 2009.
[45] Ganic, E. &Eskicioglu, A., "Secure DWT-SVD Domain Image Watermarking Embedding Data in All Frequencies", ACM Multimedia and Security Workshop 2004, 1 – 9, 2004.
[46] Dili, R. &Mwangi, E., "An Image Watermarking Method Based on the Singular Value Transformation and the Wavelet Transformation", Proceedings of IEEE AFRICON, 1 – 5, 2007.
[47] Mansouri, A., Mahmoudi, A., Aznaveh, &Azar, F., "SVD based Digital Image Watermarking using Complex Wavelet Transform", Sadhana, 34(3), 393 – 406, June 2009.
[48] Santhi, V. &Thangavelu, A., "DWT SVD Combined Full Band Robust Watermarking Technique for Color Images in YUV Color Space", International Journal of Computer Theory and Engineering. 1(4), Oct. 2009.
[49] Kamlakar, M., Gosavi, C. &Patankar, A., "Single Channel Watermarking for Video Using Block based SVD", International Journal of Advances in Computing and Information Researches, 1(2), April 2014.
[50] Gupta, A. &Raval, M., "A Robust and Secure Watermarking Scheme Based on Singular Value Replacement", Sadhana, 37(4), 425 – 440, Augst 2012.
[51] Donoho, D., "Compressed Sensing. IEEE Transaction on Information Theory", 52(4), 1289 – 1306, April 2006.
[52] Candès, E., "Compressive Sampling. Proceedings of the International Congress of Mathematicians, Madrid", Spain, 2006.
[53] Baraniuk, R., "Lecture notes on Compressive Sensing", IEEE Signal Processing Magazine, 24, 118 – 124, July 2007.

Wavelet Transform, Copyright, Authentication, Watermarking.