skip to main content
research-article

Data Hiding: Current Trends, Innovation and Potential Challenges

Published:17 December 2020Publication History
Skip Abstract Section

Abstract

With the widespread growth of digital information and improved internet technologies, the demand for improved information security techniques has significantly increased due to privacy leakage, identity theft, illegal copying, and data distribution. Because of this, data hiding approaches have received much attention in several application areas. However, those approaches are unable to solve many issues that are necessary to measure in future investigations. This survey provides a comprehensive survey on data hiding techniques and their new trends for solving new challenges in real-world applications. The notable applications are telemedicine, 3D objects, mobile devices, cloud/distributed computing and data mining environments, chip and hardware protection, cyber physical systems, internet traffic, fusion of watermarking and encryption, joint compression and watermarking, biometric watermarking, watermarking at the physical layer, and many other perspectives. Further, the potential issues that existing approaches of data hiding face are identified. I believe that this survey will provide a valuable source of information for finding research directions for fledgling researchers and developers.

References

  1. A. K. Singh, B. Kumar, G. Singh, and A. Mohan (Eds.). 2017. Medical Image Watermarking: Techniques and Applications. Multimedia Systems and Applications. Springer.Google ScholarGoogle Scholar
  2. A. K. Singh, B. Kumar, G. Singh, and A. Mohan. 2016. Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Generation Computer Systems 86 (2016), 926--939.Google ScholarGoogle ScholarCross RefCross Ref
  3. C.-S. Lu, S.-K. Huang, C.-J. Sze, and H.-Y. M. Liao. 2000. Cocktail watermarking for digital image protection. IEEE Transactions on Multimedia 2, 4 (2000), 209--224.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. T. Bianchi and A. Piva. 2013. Secure watermarking for multimedia content protection: A review of its benefits and open issue. IEEE Signal Processing Magazine 30, 2 (2013), 87--96.Google ScholarGoogle ScholarCross RefCross Ref
  5. S. P. Mohanty, A. Sengupta, P. Guturu, and E. Kougianos. 2017. Everything you want to know about watermarking: From paper marks to hardware protection. IEEE Consumer Electronics Magazine 6, 3 (2017), 83--91.Google ScholarGoogle ScholarCross RefCross Ref
  6. S. Iftikhar, M. Kamran, E. U. Munir, and S. U. Khan. 2015. A reversible watermarking technique for social network data sets for enabling data trust in cyber, physical, and social computing. IEEE Systems Journal 11, 1 (2015), 197--206.Google ScholarGoogle ScholarCross RefCross Ref
  7. S. Thakur, A. K. Singh, S. P. Ghrera, and M. Dave. 2018. Watermarking techniques and its applications in tele-health: A technical survey. In Cryptographic and Information Security Approaches for Images and Videos, S. Ramakrishnan (Ed.). CRC Press, Boca Raton, FL, 467--511Google ScholarGoogle Scholar
  8. T. Nie, L. Zhou, and Y. Li. 2013. Hierarchical watermarking method for FPGA IP protection. IETE Technical Review 30, 5 (2013), 367--374.Google ScholarGoogle ScholarCross RefCross Ref
  9. A. Sengupta and S. Bhadauria. 2016. Exploring low cost optimal watermark for reusable IP cores during high level synthesis. IEEE Access 4 (2016), 2198--2215.Google ScholarGoogle ScholarCross RefCross Ref
  10. A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris. 2006. Multiple image watermarking applied to health information management. IEEE Transactions on Information Technology in Biomedicine 10, 4 (2006), 722--732.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Rocek, K. Slavicek, O. Dostal, and M. Javornik. 2016. A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility. Biomedical Signal Processing and Control 29 (2016), 44--52.Google ScholarGoogle ScholarCross RefCross Ref
  12. H. Nyeem, W. Boles, and C. Boyd. 2015. Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical Engineering Online, 14 (2015), 7.Google ScholarGoogle ScholarCross RefCross Ref
  13. A. Zear, A. K. Singh, and P. Kumar. 2018. A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools and Applications 77, 4 (2018), 4863--4882.Google ScholarGoogle ScholarCross RefCross Ref
  14. A. K. Singh, M. Dave, and A. Mohan. 2016. Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools and Applications 75, 14 (2016), 8381--8401.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Tsai, Y. C. Hu, and H. L. Yeh. 2009. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing 86, 6 (2009), 1129--1143.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. E. Ganic and A. M. Eskicioglu. 2004. Robust DWT-SVD domain image watermarking: Embedding data in all frequencies. In Proceedings of the Workshop on Multimedia and Security. 166--174.Google ScholarGoogle Scholar
  17. Xiao Wei Li and Seok Tae Kim. 2013. Optical 3D watermark based digital image watermarking for telemedicine. Optics and Lasers in Engineering 51, 12 (2013), 1310--1320.Google ScholarGoogle ScholarCross RefCross Ref
  18. K. S. Sankaran, H. Abhi Rayna, V. Mangu, V. R. Prakash, and N. Vasudevan. 2019. Image water marking using DWT to encapsulate data in medical image. In Proceedings of the International Conference on Communication and Signal Processing (ICCSP’19). 568--571.Google ScholarGoogle Scholar
  19. K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li. 2013. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security 8, 3 (2013), 553--562.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. X. Zhang. 2011. Reversible data hiding in encrypted images. IEEE Signal Processing Letters 18, 4 (2011), 255--258.Google ScholarGoogle ScholarCross RefCross Ref
  21. X. Zhang. 2012. Separable reversible data hiding in encrypted image. IEEE Transactions on Information Forensics and Security 7, 2 (2012), 826--832.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. W. Zhang, K. Ma, and N. Yu. 2014. Reversibility improved data hiding in encrypted images. Signal Processing 94 (2014), 118--127.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Zheng, D. Li, D. Hu, D. Ye, L. Wang, and J. Wang. 2016. Lossless data hiding for encrypted images with high capacity. Multimedia Tools and Applications 75, 21 (2016), 13765--13778.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. W. Hong, T. Chen, and H. Wu. 2012. An improved reversible data hiding in encrypted images using side match. IEEE Signal Processing Letters 19, 4 (2012), 199--202.Google ScholarGoogle ScholarCross RefCross Ref
  25. S. Thakur, A. K. Singh, and S. P. Ghrera. 2018. NSCT domain based secure multiple watermarking technique through lightweight encryption for medical images. Concurrency and Computation: Practice and Experience. Epub Ahead of Print. December 26, 2018.Google ScholarGoogle Scholar
  26. N. K. Nishchal. 2009. Optical image watermarking using fractional Fourier transform. Journal of Optics 38, 1 (2009), 22--28.Google ScholarGoogle ScholarCross RefCross Ref
  27. X. Cao, L. Du, X. Wei, D. Meng, and X. Guo. 2016. High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Transactions on Cybernetics 46, 5 (2016), 1132--1143.Google ScholarGoogle ScholarCross RefCross Ref
  28. S. Thakur, A. K. Singh, S. P. Ghrera, and A. Mohan. 2018. Chaotic based secure watermarking approach for medical images. Multimedia Tools and Applications 79 (2018), 4263--4276.Google ScholarGoogle ScholarCross RefCross Ref
  29. A. K. Singh. 2019. Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimedia Tools and Applications 78 (2019), 30523--30533.Google ScholarGoogle ScholarCross RefCross Ref
  30. S. Borra and R. Thanki. 2020. Crypto-watermarking scheme for tamper detection of medical images. Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization 8, 4 (2020), 345--355.Google ScholarGoogle ScholarCross RefCross Ref
  31. M.-W. Chao, C.-H. Lin, C.-W. Yu, and T.-Y. Lee. 2009. A high capacity 3D steganography algorithm. IEEE Transactions on Visualization and Computer Graphics 15, 2 (2009), 274--284.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Q. S. Ai, Q. Liu, Z. D. Zhou, L. Yang, and S. Q. Xie. 2009. A new digital watermarking scheme for 3D triangular mesh models. Signal Processing 89, 11 (2009), 2159--2170.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Y. Yang, R. Pintus, H. Rushmeier, and I. Ivrissimtzis. 2017. A 3D steganalytic algorithm and steganalysis-resistant watermarking. IEEE Transactions on Visualization and Computer Graphics 23, 2 (2017), 1002--1013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. J.-W. Cho, R. Prost, and H.-Y. Jung. 2007. An oblivious watermarking for 3-D polygonal meshes using distribution of vertex norms. IEEE Transactions on Signal Processing 55, 1 (2007), 142--155.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Y. Yang, R. Pintus, H. Rushmeier, and I. Ivrissimtzis. 2014. A steganalytic algorithm for 3D polygonal meshes. In Proceedings of the IEEE International Conference on Image Processing. 4782--4786.Google ScholarGoogle Scholar
  36. Y. Yang and I. Ivrissimtzis. 2014. Mesh discriminative features for 3D steganalysis. ACM Transactions on Multimedia Computing, Communications, and Applications 10, 3 (2014), Article 27, 13 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. A. Al-Haj, Md. E. Farfoura, and A. Mohammad. 2017. Transform-based watermarking of 3D depth-image-based-rendering images. Measurement 95 (2017), 405--417.Google ScholarGoogle ScholarCross RefCross Ref
  38. M.-J. Lee, K.-S. Kim, and H.-K. Lee. 2010. Digital cinema watermarking for estimating the position of the pirate. IEEE Transactions on Multimedia 12, 7 (2010), 605--621.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Md. Asikuzzaman, J. Alam, Md. A. J. Lambert, and M. R. Pickering. 2016. Robust DT CWT-based DIBR 3D video watermarking using chrominance embedding. IEEE Transactions on Multimedia 18, 9 (2016), 1733--1748.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. H. D. Kim, J. W. Lee, T. W. Oh, and H. K. Lee. 2012. Robust DT-CWT watermarking for DIBR 3D images. IEEE Transactions on Broadcasting 58, 4 (2012), 533--543.Google ScholarGoogle ScholarCross RefCross Ref
  41. A. Kejariwal, S. Gupta, A. Nicolau, N. D. Dutt, and R. Gupta. 2006. Energy efficient watermarking on mobile devices using proxy-based partitioning. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 14, 6 (2006), 625--636.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. M. Zhaofeng and J. Ming. 2018. Secure and efficient DRM watermark algorithm of forensics in mobile internet. EURASIP Journal on Image and Video Processing 2018 (2018), Article 69.Google ScholarGoogle Scholar
  43. S. G. Shini, T. Thomas, and K. Chithraranja. 2012. Cloud based medical image exchange-security challenges. Procedia Engineering 38 (2012), 3454--3461.Google ScholarGoogle Scholar
  44. K. Liu, W. Zhang, and X. Dong. 2017. A cloud-user protocol based on ciphertext watermarking technology. Security and Communication Networks 2017 (2017), Article 4376282, 14 pages.Google ScholarGoogle Scholar
  45. X. Cao, Z. Fu, and X. Sun. 2016. A privacy-preserving outsourcing data storage scheme with fragile digital watermarking-based data auditing. Journal of Electrical and Computer Engineering 2016 (2016), Article 3219042, 7 pages.Google ScholarGoogle Scholar
  46. H. L. Khor, S.-C. Liew, and J. Mohd. Zain. 2016. Parallel digital watermarking process on ultrasound medical images in multicores environment. International Journal of Biomedical Imaging 2016 (2016), Article 9583727, 14 pages.Google ScholarGoogle Scholar
  47. J. J. Shen and J. M. Ren. 2010. A robust associative watermarking technique based on vector quantization. Digital Signal Processing 20, 5 (2010), 1408--1423.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. U. Khadam, M. M. Iqbal, M. A. Azam, S. Khalid, S. Rho, and N. Chilamkurti. 2019. Digital watermarking technique for text document protection using data mining analysis. IEEE Access 7 (2019), 64955--64965.Google ScholarGoogle ScholarCross RefCross Ref
  49. H. Tufail, K. Zafar, and A. R. Baig. 2019. Relational database security using digital watermarking and evolutionary techniques. Computational Intelligence 35, 4 (2019), 693--716.Google ScholarGoogle ScholarCross RefCross Ref
  50. S. Iftikhar, M. Kamran, and Z. Anwar. 2015. RRW—A robust and reversible watermarking technique for relational data. IEEE Transactions on Knowledge and Data Engineering 27, 4 (2015), 1132--1145.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. M. Shehab, E. Bertino, and A. Ghafoor. 2008. Watermarking relational databases using optimization-based techniques. IEEE Transactions on Knowledge and Data Engineering 20, 1 (2008), 116--129.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. A. H. Gandomi, X.-S. Yang, A. H. Alavi, and S. Talatahari. 2013. Bat algorithm for constrained optimization tasks. Neural Computing and Applications 22, 6 (2013), 1239--1255.Google ScholarGoogle ScholarCross RefCross Ref
  53. M. E. Farfoura and S. J. Horng. 2010. A novel blind reversible method for watermarking relational databases. In Proceedings of the International Symposium on Parallel and Distributed Processing with Applications (ISPA’10).Google ScholarGoogle Scholar
  54. D. Ziener and J. Teich. 2008. Power signature watermarking of IP cores for FPGAs. Journal of Signal Processing Systems 51 (2008), 123--136.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. F. Koushanfar, I. Hong, and M. Potkonjak. 2005. Behavioral synthesis techniques for intellectual property protection. ACM Transactions on Design Automation of Electronic Systems 10, 3 (2005), 523--545.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. P. Sarkar, D. Roy, A. Sengupta, and M. K. Naskar. 2019. Signature-free watermark for protecting digital signal processing cores used in CE devices [hardware matters]. IEEE Consumer Electronics Magazine 8, 1 (2019), 92--94.Google ScholarGoogle ScholarCross RefCross Ref
  57. R. Srivastava, B. Kumar, A. K. Singh, and A. Mohan. 2018. Computationally efficient joint imperceptible image watermarking and JPEG compression: A green computing approach. Multimedia Tools and Applications 77, 13 (2018), 16447--16459.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. A. V. Subramanyam, S. Emmanuel, and M. S. Kankanhalli. 2012. Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Transactions on Multimedia 14, 3 (2012), 703--716.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. S. J. J. Mary, C. S. Christopher, and S. A. Joe. 2016. Novel scheme for compressed image authentication using LSB watermarking and EMRC6 encryption. Circuits and Systems 7, 8 (2016), 1722--1733.Google ScholarGoogle ScholarCross RefCross Ref
  60. A. Mishra, R. Gupta, and S. Jain. 2019. Secure and robust color image watermarking scheme using partial homomorphic cryptosystem in ASWDR compressed domain. Multimedia Tools and Applications 78 (2019), 22127--221541.Google ScholarGoogle ScholarCross RefCross Ref
  61. M. Vatsa, R. Singh, and A. Noore. 2009. Feature based RDWT watermarking for multimodal biometric system. Image and Vision Computing 27, 3 (2009), 293--304.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. A. K. Jain and U. Uludag. 2003. Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 11 (2003), 1494--1498.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. P. Singh, B. Raman, and P. P. Roy. 2017. A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform. Multimedia Tools and Applications 76, 3 (2017), 3871--3897.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. P. Aparna and P. V. V. Kishore. 2019. Biometric-based efficient medical image watermarking in e-healthcare application. IET Image Processing 13, 3 (2019), 421--428.Google ScholarGoogle ScholarCross RefCross Ref
  65. J. Feng and M. Potkonjak. 2003. Real-time watermarking techniques for sensor networks. In Proceedings of SPIE—The International Society for Optical Engineering.Google ScholarGoogle Scholar
  66. B. Harjito, V. Potdar, and J. Singh. 2012. Watermarking technique for wireless sensor networks: A state of the art. In Proceedings of the 8th International Conference on Semantics, Knowledge, and Grids.Google ScholarGoogle Scholar
  67. B. Satchidanandan and P. R. Kumar. 2017. Dynamic watermarking: Active defense of networked cyber-physical systems. Proceedings of the IEEE 105, 2 (2017), 219--240.Google ScholarGoogle ScholarCross RefCross Ref
  68. P. L. Yu, J. S. Baras, and B. M. Sadler. 2008. Physical-layer authentication. IEEE Transactions on Information Forensics and Security 3, 1 (2008), 38--51.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. J. E. Kleider, S. Gifford, S. Chuprun, and B. Fette. 2004. Radio frequency watermarking for OFDM wireless networks. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing.Google ScholarGoogle Scholar
  70. X. Li, C. Yu, M. Hizlan, W.-T. Kimand, and S. Park. 2013. Physical layer watermarking of direct sequence spread spectrum signals. In Proceedings of the IEEE Military Communications Conference.Google ScholarGoogle Scholar
  71. T. Lu, R. Guo, L. Zhao, and Y. Li. 2016. A systematic review of network flow watermarking in anonymity systems. International Journal of Security and Its Applications 10, 3 (2016), 129--138.Google ScholarGoogle ScholarCross RefCross Ref
  72. A. Iacovazzi and Y. Elovici. 2017. Network flow watermarking: A survey. IEEE Communications Surveys & Tutorials 19, 1 (2017), 512--530.Google ScholarGoogle ScholarCross RefCross Ref
  73. D. Bhowmik and C. Abhayaratne. 2016. Quality scalability aware watermarking for visual content. IEEE Transactions on Image Processing 25, 11 (2016), 5158--5172.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. J.-M. Guo, G.-H. Lai, K. Wong, and L. C. Chang. 2015. Progressive halftone, watermarking using multilayer table lookup strategy. IEEE Transactions on Image Processing 24, 7 (2015), 2009--2024.Google ScholarGoogle ScholarCross RefCross Ref
  75. S. Heidari and M. Naseri. 2016. A novel LSB based quantum watermarking. International Journal of Theoretical Physics 55, 10 (2016), 4205--4218.Google ScholarGoogle ScholarCross RefCross Ref
  76. B. Lei, I. Song, and S. A. Rahman. 2013. Robust and secure watermarking scheme for breath sound. Journal of Systems and Software 86, 6 (2013), 1638--1649.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. X. Y. Wang and H. Zhao. 2006. A novel synchronization invariant audio watermarking scheme based on DWT and DCT. IEEE Transactions on Signal Processing 54, 12 (2006), 4835--4840.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Z. Tao, H.-M. Zhao, J. Wu, J. H. Gu, Y. S. Xu, and D. Wu. 2010. A lifting wavelet domain audio watermarking algorithm based on the statistical characteristics of sub-band coefficients. Archives of Acoustics 35, 4 (2010), 481--491.Google ScholarGoogle ScholarCross RefCross Ref
  79. K. V. Bhat, I. Sengupta, and A. Das. 2010. An adaptive audio watermarking based on the singular value decomposition in the wavelet domain. Digital Signal Processing: A Review Journal 20, 6 (2010), 1547--1558.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. D. Hu, D. Zhao, and S. Zheng. 2019. A new robust approach for reversible database watermarking with distortion control. IEEE Transactions on Knowledge and Data Engineering 31, 6 (2019), 1024--1037.Google ScholarGoogle ScholarCross RefCross Ref
  81. K. Jawad and A. Khan. 2013. Genetic algorithm and difference expansion based reversible watermarking for relational databases. Journal of Systems & Software 86, 11 (2013), 2742--2753.Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. M. B. Imamoglu, M. Ulutas, and G. Ulutas. 2017. A new reversible database watermarking approach with firefly optimization algorithm. Mathematical Problems in Engineering 2017 (2017), Article 1387375, 14 pages.Google ScholarGoogle Scholar
  83. M. E. Farfoura and S. J. Horng. 2010. A novel blind reversible method for watermarking relational databases. In Proceedings of the International Symposium on Parallel and Distributed Processing with Applications. 563--569.Google ScholarGoogle Scholar
  84. S. Iftikhar, M. Kamran, and Z. Anwar. 2015. RRW—A robust and reversible watermarking technique for relational data. IEEE Transactions on Knowledge & Data Engineering 27, 4 (2015), 1132--1145.Google ScholarGoogle ScholarCross RefCross Ref
  85. Jamal N. Bani Salameh. 2019. A new approach for securing medical images and patient's information by using a hybrid system. International Journal of Network Security 19, 4 (2019), 28--39.Google ScholarGoogle Scholar
  86. S. Arunkumar, V. Subramaniyaswamy, V. Vijayakumar, N. Chilamkurti, and R. Logesh. 2019. SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139 (2019), 426--437.Google ScholarGoogle ScholarCross RefCross Ref
  87. C. C. Chang, Y. P. Hsieh, and C. H. Lin. 2008. Sharing secrets in stego images with authentication. Pattern Recognition 41, 10 (2008), 3130--3137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. C. C. Wu, S. J. Kao, and M. S. Hwang. 2011. A high quality image sharing with steganography and adaptive authentication scheme. Journal of Systems and Software 84, 12 (2011), 2196--2207.Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. H. R. Kanan and B. Nazeri. 2014. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Systems with Applications 41, 14 (2014), 6123--6130.Google ScholarGoogle ScholarCross RefCross Ref
  90. Mohamed Elhoseny, Gustavo Ramirez-Gonzalez, Osama M. Abu-Elnasr, Shihab A. Shawkat, N. Arunkumar, and Ahmed Farouk. 2018. Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6 (2018), 20596--20608.Google ScholarGoogle ScholarCross RefCross Ref
  91. A. S. Anwar, K. K. A. Ghany, and H. E. Mahdy. 2015. Improving the security of images transmission. International Journal of Bio-Medical Informatics and e-Health 3, 4 (2015), 7--13.Google ScholarGoogle Scholar
  92. X. Wang, E. Miao, and H. Yang. 2012. A new SVM-based image watermarking using Gaussian--Hermite moments. Applied Soft Computing 12, 2 (2012), 887--903.Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. H. Tsai and D. Sun. 2007. Color image watermark extraction based on support vector machines. Information Sciences 177, 2 (2007), 550--569.Google ScholarGoogle ScholarCross RefCross Ref
  94. H. Peng, J. Wang, and W. Wang. 2010. Image watermarking method in multi-wavelet domain based on support vector machines. Journal of Systems and Software 83, 8 (2010), 1470--1477.Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Y. Fu and R. Shen. 2008. Color image watermarking scheme based on linear discriminant analysis. Computer Standards & Interfaces 30, 3 (2008), 115--120.Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. D. Li, L. Deng, B. B. Gupta, H. Wang, and C. Choi. 2019. A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Information Sciences 479 (2019), 432--447.Google ScholarGoogle ScholarCross RefCross Ref
  97. G. Badshah, S. Liew, J. Zain, and M. Ali. 2015. Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. Journal of Digital Imaging 29, 2 (2015), 216--225.Google ScholarGoogle ScholarCross RefCross Ref
  98. E. Etemad. 2017. Robust image watermarking scheme using bit-plane of Hadamard coefficients. Multimedia Tools and Applications 77, 2 (2017), 2033--2055.Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Q. Su and B. Chen. 2017. Robust color image watermarking technique in the spatial domain. Soft Computing 22, 1 (2017), 91--106.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Z. Meng, T. Morizumi, S. Miyata, and H. Kinoshita. 2018. Design scheme of copyright management system based on digital watermarking and blockchain. In Proceedings of the IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC’18). 359--364.Google ScholarGoogle Scholar
  101. A. Anand and A. K. Singh. 2020. An improved DWT-SVD domain watermarking for medical information security. Computer Communications 512 (2020), 72--80.Google ScholarGoogle ScholarCross RefCross Ref
  102. Y. Sun, R. Xu, L. Chen, and X. Hu. 2015. Image compression and encryption scheme using fractal dictionary and Julia set. IET Image Processing 9, 3 (2015), 173--183.Google ScholarGoogle ScholarCross RefCross Ref
  103. X.-J. Tong, P. Chen, and M. Zhang. 2017. A joint image lossless compression and encryption method based on chaotic map. Multimedia Tools and Applications 76, 12 (2017), 13995--14020.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Data Hiding: Current Trends, Innovation and Potential Challenges

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 16, Issue 3s
      Special Issue on Privacy and Security in Evolving Internet of Multimedia Things and Regular Papers
      October 2020
      190 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3444536
      Issue’s Table of Contents

      Copyright © 2020 ACM

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 December 2020
      • Online AM: 7 May 2020
      • Accepted: 1 February 2020
      • Revised: 1 January 2020
      • Received: 1 December 2019
      Published in tomm Volume 16, Issue 3s

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!