Generic placeholder image

Current Forensic Science

Editor-in-Chief

ISSN (Print): 2666-4844
ISSN (Online): 2666-4852

Mini-Review Article

A Review of Digital Watermarking Approaches for Forensic Applications

Author(s): Rishi Sinhal, Irshad Ahmad Ansari* and Om Prakash Verma

Volume 1, 2023

Published on: 27 March, 2023

Article ID: e020223213376 Pages: 10

DOI: 10.2174/2666484401666230202121526

Abstract

There has been remarkable growth in the digital domain. This has led to the production of a huge amount of digital data in the form of text messages, documents, audio/speech signals, digital images, videos, etc. In forensics, digital information (i.e., images of crime scenes, etc.) is very important to examine cases and collect the proof regarding the incident. This further leads to judge the victims and culprits by the court for appropriate actions. So, even a slight change (intentional/ unintentional) may lead to the wrong judgement. Several digital signal processing tools are easily available to process this type of digital data, which means data may get disrupted, altered, or deform in such a way that the authenticity gets compromised. In such cases, it can be difficult to recognize the source information as well as to check the originality/intactness of the digital data. In the recent past, several techniques have come into existence to protect digital data against security issues. Steganography, cryptography, and watermarking are examples of security techniques, which have been widely used for data security and forensic applications for a long time. Specifically, digital watermarking techniques provide many useful features to help users regarding data security and authentication without affecting other data characteristics. This work is an attempt to provide a review of recent digital image watermarking approaches for forensic applications.

Keywords: Digital watermarking, forensic applications, signal processing, proof of tampering, steganography, cryptography.

[1]
Schmidt E, Cohen J. The new digital age: Reshaping the future of people, nations and business. Hachette UK Limited 2013.
[2]
Wójcik OP, Brownstein JS, Chunara R, Johansson MA. Public health for the people: participatory infectious disease surveillance in the digital age. Emerg Themes Epidemiol 2014; 11(1): 7.
[http://dx.doi.org/10.1186/1742-7622-11-7] [PMID: 24991229]
[3]
R D. R D. Light weight CNN based robust image watermarking scheme for security. J Info Technol Digital World 2021; 3(2): 118-32.
[http://dx.doi.org/10.36548/jitdw.2021.2.005]
[4]
Sharma R, Davuluri K. Security Analysis for Machine Learning and Image Processing Related Information Systems. InImage Processing and Capsule Networks: ICIPCN 2020. Springer International Publishing 2021; pp. 135-47.
[http://dx.doi.org/10.1007/978-3-030-51859-2_13]
[5]
Fianyi I. Curbing cyber-crime and Enhancing e-commerce security with digital forensics. arXiv preprint arXiv:1610.08369. 2016 Jan; 18.
[http://dx.doi.org/10.48550/arXiv.1610.08369]
[6]
Raghavan S. Digital forensic research: current state of the art. CSI Trans ICT 2013; 1(1): 91-114.
[http://dx.doi.org/10.1007/s40012-012-0008-7]
[7]
Chang CC, Lin PY. Adaptive watermark mechanism for rightful ownership protection. J Syst Softw 2008; 81(7): 1118-29.
[http://dx.doi.org/10.1016/j.jss.2007.07.036]
[8]
Anand A, Singh AK. Watermarking techniques for medical data authentication: a survey. Multimedia Tools Appl 2021; 80(20): 30165-97.
[http://dx.doi.org/10.1007/s11042-020-08801-0]
[9]
Fridrich J. Image watermarking for tamper detection. InProceedings 1998 International Conference on Image Processing ICIP98 (Cat No 98CB36269). 1998 Oct 7; (Vol. 2: pp. 404-408). IEEE.
[http://dx.doi.org/10.1109/ICIP.1998.723401]
[10]
Sinhal R, Sharma TK, Ansari IA, Bajaj V. Blind image watermarking with efficient dual restoration feature. InAdvanced Security Solutions for Multimedia 2021. Sep 1. IOP Publishing.
[http://dx.doi.org/10.1088/978-0-7503-3735-9ch1]
[11]
Masrom M, Rahimly A. Overview of data security issues in hospital information systems. Pac Asia J Assoc Info Syst 2015; 7(4): 51-66.
[http://dx.doi.org/10.17705/1pais.07404]
[12]
Kahn D. The history of steganography. InInformation Hiding: First International Workshop Cambridge, UK, May 30-June 1, 1996 Proceedings. 2005 Jun 9; (pp. 1-5). Berlin, Heidelberg: Springer Berlin Heidelberg..
[http://dx.doi.org/10.1007/3-540-61996-8_27]
[13]
Menezes AJ, Van Oorschot PC, Vanstone SA. Handbook of applied cryptography. CRC Press 2018.
[14]
Cox IJ, Miller ML, Bloom JA, Honsinger C. Digital watermarking San Francisco: Morgan Kaufmann 2002; 53.
[15]
Hariri M, Karimi R, Nosrati M. An introduction to steganography methods. World Appl Program 2011; 1(3): 191-5.
[16]
Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: Survey and analysis of current methods. Signal Process 2010; 90(3): 727-52.
[http://dx.doi.org/10.1016/j.sigpro.2009.08.010]
[17]
Provos N, Honeyman P. Hide and seek: an introduction to steganography. IEEE Secur Priv 2003; 1(3): 32-44.
[http://dx.doi.org/10.1109/MSECP.2003.1203220]
[18]
Sallee P. Model-based steganography. InIWDW 2003 Oct 20; (Vol. 2939: pp. 154-167).
[http://dx.doi.org/10.1007/978-3-540-24624-4_12]
[19]
Kessler G C. An overview of cryptography. In: Handbook on Local Area Networks. 2003.
[20]
Dolev D, Dwork C, Naor M. Nonmalleable cryptography. SIAM Rev 2003; 45(4): 727-84.
[http://dx.doi.org/10.1137/S0036144503429856]
[21]
Diffie W, Hellman ME. New directions in cryptography. In: Secure communications and asymmetric cryptosystems. Routledge 2019; pp. 143-80.
[22]
Katzenbeisser S, Petitcolas FAP. Digital watermarking. London: Artech House 2000.
[23]
Podilchuk CI, Delp EJ. Digital watermarking: algorithms and applications. IEEE Signal Process Mag 2001; 18(4): 33-46.
[http://dx.doi.org/10.1109/79.939835]
[24]
Mohanty SP. 1999. Digital watermarking: A tutorial review. 1999. Available from: http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey 1999Mohanty.pdf
[25]
Cox I, Miller M, Bloom J, Fridrich J, Kalker T. Digital watermarking and steganography. Morgan Kaufmann; 2007 Nov 23;
[26]
Desai HV. Steganography, cryptography, watermarking: A comparative study. J Global Res Comput Sci 2012; 3(12): 33-5.
[27]
Razzaq MA, Shaikh RA, Baig MA, Memon AA. Digital image security: Fusion of encryption, steganography and watermarking. Int J Adv Comput Sci Appl 2017; 8(5)
[28]
Ali Z, Imran M, McClean S, Khan N, Shoaib M. Protection of records and data authentication based on secret shares and watermarking. Future Gener Comput Syst 2019; 98: 331-41.
[http://dx.doi.org/10.1016/j.future.2019.01.050]
[29]
Sinhal R, Sharma S, Ansari IA, Bajaj V. Multipurpose medical image watermarking for effective security solutions. Multimedia Tools Appl 2022; 81(10): 14045-63.
[http://dx.doi.org/10.1007/s11042-022-12082-0] [PMID: 35233177]
[30]
Berghel H, O’Gorman L. Protecting ownership rights through digital watermarking. Computer 1996; 29(7): 101-3.
[http://dx.doi.org/10.1109/2.511977]
[31]
Halder R, Pal S, Cortesi A. Watermarking techniques for relational databases: Survey, classification and comparison. J Univers Comput Sci 2010; 16(21): 3164-90.
[32]
Lee SJ, Jung SH. A survey of watermarking techniques applied to multimedia. InISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat No 01TH8570). 2001 Jun 12; (Vol. 1: pp. 272-277). IEEE.
[http://dx.doi.org/10.1109/ISIE.2001.931796]
[33]
Song C, Sudirman S, Merabti M. Recent advances and classification of watermarking techniques in digital images. Proceedings of Post Graduate Network Symposium. 2009; pp. 1-6.
[34]
Barnett R. Digital watermarking: applications, techniques and challenges. Electron Commun Eng J 1999; 11(4): 173-83.
[http://dx.doi.org/10.1049/ecej:19990401]
[35]
Rashid A. Digital watermarking applications and techniques: A brief review. Int J Comput Appl Technol Res 2016; 5(3): 147-50.
[http://dx.doi.org/10.7753/IJCATR0503.1006]
[36]
Sharma RK, Decker S. Practical challenges for digital watermarking applications. EURASIP J Adv Signal Process 2002; 2002(2): 1-7.
[37]
Begum M, Uddin MS. Digital image watermarking techniques: A review. Information (Basel) 2020; 11(2): 110.
[http://dx.doi.org/10.3390/info11020110]
[38]
Setiadi DRIM. PSNR vs. SSIM: Imperceptibility quality assessment for image steganography. Multimed Tools Appl 2021; 80: 8423-44.
[http://dx.doi.org/10.1007/s11042-020-10035-z]
[39]
Sinhal R, Ansari IA. Multipurpose image watermarking: Ownership check, tamper detection and self-recovery. Circuits Syst Signal Process 2022; 41(6): 3199-221.
[http://dx.doi.org/10.1007/s00034-021-01926-z]
[40]
Sinhal R, Ansari IA. Tunable Q-factor wavelet transform-based robust image watermarking scheme using logistic mapping and antlion optimization. Circuits Syst Signal Process 2022; 41(11): 6370-410.
[http://dx.doi.org/10.1007/s00034-022-02090-8]
[41]
Ernawan F, Kabir MN. A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access 2018; 6: 20464-80.
[http://dx.doi.org/10.1109/ACCESS.2018.2819424]
[42]
Liu D, Su Q, Yuan Z, Zhang X. A blind color digital image watermarking method based on image correction and eigenvalue decomposition. Signal Process Image Commun 2021; 95: 116292.
[http://dx.doi.org/10.1016/j.image.2021.116292]
[43]
Prajwalasimha SN, Chethan Suputhra S, Mohan CS. Performance analysis of DCT and successive division based digital image watermarking scheme. Ind J Electr Eng Comput Sci 2019; 15(2): 750-7.
[http://dx.doi.org/10.11591/ijeecs.v15.i2.pp750-757]
[44]
Ferreira WD, Ferreira CBR, da Cruz Júnior G, Soares F. A review of digital image forensics. Comput Electr Eng 2020; 85: 106685.
[http://dx.doi.org/10.1016/j.compeleceng.2020.106685]
[45]
Koley S. A feature adaptive image watermarking framework based on phase congruency and symmetric key cryptography. J King Saud Univ - Comput Inf Sci 2019; 34(3): 636-45.
[46]
Sinhal R, Jain DK, Ansari IA. Machine learning based blind color image watermarking scheme for copyright protection. Pattern Recognit Lett 2021; 145: 171-7.
[http://dx.doi.org/10.1016/j.patrec.2021.02.011]
[47]
Hosny KM, Darwish MM, Li K, Salah A. Parallel multi-core CPU and GPU for fast and robust medical image watermarking. IEEE Access 2018; 6: 77212-25.
[http://dx.doi.org/10.1109/ACCESS.2018.2879919]
[48]
Voloshynovskiy S, Pereira S, Pun T, Eggers JJ, Su JK. Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Commun Mag 2001; 39(8): 118-26.
[http://dx.doi.org/10.1109/35.940053]
[49]
Nyeem H, Boles W, Boyd C. Digital image watermarking: Its formal model, fundamental properties and possible attacks. EURASIP J Adv Signal Process 2014; 2014(1): 1-22.
[50]
Agarwal N, Singh AK, Singh PK. Survey of robust and imperceptible watermarking. Multimedia Tools Appl 2019; 78(7): 8603-33.
[http://dx.doi.org/10.1007/s11042-018-7128-5]
[51]
Nikolaidis N, Pitas I. Robust image watermarking in the spatial domain. Signal Process 1998; 66(3): 385-403.
[http://dx.doi.org/10.1016/S0165-1684(98)00017-6]
[52]
Barni M, Bartolini F, Cappellini V, Piva A. A DCT-domain system for robust image watermarking. Signal Process 1998; 66(3): 357-72.
[http://dx.doi.org/10.1016/S0165-1684(98)00015-2]
[53]
Lai CC. An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 2011; 284(4): 938-44.
[http://dx.doi.org/10.1016/j.optcom.2010.10.047]
[54]
Mehta R, Rajpal N, Vishwakarma VP. LWT- QR decomposition based robust and efficient image watermarking scheme using Lagrangian SVR. Multimedia Tools Appl 2016; 75(7): 4129-50.
[http://dx.doi.org/10.1007/s11042-015-3084-5]
[55]
Mishra A, Rajpal A, Bala R. Bi-directional extreme learning machine for semi-blind watermarking of compressed images. J Info Secur Appl 2018; 38: 71-84.
[http://dx.doi.org/10.1016/j.jisa.2017.11.008]
[56]
Srivastava R, Kumar B, Singh AK, Mohan A. Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach. Multimedia Tools Appl 2018; 77(13): 16447-59.
[http://dx.doi.org/10.1007/s11042-017-5214-8]
[57]
Moosazadeh M, Ekbatanifard G. A new DCT-based robust image watermarking method using teaching-learning-Based optimization. J Info Secur Appl 2019; 47: 28-38.
[http://dx.doi.org/10.1016/j.jisa.2019.04.001]
[58]
Ernawan F, Kabir MN. A block-based RDWT-SVD image watermarking method using human visual system characteristics. Vis Comput 2020; 36(1): 19-37.
[http://dx.doi.org/10.1007/s00371-018-1567-x]
[59]
Pourhadi A, Mahdavi-Nasab H. A robust digital image watermarking scheme based on bat algorithm optimization and SURF detector in SWT domain. Multimedia Tools Appl 2020; 79(29-30): 21653-77.
[http://dx.doi.org/10.1007/s11042-020-08960-0]
[60]
Sisaudia V, Vishwakarma VP. Copyright protection using KELMPSO based multi-spectral image watermarking in DCT domain with local texture information based selection. Multimedia Tools Appl 2020; 1-22.
[61]
Niu P, Wang L, Shen X, Zhang S, Wang X. A novel robust image watermarking in quaternion wavelet domain based on superpixel segmentation. Multidimens Syst Signal Process 1509; 31(4): 1509-30.
[http://dx.doi.org/10.1007/s11045-020-00718-z]
[62]
Wang J, Liu G, Dai Y, Sun J, Wang Z, Lian S. Locally optimum detection for Barni’s multiplicative watermarking in DWT domain. Signal Process 2008; 88(1): 117-30.
[http://dx.doi.org/10.1016/j.sigpro.2007.07.012]
[63]
Peng H, Wang J, Wang W. Image watermarking method in multiwavelet domain based on support vector machines. J Syst Softw 2010; 83(8): 1470-7.
[http://dx.doi.org/10.1016/j.jss.2010.03.006]
[64]
Ali M, Ahn CW, Siarry P. Differential evolution algorithm for the selection of optimal scaling factors in image watermarking. Eng Appl Artif Intell 2014; 31: 15-26.
[http://dx.doi.org/10.1016/j.engappai.2013.07.009]
[65]
Ansari IA, Pant M, Ahn CW. ABC optimized secured image watermarking scheme to find out the rightful ownership. Optik (Stuttg) 2016; 127(14): 5711-21.
[http://dx.doi.org/10.1016/j.ijleo.2016.03.070]
[66]
Gao Y, Wang J, Shi YQ. Dynamic multi-watermarking and detecting in DWT domain. J Real-Time Image Process 2019; 16(3): 565-76.
[http://dx.doi.org/10.1007/s11554-018-0812-x]
[67]
Zhu X, Ho ATS, Marziliano P. A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process Image Commun 2007; 22(5): 515-28.
[http://dx.doi.org/10.1016/j.image.2007.03.004]
[68]
Zhang X, Wang S. Fragile watermarking with error-free restoration capability. IEEE Trans Multimed 2008; 10(8): 1490-9.
[http://dx.doi.org/10.1109/TMM.2008.2007334]
[69]
Zhang X, Wang S, Qian Z, Feng G. Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 2011; 20(2): 485-95.
[http://dx.doi.org/10.1109/TIP.2010.2066981] [PMID: 20716503]
[70]
Zhang X, Qian Z, Ren Y, Feng G. Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inf Forensics Secur 2011; 6(4): 1223-32.
[http://dx.doi.org/10.1109/TIFS.2011.2159208]
[71]
He H, Chen F, Tai HM, Kalker T, Zhang J. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans Inf Forensics Secur 2012; 7(1): 185-96.
[http://dx.doi.org/10.1109/TIFS.2011.2162950]
[72]
Qin C, Chang CC, Chen PY. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 2012; 92(4): 1137-50.
[http://dx.doi.org/10.1016/j.sigpro.2011.11.013]
[73]
Chang JD, Chen BH, Tsai CS. LBP-based fragile watermarking scheme for image tamper detection and recovery. In2013 international symposium on next-generation electronics 2013. Feb 25 (pp. 173-176). IEEE.
[http://dx.doi.org/10.1109/ISNE.2013.6512330]
[74]
Das S, Kundu MK. Effective management of medical information through ROI-lossless fragile image watermarking technique. Comput Methods Programs Biomed 2013; 111(3): 662-75.
[http://dx.doi.org/10.1016/j.cmpb.2013.05.027] [PMID: 23816251]
[75]
Eswaraiah R, Sreenivasa Reddy E. Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl 2014; 2014: 1-10.
[http://dx.doi.org/10.1155/2014/984646] [PMID: 25328515]
[76]
Ansari IA, Pant M, Ahn CW. SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 2016; 7(6): 1225-39.
[http://dx.doi.org/10.1007/s13042-015-0455-1]
[77]
Wang C, Zhang H, Zhou X. A self-recovery fragile image watermarking with variable watermark capacity. Appl Sci (Basel) 2018; 8(4): 548.
[http://dx.doi.org/10.3390/app8040548]
[78]
Daneshmandpour N, Danyali H, Helfroush MS. Image tamper detection and multi-scale self-recovery using reference embedding with multi-rate data protection. China Commun 2019; 16(11): 154-66.
[http://dx.doi.org/10.23919/JCC.2019.11.013]
[79]
Lee CF, Shen JJ, Chen ZR, Agrawal S. Self-embedding authentication watermarking with effective tampered location detection and high-quality image recovery. Sensors (Basel) 2019; 19(10): 2267.
[http://dx.doi.org/10.3390/s19102267] [PMID: 31100886]
[80]
Molina-Garcia J, Garcia-Salgado BP, Ponomaryov V, Reyes-Reyes R, Sadovnychiy S, Cruz-Ramos C. An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process Image Commun 2020; 81: 115725.
[http://dx.doi.org/10.1016/j.image.2019.115725]
[81]
Badshah G, Liew SC, Zain JM, Ali M. Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) loss-less compression technique. J Digit Imaging 2016; 29(2): 216-25.
[http://dx.doi.org/10.1007/s10278-015-9822-4] [PMID: 26429361]
[82]
Chun-Shien Lu CS, Liao HYM. Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 2001; 10(10): 1579-92.
[http://dx.doi.org/10.1109/83.951542] [PMID: 18255500]
[83]
Liu XL, Lin CC, Yuan SM. Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans Circ Syst Video Tech 2018; 28(5): 1047-55.
[http://dx.doi.org/10.1109/TCSVT.2016.2633878]
[84]
Singh P, Agarwal S. A self recoverable dual watermarking scheme for copyright protection and integrity verification. Multimedia Tools Appl 2017; 76(5): 6389-428.
[http://dx.doi.org/10.1007/s11042-015-3198-9]
[85]
Ansari IA, Pant M. Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recognit Lett 2017; 94: 228-36.
[http://dx.doi.org/10.1016/j.patrec.2016.12.010]
[86]
Bolourian Haghighi B, Taherinia AH, Harati A, Rouhani M. WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II. Appl Soft Comput 2021; 101: 107029.
[http://dx.doi.org/10.1016/j.asoc.2020.107029]
[87]
Ansari IA, Pant M, Ahn CW, Jeong J. PSO optimized multipurpose image watermarking using SVD and chaotic sequence. In: Bioinspired computing-theories and applications. Berlin, Heidelberg: Springer 2015; pp. 1-17.
[http://dx.doi.org/10.1007/978-3-662-49014-3_1]
[88]
Zhe-Ming Lu, Dian-Guo Xu, Sheng-He Sun. Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans Image Process 2005; 14(6): 822-31.
[http://dx.doi.org/10.1109/TIP.2005.847324] [PMID: 15971780]
[89]
Zhang C, Cheng LL, Qiu Z, Cheng LM. Multipurpose watermarking based on multiscale curvelet transform. IEEE Trans Inf Forensics Security 2008; 3(4): 611-9.
[http://dx.doi.org/10.1109/TIFS.2008.2004288]
[90]
Lei B, Zhao X, Lei H, et al. Multipurpose watermarking scheme via intelligent method and chaotic map. Multimedia Tools Appl 2019; 78(19): 27085-107.
[http://dx.doi.org/10.1007/s11042-017-4743-5]
[91]
Alshanbari HS. Medical image watermarking for ownership & tamper detection. Multimedia Tools Appl 2021; 80(11): 16549-64.
[http://dx.doi.org/10.1007/s11042-020-08814-9]
[92]
Peng Y, Lan H, Yue M, Xue Y. Multipurpose watermarking for vector map protection and authentication. Multimedia Tools Appl 2018; 77(6): 7239-59.
[http://dx.doi.org/10.1007/s11042-017-4631-z]

© 2024 Bentham Science Publishers | Privacy Policy