Advertisement

Medical Image Watermarking Techniques: A Technical Survey and Potential Challenges

  • Amit Kumar SinghEmail author
  • Basant Kumar
  • Ghanshyam Singh
  • Anand Mohan
Chapter
Part of the Multimedia Systems and Applications book series (MMSA)

Abstract

This chapter devoted to the comprehensive survey on the current state-of-the-art in the field of medical image watermarking. In addition to this, we have introduced the wavelet based watermarking techniques because the main advantages this technique are space-frequency localization, multi-resolution representation, multi-scale analysis, reducing blocking artifact, adaptability, linear complexity and compatibility with the image coding standards JPEG 2000. Further, the potential challenges of existing techniques are also discussed followed by performance comparison of important wavelet domain medical image watermarking techniques are tabulated.

Keywords

EPR DWT SVD DCT ECCs Encryptions 

References

  1. 1.
    A.K. Singh, B. Kumar, M. Dave, A. Mohan, Robust and imperceptible spread-spectrum watermarking for telemedicine applications. Proc. Natl. Acad. Sci., India Sect. A: Phys. Sci. 85(2), 295–301 (2015). doi: 10.1007/s40010-014-0197-6 CrossRefGoogle Scholar
  2. 2.
    S.A.K. Mostafa, N. El-sheimy, A.S. Tolba, F.M. Abdelkader, H.M. Elhindy, Wavelet packets-based blind watermarking for medical image management. Open Biomed. Eng. J. 4, 93–98 (2010)CrossRefGoogle Scholar
  3. 3.
    A. Al-Haj, Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images. J. Digit. Imaging 28(2), 179–187 (2015)MathSciNetCrossRefGoogle Scholar
  4. 4.
    H.-M. Chao, C.-M. Hsu, S. Miaou, A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans. Inf. Technol. Biomed. 6(1), 46–53 (2002)CrossRefGoogle Scholar
  5. 5.
    G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland, R. Collorec, Relevance of watermarking in medical imaging, in Proceedings of the IEEE EMBS Conference on Information Technology Applications in Biomedicine, Arlington, USA, pp. 250–255, 2000Google Scholar
  6. 6.
    G. Coatrieux, L. Lecornu, Ch. Roux, B. Sankur, A review of image watermarking applications in healthcare, in Proceedings of IEEE-EMBC Conference, New York, USA, pp. 4691–4694, 2006Google Scholar
  7. 7.
    U.R. Acharya, D. Anand, P.S. Bhat, U.C. Niranjan, Compact storage of medical images with patient information. IEEE Trans. Inf. Technol. Biomed. 5(4), 320–323 (2001)CrossRefGoogle Scholar
  8. 8.
    A. Giakoumaki, S. Pavlopoulos, D. Koutsouris, A medical image watermarking scheme based on wavelet transform, in Proceedings of 25th Annual International Conference of IEEE-EMBS, San Francisco, pp. 1541–1544, 2004Google Scholar
  9. 9.
    A. Giakoumaki, S. Pavlopoulos, D. Koutsouris, Secure and efficient health data management through multiple watermarking on medical images. Med. Biol. Eng. Comput. 44, 619–631 (2006)CrossRefGoogle Scholar
  10. 10.
    B. Kumar, H.V. Singh, S.P. Singh, A. Mohan, Secure spread spectrum watermarking for telemedicine applications. J. Inf. Secur. 2, 91–98 (2011)Google Scholar
  11. 11.
    N. Terzija, M. Repges, K. Luck, W. Geisselhardt, Digital image watermarking using discrete wavelet transform: performance comparison of error correction codes, in Proceedings of International Association of Science and Technology for Development, 2002Google Scholar
  12. 12.
    A.K. Singh, B. Kumar, M. Dave, A. Mohan, Robust and imperceptible dual watermarking for telemedicine applications. Wirel. Pers. Commun. 80(4), 1415–1433 (2014)Google Scholar
  13. 13.
    K.A. Navas, S.A. Thampy, M. Sasikumar, ERP hiding in medical images for telemedicine, in Proceedings of World Academy of Science and Technology, vol. 28, pp. 266–269, 2008Google Scholar
  14. 14.
    A. Kannammal, K. Pavithra, S. SubhaRani, Double watermarking of DICOM medical images using wavelet decomposition technique. Eur. J. Sci. Res. 70(1), 55–46 (2012)Google Scholar
  15. 15.
    A.K. Singh, B. Kumar, M. Dave, A. Mohan, Multiple watermarking on medical images using selective DWT coefficients. J. Med. Imaging Health Inf. 5(3), 607–614 (2015)CrossRefGoogle Scholar
  16. 16.
    D.-Ch. Lou, Ch.-H. Sung, Robust image watermarking based on hybrid transformation, in Proceedings of IEEE International Carnahan Conference on Security Technology, Taiwan, pp. 394–399, 2003Google Scholar
  17. 17.
    Md. Ouhsain, E.E. Abdallah, A.B. Hamza, An image watermarking scheme based on wavelet and multiple-parameter fractional Fourier transform, in Proceedings of IEEE International Conference on Signal Processing and Communications, Dubai, United Arab Emirates, pp. 1375–1378, 2007Google Scholar
  18. 18.
    M. Jiansheng, L. Sukang, T. Xiaomei, A digital watermarking algorithm based on DCT and DWT, in Proceedings of International Symposium on Web Information Systems and Applications, Nanchang, P.R. China, pp. 104–107, 2009Google Scholar
  19. 19.
    A.S. Hadi, B.M. Mushgil, H.M. Fadhil, Watermarking based Fresnel transform, wavelet transform, and chaotic sequence. J. Appl. Sci. Res. 5(10), 1463–1468 (2009)Google Scholar
  20. 20.
    C. Cao, R. Wang, M. Huang, R. Chen, A new watermarking method based on DWT and Fresnel diffraction transforms, in Proceedings of IEEE International Conference on Information Theory and Information Security, Beijing, pp. 433–430, 2010Google Scholar
  21. 21.
    C.-C. Lai, C.-C. Tsai, Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11), 3060–3063 (2010)CrossRefGoogle Scholar
  22. 22.
    A.A. Nakhaie, S.B. Shokouhi, No reference medical image quality measurement based on spread spectrum and discrete wavelet transform using ROI processing, in Proceedings of 24th Canadian Conference on Electrical and Computer Engineering, pp. 121–125, 2011Google Scholar
  23. 23.
    V.K. Ahire, V. Kshirsagar, Robust watermarking scheme based on discrete wavelet transform (DWT) and discrete cosine transform (DCT) for copyright protection of digital images. IJCSNS 11(8), 208–213 (2011)Google Scholar
  24. 24.
    A. Umaamaheshvari, K. Thanushkodi, High performance and effective watermarking scheme for medical images. Eur. J. Sci. Res. 67(2), 283–293 (2012)Google Scholar
  25. 25.
    M. Soliman, A.E. Hassanien, N.I. Ghali, H.M. Onsi, An adaptive watermarking approach for medical imaging using swarm intelligent. Int. J. Smart Home 6(1), 37–50 (2012)Google Scholar
  26. 26.
    M.A. Hajjaji, E.-B. Bourennane, A.B. Abdelali, A. Mtibaa, Combining Haar wavelet and Karhunen Loeve transforms for medical images watermarking. Biomed. Res. Int. 2014, 1–15 (2014)CrossRefGoogle Scholar
  27. 27.
    A. Kannammal, S. Subha Rani, Two level security for medical images using watermarking/encryption algorithms. Int. J. Imaging Syst. Technol. 24(1), 111–120 (2014)CrossRefGoogle Scholar
  28. 28.
    A. Al-Haj, A. Amer, Secured telemedicine using region-based watermarking with tamper localization. J. Digit. Imaging 27(6), 737–750 (2014)CrossRefGoogle Scholar
  29. 29.
    S. Priya, B. Santhi, P. Swaminathan, Study on medical image watermarking techniques. J. Appl. Sci. 14(14), 1638–1642 (2014)CrossRefGoogle Scholar
  30. 30.
    L. Gao, T. Gao, G. Sheng, S. Zhang, Robust medical image watermarking scheme with rotation correction, in Intelligent Data Analysis and Its Applications, Vol. 2, Advances in Intelligent Systems and Computing, ed. by J.-S. Pan et al. (Eds), vol. 298, (Springer, New York, 2014), pp. 283–292Google Scholar
  31. 31.
    D. Rosiyadi, S.-J. Horng, P. Fan, X. Wang, Copyright protection for e-government document images. IEEE Multimedia 19(3), 62–73 (2012)CrossRefGoogle Scholar
  32. 32.
    D. Rosiyadi, S.-J. Horng, N. Suryana, N. Masthurah, A comparison between the hybrid using genetic algorithm and the pure hybrid watermarking scheme. Int. J. Comput. Theory Eng. 4(3), 329–331 (2012)CrossRefGoogle Scholar
  33. 33.
    S.-J. Horng, D. Rosiyadi, T. Li, T. Takao, M. Guo, M.K. Khan, A blind image copyright protection scheme for e-government. J. Vis. Commun. Image Represent. 24(7), 1099–1105 (2013)CrossRefGoogle Scholar
  34. 34.
    S.-J. Horng, D. Rosiyadi, P. Fan, X. Wang, M.K. Khan, An adaptive watermarking scheme for e-government document images. Multimedia Tools Appl. 72(3), 3085–3103 (2014)CrossRefGoogle Scholar
  35. 35.
    A. Sharma, A.K. Singh, S.P. Ghrera, Robust and secure multiple watermarking technique for medical images. Wirel. Pers. Commun. 92(4), 1611–1624 (2017)CrossRefGoogle Scholar
  36. 36.
    R. Pandey, A.K. Singh, B. Kumar, A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology. Multimedia Tools Appl. 75, 14381 (2016). doi: 10.1007/s11042-016-3536-6 CrossRefGoogle Scholar
  37. 37.
    Y. Niu, X. Cui, Q. Li, J. Ding, A SVD-based color image watermark algorithm in DWT domain, in Advanced Graphic Communications, Packaging Technology and Materials, Lecture Notes in Electrical Engineering, vol. 369, (Springer, New York, 2015), pp. 303–309CrossRefGoogle Scholar
  38. 38.
    A. Singh, A. Tayal, Choice of wavelet from wavelet families for DWT–DCT–SVD image watermarking. Int. J. Comput. Appl. 48(17), 9–14 (2012)Google Scholar
  39. 39.
    M.I. Khan, M.M. Rahman, M.I.H. Sarker, Digital watermarking for image authentication based on combined DCT, DWT, and SVD transformation. Int. J. Comput. Sci. 10(5), 223–230 (2013)Google Scholar
  40. 40.
    A. Srivastava, P. Saxena, DWT-DCT-SVD based semi blind image watermarking using middle frequency band. IOSR J. Comput. Eng. 12(2), 63–66 (2013)CrossRefGoogle Scholar
  41. 41.
    N.J. Harish, B.B.S. Kumar, A. Kusagur, Hybrid robust watermarking techniques based on DWT, DCT, and SVD. Int.J. Adv. Electr. Electron. Eng. 2(5), 137–143 (2013)Google Scholar
  42. 42.
    A. Zear, A.K. Singh, P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools Appl. (2016). doi: 10.1007/s11042-016-3862-8
  43. 43.
    A.K. Singh, M. Dave, A. Mohan, Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools Appl. 75(14), 8381–8401 (2016)CrossRefGoogle Scholar
  44. 44.
    A.K. Singh, Improved hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools Appl. 76, 8881–8900 (2016). doi: 10.1007/s11042-016-3514-z CrossRefGoogle Scholar
  45. 45.
    H. Peng, J. Wang, W. Wang, Image watermarking method in multiwavelet domain based on support vector machines. J. Syst. Softw. 83, 1470–1477 (2010)CrossRefGoogle Scholar
  46. 46.
    G.D. Fu, H. Peng, Sub sampling-based wavelet watermarking algorithm using support vector regression, in Proceedings of EUROCON, Warsaw, pp. 9–12, 2007Google Scholar
  47. 47.
    J. Zhang, N.-C. Wang, F. Xiong, Hiding a logo watermark into the multiwavelet domain using neural networks, in Proceedings of 14th IEEE International Conference on Tools with Artificial Intelligence, pp. 477–482, 2002Google Scholar
  48. 48.
    H.-H. Tsai, D.-W. Sun, Color image watermark extraction based on support vector machines. Inf. Sci. 177(2), 550–569 (2007)CrossRefGoogle Scholar
  49. 49.
    M. Vafaei, H. Mahdavi-Nasab and H. Pourghassem (2013) A new robust blind watermarking method based on neural networks in wavelet transform domain, World Appl. Sci. J., Vo. 22, No. 11, pp. 1572–1580.Google Scholar
  50. 50.
    T. Sridevi, S.S. Fathima, Watermarking algorithm using genetic algorithm and HVS. Int. J. Comput. Appl. 74(13), 26–30 (2013)Google Scholar
  51. 51.
    X. Kang, W. Zeng, J. Huang, X. Zhuang, Y.-Q. Shi, Digital watermarking based on multi-band wavelet and principal component analysis. Proc. SPIE 5960, 1–7 (2005)Google Scholar
  52. 52.
    Z. Wang, N. Wang, B. Shi, A novel blind watermarking scheme based on neural network in wavelet domain, in Proceedings of the 6th Word Congress on Intelligent Control and Automation, Dallan, Chaina, pp. 3024–3027, 2006Google Scholar
  53. 53.
    H.-H. Tsai, C.-C. Liu, K.-C. Wang, Blind wavelet based image watermarking based on HVS and neural networks, in Proceeding of the Joint Conference on Information Sciences, Kaohsiung, Taiwan, 2006Google Scholar
  54. 54.
    S. Joo, Y. Suh, J. Shin, H. Kikuchi, A new robust watermark embedding into wavelet DC components. ETRI J. 24(5), 401–404 (2002)CrossRefGoogle Scholar
  55. 55.
    Y. Wang, A. Pearmain, Blind image data hiding based on self reference. Pattern Recogn. Lett. 25(15), 1681–1689 (2004)CrossRefGoogle Scholar
  56. 56.
    J. Ni, C. Wang, J. Huang, R. Zhang, Performance enhancement for DWT-HMM image watermarking with content-adaptive approach, in Proceeding of International Conference on Image Processing, pp. 1377–1380, 2006Google Scholar
  57. 57.
    A. Miyazaki, Improvement of watermark detection process based on bayesian estimation, in 18th European Conference on Circuit Theory and Design, pp. 408–411, 2007Google Scholar
  58. 58.
    Y. Shao, W. Chen, C. Liu, Multiwavelet based digital watermarking with support vector machine technique, in Control and Decision Conference, pp. 4557–4561, 2008Google Scholar
  59. 59.
    C.-h. Li, Z.-d. Lu, K. Zhou, An image watermarking technique based on support vector regression, in Proceeding of International Symposium Communications and Information Technology, vol. 1, pp. 183–186, 2005Google Scholar
  60. 60.
    M.-S. Hsieh, Perceptual copyright protection using multiresolution wavelet-based watermarking and fuzzy logic. Int. J. Artif. Intell. Appl. 1(3), 45–57 (2010)Google Scholar
  61. 61.
    P. Surekha, S. Sumathi, Implementation of genetic algorithm for a dwt based image watermarking scheme. ICTACT J. Soft Comput. 2(1), 244–252 (2011)CrossRefGoogle Scholar
  62. 62.
    K. Ramanjaneyulu, K. Rajarajeswari, Wavelet-based oblivious image watermarking scheme sing genetic algorithm. IET Image Process. 6(4), 364–373 (2012)MathSciNetCrossRefGoogle Scholar
  63. 63.
    W.-H. Lin, Y.-R. Wang, S.-J. Horng, A wavelet-tree based watermarking method using distance vector of binary cluster. Expert Syst. Appl. 36(6), 9869–9878 (2009)CrossRefGoogle Scholar
  64. 64.
    S.H. Wang, Y.P. Lin, Wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Process. 13(2), 154–165 (2004)CrossRefGoogle Scholar
  65. 65.
    E. Li, H. Liang, X. Niu, An integer wavelet based multiple logo-watermarking scheme, in Proceedings of the IEEE WCICA, pp. 10256–10260, 2006Google Scholar
  66. 66.
    B.K. Lien, W.H. Lin, A watermarking method based on maximum distance wavelet tree quantization, in Proceeding of 19th Conference on Computer Vision, Graphics and Image Processing, pp. 269–276, 2006Google Scholar
  67. 67.
    N. Ramamurthy, S. Varadarajank, Robust digital image watermarking scheme with neural network and fuzzy logic approach. Int. J. Emerg. Technol. Adv. Eng. 2(9), 555–562 (2012)Google Scholar
  68. 68.
    H.V. Dang, W. Kinsner, An intelligent digital colour image watermarking approach based on wavelets and general regression neural networks, in Proceeding of 11th IEEE International Conference on Cognitive Informatics and Cognitive Computing, Kyoto, pp. 115–123, 2012Google Scholar
  69. 69.
    Md. Imran, A. Ghafoor, A PCA-DWT-SVD based color image watermarking, in Proceeding of International Conference on Systems, Man, and Cybernetics, COEX, Seoul, Korea, pp. 1147–1152, 2012Google Scholar
  70. 70.
    P. Mangaiyarkarasi, S. Arulselvi, Medical image watermarking based on DWT and ICA for copyright protection, in Recent Advancements in System Modelling Applications, Lecture Notes in Electrical Engineering, ed. by R. Malathi, J. Krishnan (Eds), vol. 188, (Springer, New York, 2013), pp. 21–33Google Scholar
  71. 71.
    P.T. Selvy, V. Palanisamy, E. Soundar, A novel biometrics triggered watermarking of images based on wavelet based Contourlet transform. Int. J. Comput. Appl. Inf. Technol. 2(2), 19–24 (2013)Google Scholar
  72. 72.
    W. Wioletta, Biometric watermarking for medical images—example of Iris code. Tech. Trans. 1-M(5), 409–416 (2013)Google Scholar
  73. 73.
    S.J. Jereesha Mary, C. Seldev Christopher, S. Sebastin Antony Joe, Novel scheme for compressed image authentication using LSB watermarking and EMRC6 encryption. Circuits Syst. 7, 1722–1733 (2016)CrossRefGoogle Scholar
  74. 74.
    A. Javeed Zargar, A.K. Singh, Robust and imperceptible image watermarking in DWT-BTC domain. Int. J. Electron. Secur. Digit. Forensics 8(1), 53–62 (2016)CrossRefGoogle Scholar
  75. 75.
    J.-M. Guo, Y.-F. Liu, Joint compression/watermarking scheme using majority parity guidance and half toning-based block truncation coding. IEEE Trans. Image Process. 19(8), 2056–2069 (2010)MathSciNetCrossRefGoogle Scholar
  76. 76.
    M.H. Lin, C.C. Chang, A novel information hiding scheme based on BTC. Proc. Int. Conf. Comput. Inf. Technol. 14–16, 66–71 (2004)Google Scholar
  77. 77.
    D. Goudia, M. Chaumont, W. Puech, N.H. Said, A joint JPEG2000 compression and watermarking system using a TCQ-based quantization scheme. Vis. Inf. Process. Commun. II(VIPC 2011), 78820C–78820C (2011)Google Scholar
  78. 78.
    G. Badshah, S.-C. Liew, J. Md Zain, M. Ali, Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. J. Digit. Imaging 29(2), 216–225 (2016)CrossRefGoogle Scholar
  79. 79.
    S.D. Lin, S.-C. Shie, J.Y. Guo, Improving the robustness of DCT-based image watermarking against JPEG compression. Comput. Stand. Interfaces 32(1–2), 54–60 (2010)CrossRefGoogle Scholar
  80. 80.
    A. Reddy, B.N. Chatterji, A new wavelet based logo-watermarking scheme. Pattern Recogn. Lett. 26(7), 1019–1027 (2005)CrossRefGoogle Scholar
  81. 81.
    C.-Y. Lin, C. Yu-Tai, A robust image hiding method using wavelet technique. J. Inf. Sci. Eng. 22(1), 163–174 (2006)Google Scholar
  82. 82.
    C.C. Chang, W.L. Tai, C.C. Lin, A multipurpose wavelet based image watermarking, in Proceedings of international conference on innovative computing, information and control, Beijing, pp. 70–73, 2006Google Scholar
  83. 83.
    Y. Yusof, O.O. Khalifa, Imperceptibility and robustness analysis of DWT-based digital image watermarking, in International Conference on Computer and Communication Engineering, Kuala Lumpur, Malaysia, pp. 1325–1330, 2008Google Scholar
  84. 84.
    J.P. Yeh, C.-W. Lu, H.-J. Lin, H.-H. Wu, Watermarking technique based on DWT associated with embedding rule. Int. J. Circuits, Syst. Signal Process. 4(2), 72–82 (2010)Google Scholar
  85. 85.
    C.-Y. Lin, Y.-T. Ching, A robust image hiding method using wavelet technique. J. Inf. Sci. Eng. 22, 163–174 (2006)Google Scholar
  86. 86.
    C.-Y. Yang, W.-C. Hu, Reversible data hiding in the spatial and frequency domains. Int. J. Image Process. 3(6), 373–382 (2010)Google Scholar
  87. 87.
    H.A. Abdallah, M.M. Hadhoud, A.A. Shaalan, F.E.A. El-samie, Blind wavelet-based image watermarking. Int. J. Signal Process. Image Process. Pattern Recogn. 4(1), 15–28 (2011)Google Scholar
  88. 88.
    R. Dugad, K. Ratakonda, N. Ahuja, A new wavelet-based scheme for watermarking images, in Proceeding of the IEEE International Conference on Image Processing, Chicago, IL, USA, pp. 419–423, 1998Google Scholar
  89. 89.
    S. Bekkouche, A. Chouarfia, A new watermarking approach–combined RW/CDMA in spatial and frequency domain. Int. J. Comput. Sci. Telecommun. 2(4), 1–8 (2011)Google Scholar
  90. 90.
    K. Pal, G. Ghosh, M. Bhattacharya, Biomedical image watermarking in wavelet domain for data integrity using bit majority algorithm and multiple copies of hidden information. Am. J. Biomed. Eng. 2(2), 29–37 (2012)CrossRefGoogle Scholar
  91. 91.
    G. Bhatnagar, Q.M.J. Wu, B. Raman, Robust gray-scale logo watermarking in wavelet domain. Comput. Electr. Eng. 38(5), 1164–1176 (2012)CrossRefGoogle Scholar
  92. 92.
    W.-H. Lin, S.-J. Horng, T.-W. Kao, P. Fan, C.-L. Lee, P. Yi, An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans. Multimedia 10(5), 746–757 (2008)CrossRefGoogle Scholar
  93. 93.
    W.-H. Lin, Y.-R. Wang, S.-J. Horng, A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst. Appl. 36(6), 9869–9878 (2009)CrossRefGoogle Scholar
  94. 94.
    Q. Zhang, Y. Sun, Y. Yan, H. Liu, Q. Shang, Research on algorithm of image reversible watermarking based on compressed sensing. J. Inf. Comput. Sci. 10(3), 701–709 (2013)Google Scholar
  95. 95.
    W.J. Lin, Reconstruction algorithms for compressive sensing and their applications to digital watermarking, Beijing Jiaotong University, Beijing, 2011Google Scholar
  96. 96.
    S. Wang, D. Zheng, J. Zhao, Adaptive watermarking and tree structure based image quality estimation. IEEE Trans. Multimedia 16(2), 311–325 (2014)CrossRefGoogle Scholar
  97. 97.
    Lei Chen and Jiying Zhao, Robust Contourlet-based watermarking for depth-image-based rendering 3D images, 2016 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Nara, Japan, pp. 1-4.Google Scholar
  98. 98.
    Y.H. Lin, J.L. Wu, A digital blind watermarking for depth-image based rendering 3D images. IEEE Trans. Broadcast. 57, 602–611 (2011)CrossRefGoogle Scholar
  99. 99.
    H.D. Kim, J.W. Lee, T.W. Oh, H.K. Lee, Robust DT-CWT watermarking for DIBR 3D images. IEEE Trans. Broadcast. 58, 533–543 (2012)CrossRefGoogle Scholar
  100. 100.
    Y. Zolotavkin, M. Juhola, A new scalar quantization method for digital image watermarking. J. Electr. Comput. Eng. 2016, 1–16 (2016)Google Scholar
  101. 101.
    F. Wang, J.P. Allebach, Printed image watermarking using direct binary search Halftoning, in IEEE International Conference on Image Processing, pp. 2727–2731, 2016Google Scholar
  102. 102.
    J. Cao, H. Li, W. Luo, J. Huang, An improved spread transform dither modulation for robust and secure watermarking, in IEEE International Conference on Image Processing, pp. 2718–2722, 2016Google Scholar
  103. 103.
    S. Heidari, M. Naseri, A Novel LSB based quantum watermarking. Int. J. Theor. Phys. 55(10), 4205–4218 (2016)zbMATHCrossRefGoogle Scholar
  104. 104.
    A.K. Singh, B. Kumar, M. Dave, S.P. Ghrera, A. Mohan, Digital image watermarking: techniques and emerging applications, in Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, (IGI Global, USA, 2016), pp. 246–272. doi: 10.4018/978-1-5225-0105-3.ch011 CrossRefGoogle Scholar
  105. 105.
    A.K. Singh, M. Dave, A. Mohan, Wavelet based image watermarking: futuristic concepts in information security. Proc. Natl. Acad. Sci., India Sect. A: Phys. Sci. 84(3), 345–359 (2014)CrossRefGoogle Scholar
  106. 106.
    F. Cayre, C. Fontaine, T. Furon, Watermarking security: theory and practice. IEEE Trans. Signal Process. 53(10), 3976–3987 (2005)MathSciNetCrossRefGoogle Scholar
  107. 107.
    L.P. Freire, P. Comesana, J.R.T. Pastoriza, F.P. Gonzalez, Watermarking security: a survey, in Transactions on Data Hiding Multimedia Security, Lecture Notes in Computer Sciences, vol. 4300, (Springer, New York, 2006), pp. 41–72CrossRefGoogle Scholar
  108. 108.
    Y.-S. Seo, M.-S. Kim, H.J. Park, H.-Y. Jung, H.-Y. Chung, Y. Hug, J.-D. Lee, A secure watermarking for JPEG2000. Int. Conf. Image Process. 2, 530–533 (2001)Google Scholar
  109. 109.
    M. Vatsa, R. Singh, A. Noore, Feature based RDWT watermarking for multimodal biometric system. Image Vis. Comput. 27(3), 293–304 (2009)CrossRefGoogle Scholar
  110. 110.
    A.K. Jain, U. Uludag, Hiding Biometric Data. IEEE Trans. Pattern Anal. Mach. Intell. 25(11), 1494–1498 (2003)CrossRefGoogle Scholar
  111. 111.
    J. Zain, M. Clarke, Security in telemedicine: issue in watermarking medical images, in International Conference: Science Of Electronic, Technologies of Information and Telecommunications, 2005Google Scholar
  112. 112.
    N.A. Memon, S.A.M. Gilani, NROI watermarking of medical images for content authentication, in Proceedings of 12th IEEE International Multitopic Conference, Karachi, Pakistan, pp. 106–110, 2008Google Scholar
  113. 113.
    S. Dandapat, J. Xu, O. Chutatape, S.M. Krishnan, Wavelet transform domain data embedding in a medical image, in Proceedings 26th Annual International Conference of IEEE-EMBS, San Francisco, CA, USA, pp. 1541–1544, 2004Google Scholar
  114. 114.
    R. Ridzon, D. Levicky, Content protection in gray scale and color images based on robust digital watermarking. Telecommun. Syst. 52(3), 1617–1631 (2011)CrossRefGoogle Scholar
  115. 115.
    S.P. Nanavati, P.K. Panigrahi, Wavelets: applications to image compression-I. Resonance 10(2), 52–61 (2005)CrossRefGoogle Scholar
  116. 116.
    Y. Zhou, Joint robust watermarking and image compression, in IEEE International Workshop on Information Forensics and Security, WA, USA, pp. 1–6, 2010Google Scholar
  117. 117.
    Y. Zhou, E.-H. Yang, Joint robust watermarking and compression using variable-rate scalar quantization, in Proceedings of The 11th Canadian Workshop on Information Theory, Ottawa, Canada, 2009Google Scholar
  118. 118.
    L. Guillemot, J. Moureaux, Indexing lattice vectors in a joint watermarking and compression scheme, in IEEE International Conference on Acoustics, Speech, Signal Processing, Toulouse, France, 2006Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Amit Kumar Singh
    • 1
    Email author
  • Basant Kumar
    • 2
  • Ghanshyam Singh
    • 3
  • Anand Mohan
    • 4
  1. 1.Department of Computer Science & EngineeringJaypee University of Information TechnologyWaknaghat, SolanIndia
  2. 2.Department of Electronics and Communication EngineeringMotilal Nehru National Institute of TechnologyAllahabadIndia
  3. 3.Department of Electronics and Communication EngineeringJaypee University of Information TechnologyWaknaghat, SolanIndia
  4. 4.Department of Electronics EngineeringIndian Institute of Technology (BHU)VaranasiIndia

Personalised recommendations