Image watermarking using soft computing techniques: A comprehensive survey
- PDF / 1,122,150 Bytes
- 32 Pages / 439.37 x 666.142 pts Page_size
- 17 Downloads / 217 Views
Image watermarking using soft computing techniques: A comprehensive survey Om Prakash Singh 1 & A. K. Singh 1 & Gautam Srivastava 2 & Neeraj Kumar 3 Received: 28 February 2020 / Revised: 21 July 2020 / Accepted: 12 August 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
Image watermarking techniques are used to provide copyright protection and verify ownership of media/entities. This technique refers to the concept of embedding of secret data/information of an owner in a given media/entity for determining any ownership conflicts that can arise. Many watermarking approaches have been offered by various authors in the last few years. However, there are not enough studies and comparisons of watermarking techniques in soft computing environments. Nowadays, soft computing techniques are used to improve the performance of watermarking algorithms. This paper surveys soft computing-based image watermarking for several applications. We first elaborate on novel applications, watermark characteristics and different kinds of watermarking systems. Then, soft computing based watermarking approaches providing robustness, imperceptibility and good embedding capacity are compared systematically. Furthermore, major issues and potential solutions for soft computing-based watermarking are also discussed to encourage further research in this area. Thus, this survey paper will be helpful for researchers to implement an optimized watermarking scheme for several applications. Keywords Watermarking . Steganography . Copyright . Machine learning . CNN . SVM . Neural networks . Genetic algorithm . Fuzzy logic . PCA
* A. K. Singh [email protected]; [email protected] Om Prakash Singh [email protected] Gautam Srivastava [email protected] Neeraj Kumar [email protected] Extended author information available on the last page of the article
Multimedia Tools and Applications
1 Introduction Due to widespread growth of multimedia information and improved Internet technologies, users are now allowed easy storage, duplication, and distribution of digital data/contents for various potential applications [13, 106, 109]. However, security and copyright protection of the digital content is a challenging task in the current era [12]. Furthermore, identity theft, illegal copying and data distribution, and privacy leakageare growing crimes and we have seen cybercrime in general increase [12, 13, 67, 106, 109]. Steganography and watermarking are the interesting data hiding techniques used to provide security for multimedia contents [12, 106]. Steganography is the science of hiding data in which the intended information is concealed in such a way that only the concerned communicating parties understand the concealed message [109]. It offers a major advantage since the secret data is hidden within the host and exchanged without generating any kind of visible alert to the attackers. However, bandwidth constraints are a major drawback associated with steganography [109]. Due to these limitations, d
Data Loading...