Academia.eduAcademia.edu

A Review of Different Secret Image Watermarking Technique

— In this paper, we discussed several different techniques use on digital image watermarking.The enlargement of internet and availability of the network incomputer now adays provide facility of multimedia data during passing information over the transmission medium. In this regularly developing society of the internet if using the traditional digital image watermarking technology doesn't have the capability to provide security from intentionally or may unintentionally attacks. So multimedia data received conveniently without suffering the losses of information. The repercussion of these application create moderation and distribution of the illegal information easily for the uncertified parties. The technique of digital watermarking come into existence to vanquish these authentications issue. So watermarking is one of the solution come to salvage for protection from the unlawful operation like forgery, duplicity, modifying data content, copyright-violation. The digital based content can be protected by using watermarking. So digital watermarking is basically an embedding or hiding data technique. This data may in form of image, audio, text or video. In this paper we point two categories of digital image watermarking via spatial domain and frequency domain. We mainly focused to describe variety of techniques applied on digital image. The comprehensive set of experimental results through variety of the watermarking techniques on digital image, which is showing that their proposed method has superiority and provide improved performance of the watermarking algorithms in comparison with the previously proposed methods. These approaches having the ability to withstand against variety of image processing attacks such as salt and pepper noise, JPEG compression, Gaussian noise, some filtering attacks as median filtering, Conv filtering (Gaussian filtering and sharpening), some geometric structure distortion attacks as bending cropping, resizing and rotating. These schemes output performed to measure imperceptibility and its Robustness with Signal to Noise Ratio (PSNR) and Normalized Cross Correlation (NCC) values.

International Journal of New Technology and Research (IJNTR) ISSN:2454-4116, Volume-3, Issue-1, January 2017 Pages 71-76 A Review of Different Secret Image Watermarking Technique Vipra Bohara, Sandeep Toshniwal  Abstract— In this paper, we discussed several different techniques use on digital image watermarking.The enlargement of internet and availability of the network incomputer now adays provide facility of multimedia data during passing information over the transmission medium. In this regularly developing society of the internet if using the traditional digital image watermarking technology doesn’t have the capability to provide security from intentionally or may unintentionally attacks. So multimedia data received conveniently without suffering the losses of information. The repercussion of these application create moderation and distribution of the illegal information easily for the uncertified parties. The technique of digital watermarking come into existence to vanquish these authentications issue. So watermarking is one of the solution come to salvage for protection from the unlawful operation like forgery, duplicity, modifying data content, copyright-violation. The digital based content can be protected by using watermarking. So digital watermarking is basically an embedding or hiding data technique. This data may in form of image, audio, text or video. In this paper we point two categories of digital image watermarking via spatial domain and frequency domain. We mainly focused to describe variety of techniques applied on digital image. The comprehensive set of experimental results through variety of the watermarking techniques on digital image, which is showing that their proposed method has superiority and provide improved performance of the watermarking algorithms in comparison with the previously proposed methods. These approaches having the ability to withstand against variety of image processing attacks such as salt and pepper noise, JPEG compression, Gaussian noise, some filtering attacks as median filtering, Conv filtering (Gaussian filtering and sharpening), some geometric structure distortion attacks as bending cropping, resizing and rotating. These schemes output performed to measure imperceptibility and its Robustness with Signal to Noise Ratio (PSNR) and Normalized Cross Correlation (NCC) values. Index Terms— image watermarking , PSNR, Gaussian filtering. I. INTRODUCTION The digital watermarking (data hiding) [15][16][18] is a concept to inserting or hiding the information as a copyright. This information’s in a digital file such as video, image, text and audio etc. in a manner that it should not create degradation in real host image without discernible changes in the file itself. It pinched a lot of attention [19][20]as a solution of several problems.Many of the methods were already put forward to increase the required quality factor of the watermark data. Now researches start to utilize Vipra Bohara, . Electronics Communication, Kautilya Institute of Technology & Engineering , Jaipur ,Rajasthan, India Sandeep Toshniwal, Hod ECE, Kautilya Institute of Technology & Engineering ,Jaipur ,Rajasthan, India evolutionary techniques for this digital based watermarking [40][41]. Because of expeditious enlargement of personal digital based data over internet medium. The planting activity of supplementary statistics into an image to build assertion about the image. These extra statics is known as a watermark. Approaches on the technique of watermark is introduced in [21]. The digital content will remain safe by using watermark[22][44]. This is because of the application of the digital image watermarking such as authenticity of the data and copyright, identification of the original user, protection from delicacy and automated monitoring [22]. The watermarking technique can be categorized into two domains, one is spatial and another one is frequency domain. The strength of the watermark as robust, semi-fragile and fragile. The visibility of the watermark as blind or Non-blind [21], transparency, capacity to hide data, payload of watermark, robustness are the requirements of the watermark.It is now very susceptible to being a copy by duplicate owner and after copying it become difficult to separate copied content from the real image. Its identification code may be invisible or visible type, from the both types the visible type of the watermark can be remote without difficulty from the main cover of the digital image[49]. But remote the invisible type of the watermark is very difficult from the cover of the digital image. This feature of the invisible watermark due to the integral multiple component of the host image after inserting watermark. In transformation domain the adopted technique of watermarking is Discrete Wavelet Transform (DWT) [2][13][24],Discrete Fourier Transform (DFT) [29], Discrete Cosine Transform (DCT) [25][26] and Singular Value Decomposition (SVD) [27][28][30][33] Fast Fourier Transform (FFT), Curve Let Transform (CT), Counter Let Transform (CLT) etc. But utilizing DWT and SVD concept rather than any other concept are known to have gained more popularity [31]. When this transformation applied the watermarked data are inserted in the transformed coefficient of the real image. Then the watermark data finial recovered by utilizing inverse transformation of these coefficient.For the strong protection against the unwanted copyright several methods are now using with best possible security for digital products like image, video, data or audio significantly [1].The robustness may increase threw introducing in low valued coefficient with respect to all attacks. The main motive of digital image watermarking to insert watermark information with better imperceptibility as well as robustly on the cover image.This paper is discussed into following sections. In II section we point categories of thedigital image watermarking. In III section we point the requirements, applications and attacks of digital image watermarking. In IV section different technique of watermarking discussed. Then we conclude this paper in section V. 71 www.ijntr.org A Review of Different Secret Image Watermarking Technique  Image or Content Authentication & Description II. CATEGORIES OF DIGITAL IMAGE WATERMARKING The inserted watermark contain detailed information as labeling & captioning etc. [14][34][47].  Convert Communication Algorithm ofwatermarking are categorized into spatial domain and frequency domain technique. A. Spatial Domain Technique By embedding unique image secretly exchanging of message is possible. B. Requirements In this domain technique the required watermark is designed on the original cover image by modifying its characteristics or pixels [35] i.e. to inset the watermark into Least Significant Bit (LSBs) of the host image. It is simple to implement but it become fain under some image processing attacks as rescaling, compression, cropping etc. The inserted watermark has to provide some common requirements as  Robustness  Frequency Domain Technique In frequency domain, the watermark is inserted into the transformed coefficient of the host image after applying DCT, DFT and DWT or combined DWT-DCT [37]. In comparison to the spatial domain, this frequency domain is more effective and having more robustness [36]. It shows the resistance ability against various attacks. If the watermark designed under low frequency component of the image, it should be much robust against geometric distortion, filtering and compression. If watermark build under high frequency component, it should be with-stand against gamma correction, brightness adjustments, cropping and histogram equalization [21].  Perceptual Transparency It should be imperceptible to human eyes & its quality doesn’t affect under signal processing attacks [8].  Non-Blind versus Blind III. APPLICATION, REQUIREMENTAND ATTACKS OF DIGITAL IMAGE WATERMARKING Non-blind utilize both the secret key & original image, Blind utilize secret key, Semi-Blind utilize bit sequence of watermark & secret key.  Payload In this section we introducing the review of some common application, requirement and attacks on watermark[18].Digital based content can be safe by watermarking [22][44]. It should be enough for retrieval of the inserted watermark[45].  Capacity A. Application Some applications of watermark are  Original Owner Identification It showing majority watermark[5]. C. Attacks The traditional form of identification of real ownership was visual mark can be easily copied but now invisible watermark using to overcome this issue of fake watermark.  Publication Monitoring & Copy Control of information contained by The attacks can be categorized into two form as I. Intentionally: It is applied with exact aim of destroying or copy the secret information. II. Unintentionally: It impaired by processing the data by mistake such as compression or enhancement the image [3]. Tracking of illegal distribution is possible because the real owner can be recovered by unique data in watermark.A significant role is played by digital based image in the age of information technology [6].  Monitor Broadcasting Some types of attacks are:  Geometric Attack It can confirm the content which is supported to transmit [21][38].  Fingerprinting It include affine transform [12] as scaling, rotation and translation. Mosaic attacks and Pixel jittering etc.  Cryptographic Attacks Set of fingerprint hosted in a single image.  Temper Detection It deal with cracking the security of unique data, it includes oracle attacks. For hiding information of multimedia content using digital image watermarking is very useful way associated with trouble of copyright protection [7].  Removal & Interference Attacks Fragile watermark is now using for temper detection.  Copyright Protection In situation of fake ownership this watermark used as evidence.  Medical Purpose It include compression, de-noising, quantized noise, re-modulating, collusion noise storms and averaging image.  Simple Attacks The designing of watermark which contain all necessary information of patients is possible [39]. 72 www.ijntr.org International Journal of New Technology and Research (IJNTR) ISSN:2454-4116, Volume-3, Issue-1, January 2017 Pages 71-76 It include cropping, addition of noise and conversion into analog or wavelet based compression.  Protocol Attacks It contain IBM attacks which are known as inversion, fake to original attacks, deadlocks.  Disabling Attacks It is used for destroy correlation between watermarked & original image. It includes cropping, geometric attacks, rotation at fix point and insertion of pixel in image. IV. DIFFERENT TECHNIQUE ON DIGITAL IMAGE WATERMARKING In this section we discussed some recent researches briefly which are applied on the digital image watermarking as Literature Study. Huailin Dong et. al[1] in 2015 put forward a discrete wavelet transform, discrete cosine transforms with singular value decomposition based optimized watermarking technique. The resultant by the multiplication of the left singular vector values and a matrix with the singular valued type matrix of its binary watermark data. These resultant are inserted into the resultant from the multiplication of the same left side singular vectored value with the DCT based matrix singular values. These matrices are related to the coefficient of the LL3 sub-band from the host image by using the concept of MSFs (Multiple scaling factors). By utilizing chaotic firefly algorithm which have logistic map with objective type functions, the MSF is optimizing. These functions are actually linear combination of the required term like robustness and imperceptibility. Now the researchers start using an evolutionary algorithm for watermarking such as Genetic Algorithms (GA) [40][41], algorithms of Particles Swarm Optimization (PSO) [10] and bacteria foraging optimization algorithm [42] etc. So it is now not a big deal to get that evolutionary algorithm which is using to resolve the issues related to the optimization MSFs [43]. This paper provide the solution of the issue related to joining SVD with micro-genetic algorithm and lead to false positive rate [Z-12]. So this technique can be proved its robustness against 8 various image processing related operations. Ramandeep Kaur et. al [9] in 2014 has been presented an exhaustive survey on the several digital image watermarking techniques based on usually DCTR, DWT and hybridization with the concept of SVD. After this survey it is concluded that a bulk of researches is going on this hybridizing the transformation techniques with SVD field. Some model likes in DWT-SVD, DCT-SVD and DCT-DWT-SVD are scout in prospect to decrease the mean square error and increasing the required PSNR values in between original and watermarked image. Sufficient exploration has been done already and still running in the spreading field. Things like analysis of the principle component, extracting features related to the hybridization transformation etc. still growing to improve the performance parameter. HinaSaxena et. al[48] in 2014 use DWT-DCT-SVD based scheme with semi-blind reference algorithm of digital watermark. A trigonometric function is using to progress of this algorithm. This scheme can be withstanding in opposition to the various attacks related to processing an image. To correlated the singular value of the real image and the watermark contend image, this trigonometric functions are useful. Firstly, a concept of DWT is put in on the real host image to spilt it into 4 different frequency bands as LL, LH, HL and HH. Then because of the higher frequency, the singular values of the coefficient of DCT transformed image is being revise by utilizing the singular values of the coefficient of the DCT transformation but for watermarked image now. Then this revision utilization to redesign the watermarked host image to give a proof of its authentication, the recovery process is applied on the same watermarked image using inverse SVD. Y. Shantikumar Singh et. al[4] in 2013 present a survey on DCT, DWT and SVD hybridization techniques on the digital image watermarking. In this paper spatial and frequency domain are two methods mainly described. In spatial domain, by changing the pixel values of the original host image watermark can be designed. In frequency domain, the watermark is designed into the transformed coefficient of the host image. From both of the domain the spatial domain is very simple during its implementation time whereas the frequency domain provides more robustness and hiding capacity in apposite to the several attacks. So a detailed survey on different techniques for digital image watermarking is found in this paper. Any Tun et. al [7] in 2013 put forward an effective solution to shielding from unauthorized reproduction of the digital multimedia data. On LWT (Lifting Wavelet Transform) and DCT based new digital image watermarking technique is proposed in it to preserve copyright of image. To decomposition of the real image into 4 different sub-bands. Firstly, LWT is put in an application then DCT is evaluated on the sort out sub-bands of LWT coefficient. Now the watermark is implanted in this DCT component of the chosen LWT sub-band of the original cover image. Keta Raval et.al [3] in 2013 proposed a DCT-DWT based transformation algorithm for digital image watermarking. To build it firstly, the image taken as watermarked image is decomposing by using DWT concept and then pick the suitable frequency band to insert watermark in it. Then DCT put in for resembling and remodeling in its real form. Now fix it on particular position to make the complete image IDCT and IDWT transformed to achieve the watermarked image. Same procedure applied for recovery of the watermark but now the image is real host image. ArisMarjuni et. al [6] in 2013 put forward an improved DCT based scheme with FWHT (Fast Walsh Hadamard Transform) for authenticating the image. In this scheme before put in DCT coefficients FWHT is applied first for high visual quality of the watermarked image low signal coefficients are expected. It is discovered that depending on the level distortion the watermark can be improved. Nallagarla Ramamurthy et. al[5] in 2012 provide comparison between two novel approaches to build watermark image into the real host image using the quantization concepts. Which are related to the BPNN (Back Propagation Neural Network) and DFIS (Dynamic Fuzzy Interference System). To insert and recover the watermark and to use the weighting function for same the BPNN and DFIS is utilizing respectively. Against the image processing attacks like salt & pepper noise, rotating the image, filtering 73 www.ijntr.org A Review of Different Secret Image Watermarking Technique and JPEG compressing attacks etc. this algorithm proved its interleaving with synchronization method as a newly watermark inserting strategy is utilized in this paper to get robustness as well as imperceptibility. Xiangui Kang et. al[12] in 2003 provide a composite image better robustness. based watermarking technique on blind based DWT-DFT Comparison of different algorithms with their intrinsic algorithm. Which can be withstand in apposite to the affine features, variety of embedding & extraction technique on transformation as well as JPEG compression attacks. 2-D digital image watermarking listed in this Table-I Table-I: Variety of Algorithms on Digital Image Watermarking Scheme. Reference No. Researchers Year 1 Huailin Dong et. al Ayesha Shaik et. al HinaSaxena et. al Amy Tun et. al Keta Raval et. al ArisMarjuni et. al Chunto Wang et. al Chin-Chin Lai et. al Ning Bi et. al 2015 DWT-DCT-SVD and Chaotic Firefly Algorithm Results PSNR NCC (dB) 50.73 1.00 2015 SVD Decomposition &Tabu-Search 51.05 0.99 2014 2013 2013 2013 2012 DWT-DCT-SVD using Trigonometric functions Combined LWT-DCT method DCT-DWT Algorithm FWHT-DCT Scheme Hidden Markov Model in Wavelet Domain based Watermarking DWT-SVD Decomposition based Watermarking 53.56 46.76 21.04 21.43 38.40 0.99 0.97 0.90 0.84 0.99 51.14 0.93 45.00 8 Kyung-Su et. al Kim 2007 Multiband Wavelet & Empirical Mode Decomposition based Watermarking DWT-SVD based Blind Image Watermarking 41.06 BER-3.8 9 0.78 12 Xiangui Kang et. al Yiwei Wang et.al 2003 DWT-DCT Composite based Watermarking 42.50 0.73 2002 Wavelet based Watermarking 41.80 0.98 2 48 7 3 6 49 33 46 47 2010 2007 Methodology trend of the sub-image, the middle frequency in the wavelet domain is selected to inserting the required bits of the watermark. To obtain more robustness as well as perceptually invisibility in the form of its performance, selected suitable multiband wavelet transformation filter and required dilation factor. So it is analyzed that in front of currently announced watermarking algorithm. It expressed better performance. Ayesha Shaik et. al[2] in 2015 put forward a new watermarking scheme based on Tabu Search. The metaHeuristic concept is called as Tabu Search. In this concept for designing and building the watermark image, changing the singular value of the original image data by utilizing MSFs (Multiple Scale Factor). This building process has been done on the diagonal matrix rather than on the one constant value. By utilizing Tabu Search, these multiple scaling factor obtained in this paper. This Tabu Search is also helpful for discovery of the optimal scaling factor associated with anti-cycling type memory under various attacks related to the image processing operation like JPEG compression, rotating watermark data on real image and average or medium filtering. All these experiment are executed on the data set of standard benchmark exhibit this presented algorithm and Walsh Hadamard Transform [32]. This Meta-Heuristic based Tabu Search proved its robustness and it get correlation value very close to 1 (almost similar) by comparing the watermark containing image to the watermark recovered image. So it demonstrates its better performance compared to the recently reported similar schemes. Ning Bi et. al [46] introduced a multiband wavelet transformation and empirical mode decomposition based watermarking technique with blind image concept. In the traditionally used watermarking technique the two-band type of wavelet transformation concept is used in which on the coefficients of the wavelet, the selected bits of the watermark are inserted directly. But in this presented paper on the mean CONCLUSION In this paper, we have reviewed some of recent schemes, many watermarking schemes with their intrinsic feature, inserting and extraction forms are briefly described in section IV which revealed some advantages by using DCT, DWT, DFT and SVD for digital image watermarking. Categories of digital image watermarking are briefly described in section II. Along with these, some applications, requirements and types of attacks have been presented in section III. So there is large amount of literature for digital based watermarking, which showing some approaches tends to decrease noise and provide security to the secret data for purpose of fulfill required applications. We revealed the fact that the content of the host image utilizing to provide better invisibility and robustness to the scheme. It is concluded that from the above observation several model of digital image watermarking in DCT, DWT, DFT and SVD along with joint DCT-SVD, DWT-SVD and DCT-DWT-SVD domain are utilizing to minimize the mean square error and give improved PSNR, NCC values in order to enhance the performance. 74 www.ijntr.org International Journal of New Technology and Research (IJNTR) ISSN:2454-4116, Volume-3, Issue-1, January 2017 Pages 71-76 REFERENCES [1] Huailin Dong, Nasrin M.Makbol, BeeEeKhoo, "Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition", Elsevier International Journal of Electronics and Communications, AEU-67,pp.102-112,2015. [2] Ayesha SK, VM Manikandan and V. Masilamani. [2015], “A Combined SVD-DWT Watermarking Scheme with Multi-Level Compression Using Sampling and Quantization on DCT Followed by PCA,” In Proc. of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Application (FICTA) 2014, Springer International Publishing, 141-149. [3] Keta Raval, Sameena Zafar, " Digital Watermarking with Copyright Authentication for Image Communication", IEEE Transaction, pp 1l1-1l6, 2013. [4] Y. Shantikumar Singh, B.Pushpa Devi, and Kh. Manglem Singh, “A Review of Different Technique on Digital Image Watermarking Scheme”, IEEE Transaction, Vol. 2, Iss. 3, pp.193-199 July 2013. [5] Nallagarla Ramamurthy, Dr. S. Varadarajan, “Robust Digital Image Watermarking Scheme with Neural Network and Fuzzy Logic Approach”, pp.555-562,2012. International Journal of Emerging Technology and Advanced Engineering, Vol. 2, Issue 10, pp.193-199, September 2012. [6] Aris Marjuni, Mohammad Faizal Ahmad Fauzi, RajasvaranLogeswaran, and Swee-HuayHeng, “An Improved DCT-Based Image Watermarking Scheme Using Fast Walsh Hadamard Transform, IEEE Transaction, Vol. 9, No. 3, pp. 271-278, June 2013. [7] Amy Tun and Yadana Thein, “Digital Image Watermarking Scheme Based on LWT and DCT, IJET, Vol. 5, pp. 272-277, 2013. [8] Kyung-Su Kim, Min-Leong Lee and Heung-kyu lee, “Blind Image Watermarking Scheme in DWT-SVD domain”, 2007. [9] Ramandeep Kaur and Harpal Singh, “Image Watermarking in DCT, DWT and Their Hybridization Using SVD: A Survey”, International Journal of Innovations in Engineering and Technology (IJIET), Vol. 4, Issue 4, pp. 376-379, Dec. 2014. [10] R. S. Run, S. J. Horng, J. L. Lai, T. W. Kao, R. J. Chen, “An Improved SVD based Watermarking Technique for Copyright Protection,” Expert System with Application, vol. 39, pp. 673-689, 2012. [11] Emir Ganic and Ahmet M. Eskicioglu, “Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies, MM&SEC, 20-21 Sept. 2004. [12] Xiangui Kang, Jiwu Huang, Q. Shi and Van Lin, "A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression", IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp.776-786, Aug. 2003. [18] [19] [20] [21] [22] [23] Multimedia,” IEEE Transaction on Image Processing, 6(12): 1673-1687. C.I. Podilchuk and E. J. Delp, “Digital Watermarking Algorithm and Applications,” IEEE Signal Processing Magazine, July 2001, pp.33-46. I.Cox, J. Kilian, F. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia, “IEEE Trans. Image Processing, vol. 6,pp. 1673–1687, Dec. 1997. I.F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proc.IEEE, vol. 87, pp. 1079–1107, July 1999. R. Kountchev, S. Rubin, M. Milanova, V. Todorov and R. Kountcheva, “Resistant Image Watermarking in the Phases of the Complex Hadamard Transform Coefficients,” in Proc. Of the IEEE International Conference on Information Reuse and Integration, 2010, pp. 159-164. V.M. Potdar, S. Han and E. Chang, “A Survey on Digital Watermarking Technique,” in Proc. Of the 3rd IEEE International. Conference on Industrial Information (INDIN 2005), pp. 709-716, 2005. Joishi, Vaibhav and MilindRane. [2014], “Digital Watermarking using LSB replacement with Secret Key Insertion Technique [24] Xia, Xiang-Genm Charles, G. Boncelet and Gonzalo Rarce. [1997], “A Multiresolution Watermark for Digital Image,” in IEEE Transaction, 1: 548551. [25] Tao B, Dickinson B. [1997], “Adaptive Watermarking in DCT Domain,” In Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, 4; 1985-2988. [26] Golikeri A, Nasiopoulos P. [2005], “A Robust DCT Energy based Watermarking Scheme for Image,” Journal of Proc. of IEEE (Available online: www.ece.ubc.ca-adarshg/DCT_Watermark.pdf). [27] LuiRuizhen and Tieniu Tan. [2002], “An SVD based Watermarking Scheme for Protecting Rightful ownership,” IEEE Transactions on Multimedia 4(1): 121-128. [28] Lai, Chin-Chin., “A Digital Watermarking Scheme basedon Singular Value Decomposition and Tiny Genetic Algorithm,” Digital Signal Processing, 21(4): 522-527, 2011. [29] Tao Peining and Eskicioglu Ahmet M, “An Adaptive Method for Image Recovery in the DFT Domain”, Journal of Multimedia, vol. 1, No. 6 September, 2006. [30] V.I. Gorodetski, L. J. Popyak, V. Samoilov and V. A. Skormin, “SVD- Based Approach to Transparent Embedding Data into Digital Image”, International Workshop Methods, Models and Architecture for Computer Network Security (MMM-ACNS 2001), St. Petersburg, Russia, May 21-23, 2001. [31] R. Lui, T. Tan, “An SVD- based Watermarking Scheme for Protecting Rightful Ownership”, IEEE Transaction Multimedia, (4), 1, pp. 121-128, 2002. [32] Sun, R.., Sun, H., Yao, T., “A SVD and Quantization based Semi-Fragile Watermarking Technique for Image Authentication”, Proc. IEEE International Conference on Signal Processing, 2, 1592-1595, 2002. [33] Chin-Chin Lai,Piyu Tsai, Chin-Chen Chang, “SVD based Digital Image Watermarking Scheme”, Pattern Recognition Letters 26, 1577-1586, 2010. [34] G. Hai-ying, L. Guo-quing, L.Xu and X.Yin, “A Robust Watermark Alogorithm for jpeg2000 Image”, Fifth Internation Conference on Information Assurance and Security, 2009. [35] M. EL-Gayyar and J. Von zurGathen, “Watermarking Technique Spatial Domain”’ University of Bonn Germany, Tech. Rep., 2006. [36] S. Riaz, M. Y. Javel and M. A. Anjun, “Invisible Watermarking Scheme in Spatial and Frequency Domain”, International Conference on Emerging Technology, 2008. [37] Ali Al-Haj, “Combined DWT-DCT Digital Image Watermarking”, Journal of Computer Science, vol. 3, No. 9, pp. 740-746, 2007. [13] Kundur D, Hatzinakos D. [1998], “Digital Watermarking using Multiresolution Wavelet Decomposition, Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, Seattle, Washington, 5: 2969-2972. [14] Xie L, Boncelet, G. Arce, GR. [1998], “Wavelet Transform based Watermarking for Digital Image,” in Optics Letters 36(4): 312-313. [15] E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp, “Advance in Digital Video Content Protection,” Proceeding of the IEEE, Special Issue on Advance in Video Coding and Delivery, 2004. [16] I. J. Cox, M. l. Miller and J. A. Bloom, Digital Watermarking, Margan Kaufmann Publishers, 2002. [17] I.Cox, Ingemar J. Joe Kilian, F. Thomson Leighton and TalalShamoon. [1997], “Secure Specturm Watermarking for 75 www.ijntr.org A Review of Different Secret Image Watermarking Technique [38] I.J. Cox, M.L. Miller, J.A. Bloom, J.Fridrich and T.Kalker, “Digital Watermarking and Steganography, in Springer Morgan Kaufmann, 2008. [39] G. Caotrieux, L. Lecornu, Member, IEEE, Ch. Roux, Fellow, IEEE, B. Sankur, Member IEEE, “A Review of Digital Image Watermarking Health Care”. [40] P. Kumasawat, K. Attakitmongcol, A. Srilkaew, “A New Approach for Optimization in Image Watermarking by using Genetic Algorithms”, IEEE Transaction on Signal Processing, vol. 53(12), pp. 4707-4719, 2005. [41] C. Shieh, H. Huang, F. Wang, J. Pan, Genetic Watermarking based on Transformation Domain Techniques,” Patter Recognition Letter, vol. 37, pp. 555-565, 2004. [42] H. C. Huang, Y. H. Chen, A. Abraham, “Optimized Watermarking using Swarm-based Bacterial Foraging”, Journal of Information Hiding and Multimedia Signal Processing, vol. 1(1), pp. 51-58, 2010. [43] M. Ishtiaq, B. Sikandar, A. Jaffar, A. Khan, “Adaptive Watermarking Strength Selection using Particle Swarm Optimization”, ICIC Express Letter, An International Journal of Research and Survey, 2010. [44] I.J. Cox, M. L. Miller and J. A. Bloom, “Watermarking Application and their Properties,” in Proc. Of the International Conference on Information Technology: Coding and Computing (ITCC 2000), Las Vegas, NV, USA, 27-29 March, 2000, pp. 6-10. [45] Zheng, Peijia and JiwuHauns, “Walsh Hadamard Transform in the Homomorphic Encrypted Domain and its Application in Image Watermarking”, in Information Hiding, Springer Berlin Heidelberg, 240-254, 2013. [46] N. Bi, Q. Sun, D. Huang, Z. Yang, and I. Huang, "Robust image watermarking based on multi band wavelets and empirical mode decomposition," IEEE Transaction on Image Processing, Vol. 16, No. 8, pp. 1956- 1966, Aug. 2007. [47] Y. Wang, J. F. Doherty AND R. E. Van Dyck, “A Wavelet-based Watermarking Algorithm for Ownership Verification of Digital Image,” IEEE Transaction on Image Processing, vol. 11. No. 2, pp. 77-88, February 2002. [48] HinaSaxena, PrafulSaxena and ShubhamRastogi, “DWT-DCT-SVD based Semi-blind Reference Image Watermarking Scheme using Trignometric Function”, International Journal of Conceptions on Computing and Information Technology, Vol. 2, Issue 2, pp.14|29-18|29, April 2014. [49] Chuntao Wang, Jiangqun Ni, Jiwu Huang, “An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain”, IEEE Transactions on Information Forensics and Security, Vol.7, No.3, June 2012. . 76 www.ijntr.org