www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 2 February 2015, Page No. 10270-10275 A Survey Of Digital Watermarking Techniques Sumedh P. Ingale 1, Dr.C.A.Dhote 2 1 Prof. Ram Meghe Institute Of Technology and Research, Badnera,Amrava Sant Gadgebaba Amravati University, Amravati, Maharashtra, India – 444701. sumedh3003@gmail.com 2 Prof. Ram Meghe Institute Of Technology and Research, Badnera Amravati. SantGadgebabaAmravatiUniversity, Amravati, Maharashtra, India – 444701. vikasdhote@rediffmail.com Abstract: Digital watermarking has become a promising research area to face the challenges created by the rapid growth in distribution of digital content over the internet. To prevents misuse of this data Digital watermarking techniques are very useful in which a Secret message called as a watermarks which can be a logo or label is embedded into multimedia data imperceptibly which would be then used for various applications like copyright protection, authentication, and tamper detection etc.. Based on the requirement of the application the watermark is extracted or detected by detection algorithm to test condition of the data. Keywords: Digital Watermarking, Copyright, Authentication. 1. Introduction The rapid growth in internet has changed many aspects of our lives. The use of internet in day to day life by common people is continuously rising around the world, This is rapidly increasing because it seems natural use internet to provide real time coverage of stories, publishing newspapers, magazines, music, still images would yield commercial benefits by providing a fast and inexpensive way to distribute their work. It becomes very easy to search and develop any digital content on the internet. But there is a serious problem faced about unauthorized and illegal access and manipulation of multimedia files over internet. Everybody can obtain copies of copyrighted multimedia openly at low cost and with no loss of information, while this good for sharing but using them for the commercial profit would be unethical. So problem comes how to share data with protecting owner’s rights. The protection and enforcement of intellectual property rights for digital media has become an important issue. Digital watermarking to provides way to protect the Intellectual property rights of publishers, artists, distributers and photographers .Watermarking is used for providing a kind of security for various type of data it may be image, audio, video, etc.[2]. The remainder of this paper is organized as follows. Section III provides overview of Digital Watermarking, which Section IV describes the Image Watermarking Techniques. Section V describes Comparative Analysis which contains eighteen types of analysis, Finally section VI concludes this paper. 2. Literature Review Digital watermarking can be seen as a process to insert a secret message or logo into the original media source by using signal processing method. It provides a high level of security; as the location of embedded information is secret, and the watermark algorithm is also not public. Digital watermarks should be difficult to remove or change without damaging the host signal. Watermarking is used for various applications viz. copyright protection, broadcast monitoring, authentication, fingerprinting. Watermarking techniques can be classified in various ways. Whether there is the need of the original image for watermark extraction or detection, watermarking is classified to blind, semi-blind and non-blind watermarking techniques. It can be classified on the basis of visibility of watermark, whether visible or invisible. On the basis of how the watermark be embedded in the image; either by changing the pixels i.e. spatial or by transformation domain. Which will be explained below in the paper [1][2][3]. 3. Digital Watermarking Overview 3.1 Watermarking Background Image Watermarking is the technique of embedding of owner copyright identification with the host image..at first it is used in paper mills as paper mark of company . Then it is common in practice up to 20th century. After that watermark also used in the postage stamp and currency notes of any country to ensure there authenticity . 3.2 Basic Model of Digital Image Watermarking The basic model of digital image watermarking can be divide into two parts; the first part is the watermark embedding process and the second part is the watermark detection process which shown in Figures below .[4] Sumedh P. Ingale, IJECS Volume 4 Issue 2 February, 2015 Page No.10270-10275 Page 10270 The original image is transformed by using the concept of Fresnel diffraction plane by distance parameter, and watermark image is embedded after scrambled by chaotic sequence. The watermark image can be retrieved without original image, and there is little changes on the original image after embedding. Chaotic scrambling can encrypt watermark information Figure 1: Watermark Embedding In Figure 1, which represents sender, we can see the Watermark is embedded into the Cover Image with the Secret Key that is used ensures the security of watermarking process. The output of this step is the Watermarked Image. Figure 2: Watermark Detection In Figure 2, at the receiver side, the detector detects the watermark from the Watermarked Image by using the Secret Key to recover the Watermark [4]. 4. Image Watermarking Techniques Deepshikha Chopra, Preeti Gupta, Gaur Sanjay B.C., Anil Gupta[8] in “Lsb Based Digital Image Watermarking For Gray Scale Image” proposed an invisible watermarking technique (least significant bit) and a visible watermarking technique using LSB algorithm which replaces the least significant bits of pixels selected to hide the information. They applied various attacks on the watermarked image and their impact on quality of images are measured using MSE and PSNR Qing Liu,Jun Ying(2012) [9],has proposed ”Grayscale Image Digital Watermarking Technology Based on Wavelet Analysis” In this paper, firstly, original image is transformed by using the DWT (Discrete wavelet transform) upto the 3-layers, means apply 3 times ,so that image is divided into the different sub band(LL,LH,HL and HH) and watermarked image is embedded into the intermediate frequency sub band. Spread spectrum technology is also used in this paper and blind watermarking technique is used to extract the watermark. Spread spectrum technology provides Secure communications because signal is “hidden” like noise but it increases bandwidth of signal and increases the complexity and also used blind detection technique to extract the watermark is used. Zhaoshan Wang, Shanxiang Lv,Yan Shna [10] in ”A Digital Image Watermarking Algorithm Based on Chaos and Fresnel Transform has proposed, a digital image watermarking algorithm based on chaos and Fresnel transform is proposed. Fangjun Huang, Zhi-Hong Guan [11] “A hybrid SVD DCT watermarking method based on LPSNR”. proposed, a watermarking method which combines the singular value decomposition (SVD) and the discrete cosine transform (DCT) In which only the singular values (SVs) of the watermark need to be embedded into the original image for more transparency that can easily be obtained .They proposed method would be quite robust., the local peak signal-to-noise ratio (LPSNR) is adopted in our method to achieve the highest possible robustness without losing the transparency. Enping Li, Huaqing Liang, Xinxin Niu[12]. “Blind Image Watermarking Scheme Based on Wavelet Tree Quantization Robust to Geometric Attacks”, paper proposes an improved blind image watermarking scheme based on wavelet tree quantization. The wavelet coefficients of the original image are grouped into wavelet super trees. Each watermark bit is embedded using two wavelet super trees. The watermark is extracted according to the statistical difference between two wavelet super trees the proposed algorithm is robust to both common image processing operations and geometric attacks such as rotation, scaling, cropping. Wang H. et al.[13] proposed a chaotic watermarking scheme for authentication of JPEG images. The quantized DCT coefficients after entropy decoding are mapped to the initial values of the chaotic system, and then the generated watermark information by chaotic iteration is embedded into JPEG compressed domain. Re-quantization operation does not invalidate tamper detection due to direct modification of DCT coefficient after quantization. Extraction is also performed in the compression domain. Extraction is fast and complexity of method is claimed to be low Tan Yuxi, Gao Zhinian,Yang Xiaoyuan,Tang Lei,Sun Peng,Li Yu[14] in “A Rotation Resistant Image Watermarking Algorithm via Circle” has proposed A rotation resistant image watermarking algorithm to solve digital image watermarking extracting when rotated with any angle. The algorithm firstly do watermarking with binary serialization, and then divide the source image into several circle area with the center point of the image, segment the circle area according to length of the binary watermarking sequences with certain rules, the binary watermarking sequences embedded in segmentation of circle with modulus algorithm. When watermarking is extracted, corresponding inverse operation of embedded, firstly extracting the binary watermarking sequences from every segmentation of circle, then combined it into binary watermarking, recover the embedded watermarking image. Experimental results show that the algorithm has a good resistance to against rotation and compression attack Mohamed M. Ibrahim1, Neamat S. Abdel Kader 2, M. Zorkany3, [15] in “A Robust Image Watermarking Technique Based On Image Interlacing” proposed a effective non-blind image watermarking for this problem of overhead of original Sumedh P. Ingale, IJECS Volume 4 Issue 2 February, 2015 Page No.10270-10275 Page 10271 image overhead. The proposed method depends on using image interlacing as a new way in the watermarking systems. The performance of this method is compared with the ordinary nonblind watermarking technique over a wide number of images. Simulation results show the effectiveness of the proposed method and robustness against different attacks. Dr.M.Mohamed Sathik and S.S.Sujatha[16] has proposed in “An Improved Invisible Watermarking Technique for Image Authentication”, a blind watermarking scheme. According to which , the low frequency subband of wavelet domain and the rescaled version of original image are utilized in the watermark construction process. A scrambled version of watermark is obtained with the help of Arnold Transform. The operation of embedding and extraction of watermark is done in high frequency domain of Discrete Wavelet Transform since small modifications in this domain are not perceived by human eyes Keta Raval, Sameena Zafar [17], ” Digital Watermarking with Copyright Authentication for Image Communication”, Most watermarking algorithms transform the host image and embedding of the watermark information by robust way. Uncompressed digital images need a lot storage capacity and bandwidth so efficient image transmission need image compression. The solution is becoming more complex with the growth of data. They propose Digital Watermarking by proposed transform Algorithm based on DCT-DWT watermarking for secure image transmission. Neeraj Bhargava, M.M. Sharma, Abhimanyu Singh Garhwal and Manish Mathuria[18], “Digital Image Authentication System Based on “Digital Watermarking” This research paper introduces a prototype for Digital Image Authentication System (DIAS). This system can perform visible and invisible watermarking on image, which is applicable for color and gray images. The complete system consists of two functions, one for hiding information inside image and other for detecting information from image. In this approach, digital watermarking performed using Discrete Wavelet Transform (DWT) and analyzed its results Dr.M.A. Dorairangaswamy[19], “Protecting Digital-Image Copyrights: A Robust and Blind Watermarking Scheme” proposed a The Digital Rights Management (DRM) the proposed scheme is a robust and blind watermarking scheme which can be used to for protect the copyrights of digital images. By copyrights of the image by invisibly embedding a binary watermark image into the host image. The proposed scheme embeds binary watermark pixels into host image pixels to construct the watermarked image. As the proposed watermarking scheme is blind, we do not require the original image or any of its characteristics for watermark extraction. Mei Jiansheng, Li Sukang and Tan Xiaomei [20], “A Digital Watermarking Algorithm Based on DCT and DWT” in this paper proposed an algorithm of digital watermarking based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). According to the characters of human vision, in this algorithm, the information of digital watermarking which has been discrete Cosine transformed, is put into the high frequency band of the image which has been wavelet transformed. Then refine the digital watermarking with the help of the original image and the watermarking image. The simulation results show that this algorithm is invisible and has good robustness for some common image processing operations Navnidhi Chaturvedi, Dr.S.J.Basha [21] “Comparison of Digital Image watermarking Methods DWT & DWT-DCT on the Basis of PSNR” , In this paper they have compared watermarking using DWT & DWT-DCT methods performance analysis on basis of PSNR, Similarity factor of watermark and recovered watermark. Yang, Xiuguang Li and Xiaoyuan[22], in “A blind watermarking algorithm resisting to geometric transforms based on SVD” proposed a watermarking algorithm to resist the geometric transformation based on singular value decomposition (SVD) logarithm polar coordinate is proposed. The log-polar mapping (LPM) is used to resist rotation and scaling attacks, and the odd-even quantization algorithm is used to embed watermark. The algorithm show good resistant to geometric attack and better robustness. Mingli Zhang, Qiang Zhang, and Changjun Zhou [23] In “Robust Digital Image Watermarking in DWT-SVD”. Proposed a novel robust image watermarking scheme based on discrete wavelet transform (DWT), singular value decomposition (SVD). In which singular values of the encrypt watermark are embedded on the singular values of the important inscribed circle domain of normalized cover image’s DWT sub-bands. The experimental result of the proposed method is good in imperceptibility, and the significant improvement in robustness under geometrical attacks. Chen Li, Cheng Yang, Wei Li [24] in “Wavelet Bases and Decomposition Series in the Digital Image Watermarking” analyzes and compares the performance of different wavelet bases in the digital image watermarking and the effect of different wavelet decomposition series for the digital image watermarking embedding based on the application of wavelet in the digital image watermarking. The experiments proved the digital image watermarking embedding based on bi-orthogonal wavelet better than others. Xiong Shunqing, Zhou Weihong, and Zhao Yong [25] in” A New Digital Watermarking Algorithm Based on NSCT and SVD” proposed an new algorithm of digital watermarking based on combining the Non Sub Sampled Contourlet Transform and SVD, they first applied the NSCT to the image and extract the low-frequency sub-band of image, and then decompose the low-frequency sub-band of image by SVD, finally embed the watermarking in the decomposed singular value. The experiment results show that the new algorithm has good ability in standing up to geometric attacking, especially rotation attacks. 5. Comparative Analysis Title [8]Lsb Based Digital Image Watermarking For Gray Scale Image [9]Grayscale Image Digital Watermarking Technology Based on Wavelet Analysis Sumedh P. Ingale, IJECS Volume 4 Issue 2 February, 2015 Page No.10270-10275 Author Deepshikha Chopra, Preeti Gupta, Gaur Sanjay B.C., Anil Gupta Qing Liu,Jun Ying Feature LSB algorithm DWT applied upto 3 layers Use blind watermarking approach Page 10272 [10]A Digital Image Watermarking algorithm Based on Chaos and Fresnel Transform [11]A hybrid SVD DCT watermarking method based on LPSNR Zhaoshan Wang, Shanxiang Lv,Yan Shna [12]Blind Image Watermarking Scheme Based on Wavelet Tree Quantization Robust to Geometric Attacks Enping Li, Huaqing Liang, Xinxin Niu. , Fangjun Huang, Zhi-Hong Guan: [13]Chaotic Watermarking Scheme for Authentication of JPEG Images [14]A Rotation Resistant Image Watermarking Algorithm via Circle Hongxia Wang, Ke Ding, Changxing Liao Tan Yuxi, Gao Zhinian,Yang Xiaoyuan,Tang Lei,Sun Peng,Li Yu in [15] A Robust Image Watermarking Technique Based On Image Interlacing Mohamed M. Ibrahim, Neamat S. Abdel Kader , M. Zorkany [16] An Improved Invisible Watermarking Technique for Image Authentication Dr.M.Mohamed Sathik and S.S.Sujatha has proposed in [17]DigitalWatermarking with Copyright Authentication for Image Communication Keta Raval, Sameena Zafar [18] Digital Image Authentication System Based on Digital Watermarking Neeraj Bhargava, M.M. Sharma, Abhimanyu Singh Garhwal and Manish Mathuria, [19]Protecting DigitalImage Copyrights: A Robust and Blind Watermarking Scheme [20]A Digital Watermarking Algorithm Based On DCT and DWT Dr.M.A. Dorairangaswamy Mei Jiansheng, Li Sukang and Tan Xiaomei [21] Comparison of Digital Image watermarking Methods DWT & DWTDCT on the Basis of PSNR [21]Navnidhi Chaturvedi, Dr.S.J.Basha [22] A blind watermarking algorithm resisting to geometric transforms based on SVD [22] Yang, Xiuguang Li and Xiaoyuan, [23],Robust Digital Image Watermarking in DWTSVD. Mingli Zhang, Qiang Zhang, and Changjun Zhou Based on Chaos and Fresnel Transform Achive high robustness without losing transparency Bind watermarking robust to common image processing operations and geometric attacks such as rotation, scaling, cropping. Fast extraction and claims low complexity has a good resistance to against rotation and compression attack robust against different attacks Scrambled watermark using Arnold transform Robust agent many attack DCT-DWT watermarking for secure image transmission Proposed prototype using DWT Robust and Blind watermarking scheme Uses both DCT DWT and result show good robustness against many attack Concluded that DWT--DCT method is best technique for level one watermark embedding Bind robust and resist rotation robust to a wide range of attacks, especially geometrical [24] Wavelet Bases and Decomposition Series in the Digital Image Watermarking Chen Li, Cheng Yang, Wei Li [25] A New Digital Watermarking Algorithm Based on NSCT and SVD. Xiong Shunqing, Zhou Weihong, Zhao Yong Conclude that biorthogonal wavelet better than others Good imperceptebilty Good robustness 6. Conclusion In this paper we studied the overview of digital watermarking process. In this paper we studied various approaches used and identified features of each of them, by this survey we can say that the different approach is suitable for different uses .we also noticed the that each approaches can designed to robust against' specific types of attacks. In the end we presented the table of some paper used for comparison and identified their features. References: [1] Cox, IJ, Miller, ML & Bloom, JA 2002, Digital Watermarking, Morgan Kaufmann Publisher, San Francisco, CA, USA 2002 [2]Christine I. Podilchuk, Edward J. Delp, ―Digital watermarking: Algorithms and applications‖, IEEE Signal processing Magazine, July 2001. [3] Vinita Gupta,Mr.Atul Barve A Review on Image Watermarking and Its Techniques. [4] Y. Yusof and O. O. Khalifa, "Digital watermarking for digital images using wavelet transform," in Telecommunications and Malaysia International Conference on Communications, 2007 [5]M. L. M. Ingemar J. Cox, Jeffrey A. Bloom, Jessica Fridrich, and Ton Kalker, Digital Watermarking and Steganography: Morgan Kaufmann Publishers, 2008. [6] Mohammad Abdullatif,Akram M. Zeki, Jalel Chebil,Teddy Surya Gunawan, “Properties of Digital Image Watermarking”, 2013 IEEE 9th International Colloquium on Signal Processing and its Applications, 8 - 10 Mac. 2013, Kuala Lumpur, Malaysia Sumedh P. Ingale, IJECS Volume 4 Issue 2 February, 2015 Page No.10270-10275 Page 10273 [7] Z. Yanqun, "Digital Watermarking Technology: A Review," in Future Computer and Communication, 2009. FCC '09. International Conference on, 2009, [18] Neeraj Bhargava, M.M. Sharma, Abhimanyu Singh Garhwal and Manish Mathuria, “Digital Image Authentication System Based on Digital Watermarking [8] Ensaf Hussein. Mohamed A. Belal ,” Digital Watermarking Techniques, Applications and Attacks Applied toDigital Media: A Survey”, (IJERT) Vol. 1 Issue 7, September – 2012 [19] Dr.M.A. Dorairangaswamy, “Protecting Digital-Image Copyrights: A Robust and Blind Watermarking Scheme” ieee 2009 [9] Sasmita Mishra, Amitav Mahapatra,Pranati Mishra,” A Survey on Digital Watermarking Techniques [10] Rajkumar Yadav, Ravi Saini, Gaurav Chawla, Kamaldeep ,” Classification of Watermarking Based upon Various Parameters” ijcait [8] Deepshikha Chopra, Preeti Gupta, Gaur Sanjay B.C., Anil Gupta, “Lsb Based Digital Image Watermarking For Gray Scale Image” IOSR Journal of Computer Engineering (IOSRJCE) [9] Qing Liu,Jun Ying(2012),”Grayscale Image Digital Watermarking Technology Based on Wavelet Analysis” . [10] Zhaoshan Wang, Shanxiang Lv,Yan Shna (2012)”A Digital Image Watermarking Algorithm Based on Chaos and Fresnel Transform”, 2012 [11] Fangjun Huang, Zhi-Hong Guan: A hybrid SVD DCT watermarking method based on LPSNR. Pattern Recognition Letters (2004) [12] Enping Li, Huaqing Liang, Xinxin Niu. , “Blind Image Watermarking Scheme Based on Wavelet Tree Quantization Robust to Geometric Attacks”, 2006 [13] Hongxia Wang, Ke Ding, Changxing Liao (2008), “Chaotic Watermarking Scheme for Authentication of JPEG Images”,International Symposium on Biometrics and Security Technologies, [20] Mei Jiansheng, Li Sukang and Tan Xiaomei, in “A Digital Watermarking Algorithm Based On DCT and DWT” Proceedings of the 2009 International Symposium on Web Information Systems and Applications [21]Navnidhi Chaturvedi1, Dr.S.J.Basha “Comparison of Digital Image watermarking Methods DWT & DWT-DCT on the Basis of PSNR” [22] Yang, Xiuguang Li and Xiaoyuan, A blind watermarking algorithm resisting to geometric transforms based on SVD. s.l. : Wuhan University Journal Of Natural Sciences, 2011, Vols. 16,(2011). [23] Mingli Zhang, Qiang Zhang, and Changjun Zhou, “Robust Digital Image Watermarking in DWT-SVD.” s.l. : SpringerVerlag Berlin Heidelberg, 2011. [24] Chen Li, Cheng Yang, Wei Li, “Wavelet Bases and Decomposition Series in the Digital Image Watermarking”. Advances in Intelligent and Soft Computing, Advances in Multimedia, Software Engineering and Computing Vol.2 , s.l. : Springer, 2012. [25] Xiong Shunqing, Zhou Weihong, Zhao Yong, “A New Digital Watermarking Algorithm Based on NSCT and SVD”. Advances in Control and Communication, LNEE, 2012, Vol. Author Profile [14]Tan Yuxi, Gao Zhinian,Yang Xiaoyuan,Tang Lei,Sun Peng,Li Yu in “A Rotation Resistant Image Watermarking Algorithm via Circle” [15] Mohamed M. Ibrahim, Neamat S. Abdel Kader , M. Zorkany, in “A Robust Image Watermarking Technique Based On Image Interlacing” [16] Dr.M.Mohamed Sathik and S.S.Sujatha has proposed in “An Improved Invisible Watermarking Technique for Image Authentication” Sumedh P. Ingale received the B.E. degree in Computer Science and Engineering from Shri Sant Gajanan Maharaj College of Engineering, Shegaon, Sant Gadge Baba University in 2012. Now pursuing M.E. from Prof.Ram Meghe Institute of Technology & Research, Badnera-Amravati. [17] Keta Raval, Sameena Zafar , “Digital Watermarking with Copyright Authentication for Image Communication” Sumedh P. Ingale, IJECS Volume 4 Issue 2 February, 2015 Page No.10270-10275 Page 10274 Dr.C.A.Dhote is a Professor at Prof.Ram Meghe Institute of Technology & Research in Information Technology Dept., Badnera-Amravati. His educational qualification is M.S., Ph.D.,having experience of more than 27 years in the teaching field. Sumedh P. Ingale, IJECS Volume 4 Issue 2 February, 2015 Page No.10270-10275 Page 10275