Digital Watermarking for Image Authentication

  • Obaid Ur-Rehman
  • Natasa Zivic
Part of the Signals and Communication Technology book series (SCT)


This chapter serves as an introduction to digital watermarking, and various aspects pertinent to digital watermarking techniques for data authentication are discussed. The chapter is focused on multimedia authentication in general and image authentication in particular. Requirements for watermarking techniques are listed. A classification of watermarking techniques is given followed by a security analysis. Watermarking techniques for image authentication are briefly discussed in the end.


Digital watermarking Requirements Classification Robustness Perceptibility 


  1. 1.
    C. Ling, O. Ur-Rehman, Watermarking for image authentication, in Robust Image Authentication in the Presence of Noise, ed. by N. Zivic (Springer, New York, 2015), pp. 43–74Google Scholar
  2. 2.
    L. Kumar Saini, V. Shrivastava, A survey of digital watermarking techniques and its applications. Int. J. Comput. Sci. Trends Technol. 2(3) (May-Jun 2014)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Obaid Ur-Rehman
    • 1
  • Natasa Zivic
    • 1
  1. 1.Data Communications SystemsUniversity of SiegenSiegenGermany

Personalised recommendations