EVALUATION OF DIGITAL IMAGE WATERMARKING TECHNIQUES

  • Abstract
  • Literature Map
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

The advancing world of digital multimedia communication is facing problems linked to security and authenticity of digital data. The data security term is described as protecting information or digital data against any attack that may be performed by utilizing different attacking technologies, methods and techniques. A watermark system is reported to be secure, if the hacker cannot take away the watermark without full knowledge of embedding algorithm, detector and composition of watermark. This paper has shown the survey on image watermarking and its various techniques. From the survey it has been concluded that none of the technique performs effectively in all fields. Keywords— CZT, DWT, Image Watermarking, Negative Selection Algorithm, SVD

Similar Papers
  • Research Article
  • 10.1186/s12911-025-02902-2
Digital health data security practices among health professionals in low-resource settings: cross-sectional study in Amhara Region, Ethiopia
  • Feb 5, 2025
  • BMC Medical Informatics and Decision Making
  • Ayenew Sisay Gebeyew + 8 more

IntroductionProtecting digital health data from unauthorized access, alteration, and destruction is a crucial aspect of healthcare digitalization. Currently, digital security breaches are becoming more common. Healthcare data breaches have compromised over 50 million medical records per year. In Ethiopia, health digitization has grown gradually. However, there is a limitation of study in digital health security. Studying digital health data security helps individuals protect digital data as a baseline and contributes to developing a digital health security policy.ObjectiveTo assess the practice of healthcare professionals in digital health data security among specialized teaching referral hospitals in Amhara Region, Ethiopia.MethodA cross-sectional study design supplemented by a qualitative purposive sampling method was used to measure the digital data security practices of health professionals. The sample size was determined via single population proportion formula. A simple random sampling technique was used for the study participants. Then, self-administered questionnaires were administered. Multivariable logistic analysis was used to identify associated factors using STATA software. For the qualitative study, key informant interviews were used and analyzed using thematic analysis approach via open-code software.ResultsOut of the 423 health professionals, 95.0% were involved in the survey. The finding indicates digital health data security practice of health professionals working at specialized teaching hospitals were 45.0%, CI: (40, 50). Health professionals 41–45-year age group (AOR = 0.107), master’s degree (AOR = 2.45), postmaster’s degree (AOR = 3.87), time to visit the internet for more than two hours (AOR = 2.46), basic computer training (AOR = 2.77), training in digital data security (AOR = 2.14), and knowledge (AOR = 1.76) were associated with the practice of digital health data security. For the qualitative study, three teams were prepared. The findings indicate digital health data security can be improved through training, advanced knowledge and working with digital security.ConclusionThe practice of digital health data security in specialized teaching hospitals in the Amhara region was inadequate. Therefore, it can be improved through enhancing education status, increasing the time needed to visit the internet, providing computer training, and updating health professionals’ knowledge toward digital health data security.

  • Conference Article
  • Cite Count Icon 17
  • 10.1109/issp.2013.6526885
Digital Watermarking with copyright authentication for image communication
  • Mar 1, 2013
  • K Raval + 1 more

The advancing world of digital multimedia communication is faces problems related to security and authenticity of digital data. In the context of multimedia communication, digital images and videos have numerous applications in entertainment world like TV channel broadcasting. Digital Watermarking algorithms used to protect the copyright of digital images and to verify multimedia data security. Most watermarking algorithms transform the host image and embedding of the watermark information by robust way. Uncompressed digital images need a lot storage capacity and bandwidth so efficient image transmission need image compression. The solution is becoming more complex with the growth of data. We propose Digital Watermarking by proposed transform Algorithm based on DCT-DWT watermarking. By this method we can do secure image transmission.

  • Book Chapter
  • 10.4018/978-1-7998-5351-0.ch049
A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security
  • Jan 1, 2021
  • Ranjeet Kumar Singh + 1 more

Now a days, in communication technology safety of digital data in the form of text, image, and video, audio is a biggest problem. With the rapid development of the network multimedia systems, security is the biggest issue. Digital watermarking is one of the solutions to these problems. It hides some secret data into the original image and this information is use for image authentication and security. This paper Focus an application using Hybrid approach of Cryptography technique and dual watermarking for the purpose of Providing highly security and authentication of digital data. This paper use cryptography and QR Code in combined approach of LSB and DCT Digital image water marking technique. The Experimental results are given in the form of table and graph. This algorithm provides more security and data authentication compare to other image data security approach.

  • PDF Download Icon
  • Research Article
  • 10.17762/turcomat.v12i11.5867
Exploring The Robustness Of Digital Watermarking Algorithms Based On Transform Function And Machine Learning
  • May 10, 2021
  • Turkish Journal of Computer and Mathematics Education (TURCOMAT)
  • Rakesh Kumar Verma, Et Al

The robustness of digital watermarking algorithms is a critical factor for analysing the security of digital multimedia. The increasing utility of digital multimedia in every filed area of business needed copyright protection. Copyright protection is the intergluteal property of digital assets. The strength of robustness used various algorithms and methods in current research trends of digital data security. This paper explores the robustness of digital image watermarking using transform function and machine learning. The machine learning-based digital watermarking techniques uplift the strength of security. The machine learning algorithm's primary issue is the transformation and mapping of digital image data for the conversion of digital image data using the process of transform function. The utility of the transform function is very high in the area of image processing. The transform function is directly applied in image compression, pattern recognition, and many more. In digital watermarking, the transform function provides security and compression of data—the combination of transform function and machine learning born a new dimension of digital image watermarking. The analysis of watermarking algorithms used MATLAB software and reputed image data based on empirical parameters for performance.

  • Conference Article
  • Cite Count Icon 1
  • 10.1109/cec.2016.7744006
A new approach to optimized negative selection
  • Jul 1, 2016
  • Brian Schmidt + 1 more

The Negative Selection (NS) algorithm is the first algorithm to come from the study of natural immune systems, and is the most widely known and applied algorithm in the field. It has been used to build intrusion detection systems along with many other security-related tasks. However, it has not been possible to use the Negative Selection algorithm on many real-world scenarios. The present research shows an optimization of the negative selection algorithm to make its execution faster. The optimized algorithm remains functionally the same, providing the same results as the unoptimized algorithm. Details are given about the optimization scheme used and the optimized negative selection algorithm is tested on the UCI Breast Cancer data set. The performance of the unoptimized negative selection algorithm is compared to the performance of the algorithm with the proposed optimization. Three claims about the function of the optimized negative selection algorithm are made and tested with four experiments. The results of the experiments are used to demonstrate that the algorithm is faster and does not change the negative selection algorithm or lower its accuracy. Although there has been research into the optimization of the Negative Selection algorithm, this work will only apply to hyper-sphere detectors, which has not been done before.

  • Research Article
  • Cite Count Icon 4
  • 10.4018/ijsesd.298332
Least Significant Bit-Based Image Watermarking Mechanism
  • May 20, 2022
  • International Journal of Social Ecology and Sustainable Development
  • Ranjeet Kumar Singh + 2 more

Now days, digital data security over network is a big issue. Digital data security and authentication is a big and challenge able research area in the field of computer science. A lot of security mechanisms are available for data authentication and privacy. For the purpose of data security and secure communication encryption mechanism are available, and also for data authentication several watermarking techniques are available. In this paper authors mainly focus research based on image watermarking approach by using least significant bit substitutions. Here authors represent comparative studies of different LSB based image watermarking approach.This paper mainly focuses on spatial domain based data hiding mechanism. The detail comparison is also given in the tabular form.

  • Research Article
  • 10.2196/57764
Attitudes of Health Professionals Toward Digital Health Data Security in Northwest Ethiopia: Cross-Sectional Study
  • Nov 6, 2024
  • Online Journal of Public Health Informatics
  • Ayenew Sisay Gebeyew + 12 more

BackgroundDigital health is a new health field initiative. Health professionals require security in digital places because cybercriminals target health care professionals. Therefore, millions of medical records have been breached for money. Regarding digital security, there is a gap in studies in limited-resource countries. Therefore, surveying health professionals’ attitudes toward digital health data security has a significant purpose for interventions.ObjectiveThis study aimed to assess the attitudes of health professionals toward digital health data security and their associated factors in a resource-limited country.MethodsA cross-sectional study was conducted to measure health professionals’ attitudes toward digital health data security. The sample size was calculated using a single population. A pretest was conducted to measure consistency. Binary logistic regression was used to identify associated factors. For multivariable logistic analysis, a P value ≤.20 was selected using Stata software (version 16; StataCorp LP).ResultsOf the total sample, 95% (402/423) of health professionals participated in the study. Of all participants, 63.2% (254/402) were male, and the mean age of the respondents was 34.5 (SD 5.87) years. The proportion of health professionals who had a favorable attitude toward digital health data security at specialized teaching hospitals was 60.9% (95% CI 56.0%‐65.6%). Educational status (adjusted odds ratio [AOR] 3.292, 95% CI 1.16‐9.34), basic computer skills (AOR 1.807, 95% CI 1.11‐2.938), knowledge (AOR 3.238, 95% CI 2.0‐5.218), and perceived usefulness (AOR 1.965, 95% CI 1.063‐3.632) were factors associated with attitudes toward digital health data security.ConclusionsThis study aimed to assess health professionals’ attitudes toward digital health data security. Interventions on educational status, basic computer skills, knowledge, and perceived usefulness are important for improving health professionals’ attitudes. Improving the attitudes of health professionals related to digital data security is necessary for digitalization in the health care arena.

  • Research Article
  • 10.36647/ijercse/09.09.art016
A Wavelet Based Digital Image Watermarking Technique through Encryption with DCT
  • Sep 21, 2022
  • International Journal of Engineering Research in Computer Science and Engineering
  • Manohar Gosul + 1 more

Recently, due to the increase in popularity of the Internet, the problem of digital data security over the Internet is increasing at a phenomenal rate. Watermarking is used for various notable applications to secure digital data from unauthorized individuals. Digital image watermarking is an attractive research area since it protects the multimedia data from unauthorized access. Digital images are widely communicated over the internet. The security of digital images is an essential and challenging task on shared communication channel. In the era of big data and networking, it is necessary to develop a secure and robust digital watermarking scheme with high computational efficiency to protect copyrights of digital works. Digital watermarking is need for the security of digital images to achieve security goals, i.e. confidentiality, integrity and availability. With the use of sophisticated signal/image processing algorithms, manipulations and duplications of audio, images, and videos are much easier. Hence, content authentication through encryption and resistance to general attacks such as noise, compression, and geometric has become an urgent and important issue. Hence in this work a wavelet based digital image watermarking technique through encryption with DCT (Discrete Cosine Transform) is presented that can guarantee robustness of image against salt and pepper attack.

  • Conference Article
  • Cite Count Icon 9
  • 10.1109/iic.2015.7150868
A new digital image watermarking algorithm based on image interlacing, DWT, DCT
  • May 1, 2015
  • Mahejabi Khan + 2 more

The availability of digital data such as images, audio and videos to the public is growing day by day with the expansion of the Internet. Hence preserving the rightfulness of the data is a critical factor and the solution is effectively provided by digital watermarking. Digital watermarking is a developing technology which ensures and facilitates security, authentication and copyright protection of digital data. We tries to propose a secure and robust watermarking algorithm based on the combination of image interlacing, DWT & DCT techniques. To minimize the bandwidth requirement during transmission of watermarked image EBCOT algorithm to compress the image and error correcting codes are applied to receive error free content at receiver end.

  • Research Article
  • Cite Count Icon 3
  • 10.9790/487x-2609013034
Revolutionizing Indian Healthcare: The Impact of Digital Health, AI, Telemedicine, and Data Security
  • Sep 1, 2024
  • IOSR Journal of Business and Management
  • Gaurav Bagga + 2 more

Introduction: The Indian healthcare system is in the middle of a transformative shift, driven by innovations in digital health, artificial intelligence (AI), telemedicine, and data security. These technologies are restructuring healthcare delivery, with substantial implications for patient safety, access to care, and overall efficiency. Understanding their impact is important for stakeholders seeking to navigate and leverage these innovations for improved healthcare outcomes. Methodology: This review involved a thorough analysis of current literature, case studies, and statistical data. Sources were selected based on their relevance to digital health, AI, telemedicine, and data security within the Indian healthcare context. The analysis focused on examining the benefits and challenges associated with the integration of these technologies, as well as the influence of government policies on their adoption. Results: The review underlines both- the significant benefits and challenges of integrating these technologies into the Indian healthcare system. While advancements have led to improved patient safety, increased access to care, and enhanced efficiency, they also present challenges related to infrastructure, training, and data privacy. The role of government policies has been pivotal in facilitating the adoption and growth of these technologies, providing necessary regulatory support and strategic initiatives. Conclusion: The review underscores the transformative potential of digital health, AI, telemedicine, and data security in revolutionizing Indian healthcare. However, realizing this potential requires continued government support, strategic implementation, and addressing the challenges identified. A balanced approach is essential to leverage these technologies effectively for the betterment of the nation’s healthcare system.

  • Conference Article
  • Cite Count Icon 16
  • 10.1109/icaetr.2014.7012790
A more secure transmission of medical images by two label DWT and SVD based watermarking technique
  • Aug 1, 2014
  • Yatindra Pathak + 1 more

Digital multimedia content safety has progressively become an important issue. Digital watermarking is used to copyright protection. Any digital object can be used as a carrier to transmit information. If the info is related to object then it is known as a watermark which can be invisible or visible. The exchanging of digital content such as images is rapidly growing on computer networks. Safety and security of digital data, particularly in medical images, becomes important for many causes such as confidentiality, integrity and authentication. Presently, the most appropriate method for the exchange of medical images rest in cryptography but, once decrypted, the image is no longer protected and can be copied, duplicated, distributed and falsified simply. In the world of digital information, there are multiple danger zones like integrity damages and copyright, of digital object. In case of any dispute during rights violation, content maker can demonstrate his ownership by recovering the watermark. This way, digital watermarking has speedily appeared as a new advanced technology to boost the security of digital images. Actually, the inclusion of a watermark in a medical image can validate it and guarantee its reliability. The watermark should be unremarkably hidden does not affect the feature of the medical image. Two most important prerequisites for an efficient watermarking technique are robustness and security. Watermark must be robust and recoverable even if a part of content is altered by one or more attacks like resizing, compression, filtering, geometric distortions, etc. Due to its rising popularity, the Discrete Wavelet Transform is commonly used in recent watermarking techniques. In our work first we encrypt the watermark image using a random key after that In a Discrete Wavelet Transform based technique, the DWT coefficients are altered with the data that delineate the watermark. In this article, we present a combined two label DWT and Singular Value Decomposition (SVD) based technique. After decomposing the cover digital image into four bands LL, LH, HL, and HH where LL represents the coarse level coefficient which is the low frequency part of the image and LH, HL, and HH denote the finest scale wavelet coefficient, we tend to apply the SVD to each band, and insert the same watermark data via renovating the singular values. Alteration in all frequencies permits the development of a watermarking technique that is robust to various attacks.

  • Conference Article
  • Cite Count Icon 1
  • 10.1117/12.974766
Integration of a digital watermarking system into a Morphological Scene Change Detector (MSCD) for tamper prevention and detection
  • Nov 8, 2012
  • Andrew J Tickle + 1 more

Digital image watermarking is the process of embedding information into a digital image which may be used to verify its authenticity or the identity of its owners. This is the same as paper bearing a watermark for visible identification such as in money for example. In digital watermarking, if the signal is copied, then the information also is carried in the copy, proving that the data has been copied. In this paper, a digital watermarking approach is investigated using the DSP Builder methodology in order to provide the Morphological Scene Change Detector (MSCD) with a means by which if it detects an intruder, a watermarked copy of the triggering image is produced. This is so that if the image is required as proof in a court case; it can help show that the image has not been tampered with by means of the watermark. The system uses an 8-bit greyscale image and maps a binary watermark image onto the lowest bit level; this is then used when the MSCD is triggered. For simplicity in this case, the watermark image is the same size and the target image to be watermarked, future variations with foresee a variable watermark image size. The result will be a watermarked image that if a section is copied and pasted into another file and that file is then analysed, the watermark will be visible. The process of integrating the watermarking process into the MSCD will also be discussed as this system originally used binary images to speed up the process. Finally, this watermark system can be used with any system designed as all that is required is to insert the sub-system into a larger system meaning that it is extremely interchangeable. Keywords: Digital Watermarking, Scene Change Detection, FPGA, DSP Builder.

  • Research Article
  • Cite Count Icon 1
  • 10.3390/en17143403
Detection and Classification of Voltage Disturbances in Electrical Power Systems Based on Multiresolution Analysis and Negative Selection Algorithm
  • Jul 11, 2024
  • Energies
  • Haislan Bernardes + 1 more

Early detection of threats to electrical energy distribution systems helps professionals make decisions and mitigate interruptions in supply and improper activation of the protection system. Biologically inspired methods, e.g., artificial neural networks, genetic algorithms, and ant colonies, solve optimization problems and facilitate pattern recognition and decision-making. The present work presents a tool for detecting and classifying voltage disturbances based on the negative selection algorithm, which identifies and eliminates self-reactive cells, associated with multiresolution analysis, which analyzes the signal at different scales of detail, allowing a more complete understanding and detailed description of the phenomenon in question. The negative wavelet selection algorithm demonstrates robustness to detect and classify disturbances.

  • Conference Article
  • Cite Count Icon 4
  • 10.1109/sceecs57921.2023.10063033
Digital Image Watermarking and Its Applications: A Detailed Review
  • Feb 18, 2023
  • Shaik Kashifa + 3 more

The protection of digital information has drawn significant attention in recent years. Data authentication and copyright protection issues are widely considered as two major concerns. Digital watermarking can be considered as a solution to ensure copyright protection and data authentication in which a watermark will be embedded into a digital content. Later, the watermark can be extracted to ensure copyright protection or to ensure data authentication. Robust watermarking schemes are widely used for copyright protection of digital content and fragile watermarking schemes are preferred for data authentication. The purpose of this work is to provide a thorough analysis of the domain of research regarding image watermarking methods. This manuscript gives an overview of the digital image watermarking approach, the classification of digital image watermarking schemes, and the research challenges in this domain.

  • Research Article
  • 10.32628/ijsrst251245
Digital Data Security: Integration of RSA and Pseudo-Random Prime Number Generator in Steganography Engineering
  • Jul 1, 2025
  • International Journal of Scientific Research in Science and Technology
  • Andysah Putera Utama Siahaan + 5 more

The increasing reliance on digital data exchange has raised critical concerns regarding information security and confidentiality. This research proposes a secure data hiding technique by integrating the RSA algorithm and a Pseudo-Random Prime Number Generator (PRPNG) into steganography. The objective is to enhance both the encryption efficiency and the robustness of hidden data. The method involves converting secret messages into numeric form limited to digits 0-9 to optimize the Least Significant Bit (LSB) substitution process within digital images. The encryption utilizes asymmetric RSA keys generated from dynamically selected pseudo-random prime numbers, which adds a layer of complexity and security. The experiment compared conventional and optimized steganographic approaches by measuring encryption-decryption time and the imperceptibility of the modified images. Results indicate that the optimized steganography method significantly reduces encryption time while embedding a greater amount of data without affecting visual quality. Moreover, the decryption process, while slightly slower, benefits from enhanced security due to the requirement of specific private keys, correct prime pair identification, and precise padding. This integration proves to be a viable and secure approach for embedding sensitive data in digital images, contributing to improved digital data protection in various applications, especially those requiring confidentiality, such as secure communications and digital watermarking.

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.