Digital image watermarking using deep learning: A survey
Khalid M. Hosny,
No information about this author
Amal Magdi,
No information about this author
Osama M. Elkomy
No information about this author
et al.
Computer Science Review,
Journal Year:
2024,
Volume and Issue:
53, P. 100662 - 100662
Published: Aug. 1, 2024
Language: Английский
A Robust Zero-Watermarking Scheme in Spatial Domain by Achieving Features Similar to Frequency Domain
Electronics,
Journal Year:
2024,
Volume and Issue:
13(2), P. 435 - 435
Published: Jan. 20, 2024
In
recent
years,
there
has
been
a
substantial
surge
in
the
application
of
image
watermarking,
which
evolved
into
an
essential
tool
for
identifying
multimedia
material,
ensuring
security,
and
protecting
copyright.
Singular
value
decomposition
(SVD)
discrete
cosine
transform
(DCT)
are
widely
utilized
digital
watermarking
despite
considerable
computational
burden
they
involve.
By
combining
block-based
direct
current
(DC)
values
with
matrix
norm,
this
research
article
presents
novel,
robust
zero-watermarking
approach.
It
generates
zero-watermark
without
attempting
to
modify
contents
image.
The
is
partitioned
non-overlapping
blocks,
DC
computed
applying
DCT.
This
sub-image
further
maximum
singular
each
block
calculated
by
norm
instead
SVD
obtain
binary
feature
matrix.
A
piecewise
linear
chaotic
map
encryption
technique
improve
security
watermark
After
that,
created
via
XOR
procedure
between
encrypted
proposed
scheme
tested
using
variety
distortion
attacks
including
noise,
filter,
geometric,
compression
attacks.
also
compared
other
relevant
methods
outperformed
them
most
cases.
Language: Английский
Robust Digital Image Watermarking Scheme in the Dct Domain Employing Möbius Transformation
Published: Jan. 1, 2025
In
response
to
the
growing
digital
media
landscape,
ensuring
integrity
and
ownership
of
content
is
increasingly
crucial.
This
study
introduces
an
innovative
image
watermarking
scheme
that
integrates
Möbius
transformations
within
discrete
cosine
transform
spectrum
enhance
resilience
invisibility.
The
embeds
watermarks
into
middle-frequency
coefficients
images
via
geometric
operations
such
as
stereographic
projections
on
complex
plane.
A
genetic
algorithm
optimizes
transformation
parameters,
achieving
a
balance
between
imperceptibility
against
typical
processing
attacks
rotation,
scaling,
compression.
experimental
results
show
high
imperceptibility,
with
peak
signal-to-noise
ratios
consistently
above
40
dB,
minimal
visual
distortion.
Robustness
evaluations
indicate
watermark
remains
intact
under
various
attacks,
bit
error
rates
significantly
lower
than
those
traditional
methods.
excels
in
distortions
noise
addition,
surpassing
existing
techniques
quality
tamper
resistance.
By
integrating
for
embedding,
this
approach
offers
robust
imperceptible
solution
protection,
presenting
promising
avenue
rights
management
secure
transmission.
Future
research
will
explore
extending
method
other
types
further
optimization
techniques1.
Language: Английский
Enhancing Watermarking Robustness and Invisibility with Growth Optimizer and Improved LU Decomposition
Shengshuan Jiao,
No information about this author
Qiu Yunfei,
No information about this author
Qingtang Su
No information about this author
et al.
Optik,
Journal Year:
2025,
Volume and Issue:
unknown, P. 172353 - 172353
Published: April 1, 2025
Language: Английский
In-depth exploration of digital image watermarking with discrete cosine transform and discrete wavelet transform
Indonesian Journal of Electrical Engineering and Computer Science,
Journal Year:
2024,
Volume and Issue:
33(1), P. 581 - 581
Published: Jan. 1, 2024
Digital
image
watermarking
is
a
crucial
technique
used
to
protect
the
integrity
and
ownership
of
digital
images
by
embedding
imperceptible
watermarks
into
content.
This
review
concentrates
on
utilization
discrete
cosine
transform
(DCT)
wavelet
(DWT)
in
schemes.
DCT,
widely
compression
like
JPEG,
an
attractive
choice
for
watermarking,
modifying
DCT
coefficients
with
minimal
impact
quality.
On
other
hand,
DWT
offers
multiresolution
representation,
enabling
better
localization
robustness
against
attacks.
DWT-based
methods
use
embed
specific
frequency
bands
or
regions.
The
examines
strengths
weaknesses
exploring
algorithms
approaches
proposed
literature.
It
also
addresses
challenges
attacks,
synchronization,
processing.
Additionally,
comparative
analysis
considers
imperceptibility,
robustness,
capacity,
computational
complexity.
By
offering
valuable
insights,
this
aids
researchers
practitioners
implementing
secure
efficient
solutions.
Language: Английский