Content uploaded by Pradeep Kumar Singh
Author content
All content in this area was uploaded by Pradeep Kumar Singh on Apr 11, 2020
Content may be subject to copyright.
Survey of robust and imperceptible watermarking
Namita Agarwal
1
&Amit Kumar Singh
2
&Pradeep Kumar Singh
1
Received: 25 October 2018 /Revised: 20 December 2018 /Accepted: 26 December 2018 /
Published online: 8 January 2019
#Springer Science+Business Media, LLC, part of Springer Nature 2019
Abstract
Robustness, imperceptibility and embedding capacity are the preliminary requirements of any
watermarking technique. However, research concluded that these requirements are difficult to
achieve at same time. In this paper, we review various recent robust and imperceptible
watermarking methods in spatial and transform domain. Further, the paper introduces elemen-
tary concepts of digital watermarking, characteristics and novel applications of watermark in
detail. Furthermore, various analysis and comparison of different notable watermarking
techniques are discussed in tabular format. We believe that our survey contribution will helpful
for fledgling researchers to develop robust and imperceptible watermarking algorithms for
various practical applications.
Keywords Watermarking .Imperceptible .Robustness .Security .Capacity
1 Introduction
There has been a great increase in data transmission across various networks and channels for past
few decades. Nowadays, with the development of technologies, the usage and transmission of
computerized media are growing. To establish the authenticity and avoid the misuse, data should
be secured by methods like watermarking which can be done for multimedia data. Digital
watermarking averts illegal and malevolent copying and dissemination of digital images by
hiding the unremarkable ownership data in the host image [29,79]. Watermarking is a process
of embedding a single/dual watermark in terms of a tag, label or digital signal into a cover media.
Multimedia Tools and Applications (2019) 78:8603–8633
https://doi.org/10.1007/s11042-018-7128-5
*Amit Kumar Singh
amit_245singh@yahoo.com
Namita Agarwal
namita312@gmail.com
Pradeep Kumar Singh
pradeep_84cs@yahoo.com
1
Department of CSE & IT, JUIT, Solan, HP, India
2
Department of CSE, NIT Patna, Patna, India
In [4], watermark process can be defined on the basis of domain and different groups [4].
According to domain based, we can divide watermarking techniques either in spatial or in
transform domain [65]. The spatial domain approaches are initially used techniques, where
watermark embedding can be done by changing the image pixels directly. It has advantages of
low computational cost and accessible to implement. The most common in this domain is the least
significant bit (LSB) and spread spectrum and correlation based. However, discrete cosine
transforms (DCT), discrete wavelet transforms (DWT), discrete Fourier transform (DFT), singular
value decomposition (SVD) and Karhunen-Loeve transform (KLT) are the potential example of
transform domain. In the context of visibility, visible and invisible are the two different categories
of the digital watermark. Further, robust and fragile are the different classes of invisible watermark
[4]. The detail classification of watermark is presented in [4,99,118].
1.1 Watermark embedding and extraction process
Figures 1and 2shows the general process of watermark embedding and extraction [100,106],
respectively. The original cover and watermark data, and a secret key generate the
watermarked data in the watermark embedding process (Fig. 1). However, the watermark
recovery technique is the function of watermarked image/ original data, key and test data.
Same key is used for the processes. (Fig. 2).
1.2 Types of watermark systems
There are three different classes of watermarking systems reliant upon the description and
consolidation of contributions and productions [67,100,106,119]. The summary of these
systems are discussed below:
Decoder
Watermark
Secret Key
Encoder
Watermark
Secret Key
a) Embedding Process
b) Extraction Process
Test Data
Extracted
Data
Original Data
Watermarked
Data
Fig. 1 Wat er mark aEmbedding and bExtraction Process
8604 Multimedia Tools and Applications (2019) 78:8603–8633
1.) Blind Watermarking: In this type of watermarking system, extraction of watermark needs
only a watermarked image, it does not require an original image. The notable applications
of blind watermarking are healthcare, copyright protection, electronic voting system etc.
2.) Non-blind Watermarking: In such system, it copies the original image and the embedded
watermark that are necessary along with the test data for extraction. Potential applications
of this type of watermarking system are covert communication and copyright protection.
3.) Semi-blind Watermarking: It works as non-blind system, deprived of requiring the
original data for detection. Some of the important applications of such system are image
authentication, CAD models etc.
1.3 Characteristics of watermark
There are numerous vital characteristics that watermark illustrates, which are very imperative for
digital watermarking systems [106]. Figure 3depicts the elementary characteristics of watermarking.
Fig. 2 Important types watermarking system
Fig. 3 Characteristics of watermark
Multimedia Tools and Applications (2019) 78:8603–8633 8605
The capability of an algorithm to repel to noise is defined as robustness. Security
means watermark is difficult to alter or remove without destroying the cover image. The
data payload is expressed as the amount of information that it contains. Imperceptibility
leads to the transparency of watermark. Fragile watermark focused on authentication
purpose [106]. Key restrictions are taken into consideration as another different charac-
teristic that it is the level of restriction employed on the capability to read a watermark.
Computational cost is described as the total cost convoluted in enclosing and revealing
the watermarks. Rest of the important characteristics are well defined in [106].
1.4 Applications of watermark
Potential researchers are using different watermarking schemes for numerous evolving appli-
cations. The applications of watermark include copyright protection, digital forensic, military,
digital forensic, healthcare, medical applications and so on. Some of the applications are
presentedinFig.4[50,121].
1.) Copyright protection: The main goal of this watermark application is providing copy-
right protection to digital information by hiding secret information.
2.) Broadcast monitoring: It is an application that allows content proprietors to automati-
cally verify when, where and for how much time a content was broadcast through cable,
satellite television and worldly.
3.) Fingerprinting: It is a process by which the watermarked content contains the intended
recipient’s identification information in order to trace back the source of illegal
distribution.
4.) Medical applications: The watermarking techniques offer authentication and confiden-
tiality of medical data in a reversible manner. Research established that watermarking
approaches are providing a value added security tools for healthcare applications.
5.) Electronic Voting System: Internet has reached too many villages, country as well as
worldwide due to quick evolution in computer network. Electronic voting system is a
process of accompanying elections by preserving the security during the time of
Fig. 4 Applications of watermark
8606 Multimedia Tools and Applications (2019) 78:8603–8633
elections. Due to the rapid use of internet in every field like banking, shopping,
submission of tax returns, secure transaction is necessary. Clearly, it is an alternate
solution for the conduction of elections by considering the security maintenance in the
process of election. The most valuable solution for all of these problems can be achieved
by implementing digital watermarking.
6.) Remote Education: due to unavailability of teachers and other problems in villages,
distance education is becoming more powerful technique to provide education. For
distance learning a resilient requirement of smart technology is needed to develop a
remote education. Watermarking is used here to provide authentication to the transmis-
sion of data in distance learning.
7.) Chip and Hardware Protection: Mohanty et al. [71] introduced role of watermarking in
hardware design protection. Intellectual property (IP) core and hardware protection is a
multi-layered problem containing Trojan Security, buyer ownership security, security
against IP Piracy and vendor ownership [71]. On the basis of designer’s choice, digital
watermarking can be embedded in multi-level of hardware design concept.
8.) Secure data on Cloud: With the increase of images in day to day life, content-based
image retrieval is considered. Images take more storage as compared to text. So, for the
maintenance of images, cloud storage is an example [130]. Some sensitive images such
as medical and non-medical images need to be authenticated before transferring to
another place. By the cloud server a unique watermark is inserted in to the encrypted
images before images are sent to user. When an illegal image is found, by the watermark
extraction method an unauthorised user can be outlined.
In addition, we have identified some significant applications of watermarking according to
characteristics of digital watermark in brief [106]. (Table 1).
Table 1 Identified applications of watermarking according to their characteristics
Characteristics Definitions Applications
Robustness Robustness is described as an
ability of an algorithm to
resist against attacks [120].
Copyright protection
Imperceptibility It means, when perceived quality
of original image should not
be damaged by the existence
of watermark [49].
Digital imaging, telemedicine,
digital documents
False Positive Rate It is defined as a watermark
in a particular Work and
does not exists in real.
Copy control, ownership
Fragility It defends the embedded
watermark against
malevolent attacks [50].
Authentication of data and
integrity verification of
multimedia data
Security Security is the capability to resist
against intentional attacks.
Telemedicine, digital imaging,
telecommunication, multimedia
Capacity It defines by the number of watermarks
embedding in a data at a similar time.
Media distribution, Auxiliary data
embedding, tele-medicine
Multimedia Tools and Applications (2019) 78:8603–8633 8607
1.5 Watermarking attacks
In many watermarking applications, the noticeable data is probable to be treated in some way
before it spreads the watermark receiver [96]. In terms of watermarking, attack is defined by
any processing that may harm uncovering of the hidden secret information or communication
of the information carried through watermark. Further, attacked data is described by processed
watermarked data. Categorizations of some attacks are described below [106].
a.) Active attacks: In this attack, hacker efforts intentionally to remove the watermark or
simply make it undetectable. They are aimed at distorting an embedded watermark
beyond recognition. An example for active attacks is copyright protection, fingerprinting
or copy control, etc.
b.) Passive attacks: The hacker efforts to identify whether there is a watermark and identify
it in passive type attacks. There is no destruction or deletion is done. These types of
attacks are important in covert communication.
c.) Forgery attacks: This type of attacks, hacker will not remove the watermark but inserts a
new valid watermark.
d.) Collusion attacks: This attack is imprecisely different from the active attacks. The
hacker uses various instances of the same information, containing each different mark,
to build a duplicate copy without any mark.
a.) Simple attacks: The other name of this attack is waveform attack and noise attack. This
is called as simple attacks because it tried to harm the embedded watermark by changing
the whole watermark without an attempt to recognize the single watermark. Some
examples of these attacks are filtering, addition of noise, waveform-based compression
(JPEG, MPEG) and gamma correction.
b.) Ambiguity attack: These attacks are trying to confuse by generating some fake
watermarked data or fake original data. Inversion attack is an example of this attack.
c.) Cryptographic attacks: The main target of this attack is breaking the security method in
watermarking techniques and found the mode to remove the inserted watermark infor-
mation. Due to high computational complexity, application of these attack is delimited.
d.) Removal attack: Without breaking the security of watermarking technique, a complete
removal of watermark data from the watermarked data [123]. There is no use of key in
watermark embedding. This technique holds denoising and quantization.
e.) Geometric attack: In reverse of removal attacks, these attacks do not actually remove the
inserted watermark itself, but aim to change the watermark detector synchronization with
the inserted information.
Further, our paper is summarized as follows: BSummary of state-of-the-art watermarking
schemes^Section presents the brief review of various interesting watermarking methods in spatial
and transform domain. Further, we have provided analysis of state-of-the-art watermarking is
tabulated in different form. Concluding remarks is presented in our BConclusion^section.
2 Summary of related research
Researchers have provided different robust watermarking approaches for the protection of
sensitive information in various emerging applications.
8608 Multimedia Tools and Applications (2019) 78:8603–8633
A robust color image watermarking technique using decision tree induction in DCT domain
is developed [79]. The method uses DCT to transform the cover and watermark image first and
decision tree induction method uses to hide the secret watermark.
Reference [29] developed a feature-based image watermarking. By applying the affine
invariant points on image, synchronization error of image can be resolved. Experimental
demonstration is compared with several existing techniques [5,92,112] and shows presented
method is robust under several attacks.
Authors developed a watermarking algorithm using SVD and genetic algorithm [4]. The
method uses singular vector to embed the watermark into the cover. Further, GA technique
uses for enhance the performance of the proposed scheme.
The wavelet-based watermarking is presented in [65]. The method uses scaling factor to
modify the singular vector of cover image with watermark. Further, multi-objective particle
swarm optimization (MOPSO) is used to optimize the balance between conflicting factors of
watermarking. A robust - hybrid dual watermarking technique is discussed by Singh [99]. The
method uses three different transform domain techniques to hide two different watermarks and
provide robustness against attacks. Further, an encryption algorithm uses to save the execution
time and make it suitable for practical applications demanding secure, low complex and robust
watermarking. The experimental results are compared with one of the methods that is
developed by Singh et. al [103]. Further, NC values are compared with different techniques
[87,108,110]. A feature-based watermarking is developed by Tsai et al. [118]. The method
uses scale-adapted auto-correlation matrix and the Laplacian-of-Gaussian operation to deter-
mine the circular feature regions and balance the conflicting factors of watermarking. An
optimal selection process is described, expressed as a multidimensional knapsack problem
which is resolved by genetic algorithm-based heuristics. Further, the results demonstration
shows the method is secure and resistant to various attacks and also compared with different
techniques [16,92,112,127].
Support vector regression (SVR) based blind watermarking is proposed in [119]. The
embedding method uses DWT and SVD to hide watermark data into cover. Further, author
uses particle swarm optimization (PSO) to optimize the proposed method. Results discussion
show impressive enhancements in both transparency and robustness. For robustness the DSS
scheme is further compared with existing methods [10,22,61,70]. In [67], Authors proposed
a secure watermarking method through spread spectrum and transportation theory using gray
scale images. The author’s uses multiplicative embedding to provide acceptable robustness at
minimum distortion.
In order to this, Shen and Hsu developed a watermarking scheme using association rules
and vector quantization. Initially, the rules are determined for both 2D barcode and watermark
information. In the embedding process, the generated rules of the watermark information are
embedding into the association rules of the cover barcode information. The results have shown
that the scheme is secure and excellent embedding capacity [94].
A reversible and high capacity watermarking technique using rhombus pattern, sorting and
Histogram shift method is proposed by Sachnev et al. [88]. Initially, the cover media is divided
into two different sets and the payload information is embedding into both sets. The proposed
method is robust and imperceptible for different attacks. Discussed technique is compared with
existing methods and found to be superior to [44,57,115,116]methods.PeiandGuo
developed a pixel-based data-hiding approach [81]. The method uses error-diffused images
to hide the watermark data. The concepts of lookup table are using for fast recovery of the
hidden watermark (s). In addition, the method is tested for color images. Experimental
Multimedia Tools and Applications (2019) 78:8603–8633 8609
demonstrations are showing the method is robust for the printing and scanning attacks even at
high decoding rate and compared with existing method [35]. In [60], author proposed a data
perturbation method to authenticate the secret data in the original data and returns the
perturbed data back to the original one. The dataset used here for experiment is compared
with other authors [12,26,33]. The method uses adjustable weighting approach to estimate the
degree of trouble of the original data. Demonstrated results clearly indicate the method is
robust and secure at high payload.
In audio signals, direct sequence spread spectrum technique is applied for watermarking
operations [47]. The improved techniques focused on increased in robustness and impercep-
tiveness, averting desynchronization attacks, easing the removal of attacks and lastly main-
taining a covert communication with public audio channel. In [114], Author demonstrated a
secure method of watermarking through Chaotic based encryption. Security, robustness and
distortion of the algorithm are evaluated by standard performance metric and provide a
solution for medical data authentication. Proposed method shows that it attains superior results
compare to other approaches [99,134].
A modification of prediction errors (MPE) based watermarking scheme is proposed in [36].
In this method, pixel values are expected first then error values are acquired. The proposed
method is implemented in two parts first is embedding algorithm and second is extraction and
image restoration method. The PSNR value of stego image generated by MPE is greater than
48 dB. Results showed that the embedding capacity of MPE is achieved many times higher
than other techniques [44,76,116,117,133]. In [95], Authors uses the vector quantization and
data mining concepts to develop a watermarking scheme. The scheme estimates the associa-
tion rule of cover information and modify it with the association rule of secret watermark. The
method has good embedding capacity and robust for common attacks and compared with other
methods [128].
In [107], authors discussed a watermarking scheme using three different transform domain
techniques. The combination of transform domain method with Arnold makes it suitable for
copyright protection. Robustness of this technique is tested under different attacks. Further
results are compared with different existing methods [6,28,32,54,64]. This scheme can be
extended for video and audio processing.
In [77], the authors use the concepts of watermarking, 2D barcode and biometric to provide
the multilevel security of the method. The 2D barcode is considering as cover image and
biometrics traits are using as secret watermarks. The authors imperceptibly hide both water-
marks in to 2D barcode cover image at high matching score. Although the current results are
based on human vision system and better solution for the visual concept [122,124,125]. The
document integrity is provided through hologram-based watermarking in [19]. In this tech-
nique, hologram coding techniques based generated information is hiding into the personal
information written on an ID card. Different types of hologram along with advantages,
problems and important Issues of the Hologram Watermarks are also introduced in this paper.
In [9], Chang et al. proposed an improved embedding capacity watermarking method using
JPEG. The method uses least signification bitof the quantized DCT coefficients to impercep-
tibly hide the watermark at acceptable security level. In [43], author developed a watermarking
technique that works for three different datasets such as numeric, nonnumeric and strings
datasets. The author’s uses different machine learning methods to prove the method preserved
classification accuracy. Further, the method uses all available rows of data for watermarking to
provide security of the secret message. Robustness of discussed scheme is compared to other
existing technique [42]. A watermarking method combined with encryption algorithm which
8610 Multimedia Tools and Applications (2019) 78:8603–8633
gives surety of a priori and a post priori protection in [7]. The method uses different schemes to
provide reliability of the watermark at very low distortion. An ICA based watermarking
approach is presented in [75]. Initially, the watermark were produced by applying the visual
mask and taken the transpose of the produced watermark. Authors hide both watermarks in to
the host image. Results showed that it is robust besides many attacks and compared with many
existing techniques [14,48,52,53,55,68,126]. In [58], Li and Yang proposed a fragile
watermarking system using 1-D neighbourhood-forming method. Author demonstrated that
the method achieved low computational complexity and security without including the
concepts of cryptography. Watermarking operations proceeds in zigzag order.
In [134], the method uses transform techniques to hide three different encoded watermarks
into original data. Further, use of neural network makes it more robust against attacks. The
result demonstration shows the method makes the balance between conflicting factors of
watermarking and suitable for medical data authentication. However, the NC value of pro-
posed scheme is compared with other existing methods [27,103]. In [15], Delaigle et.al.
discussed a watermarking approach using grey-scale pictures. The authors uses additive
method to imperceptibly hide watermark consist of binary sequences in to the picture. Results
showed that bit-error-rate is very low and Itis resistance against lossy compression. In [13]
author provided a watermarking technique for efficient sharing of medical information. The
method uses knowledge digest (KD) to retrieve images and update databases through noisy
channel. The method also spreads to reversible scheme and pertained it to compressed images
such as JPEG. Authors proposed a watermarking scheme for medical data authentication
[113]. The method improved the robustness through combination of DWT-SVD and error
correction code. Further, author uses ‘U’component of SVD for watermark embedding to
make it free from false positive problem. Further, the experimental results are compared with
other existing methods [78,104]. Various experimental analysis shows the method is appro-
priate for medical applications.
The author presented a robust watermarking scheme that is transforming the length of
vector that match a vertex to the centre of the model via vertex scrambling [85]. Results have
shown this watermark is robust against attacks like mesh applications, an accumulation of
noise and model cropping. In [8], authors developed a secure watermarking through spread-
spectrum. The method uses a look-up-table (LUT) to imperceptibly hide spread-spectrum
watermark. The authors demonstrated that the proposed detection algorithm is efficiently fast
then traditional systems. A 3Dwatermarking algorithm in which watermark is embedded into
normal vector distributions of every patch is proposed in [56]. This technique is robust against
many attacks. The method does not require actual model to separate the watermark. A secure
multilevel watermarking is provided through wavelet and spread spectrumin [102]. The
method uses three different types of encrypted text watermarks and embedded in wavelet
coefficient of the medical cover. The results discussion show that the method is resistant to
various attacks while addresses the health data management issues. In [74], a quadratic
programming (QP) framework for watermarking to maintain the imperceptibility-robustness
trade-off is introduced. The method uses spread transform to the baseline QP system alter the
watermark embedding requirements. The robustness is increased up-to a limit where robust-
ness functioning cracked-up quicker than the baseline system.
In [1], Ali and Ahn proposed a watermarking algorithm in wavelet domain. The method
uses cuckoo search to determine the optimal scaling factors for better imperceptibility and
robustness performance. The extensive analysis of the results and discussion show the method
is efficient for various applications.
Multimedia Tools and Applications (2019) 78:8603–8633 8611
The method presented in [62], author introduced a H.264/AVC based watermarking using
BCH and DCT. The method encodes the secret information by BCH code before data hiding
and encoded watermark hide into DCT coefficients. The tested method provides high robust-
ness and embedding payload at acceptable quality of the watermarked image and compared
with other technique [63].
In [105], authors proposed three transform domain techniques based multiple watermarking
approach for practical applications. The robustness and security achieved through ECCs and
selective encryption, respectively. In addition, BPNN is applied on recovered image watermark
to provide improved robustness. Although the NC values of proposed scheme are compared
with other existing methods [30,90,97,131,132,135]. The results demonstrated in various
ways and found suitable for the application demanding robust, secure and low complexity
watermarking approaches. In [73], Najih et al. proposed a watermarking method using discrete
contourlet transform (CT) and quantization index module. The cover image is transform by CT
and coordinate points are computed for some selected coefficients. The method hides water-
mark data in to angle ratio of all image portions. Further the method uses Lagrange scheme to
minimize the watermarked distortion. Algorithm attains better transparency and good robust-
ness. Robustness of proposed scheme is compared with another existing scheme [24,66].
Kumar et al. [51] provided a watermarking technique in wavelet domain. The method
combining different transform techniques to hide watermark information into original form
of data. The method uses Arnold transform to scramble the image watermark before hide into
cover data. Further, watermarked image is compressed by set partitioning in hierarchical tree
(SPIHT) scheme to provide better performance of the proposed scheme. Results demonstration
proved the efficiency of the watermark system. Further, the proposed scheme is compared with
other similar techniques [34,46,89,91,98,101]. The author developed a low complexity and
memory requirement watermarking method using combination of LWT-QR and LSVR [69].
The cover image is transformed by LWT and low frequency sub-band is selected for embed-
ding. This frequency sub-band is divided into sub-block. The method uses QR code to
decompose each sub-block. The significant components of first row of ‘R’matrix is using
for embedding the watermark data. Results have shown that algorithm is high proficient
robustness and imperceptibility. Although the results of discussed scheme are compared with
other existing methods [72,82,109]. Duy et al. proposed machine learning based
watermarking method for EEG data in DWT domain [20]. The method uses intelligent
learning machine for recover the watermark to save memory for storing both data (EEG and
watermark). Author demonstrated that the method is resistant to various types of attacks.
Results are also compared with another discussed methods [39,40,83].
In [59], author produced a robust watermarking scheme through Quaternion Hadamard
Transform (QHT) and Schur decomposition. The method hide binary watermark into color
image. Author uses various performance metrics to evaluate the performance of the proposed
scheme. The experimental result shown that presented technique is not only imperceptible bust
also robust against many attacks. Robustness of the discussed method is compared with other
existing method [111].
The medical data authentication through watermarking is provided by Shehab et al.
[93]. The host image is first divided into blocks. The selected block is scrambled by
Arnold and the block with zero LSB is transformed by SVD. The method determines
some bits (using the blocks) to hide into the LSB of the original data. The method is
found suitable for copy and pest attack, text addition, content removal and VQ attacks.
Results have shown the superiority of the method with other state-of-the-art [18,21,80,
8612 Multimedia Tools and Applications (2019) 78:8603–8633
Table 2 Summary of some potential methods
Ref. ID Author Objective (s) Watermark system Used techniques Results Remarks Cover size/ watermark
(s) size
[79] Data mining based
robust watermarking
NA DCT, decision tree
induction,
Max PSNR = 50.8609
(Red Component)
Total no. of instances:
20480
512 × 512/32 × 32
[29] Improved feature-based
robust watermarking
NA graph theoretical
clustering
algorithm, affine
covariant regions,
indirect inverse
normalization
PSNR = greater than
40 dB
−100 images are using
for experiments.
-Determine the
detection ratio
against attacks.
-Computationally high
512 × 512 / 256-length
[4] Imperceptible and
Robust watermarking
NA SVD, GA Results are obtained at
various mutation
rates, Crossover
rate, Population
size etc.
-Number of
generations are 400
for each
experiment.
- GA run 30 times
with different
populations
256 × 256/32 × 32
[65] Imperceptible and Robust
watermarking
Blind LWT, SVD,
multi−objective
particle swarm
optimization
-PSNR = 54.907 dB
for Boat Image
-NC = 1
- Used multiple
scaling factors
256 × 256/32 × 32
[99] Low complex and Robust
watermarking using
encryption
Non-blind DWT, DCT, SVD and
encryption
-PSNR = 28.51 dB at
gain factor 0.01
- NC = 1 at gain factor
0.1
-Resistant to various
attacks
-Increased
computational
complexity
−512 × 512/512 × 512
- text watermark is of
185 characters
[118] Improvement in
robustness and security
through feature-based
watermarking
Blind noise visibility
function
PSNR = 42.21 dB
(Pepper)
-detection ratio = 0.46
(Linear)
-BER = 0.34 (Aspect
Ratio Change)
-Using UCID database
Noise visibility
function is used to
fix the embedding
strength
512 × 512/ Generated
watermark length
of 256 and repeated
16 times
Multimedia Tools and Applications (2019) 78:8603–8633 8613
Table 2 (continued)
Ref. ID Author Objective (s) Watermark system Used techniques Results Remarks Cover size/ watermark
(s) size
- Repeatability
ratio = 0.77 (JPEG
50)
[119] Imperceptible and Robust
watermarking
Blind DWT, SVD, SVR,
PSO
-PSNR>35 dB
-NC = 0.988
-PSO is used to
optimize the
scheme
- scale factor is set to
0.03
-Robust to other
techniques
512 × 512/32 × 32
[67] transportation theory
based Secure
watermarking
NA Spread-Spectrum, 9/7
Daubechies DWT
-PSNR = 44.05 dB
(Average)
-BER = 6.268750e-02
(at average PSNR)
- multiplicative
embedding
-Using 2, 000 images
to performed
experiments
512 × 512
combinations
[94] Data authentication
through watermarking
and 2D barcode
Blind Association rules
(AR) with the Vec-
tor quantization
(VQ)
PSNR = 31.62
Method
output = 60.62%
Key is using as
personal password
2D barcode
900 × 1782
grey-scale image
Watermark 480 × 360
grey-scale
[88] High capacity with less
distortion-based
watermarking
NA Watermarking
procedure with
Rhombus,
histogram shift and
Sorting Technique
Payload closed to
0.5b/pixel
- significant
improvements over
other methods
512 × 512/−
[81] Robust watermarking for
Halftone images
NA kernels-alternated
error diffusion,
Euclidean distance
lookup table, dot
and error diffusion,
ordered dither
Decoding rate = 95.77
(for 11 × 11
decoding region)
Low Computational
complexity.
-Excellent embedding
capacity
512 × 512/32 × 32
[60]Blind NA
8614 Multimedia Tools and Applications (2019) 78:8603–8633
Table 2 (continued)
Ref. ID Author Objective (s) Watermark system Used techniques Results Remarks Cover size/ watermark
(s) size
Watermarking in data
mining environments
decision tree, native
bytes and support
vector machine
Payload for
RDT = 9,000,000
(KDD cup)
PDE = 6,000,000
(KDD cup)
- execution time,
memory space and
watermark payload
are evaluated and
compared
[47] Robust and secure
watermarking for
audio signal
NA Spread spectrum,
modulated complex
lapped transform
Wat ermar k
detection = 0.0761
(copy sample)
-Robust for many
attacks
- Secure for estimation
attack
NA
[114] Secure watermarking Semi-blind NSCT, Chaotic,
RDWT and SVD
NCs > 0.7,
NPCR>0.99
UACI>0.32
PSNR>35 dB(in most
of the cases)
-Nine different types
of cover images are
considered
-Superior than others
512 × 512/256 × 256
and 128 × 128
[36] Imperceptible and high
capacity watermarking
Blind Using the concepts of
histogram-shifting
technique, median
edge detection
PSNR = 49.12 dB (for
c)
Increased
payload% = 487
- histogram of
prediction errors is
modified
512 × 512/Can embed
138,327 bits
[95] Robust watermarking
through data mining
Semi-blind Vector Quantization
and Association
Rules
PSNR and NC are
tested at different
threshold
- Method can embed
more than the size
of cover
-Threshold is defined
-Reduce the false
judgement rate
512 × 512/various
sizes
[107]Watermarkingfor
copyright protection
Blind Transform techniques
and Arnolds
PSNR = 52.34 dB
(Lena)
NC = 0.9785 (Lena)
-Free from false
positive problem 1024 × 1024/128 ×
128
[77] Secure watermarking Blind Determine the
embedding
location, selection
of threshold
PSNR = 86.47(2D
barcode),
64.33(Face-
image),
-capable of detecting
attacks
-Barcode and
biometric images
are used
Barcode with some
height and
width/Size of the
face and fingerprint
images are
Multimedia Tools and Applications (2019) 78:8603–8633 8615
Table 2 (continued)
Ref. ID Author Objective (s) Watermark system Used techniques Results Remarks Cover size/ watermark
(s) size
58.87(Finger-print
image)
-Tested the method
with different
metrics
240 × 320 and
300 × 300, respec-
tively
[19] Secure watermarking Fragile Hologram techniques NA Helps to prevent ID
card forgery
NA
[9] Watermarking with high
capacity
NA DCT, LSB PSNR = 39.14 dB
(Girl)
Compared with JPEG
hiding-tool
256 × 256/−
[43] Secure watermarking for
Outsourced Datasets
Blind Feature Ranking,
Threshold
Computation, Data
grouping, machine
learning
approaches
Better decoding
accuracies
Uses 25 different
datasets for
experimental
purpose
NA/Watermark
length = 16 bits
[7] High imperceptible
medical image
watermarking
Fragile AES, substitutive
watermarking
algorithm, QIM
PSNR is greater than
60 dB
-provides Image
integrity
100 × 100ultrasound
images of
576 × 688 pixels
[75] Robust watermarking Blind ICA PSNR = 43.99 dB
(Expt2)
Transformed image
also considered as
watermark
512 × 512/64 × 64
(Expt2)
[58] Secure watermarking at
low complexity
Blind 1-D neighborhood PSNR = 51 dB. Applicable for
important
applications
256 × 256/−
[134] Robust, imperceptible
and secure
watermarking for
7identity
authentication
NA DWT, DCT, SVD
with BPNN and
Arnold Transform
-PSNR = 43.88 dB
(0.01)
-BER = 0 (for
signature)
-NC = 0.9861 (0.08
without BPNN)
-NC = 0.9888 (0.08
without BPNN)
-Useful for prevention
of patient identity
theft
512 × 512/256 × 256
and 190 characters
[15] Robust watermarking on
Human visual model
NA Bit error rate is 3.0 2220possibilities to
choose the
NA
8616 Multimedia Tools and Applications (2019) 78:8603–8633
Table 2 (continued)
Ref. ID Author Objective (s) Watermark system Used techniques Results Remarks Cover size/ watermark
(s) size
Additive
watermarking
technique
embedding
parameters
[13] Imperceptible
Wat er marki ng f or
medical application
Blind knowledge digest PSNR = 41.7 dB Tested for
JPEG-compressed
images
- consider 750 images
for testing
365 × 378 pixels/
2373 bits
[113] Robust, imperceptible
and secure
watermarking
Blind DWT-SVD PSNR = dB
(X-ray2)BER = 0
-Also robust for
Checkmark attack
1024 × 1024/32 × 32
and 1022 bits
[85] Robust watermarking for
3D objects
NA Vertex Scrambling Correlation value = 1 - 2955 vertices and
5870 triangle faces
are present in the
mesh
-Tested for different
attacks
NA/50 bits
[8] Secure watermarking blind Look-up table,
SPREAD
SPECTRUM
Circulation LUT
correlation = 8.3 ×
109
-fast detection
algorithm
NA
[56] Imperceptible and robust
watermarking for 3D
polygonal
NA vector distribution,
Patch Classification
and Extended
Gaussian Image
(EGI)
Bit error = 0 (random
noise, cropping)
-Stanford bunny
model is used
1-bit watermark with
50 length
[102] Provide authentication for
medical data through
watermarking
NA DWT, Spread
Spectrum
PSNR = 40.02 dB and
BER = 0.1538
Achieved two level of
security
512 × 512/−
[74] 3D watermarking NA Spread spectrum
transform and
quadratic
programming (QP)
distortion close to
0.37, BER and
RMS is also
determined
-database of 10
meshes between
20 k and 100 k
vertices
NA
Multimedia Tools and Applications (2019) 78:8603–8633 8617
Table 2 (continued)
Ref. ID Author Objective (s) Watermark system Used techniques Results Remarks Cover size/ watermark
(s) size
[1] Robust and imperceptible
watermarking
NA DWT and Cuckoo
search
-PSNR = 38.0358
(both sizes of
watermark)
-NC = 0.9613 (Pepper
at 1stlevel
decomposition)
-NC = 1 (Baboon,
Lena, Pepper at 2nd
level
decomposition)
Balance between
conflicting factors
of watermarking
256 × 256/
128 × 128,64 × 64
[62] Robust and imperceptible
watermarking
blind BCH code,
H.264/AVC, DCT
-PSNR = 55.45 dB
-bit rate increases
1.06%
-Utilized to avert the
distortion drift
- video sequences are
encoded to test the
sample
I-frames/different no.
of bits
[105] Dual watermarking Non-blind DWT, DCT, SVD,
BPNN and
selective
encryption, error
correction
Max
PSNR = 34.88 dB
NC = 0.9965 (0.1)
BER = 0
-Provide a solution to
protect social
network data
512 × 512/128 × 128,
100 characters of
text watermark
[2] Robust watermarking Blind DWT and PNN PSNR = 68.27 dB and
NCC = 0.9779
-Performed better than
others
512 × 512/64 × 64
[73] Robust and imperceptible
watermarking
Fragile discrete contourlet
transform and QIM
-PSNR = 61.9914
-NCC = 1 (without
attack)
-Lagrange method is
pertained for
optimization
-High transparency
512 × 512/−
[51] Robust and secure
watermarking
NA DWT, DCT, SVD,
SPIHT and Arnold
Transform
-PSNR = 34.68 dB
(MRI)
-NC = 0.9973
(Barbara)
-SSIM = 0.995857
-SPIHT encoding
results in
compressed
watermarked
image.
512 × 512/256 × 256
[69]NA 512 × 512/32 × 32
8618 Multimedia Tools and Applications (2019) 78:8603–8633
Table 2 (continued)
Ref. ID Author Objective (s) Watermark system Used techniques Results Remarks Cover size/ watermark
(s) size
Wat er marki ng f or
copyright protection
LWT, Q R
Decomposition and
LSVR, Arnold
transform
-PSNR = 45.9283 dB
(Lena)
-NC = 1(without
attack, Filtering,
scaling)
-BER = 0
Less computational
cost and memory
constraint
[20]Watermarkingfor
outsourced EEG data
Blind DWT, support vector
data description,
Chaotic encryption
-PSNR = 66.55 (Avg)
-NC = 1
-BER = 0
-error analysis = 0.97
It achieves good
imperceptibility
and strong
robustness
NA/32 × 32
[59] Robust and imperceptible
watermarking for color
images
NA Quaternion Hadamard
transform, Schur
decomposition
-SSIM = 0.9917
(Lena)
-NC=1(Lena,
Pepper, Baboon in
no attack)
-NC = 1 (Lena) in
Gamma Correction
and Brighten
-Complexity is lower
than RGB channels
512×512×24/
64 × 64 × 2
[93] Secure and robust
watermarking for
medical images
Fragile Singular value
decomposition and
Arnold Transform
-PSNR = 38.96 dB
and tamper
localization is
99.56% (Copy and
Paste type 1) for
image plane
-NCC1= 0.9999
(content removal,
copy and paste
attack 1 for image
kidney)
-NCC
2=0.9985
(copy and paste
−12 grayscale medical
images are used
- highly reliable
512 × 512/−
Multimedia Tools and Applications (2019) 78:8603–8633 8619
Table 2 (continued)
Ref. ID Author Objective (s) Watermark system Used techniques Results Remarks Cover size/ watermark
(s) size
attack 2 for image
Liver)
-FPR = 0.89 (VQ
attack)
-FNR=0.06(copy
and paste attack 1
for image Liver)
[38]Watermarkingfor
ownership rights
blind Z language, hashing
and permutation
Accuracy rate = 100% - using Badge dataset
-It handles big data
-It guarantees original
data recovery after
watermark
decoding
−/8 bit
[37] Robust Watermarking for
relational data
Semi-Blind Watermarking
encoding and
decoding through
Genetic Algorithm
- Max mean and
variance = 55.019
and 81.697,
respectively
Number of
generations are 100
Population size is 50
-Result analysis at
different datasets
More than 300 tuples
[3] Robust watermarking for
grayscale images
NA Adaptive logo
texturization via
ALT- MA RK
PSNR = 44.21 dB
(Peppers)
NC = 0.979 (Mandrill)
Technique is efficient
in terms of
computational
speed
512 × 512/64 × 64
[11] Robust watermarking for
medical images
NA DWT, Mexican Hat
wavelet,
spread-spectrum
-Max
PSNR = 43.9986
dB
-Max NC
value = 0.9953
WDR = 20 dB
-Used Cauchy
statistical model
1024 × 1024/50 × 9
[137] Robust watermarking for
Copyright protection
NA DWT, APDCBT,
SVD, DC
coefficients
PSNR = 101.97 dB
NCC = 0.9724
-APDCBT is
introduced by
combining DWT
and SVD
512 × 512/32 × 32
8620 Multimedia Tools and Applications (2019) 78:8603–8633
Table 2 (continued)
Ref. ID Author Objective (s) Watermark system Used techniques Results Remarks Cover size/ watermark
(s) size
[136] Robust and imperceptible
watermarking
Non-blind DWT, SVD with
GDPSO
-PSNR = 36.877771
&Fitness
Value = 1.977786
(using GDPSO)
- PSNR = 39.792252
&Fitness
Value = 1.984123
(using DWT-SVD
with GDPSO)
-GDPSO gives better
results than other
alternates of PSO
-presented technique
is applied for
different attacks
also
512 × 512/512 × 512
Multimedia Tools and Applications (2019) 78:8603–8633 8621
Table 3 Analysis on Different Factors Used for Image Watermarking
Reference Number (Study ID)
Factors [79][29][4][65][99][118][119][67][94][88][81][60][47][114][36][95]
Robustness ✓×✓✓ ✓✓ ✓ ✓××✓×✓××✓
Imperceptibility ✓××✓×× × ×× ××× ✓×××
Security × ××× ×✓× ×× ××× ×✓×✓
Embedding Capacity × × × × ✓×××✓××× ×× ✓×
Accuracy × ××× ×× × ×× ××× ×× ××
Efficiency × ××× ×× × ×× ××× ×× ××
Transparency × × ✓×××✓×× ××× ×× ××
Distortions × ✓×× ×× × ×× ✓×× ×× ××
Payload × × × × × × × × × × × ✓×× ××
Computationalcomplexity× ××× ×× × ×× ××× ×× ××
Biterrorrate × ××× ×× × ×× ××× ×× ××
Preserves image quality × × × × × × × × × × × × × × × ×
Reference Number (Study ID)
Factors [107][77][19][9][43][7][75][58][134][15][13][113][85][8][56][102]
Robustness ✓××× ×× ✓×✓××✓✓×✓✓
Imperceptibility ✓××× ×× × ×✓××✓×× ✓×
Security ✓✓✓×✓××✓✓ ××✓×× ×✓
Embedding Capacity × × × ✓×× × ×× ××× ×✓××
Accuracy × ××× ×× × ×× ××× ×× ××
Efficiency × ××× ×× × ×× ××× ×× ××
Transparency × ××× ×× × ×× ××× ×× ××
Distortions × × × × × ✓× ×× ××× ×× ××
Payload × ××× ×× × ×× ××× ×× ××
Computationalcomplexity× ××× ×× × ✓× ××× ×× ××
Bit error rate × × × × × × × × × ✓×× ×× ××
Preserves image quality × × × × × × × × × × ✓×××××
Reference Number (Study ID)
Factors [74][1][62][105][2][73][51][69][20][59][93][38][37][3][11][137]
Robustness ✓ ✓✓✓ ✓✓ ✓ ✓✓ ✓✓✓ ✓✓ ✓✓
Imperceptibility × ✓×× ✓✓ ×✓✓ ✓×× ×✓××
Security × × × ✓×× ✓×× ×✓×××××
EmbeddingCapacity × ××× ×× × ×× ××× ×× ××
Accuracy × ××× ×× × ×× ××× ×× ××
8622 Multimedia Tools and Applications (2019) 78:8603–8633
Table 3 (continued)
Efficiency × ××× ×× × ×× ××× ×× ××
Transparency × ××× ×× × ×× ××× ×× ××
Distortions × ××× ×× × ×× ××× ×× ××
Payload × ××× ×× × ×× ××× ×× ××
Computationalcomplexity× ××× ×× × ×× ××× ×× ××
Biterrorrate × ××× ×× × ×× ××× ×× ××
Preserves image quality × × × × × × × × × × × × × × × ×
Factors [136] *******
Robustness ✓
Imperceptibility ✓
Security ×
Embedding Capacity ×
Accuracy ×
Efficiency ×
Transparency ×
Distortions ×
Payload ×
Computational complexity ×
Bit error rate ×
Preserves image quality ×
Multimedia Tools and Applications (2019) 78:8603–8633 8623
Table 4 Analysis on Different Techniques Used for Image Watermarking
Tec hni que s St udy I Ds
Discrete Cosine Transform (DCT) [79][107][105][51]
Singular Value Decomposition (SVD) [4][65][119 ][105][51][69][93][114]
[136]
Discrete Wavelet Transform (DWT) [119][102][1][105][2][51][136]
Discrete Contourlet Transform [73]
Discrete Fourier Transform (DFT) [47]
NSCT-RDWT-SVD-Chaotic [114]
Lifting Wavelet Transform (LWT) [65][69]
Quantized Discrete Cosine Transforms [9]
RDT Algorithm [60]
Independent Component Analysis (ICA) [75]
Reversed Watermarking [13][37,38]
Watermarking Encoding and Decoding [47][36][43][75][85][56][20][37]
Additive watermarking [15]
Vertice Scrambling [85]
Patch Classification, Extended Gaussian Image [65][56]
QR Decomposition [65][56][69]
Hybrid Techniques (DWT-SVD, DCT-SVD) (DWT-DCT-SVD) [99][107][134][113][137]
Spread Spectrum [67][8][102][74]
Transportation Theory [67]
QIM (Quantization Index Modulation) [7][73]
Z-notation [38]
Adaptive logo texturization via ALT-MARK [3]
Mexican Hat [11]
Set Partitioning in Hierarchical Trees (SPIHT) [51]
Decision Tree ID3 [79][60]
Genetic Algorithm [4][118][105][37]
Association Rules [94][95]
Vector Quantization [94][95]
Langrangian Support Vector Regression (LSVR) [65][56][69]
Probabilistic Neural Network (PNN) [2]
Back Propagation Neural Network (BPNN) [134][105]
Particle Swarm Optimization (PSO) [119]
Support Vector Regression (SVR) [119]
Graph theoretical clustering algorithm,
Affine covariant regions, Indirect inverse normalization
[29]
Modulated Complex Lapped Transform (MCLT) [47]
Native Bayes [60]
Support Vector Machine [60]
Image restoration algorithm [36]
Digital watermarking, Threshold selection [77]
Hologram techniques [19]
Block Cipher Algorithm [7]
Watermark embedding and extraction with Zigzag [58]
Look -Up Table [8]
Quadratic Programming (QP) [74]
BCH Syndrome Code [62]
Block based and hybrid pixel based digital watermarking [81]
Watermarking procedure with Rhombus, histogram shift and Sorting
Technique
[88]
Arnold Cat Map Encryption [107]
Cuckoo search [1]
Arnold Transform [134][51][93]
Quaternion Hadamard transform and Schur Decomposition [59]
Encryption [99]
Noise Visibility Function [118]
8624 Multimedia Tools and Applications (2019) 78:8603–8633
84]. In [38], Author discussed a watermarking scheme for social network data. The result
analysis shown the method is suitable for authentication of digital data. Iftikhar et al.
discussed a robust as and semi-blind reversible watermarking scheme using numerical
relational data [37]. Watermarking approach with the genetic algorithm is used to achieve
the objective of the proposed system. Results have shown that the effectiveness of the
method against malignant attacks. The author [3] presented a robust gray-scale
watermarking method that performs through adaptive texturization of the logo (ALT-
MARK). The method uses Arnold Transform to not only secure, but also texturize the
logo for improve robustness against attacks and hide the watermark data in DWT
domain. The performance analysis shows the method is better than other similar com-
peting schemes [25,28,41,86,129].
Chauhan et al. [11] presented an adaptive watermarking scheme and its detection for
medical images. The method hides Pseudo-Noise into the selected coefficients of DWT.
Author uses the statistical property of wavelet coefficients of watermarked image and prob-
ability distribution function (pdf) was utilized for designing the watermark recovery/detection
purpose. Result established that the method is superior to other competing approaches [104].
Author developed a Robust watermarking through DWT, all phase discrete cosine
biorthogonal transform (APDCBT) and SVD [137]. The host image is transformed by DWT
and selected sub-bands are using for embedding the two similar watermarks. Due to excellent
energy concentration, author uses APDCBT to provide better protection of secret data
(watermarks). Further, imperceptibility is improved by using DC coefficients is employed.
Table 4 (continued)
Tec hni que s St udy I Ds
9/7 Daubechies DWT [67]
GDPSO (Guided Dynamic Particle Swarm Optimization) [136]
Fig. 5 Identified techniques Used to improve the robustness of watermarking techniques
Multimedia Tools and Applications (2019) 78:8603–8633 8625
Result discussion is compared with other existing methods [23,64] and found to be suitable
for copyright protection.
Author discussed the algorithm Guided Dynamic-PSO (GDPSO) positively attained two
targets that is avoid stuckness and premature convergence [136]. These two are the problem of
PSO. GDPSO found the most suitable watermark asset in terms of DWT-SVD based image
watermarking scheme. Experimental study shows that it achieves the superior imperceptibility
and robustness and compared with another watermarking schemes [17,31,45]. It is also
appropriate in scaling factor for host and watermark images.
The summary of the above discussed techniques is provided in Table 2.
Based on the above extensive discussion, we have identified robustness,
imperceptibility, security and capacity are the major factors in most of the research papers.
Further, researchers are using various techniques for improving/balancing these concerns to
make the efficient watermarking system. Our study identified major factors and novel
techniques used by the potential researchers are shown in Tables 3and 4, respectively. In
Fig. 5, we have identified different efficient schemes/solutions to improve the robustness of
watermarking techniques. From Table 5,itisanalysedthatmostofthestudieshavetakenthe
size of image and size of watermark of variable length. In very few studies standard image
size of 512 × 512 pixels is mapped with 32 × 32, 64 × 64 and 128 × 128pixel size of
watermark. It is suggested that researcher must compare their results using the same size
of image with respect to same size of watermark.
3 Conclusion
In this paper, we have reviewed various robust and imperceptible watermarking methods in
spatial and transform domain. We have discussed basic concepts of digital watermarking,
important characteristics and applications of watermark in detail. Further, various analysis,
research challenges, identified solutions and comparison of different notable robust, imper-
ceptible and computationally efficient watermarking techniques are tabulated. Authors believe
that provided information in this paper will useful for active researchers to implement an
efficient watermarking system. In future, the performance comparison of other multimedia
watermarking techniques can discuss.
Table 5 Detail of Size of Cover Object and Size of Watermark Used in Different Studies on Image
Wat er marki ng
Size of
image
4×4
Pixels
32 × 32
Pixels
64× 64
Pixels
128 × 128
Pixels
256 × 256
Pixels
512 × 512 Pixels 1024 × 1024
Pixels
Size of
Wat er mark
4×4 –– – – – – –
32 × 32 –– – – [4,65][79][119][81]
[69][137]
[113]
64 × 64 –– – – [1][75][2][3]–
128 × 128 –– – [114 ][1][105][107]
256 × 256 –– – – [114][134][51]–
512 × 512 –– – – – [99][114][136]–
1024 × 1024 –– – – – – –
8626 Multimedia Tools and Applications (2019) 78:8603–8633
Publisher’sNote Springer Nature remains neutral with regard to jurisdictional claims in published maps and
institutional affiliations.
References
1. Ali M, Ahn CW (2018) An optimal image watermarking approach through cuckoo search algorithm in
wavelet domain. Int J Syst Assur Eng Manag 9(3):602–611
2. Al-Nabhani Y, Lalab HA, Wahid A, Noor RM (2015) Robust Watermarking Algorithm for Digital Images
using Discrete Wavelet and Probabilistic Neural Network. Journal of King Saud University -Computer,
and Information Sciences 27(4):393–401
3. Andalibi M, Chandler DM (2015) Digital Image Watermarking via Adaptive Logo Texturization. IEEE
Trans Image Process 24(12):5060–5073
4. Aslantas V (2008) A Singular-value Decomposition –based Image Watermarking using Genetic
Algorithm. Int J Electron Commun 62(5):386–394
5. Bas P, Chassery JM, Macq B (2002) Geometrically invariant watermarking using feature points. IEEE
Trans Image Process 11(6):1014–1028
6. Bhatnagar G, Wu QMJ, Raman B (2012) A new robust adjustable logo watermarking scheme.
Computers and Security 31(1):40–58
7. Bouslimi D, Coatrieux G, Roux C (2011) A Joint Watermarking/Encryption Algorithm for Verifying
Medical Image Integrity and Authenticity in Both Encrypted and Spatial domains. International
Conferen ce of the IEEE EMBS:8066–8069
8. Celik MU, Lemma AN, Katzenbeisser S, Veen MV (2007) Secure Embedding of Spread Spectrum
Watermarks Using Look-Up-Tables. IEEE-ICASSP 2:II-153–II-156
9. Chang CC, Chen TS, Chung LZ (2002) A Steganographic method Based upon JPEG and quantization
table modification. Inf Sci 141(1-2):123–138
10. Chang CC, Tsai P, Lin CC (2005) SVD- based digital image watermarking scheme. Pattern Recogn Lett
26(10):1577–1586
11. Chauhan DS, Singh AK, Adarsh A, Kumar B, Saini JP (2017) Combining Mexican hat wavelet
and spread spectrum for adaptive watermarking and its statistical detection using medical
images. Multimedia Tool and Applications, pp.1-15
12. Chen TS, Lee WB, Chen J, Kao YH, Hou PW (2013) Reversible privacy preserving data mining: a
combination of difference expansion and privacy preserving. J Supercomput 66(2):907–917
13. Coatrieux G, Guillou CL, Cauwin JM (2009) Reversible Watermarking for Knowledge Digest Embedding
and Reliability control in Medical Images. IEEE Trans Inf Technol Biomed 13(2):158–165
14. Cox IJ, Kilian J, Leighton T, Shamoon TG (1997) Secure spread spectrum watermarking for multimedia.
IEEE Trans Image Process 6(12):1673–1687
15. Delaigle JF, Vleeschouwer CD, Macq B (1998) Watermarking Algorithm Based on a Human Visual
Model. Signal Processing (Elsevier) 66(3):319–335
16. Deng C, Gao X, Li X, Tao D (2010) Local histogram based geometric invariant image watermarking.
Signal Process 90(12):3256–3264
17. Dharwadkar NV, Kulkarni GK, Melligeri TY, Amberker BB (2012) The image watermarking scheme
using edge information in YCbCr color space. International Proceedings of Computer Science and
Information Technology 56
18. Dhole VS, Patil NN (2015) Self embedding fragile watermarking for image tamperingdetection and image
recovery using self recovery blocks. In: Computing Communication Control and Automation,
International Conference on IEEE (ICCUBEA), pp. 752-757
19. Dittmann J, Ferri LC, Vielhauer C (2001) Hologram watermarks for document authentications.
IEEE International Conference on Information Technology: Coding and Computing: 60-64
20. Duy TP, Tran D, Ma W (2017) An intelligent learning- based watermarking scheme for outsourced
biomedical time series data. IEEE- IJCNN, pp. 4408-4415
21. El’arbi M, Amar CB (2014) Image authentication algorithm with recovery capabilities based on neural
networks in the DCT domain. IET Image Process 8(11):619–626
22. Fan MQ, Wang HX, Li SK (2008) Restudy on SVD-based watermarking scheme. Appl Math Comput
203(2):926–930
23. Fazli S, Moeini M (2016) A robust image watermarking method based on DWT, DCT and SVD using a
new technique for correction of main geometric attacks. Optik 127(2):964–972
Multimedia Tools and Applications (2019) 78:8603–8633 8627
24. Feng LP, Zheng LB, Cao P (2010) A DWT-DCT based blind watermarking algorithm for copyright
protection. In: Computer Science and Information Technology (ICCSIT), 3rd International Conference on
IEEE, vol.7, pp. 455-458
25. Fist E, Qi X (2007) A composite approach for blind grayscale logo watermarking. Proc IEEE International
Conference on Image Processing 3:III–265
26. Fung BCM, Wang K, Yu PS (2007) Anonymizing classification data for privacy preservation. IEEE Trans
Knowl Data Eng 19(5):711–725
27. Ganic E, Eskicioglu AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all
frequencies. In: Proceedings of the 2004 Workshop on Multimedia and Security, ACM, vol. 166-174
28. Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using discrete wavelet transform
and singular value decomposition. Journal of electronic imaging 14(4):043004
29. Gao X, Deng C, Li X (2010) Geometric Distortion Insensitive Image Watermarking in Affine Covariant
regions. IEEE Transactions on Systems, Man, And Cybernetics 40(3):278–286
30. Ghafoor A, Imran M (2012) A non-blind color image watermarking scheme resistent against geometric
attacks. Radioengineering 21(4):1246–1251
31. Gunjal BL (2011) Wavelet based color image watermarking scheme giving high robustness and exact
correlation. International Journal of Emerging Trends in Engineering and Technology 1(1):21–30
32. Gupta AK, Raval MS (2012) A robust and secure watermarking scheme based on singular values
replacement. Sadhana 37(4):425–440
33. Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The WEKA data mining
software: an update. ACM SIGKDD Explorations Newsletter 11(1):10–18
34. Harish NJ, Kumar BBS, Kusagur A (2013) Hybrid robust watermarking techniques based on DWT, DCT
and SVD. International Journal of Advanced Electrical and Electronics Engineering 2(5):137–143
35. Hel-Or HZ (2001) Watermarking and copyright labelling of printed images. Journal of Electronic Imaging
10(3):794–803
36. Hong W, Chen TS, Shiu CW (2009) Reversible Data Hiding for High-Quality Images using Modification
of Prediction Errors. The Journal of Systems and Software 82(11):1833–1842
37. Iftikhar S, Kamran M, Anwar Z (2015) RRW- A Robust and Reversible Watermarking Technique for
Relational Data. IEEE Trans Knowl Data Eng 27(4):1132–1145
38. Iftikhar S, Kamran M, Munir EU, Khan SU (2017) A Reversible Watermarking Technique for Social Network
Data Sets for Enabling Data Trust in Cyber, Physical and Social Computing. IEEE Syst J 11(1):197–206
39. Jero SE, Ramu P, Ramakrishnan S (2014) Discrete Wavelet Transform and Singular Value Decomposition
Based ECG Steganography for Secured Patient Information Transmission. J Med Syst 38(10):1–11
40. Jero E, Ramu P, Swaminathan R (2016) Imperceptibility-Robustness tradeoff studies for ECG steganog-
raphy using Continuous Ant Colony Optimization. Expert Syst Appl 49:123–135
41. Jin C, Tao F, Fu Y (2006) Image watermarking based HVS characteristic of wavelet transform. Intelligent
Information Hiding and Multimedia Signal Processing, pp. 71-74
42. Kamran M, Farooq M (2012) An information-preserving watermarking scheme for right protection of
EMR systems. IEEE Trans Knowl Data Eng 24(11):1950–1962
43. Kamran M, Farooq M (2013) A Formal Usability Constraints Model for Watermarking of Outsourced
Datasets. IEEE Transactions on Information Forensic and Security 8(6):1061–1072
44. Kamstra LHJ, Heijmans AM (2005) Reversible data embedding into images using wavelet techniques and
sorting. IEEE Trans Image Process 14(12):2082–2090
45. Kapoor P, Sharma KK, Bedi SS, Kumar A (2011) Colored Image Watermarking Technique based on HVS
using HSV color model. In: Proceedings of International Conference on Advances in Computer
Engineering, pp. 20-24
46. Khan MI, Rahman M, Sarker M, Hasan I (2013) Digital watermarking for image authentication based on
combined DCT, DWT and SVD transformation. Int J Comput Sci Math 10(5):223–230
47. Kirovski D, Malvar HS (2003) Spread Spectrum Watermarking for Audio Signals. IEEE Trans Signal
Process 51(4):1020–1033
48. Koch E, Zhao J (1995) Towards robust and hidden image copyright labelling. IEEE Workshop on
Nonlinear Signal and Image Processing Marmaras Greece 1174:452–455
49. Kulkarni AS, Lokhande SS (2013) Imperceptible and Robust Digital Image Watermarking Techniques in Frequency
Domain. International Journal of Computer Technology and Electronics Engineering (IJCTEE) 3:33–36
50. Kumar C, Singh AK, Kumar P (2017) A Recent Survey on Image Watermarking Techniques and Its
Applications in e-governance. Multimed Tools Appl 77(3):3597–3622
51. Kumar C, Singh AK, Kumar P (2018) Improved wavelet-based image watermarking through SPIHT.
Multimedia Tools and Applications 1-14
52. Kundur D, Hatzinakos D (1998) Digital watermarking using multiresolution wavelet decomposition.
ICASSP 5:2969–2972
8628 Multimedia Tools and Applications (2019) 78:8603–8633
53. Kutter M, Jordan F, Bossen F (1997) Digital Signature of color images using amplitude modulation.
Storage and retrieval for Image and Video Databases 2952:518–526
54. Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value
decomposition. IEEE Trans Instrum Meas 59(11):3060–3063
55. Langelaar GC, Lagendijk RL, Biemond J (1997) Robust labelling methods for copy protection of images.
Storage and retrieval for Image and Video Databases 3022:289–309
56. Lee SH, Kim TS, Kim BJ, Kwon SG, Kwon KR, Lee K (2003) 3D Polygon Meshes Watermarking Using
Normal Vector Distributions. IEEE-ICME 3:III–105
57. Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet
transform. IEEE Transaction on Information Forensics Security 2(3):321–330
58. Li CT, Yang FM (2003) One-Dimensional Neighbourhood Forming Strategy for Fragile Watermarking.
Journal of Electronic Imaging 12(2):284–292
59. Li J, Yu C, Gupta BB, Ren X (2018) Color image watermarking scheme based on quaternion Hadamard
transform and Schur decomposition. Multimed Tools Appl 77(4):4545–4561
60. Lin CY (2006) A Reversible Data Transform Algorithm Using Integer Transform for Privacy Preserving
Data Mining. The Journal of Systems & Software 117(7):104–112
61. Lin SD, Shie S, Guo JY (2010) Improving the robustness of DCT- based image watermarking against
JPEG compression. Computer Standards and Interfaces 32(1-2):54–60
62. Liu Y, Ju L, Hu M, Ma X, Zhao H (2015) A robust Reversible Data Hiding Scheme For H.264 without
Distortion Drift. Neurocomputing (Elsevier) 151(3):1053–1062
63. Liu Y, Li Z, Ma X (2012) Reversible data hiding scheme based on H.264/AVC without distortion drift.
JSW 7(5):1059–1065
64. Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting right ownership. IEEE
Transactions on Multimedia 4(1):121–128
65. Loukhaoukha K, Nabti M, Zebbiche K (2014) A Robust SVD- based Image Watermarking Using a Multi-
Objective Particle Swarm Optimization. Opto-Electronics Review 22(1):45–54
66. Malakooti M, Majlesi J (2012) Digital image watermarking based on the multiple discrete wavelets
transform and singular value decomposition. Multimedia Process 1(4)
67. Mathon B, Cayre F, Bas P (2014) Optimal Transport for Secure Spread –Spectrum Watermarking for Still
Images. IEEE Trans Image Process 23(4):1694–1705
68. Meerwald P (2001) Digital watermarking in the wavelet transform domain. Master’s Thesis, Department
of Scientific Computing, University of Salzburg
69. Mehta R, Rajpal N (2016) LWT-QR Decomposition based Robust and Efficient Image Watermarking
scheme using Lagrangian SVR. Multimedia Tools and Applications (Springer) 75(7):4129–4150
70. Mohammad AA, Alhaj A, Shaltaf S (2008) An improved SVD- based watermarking scheme for protecting
rightful ownership. Signal Process 88(9):2158–2180
71. Mohanty SP, Sengupta A, Guturu P, Kougianos E (2017) Everything you want to know about watermarking:
From Paper marks to hardware protection. IEEE Consumer Electronics Magazine 6(3):83–91
72. Naderahmadian Y, Hosseini-Khayat S (2010) Fast watermarking based on QR decomposition in wavelet
domain. In: Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 127-130
73. Najih A, Al-Haddad SAR, Ramli AR, Hashim SJ, Nematollahi MA (2017) Digital Image watermarking
based on Angle Quantization in Discrete Contourlet Transform. Journal of King Saud University-
Computer and Information Sciences 29(3):288–294
74. Neviere XR, Doerr G, Alliez P (2014) Spread transform and roughness-based shaping to improve 3D
watermarking based on quadratic programming. IEEE- ICIP, 4777-4781
75. Nguyen TV, Patra JC (2008) A Simple ICA-based Digital Image Watermarking Scheme. Digital Image
Processing 18:762–776
76. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible Data Hiding. IEEE Transactions on circuits and systems
for video technology 16(3):354–362
77. Noore A, Tungala N, Houck MM (2004) Embedding Biometric identifiers in 2D barcodes for improved
security. Computers & Security (Elsevier) 23(8):679–686
78. Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images:a robust
medical image watermarking system for E-healthcare. Multimed Tools Appl 76(8):10599–10633
79. Patel SB, Mehta TB, Pradhan SN (2011) A Unified Technique for Robust Digital Watermarking of Colour
Images using Data Mining and DCT. International Journal Internet Technology and Secured Transactions
3(1):81–96
80. Patra B, Patra JC (2012) CRT-based fragile self-recovery watermarking scheme for image authentication
and recovery. In: IEEE International Symposium on Intelligent Signal Processing and Communications
Systems (ISPACS), pp. 430-435
Multimedia Tools and Applications (2019) 78:8603–8633 8629
81. Pei SC, Guo JM (2003) Hybrid Pixel-Based Data Hiding and Block-Based Watermarking for Error-Diffused
Halftone Images. IEEE transactions on Circuits and Systems for Video Technology 13(8):867–884
82. Peng H, Wang J, Wang W (2010) Image watermarking method in multiwavelet domain based on support
vector machines. J Syst Softw 83(8):1470–1477
83. Pham TD, Tran D, Ma W (2015) A proposed blind DWT-SVD watermarking scheme for EEG data. In:
International Conference on Neural Information Processing, pp. 69-76
84. Preda RO (2014) Self-recovery of unauthentic images using a new digital watermarking approach in the
wavelet domain. In: Communications 10th International conference on IEEE,pp. 1-4
85. Qiang YZ, Ip HHS, Kowk LF (2003) Robust watermarking of 3D polygonal models based on vertice
scrambling. Proceedings of Computer Graphics International IEEE, pp. 254-257
86. Reddy VP, Varadarajan S (2010) An effective wavelet-based watermarking scheme using human visual
system for protecting copyrights of digital images. International Journal of Computer and Electrical
Engineering 2(1):32–40
87. Rosiyadi D, Horng SJ, Fan P, Wang X (2012) Copyright protection for e-government document images.
IEEE Multimedia 19(3):62–73
88. Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible Watermarking Algorithm Using Sorting
and Prediction. IEEE Transactions on Circuits and Systems for Video Technology 19(7):989–999
89. Said A, Pearlman AW (1996) A new, fast and efficient image codec based on set partitioning in
hierarchical trees. IEEE Transactions on Circuits and Systems for Video Technology 6(3):243–250
90. Santhi V, Thangavelu A (2011) DC coefficients based watermarking technique for color images using
singular value decomposition. International Journal of Computer and Electrical Engineering 3(1):8–16
91. Senapati RK, Patil UC, Mahapatra KK (2014) Reduced memory, low complexity embedded
image compression algorithm using hierarchical listless discrete Tchebichef transform. IET
Image Process 8(4):213–238
92. Seo JS, Yoo CD (2004) Localized image watermarking based on feature points of scale-space represen-
tation. Pattern Recogn 37(7):1365–1375
93. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and Robust
fragile watermarking scheme for medical images. IEEE-Access 6:10269–10278
94. Shen JJ, Hsu PW (2008) A Fragile Associative Watermarking on 2D Barcode for Data Authentication.
International Journal of Network Security 7(3):301–309
95. Shen JJ, Ren JM (2010) A robust associative watermarking technique- based on vector quantization.
Digital Signal Processing, pp. 1408-1423
96. Sherekar S, Thakare VM, Jain S (2011) Attacks and Countermeasures on Digital Watermarks:
Classification, Implications, Benchmarks. Int J Comput Sci Appl 4(2):32–45
97. Shi H, Lv F, Cao Y (2014) A Blind Watermarking technique for color image based on SVD with
circulation. Journal of software 9(7):1749–1756
98. Shivani JLD, Senapati RK (2017) Robust Image Embedded Watermarking using DCTand Listless SPIHT.
Future Intermet 9(3):33
99. Singh AK (2017) Improved Hybrid Algorithm for Robust and Imperceptible Multiple Watermarking using
Digital Images. Multimedia Tools Applications (Springer) 76(6):8881–8900
100. Singh AK, Dave M, Mohan A (2014) Wavelet-Based Image Watermarking: futuristic concepts in
Information Security. Proceedings of National Academy emerging of Sciences India Section A: Physical
Sciences 84(3):345–359
101. Singh AK, Dave M, Mohan A (2014) Hybrid Technique for Robust and Imperceptible image
watermarking in DWT-DCT-SVD domain. National Academy Science Letters 37(4):351–358
102. A.K. Singh, M. Dave and, A. Mohan, " Multilevel Encrypted Text Watermarking on Medical Images
Using Spread-Spectrum in DWT Domain," Wireless Personal Communication (Springer), vol. 83, issue 3,
pp. 2133-2150, 2015
103. Singh AK, Dave M, Mohan A (2016) Hybrid Technique for robust and imperceptible multiple
watermarking using medical images. Journal of Multimedia Tools and Applications (Springer) 75(14):
8381–8401
104. Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective
discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5(3):607–614
105. Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple Watermarking Technique for
Securing Online Social Network Contents using Back Propagation Neural Network. Future Generation
Computer Systems (Elsevier) 86:926–939
106. Singh AK, Kumar B, Singh G, Mohan A (2017) Medical image watermarking: techniques and applica-
tions. Book series on Multimedia Systems and Applications, Springer, ISBN: 978-3319576985
107. Singh D, Singh SK (2017) DWT-SVD and DCT based Robust and Blind Watermarking Scheme for
Copyright Protection. Multimed Tools Appl 76(11):13001–13024
8630 Multimedia Tools and Applications (2019) 78:8603–8633
108. Singh A, Tayal A (2012) Choice of wavelet from wavelet families for DWT-DCT-SVD image
watermarking. Int J Comput Appl 48(17):9–14
109. Song W, Hou JJ, Li ZH, Huang L (2011) Chaotic system and QR factorization based robust digital image
watermarking algorithm. J Cent S Univ Technol 18(1):116–124
110. Srivastava A, Saxena P (2013) DWT-DCT-SVD based semiblind image watermarking using middle
frequency bands. IOSR Journal of Computer Engineering 12(2):63–66
111. Su Q, Niu Y, Wang Q, Sheng G (2013) A blind color image watermarking based on DC component in the
spatial domain. Optik 124(23):6255–6260
112. Tang CW, Hang HM (2003) A feature- based robust digital image watermarking scheme. IEEE Trans
Signal Process 51(4):950–959
113. Thakkar FN, Srivastava VK (2017) A blind medical image watermarking: DWT-SVD based robust and
secure approach for telemedicine applications. Multimed Tools Appl 76(3):3669–3697
114. Thakur S, Singh AK, Ghrera SP, Mohan A (2018) Chaotic based secure watermarking approach for
medical images. Multimed Tools Appl:1–14. https://doi.org/10.1007/s11042-018-6691-0
115. Thodi DM, Rodriguez JJ (2004) Reversible watermarking by prediction-error expansion. IEEE Southwest
Symposium on Image Analysis and Interpretation: 21-25
116. Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE
Trans Image Process 16(3):721–730
117. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and
Systems for Video Technology 13(8):890–896
118. Tsai JS, Huang WB, Kuo YH, Horng MF (2012) Joint Robustness and Security Enhancement for Feature-
based Image Watermarking Using Invariant feature regions. Signal Processing (Elsevier) 92(6):1431–1445
119. Tsai HH, Jhuang YJ, Lai YS (2012) An SVD-based Image Watermarking in Wavelet Domain using SVR
and PSO. Applied Soft Computing (Elsevier) 12(8):2442–2453
120. Vacavant A (2016) A novel definition of robustness for image processing algorithms. In: International
Workshop on Reproducible Research in Pattern Recognition (pp. 75-87). Springer, Cham
121. Vallabha VH (2003) Multiresolution watermark based on wavelet transform for digital images. Cranes
Software Internat ional Limited, Bangalore
122. Van DWD, Nachtegael M, Kerre EE (2003) A new similarity measure for image processing. Journal of
Computational Methods in Sciences and Engineering 3(2):209–222
123. Voloshynovskiy S, Pereira S, Pun T, Eggers JJ, Su JK (2001) Attacks on digital watermarks: classification,
estimation-based attacks, and benchmarks. IEEE Communication Magazine 39(8):118–126
124. Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Processing Letters 9(3):81–84
125. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to
structural similarity. IEEE Trans Image Process 13(4):600–612
126. Wang HJ, Su PC, Kuo CCJ (1998) Wavelet based digital image watermarking. Opt Express 3(12):491–496
127. Wang X, Wu J, Niu P (2007) A new digital image watermarking algorithm resilient to desynchronization
attacks. IEEE Transaction on Information Forensics Security 2(4):633–655
128. Wu HC, Chang CC (2005) A novel digital image watermarking scheme based on the vector quantization
technique. Computers and Security 24(6):460–471
129. Wu X, Guan ZH (2007) A novel digital watermark algorithm based on chaotic maps. Phys Lett A 365(5-
6):403–406
130. Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy preserving and copy deterrence content-
based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and
Security 11(11):2594–2608
131. Xing Y, Tan J (2010) A color image watermarking scheme resistent against Geometrical Attacks.
Radioengineering 19(1):62–67
132. Xiong X (2015) A new robust color image watermarking scheme based on 3D-DCT. World Journal of
Engineering and Technology 3(03):177–183
133. Xuan G, Shi YQ, Chai P, Cui X, Ni Z, Tong X (2007) Optimum histogram pair based image lossless data
embedding. International Workshop on Digital Watermarking: 264-278
134. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT,
DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882
135 . Zhao M, Dang Y (2008) Color image copyright protection digital watermarking algorithm based on DWT and DCT.
In: Wireless Communications, Networking and Mobile Computing 4th international conference on IEEE, pp. 1-4
136. Zheng Z, Saxena N, Mishra KK, Sangaiah AK (2018) Guided Dynamic Particle Swarm Optimization for
Optimizing Digital Image Watermarking in Industry Applications. Futur Gener Comput Syst 88:92–106
137. Zhou X, Zhang H, Wang C (2018) A Robust Image Watermarking Technique Based on DWT, APDCBT,
and SVD. Symmetry MDPI 10(3):1–15
Multimedia Tools and Applications (2019) 78:8603–8633 8631
Namita Agarwal is currently pursuing Ph.D. from Jaypee University of Information Technology, Waknaghat,
Solan (H.P). Her research interest includes Data Hiding Techniques and Image Processing.
Amit Kumar Singh received the bachelor’s degree in computer science and engineering from the Institute of
Engineering, Veer Bahadur Singh Purvanchal University, Jaunpur, India, in 2005, the M.Tech. degree in
computer science and engineering from the Jaypee University of Information Technology, Waknaghat, India,
in 2010, and the Ph.D. degree in computer engineering from the National Institute of Technology, Kurukshetra,
India, in 2015. He was with the Computer Science and Engineering Department, Jaypee University of
Information Technology, from 2008 to 2018. He is currently an Assistant Professor with the Computer Science
and Engineering Department, National Institute of Technology at Patna (An Institute of National Importance),
Patna, India. He has authored over 80 peer-reviewed journal, conference publications, and book chapters. He has
authored two books entitled Medical Image Watermarking: Techniques and Applications, in 2017, and Animal
Biometrics: Techniques and Applications, in 2018 (Springer International Publishing). He has also edited the
book Security in Smart Cities: Models, Applications, and Challenges (Springer International Publishing, 2019),
the Proceedings of 4th IEEE International Conference on Parallel, Distributed and Grid Computing in 2016 and
the Proceedings of 4th International Conference on Image Information Processing in 2017. He currently serves
on the Editorial Board of two peer-reviewed international journals, including the IEEE ACCESS and Multimedia
Tools and Applications (Springer). He has edited various international journal special issues as a Guest Editor,
such as IEEE Consumer Electronics Magazine, IEEE Access, Multimedia Tools and Applications, Springer,
International Journal of Information Management, Elsevier, Journal of Ambient Intelligence and Humanized
Computing, Springer, Int. J. of Information and Computer Security, InderScience, International Journal of Grid
and Utility Computing, Inderscience and Journal of Intelligent Systems, Walter de Gruyter GmbH & Co. KG,
Germany. His research interests include data hiding, biometrics, & Cryptography
8632 Multimedia Tools and Applications (2019) 78:8603–8633
Pradeep Kumar Singh is currently working as Assistant Professor (Senior Grade) in Department of Computer
Science & Engineering at Jaypee University of Information Technology (JUIT), Waknaghat, H.P. He is having
10 years of vast experience in academics at reputed colleges and universities of India. He has total 215 google
scholar citations in his account. He has published 52 research papers in various conferences and Journal s of
Repute including the IEEE, Springer. He is senior member ACM & Computer Society of India (CSI-India). Dr.
Singh has edited various special issues in different Journals including the IJSSE, IGI Global USA and JTEC
Malaysia. He is reviewers of various SCI, Scopus Journals including IEEE Transactions on Industrial Informat-
ics, IEEE Communication Magazine, JST Malaysia and Various Scopus Journals from IGI Global USA. He has
received three research grants in his account from State Govt. and DST-India along with one consultancy.
Multimedia Tools and Applications (2019) 78:8603–8633 8633