Book Details

Survey on Joint Photographic Experts Group [JPEG] Watermarking

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC).

Download this PDF format


The expansion of the Internet has frequently increased the availability of digital data such as audio, images and videos to the public. Digital watermarking is a technology being developed to ensure and facilitate data authentication, security and copyright protection of digital media. Watermarking, which belong to the information hiding field, has seen a lot of research interest recently. There is a lot of work begin conducted in different branches in this field. Steganography is used for secret communication, whereas watermarking is used for content protection, copyright management, content authentication and tamper detection. We classify the techniques based on different domains in which data is embedded.


[1] Manpreet kaur, Sonia Jindal, Sunny behal, ?A Study of Digital image watermarking?, Volume2, Issue 2, Feb 2012.

[2] Evelyn Brannock, Michael Weeks, Robert Harrison, Computer Science Department Georgia State University ?Watermarking with Wavelets: Simplicity Leads to Robustness?, Southeast on, IEEE, pages 587 – 592, 3-6 April 2008.

[3] Vidyasagar M. Potdar, Song Han, Elizabeth Chang, ?A Survey of Digital Image Watermarking Techniques?, 2005 3rd IEEE International conference on Industrial Informatics (INDIN).

[4] Jiang Xuehua, ?Digital Watermarking and Its Application in Image Copyright Protection?, 2010 International Conference on Intelligent Computation Technology and Automation.

[5] Ensaf Hussein, Mohamed A. Belal, ?Digital Watermarking Techniques, Applications and Attacks Applied to Digital Media: A Survey?, IJERT, ISSN: 2278-0118, Vol. 1 Issue 7, September-2012.

[6] C.-T. Li and F.M. Yang., ?One-dimensional Neighborhood Forming Strategy for Fragile Watermarking?. In Journal of Electronic Imaging, vol. 12, no. 2, pp. 284-291, 2003.

[7] [6] Rakesh Ahuja, S S Bedi, Himanshu Agarwal, ?A Survey of Digital Watermarking Scheme?, MIT International Journal of Computer Science and Information Technology, Vol.2, No. 1, Jan. 2012, pp.(52-59).

[8] R. Radhakrishnan and N. Memon, ?On the security of the SARI image authentication system,? in Proc. IEEE International Conference on Image Processing (ICIP 01), Thessaloniki, Greece, October 2001.

[9] C.-Y. Lin and S.-F. Chang, ?SARI: Selfauthentication-and recovery image watermarking system,? in Proc. 9th ACM International Conference on Multimedia, Ottawa, Canada, 30 September–5 October 2001.

[10] Xie, L., Boncelet, G., Acre, G.R., ?Wavelet transform basedwatermarking for digital images?, in Optics Express, vol. 3, no. 12,Dec 1998.

[11] Boneh, D.; Shaw, J.; ?Collusion-secure fingerprinting for digital data,? IEEE Transactions on Information Theory, Volume: 44 Issue: 5 , Sept. 1998, Pages: 1897 -1905

[12] Burgett, S.; Koch, E.; Zhao, J.; ?Copyright labeling of digitized image data?, IEEE Communications Magazine, Volume: 36 Issue: 3 , March 1998, Pages:94-100

[13] Chen, B.; Sundberg, C.-E.W.; ?Digital audio broadcasting in the FM band by means of contiguous band insertion and pre-canceling techniques,? IEEE Transactions on Communications, Volume: 48 Issue: 10 , Oct. 2000, Pages: 1634 - 1637

[14] Chen, B.; Wornell, G.W.; ?An informationtheoretic approach to the design of robust digital watermarking systems,? Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, March 1999. Volume: 4 , Pages: 2061 -2064

[15] Chen, B.; Wornell, G.W.; ?Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,? IEEE Transactions on Information Theory, Volume: 47, Issue: 4, May 2001, Pages: 1423 -1443.

[16] Chou, J.; Pradhan, S.S.; El Ghaoui, L.; Ramchandran, K.; ?Watermarking based on duality with distributed source coding and robust optimization principles,? Proceedings of International Conference on Image Processing, Volume: 1, Sept. 2000, Pages: 585 -588.

[17]Wolfgang, R.B.; Podilchuk, C.I.; Delp, E.J.; ?Perceptual watermarks for digital images and video,? Proceedings of the IEEE, Volume: 87, Issue: 7, July 1999, Pages: 1108-1126.

[18] Min Wu; Bede Liu; ?Data hiding in image and video .I. Fundamental issues and solutions,? IEEE Transactions on Image Processing, Vol. 12, Number 6, June 2003, Pages: 685- 695

[19] Min Wu; Yu, H.; Bede Liu; ?Data hiding in image and video .II. Designs and applications,? IEEE Transactions on Image Processing, Vol. 12, Number 6, June 2003, Pages: 696- 705.

[20]Hartung, F.; Kutter, M.; ?Multimedia watermarking techniques,? Proceedings of the IEEE , Volume: 87, Issue: 7 , 1999, Pages: 1079 -1107

[21] Katzenseisser, S.; Petitcolas, F.A.P; ?Information Hiding Techniques forSteganography and Digital Watermarking,? Artech House, Boston – London, 2000.

[22] Kirovski, D.; Malvar, H.; ?Robust spreadspectrum audio watermarking,?Proceedings of 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing, Volume: 3, May 2001, Pages: 1345 -1348

[23] Koch, E.; Zhao, J.; ?Towards Robust and Hidden Image Copyright Labeling,? in IEEE Workshop on Nonlinear Signal and Image Processing, 1995.

[24] Kutter, M; Petitcolas, F.A.P.; ?A Fair Benchmark for Image Watermarking Systems,? Security and Watermarking of Multimedia Contents, SPIE-3657:226-239, 1999.

[25] Langelaar, G.C.; Setyawan, I.; Lagendijk, R.L.; ?Watermarking digital image and video data. A state-of-the-art overview,? IEEE Signal Processing Magazine,Volume: 17, Issue: 5, Sept. 2000, Pages: 20-46

[26] Mintzer, F.; Braudaway, G.; ?If one watermark is good, are more better?,?Proceedings Int. Conf. Acoustics, Speech, Signal Processing, Volume 4, Phoenix,AZ, March 1999. din Muharemagic and Borko Furht,

[27]?Survey Of Watermarking Techniques AndApplications?, Department of Computer science and Engineering, Florida Atlantic University.

[28] Andreja Sam?covi´c, J´an Tur´an, ?Attacks on Digital Wavelet Image watermarks?, Journal of Electrical Engineering.

[29] Peining Taoa and Ahmet M. Eskicioglub, ?A robust multiple watermarking scheme in the Discrete Wavelet Transform domain?, The Graduate Center, The City University of New York.

[30] Baisa L. Gunjal, ?An Overview Of Transform Domain Robust Digital Image Watermarking Algorithms?, Department of Computer Engineering, Amrutvahini College of Engineering.

[31] Igor Djurovic, Srdjan Stankovic, and Ioannis Pitas,? Digital watermarking in the fractional Fourier transformation domain?, Journal of Network and Computer Applications (2001), page 167 – 173.

[32] Vaishali.S.Jabade, Dr.Sachin R.Gengaje ?Literature Review of Wavelet based Digital Image Watermarking Techniques?, International Journal of Computer Applications, Vol.31, No.1, October2011.

[33] P. Meerwald, A. Uhl, ?A Survey of Wavelet-DomainWatermarking Algorithms?, EI San Jose, CA, USA, 2001.

[34] Mohamed A. Suhail and Mohammad S. Obaidat, "Digital Watermarking-Based DCT and JPEG Model", IEEE Transactions OnInstrumentation and Measurement, Vol. 52, NO. 5, p.1640-1647, October 2003.

[35] Mahendra Kumar et. al., ?Implementation of Different Non-Recursive FIR Band-pass filters using Fractional Fourier Transform? in proceedings of 4 th IEEE International Conference on Computational Intelligence and Communication Networks (CICN-2012), Mathura, 3-5 Nov. 2012.



Watermarking, internet, authentication.

  • Format Volume 1, Issue 2, No 3, 2013.
  • Copyright All Rights Reserved ©2013
  • Year of Publication 2013
  • Author M.Veni, Dr.P.Eswaran
  • Reference IJCS-018
  • Page No 091-098

Copyright 2021 SK Research Group of Companies. All Rights Reserved.