<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Comprehensive Review on Digital Image Watermarking</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Shweta Wadhera</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Deepa Kamra</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ankit Rajpal</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Aruna Jain</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vishal Jain</string-name>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, Bharati College, University of Delhi</institution>
          ,
          <addr-line>New Delhi</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computer Science, Deen Dayal Upadhyaya College, University of Delhi</institution>
          ,
          <addr-line>New Delhi</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Department of Computer Science, University of Delhi</institution>
          ,
          <addr-line>New Delhi</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Department of Management Studies, Deen Dayal Upadhyaya College, University of Delhi</institution>
          ,
          <addr-line>New Delhi</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Research Scholar, Sharda University</institution>
          ,
          <addr-line>Greater Noida</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>School of Engineering and Technology, Department of Computer Science and Engineering, Sharda University Greater Noida</institution>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <fpage>126</fpage>
      <lpage>143</lpage>
      <abstract>
        <p>The advent of the Internet led to the easy availability of digital data like images, audio, and video. Easy access to multimedia gives rise to the issues such as content authentication, security, copyright protection, and ownership identification. Here, we discuss the concept of digital image watermarking with a focus on the technique used in image watermark embedding and extraction of the watermark. The detailed classification along with the basic characteristics, namely visual imperceptibility, robustness, capacity, security of digital watermarking is also presented in this work. Further, we have also discussed the recent application areas of digital watermarking such as healthcare, remote education, electronic voting systems, and the military. The robustness is evaluated by examining the effect of image processing attacks on the signed content and the watermark recoverability. The authors believe that the comprehensive survey presented in this paper will help the new researchers to gather knowledge in this domain. Further, the comparative analysis can enkindle ideas to improve upon the already mentioned techniques.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Digital Watermarking</kwd>
        <kwd>Digital images</kwd>
        <kwd>review</kwd>
        <kwd>visual imperceptibility</kwd>
        <kwd>robustness</kwd>
        <kwd>copyright protection</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Digital Watermarking is a method to provide protection from any tampering or alteration [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3, 4, 5</xref>
        ]. It
provides security and authentication to digital content. The digital watermarking process involves the
insertion of signal, information into the original media content. The inserted information is then
uncovered and extracted to report the actual owner of the digital media.
      </p>
      <p>
        Watermarking involves embedding data called watermark or digital signature or label into the digital
media. This watermark can be extracted for revealing the authenticity of the media object [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. As an
example of a watermark, we can imagine a visible “seal” over an image. A digital watermarking
algorithm has three basic parts:
      </p>
      <sec id="sec-1-1">
        <title>Watermark</title>
      </sec>
      <sec id="sec-1-2">
        <title>The Encoding algorithm</title>
      </sec>
      <sec id="sec-1-3">
        <title>The decoding algorithm [1, 7, 8].</title>
        <p>This technique may be used for copyright safeguarding and embedding fingerprints, placing
authentication for data integrity checks, and confidential communication. Another important application
of watermarking techniques includes tracing illegal users with an objective that the owner can approach
the regulatory authorities. It can be useful for ensuring that data pertaining to people who buy and sell
digital media, kept in record for each transaction. Further track of this data can be kept for controlling
copyright breaches. In fact, strict measures must be implemented for this unlawful distribution of digital
content.</p>
        <p>The paper is consolidated as follows: section 2 presents the classification of digital watermarking
based on various characteristics. Section 3 describes the prominent features of digital watermarking.
Section 4 covers the recent areas of application for watermarking. Section 5 presents the various types of
attacks. In section 6 we analyze the highlights and results of related work by various authors and section 7
presents the conclusions and future scope in the direction of image watermarking.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Classification of Digital Watermarking</title>
      <p>The section describes the classification of digital watermarking based on various criteria such as
robustness, perceptibility, domain, and detection process, multimedia. Further we also briefly present the
different popular watermarking techniques.</p>
    </sec>
    <sec id="sec-3">
      <title>2.1. Based on Characteristics/Robustness</title>
      <p>Robust: Robust watermarking is preferred when copyright information is required to be inserted.
Robustness is indicated if the embedded watermark even after some attack is not damaged. It can
withstand several attacks. It is seen that for copyright protection, a robust watermark is advantageous.
Fragile: One can easily find out from the status of the watermark if the data has been altered. For
integrity protection, this watermark is preferred.</p>
      <p>
        Semi-fragile: Some extent of change is tolerated by a semi-fragile watermark [
        <xref ref-type="bibr" rid="ref2 ref3 ref6">2, 3, 6</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>2.2. Based on Perceptibility</title>
      <sec id="sec-4-1">
        <title>Perceptible: A watermark that is visible is known as perceptible.</title>
        <p>
          Imperceptible: Incase the watermark is invisible then it is known as imperceptible watermark. In this,
information which is embedded into the image is not visible. In such cases one can prove the ownership
of your image with the help of imperceptible watermark [
          <xref ref-type="bibr" rid="ref2 ref26">2, 26</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>2.3. Based on Domain</title>
      <p>
        Frequency domain: First, the transforming of the image to the frequency domain is carried out. In this
type of watermarking different transformation techniques are applied such as DCT, DFT, and DWT [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ].
Spatial Domain: Watermarking in this domain moderately changes the value of pixels, of arbitrarily
selected portions of images; the watermark is inserted in the host image. No conversion or transformation
is applied in the spatial domain. LSB, Patchwork method, SSM Modulation are some of the popular
spatial domain-based techniques [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ].
      </p>
      <p>Generally, the watermarking carried out in the frequency domain is more robust as compared to the
one carried out in the spatial domain.</p>
    </sec>
    <sec id="sec-6">
      <title>2.3.1. Spatial Domain</title>
      <sec id="sec-6-1">
        <title>Least Significant bit (LSB) method</title>
        <p>In this method, the watermark is inserted in the least significant bit (LSB of image pixels. Ideally,
either of two ways is used for embedding. In one approach, the LSB of an image is substituted with a
pseudo-noise (PN) sequence, while another approach adds this PN sequence to the LSB. LSB technique
provides ease of use but compromises on the robustness parameter against attacks.</p>
      </sec>
      <sec id="sec-6-2">
        <title>Patchwork Method</title>
        <p>Patchwork method randomly picks n pairs of image points (x, y). The data in the x region is lightened
and data in the y region is darkened. However, this technique can withstand a series of attacks, but it lacks
in terms of capacity.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>2.3.1. Frequency Domain</title>
      <sec id="sec-7-1">
        <title>Discrete cosine transforms (DCT)</title>
        <p>This method employs a technique of subdividing an image signal into non-overlapping blocks of 8 × 8
size. Further, block-wise DCT is performed, and thereafter the choice of coefficients to be watermarked is
carried out. Finally, an inverse DCT is applied on each 8 × 8 block to obtain the signed image.</p>
      </sec>
      <sec id="sec-7-2">
        <title>Discrete wavelets transform (DWT)</title>
        <p>
          In this method, the image is subjected to a sequence of low-pass and high-pass filters. An image is
decomposed into four equal sub-bands where each sub-band comprises low frequency (LL), horizontal
features (LH), vertical features (HL), and diagonal features (HH). It is a preferred algorithm as it provides
a robust and secure watermarking method [
          <xref ref-type="bibr" rid="ref2 ref27 ref3">2, 3, 27</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>2.4. Based on Detection process</title>
      <p>
        Blind: Those watermarking processes fall in this category wherein the removal of the embedded
information requires only the watermarked image. Its applications can be copyright protection,
evoting, etc. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        Non-Blind: In this type of watermarking, the process copies along with the text data, the host image,
and the inserted information for the retrieval of the watermark. Its application is seen in copyright
protection [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
    </sec>
    <sec id="sec-9">
      <title>2.5. Based on Multimedia</title>
      <p>Text Watermarking: It consists of components like words, punctuations, sentences, etc.</p>
      <p>
        Transformation is done on one of these components and is embedded as a watermark [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
 Image Watermarking: Large-size images are there which has to be watermarked. In the case of
images, we require robust watermarks, which should be imperceptible [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>Video watermarking: In this case, it is difficult to get imperceptible watermark.</p>
      <p>Graphic Watermarking: In 2D or 3D digital graphics, a watermark is embedded. It provides
copyright protection.</p>
    </sec>
    <sec id="sec-10">
      <title>Basic Characteristics of Digital Watermarking</title>
      <sec id="sec-10-1">
        <title>Mentioned here are various features of Digital Watermarking.</title>
        <p></p>
        <p>
          Robustness: The robustness feature indicates that the digital watermark can resist various processing
operations and attacks. Then it is considered to be robust [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
 Imperceptibility: The imperceptibility feature indicates that a digital watermark should not be seen
by the human eye. One should not be able to see the embedded watermark. It can only be identified
by specialized procedures. The watermark should be such that the viewer should not be able to see it
and the process of embedding a watermark should be such that the quality of the content is
maintained [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
 Security: The security feature indicates that irrespective of targeted attacks, the inserted digital
watermark cannot be removed. Watermark security describes that altering or removing a watermark
without any deterioration to the host signal should be arduous. Watermarking security can be
explained as a way to provide secrecy, ownership, and protection of data [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].

        </p>
        <p>
          Capacity: The amount of information embedded in a watermarked image also known as data
payload [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-11">
      <title>Recent Applications of Watermarking</title>
      <p>
        Verifiability: Through the watermark, we should be able to get a piece of evidence regarding the
ownership of copyright-protected data. This helps in verifying the authenticity of any digital data and
even the control of its unlawful copying [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>
        Copyright protection: As we are aware that images can be easily circulated and are freely available
over the internet. These images can be used commercially. So copyright protection of data is needed
and for this Digital Watermarking is very useful. The inserted digital watermark will be used to
identify the copyright owner [
        <xref ref-type="bibr" rid="ref2 ref9">2, 9</xref>
        ].
      </p>
      <p>
        Fingerprint: Fingerprinting in digital watermarking can be put up as a method for embedding some
distinctiveness. The fingerprint should be difficult to alter. The information inserted is related to the
customer. It is through this fingerprinting that it is revealed about those authorized customers who
are involved in the circulation of copyright data by breaching the agreement [
        <xref ref-type="bibr" rid="ref2 ref27">2, 27</xref>
        ].
      </p>
      <p>
        Copy control: Digital watermarking can prevent illegal duplication of digital data. Devices that do
replication can detect these watermarks and report copying and thereby put a control on illegal
copying [
        <xref ref-type="bibr" rid="ref26 ref3">3, 26</xref>
        ].
      </p>
      <p>
        Broadcast Monitoring: Over the years it has been seen that availability and accessibility to media
content have increased exponentially. Also, the content is available through the internet. In such
times, it has become important for content owners and copyright owners to know about the real
distributor of content. Digital Watermarking has an important role here [
        <xref ref-type="bibr" rid="ref26 ref3">3, 26</xref>
        ].
      </p>
      <p>
        Medical Application: Embedding of patient name in the MRI-scan, CT-scan or X-ray reports can be
done using visible watermarking. The treatment of the patient depends on these medical reports. So
to avoid mixing of reports the technique of visible watermarking can be used [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        Electronic Voting System: The Internet has spread all over the country from big towns to small
villages. Electronic voting helps to carry out elections, keeping the security aspect into consideration
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        Remote Education: Lack of teachers poses a big problem in small villages. Smart Technology
needs to be adopted for distance learning. In this case watermarking plays its role in the authentic
transmission of study material over the internet [
        <xref ref-type="bibr" rid="ref27 ref9">9, 27</xref>
        ].
      </p>
    </sec>
    <sec id="sec-12">
      <title>Attacks on Watermarking</title>
      <p>
        A digital Watermarking scheme is always assessed by the fact that how robust it is over attacks.
Attack on any watermark is used to harm the inserted watermark or enfeeble the watermark's discovery.
Hampering the protection, which a watermark provides to digital content, is the objective of any attack.
Watermarking attacks can be classified as follows – Geometry attack, Protocol attack, Cryptographic
attack, and removal attack [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10, 11, 12</xref>
        ].
      </p>
      <p>
</p>
      <p>
        Geometry Attack: Such processing is done over the watermark image which alters the geometry of
the image like rotation, cropping, etc. These can be further classified into – scaling, cropping,
rotation, and translation [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        Removal Attack: This attack aims at removing the inserted data from the digital image. If it is not
able to, yet they try to destroy the embedded information [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
 Protocol Attack: The attacks which come under this category, do not damage the embedded data.
      </p>
      <p>
        Two types of Protocol attacks are there: Invertible, Copy attack. So a watermark should be
noninvertible and should not be copied. A watermark is invertible when the attacker removes his own
watermark from the host data. The attacker then pretends to be the owner of the data. This shows that
for copyright protection, watermarks should be non-invertible [
        <xref ref-type="bibr" rid="ref13 ref29">13, 29</xref>
        ].
 Copy Attack: It is also a form of Protocol attack. In this also the watermark is not destroyed.
      </p>
      <p>
        Instead, the attacker estimates the watermark from host data. It is then copied to other data [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
 Cryptographic Attack: These types of attacks include those which break the security in
watermarking techniques. With this, they can extract the inserted watermark data or can insert some
delusive watermark. The Brute-force and Oracle attacks fall under this category [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>In order to present an exhaustive survey on image watermarking, we created a repository of more than
50 papers on Mendeley and 35 papers were used to develop the background of digital watermarking and
19 papers were found relevant in the area of image watermarking.</p>
      <p>Table 1 summarizes the watermarking schemes proposed by various research groups in the past few
years through the comparative analysis.</p>
      <p>“An
imperceptible
spatial domain
color image
watermarking
scheme”</p>
      <p>Spatial domain
Simple Image
Region Detector
(SIRD): Estimation
of most suitable
portion within the
block of an image.
DWT + SVD Hybrid</p>
      <p>Cover image
Colored
Size: 512 x
512 pixels</p>
      <p>PSNR
Range =
[38.68 -48.03]
dB</p>
      <p>
        Robustness
NCC = Range
[0.9917 – 1]
BER= Range
[0.7500-0]
Attacks
considered:
Salt and
Pepper,
Poisson,
Speckle,
average
filtering,
Gaussian LPF,
Sharpening,
JPEG
Compression,
Cropping,
Resizing
NCC Range
=[0.6053
0.9673]
Attacks
Vaidya
and
Mouli
[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]
Liu et al.
[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]
“A robust
semiblind
watermarking
for color images
based on
multiple
decompositions
”
“Digital image
watermarking
method based
on DCT and
fractal
encoding“
      </p>
      <p>DWT-CT-Schur-SVD
Discrete Wavelet
Transform (DWT):
1-level
decomposition
Contour Let
Transform (CT):
2level on LL subband
to obtain  .</p>
      <p>Schur Transform:</p>
      <p>is decomposed

as</p>
      <p>=
 .  . [ ]
Singular Value
Decomposition
(SVD): Watermark
is inserted in  .</p>
      <p>Fractal encoding
and DCT method
are combined for
double encryption
for embedding
purpose.</p>
      <p>Considered:
Mean
Filtering,
Median
Filtering,
Gaussian
Noise,
Noise,
Rotation,
Crop,
JPEG
Salt &amp; Pepper
compression
NCC=1.0
embedding strength</p>
      <p>Watermark
Size: 256 x
64 x 64 pixels SSIM range =
Watermarking
Using Hybrid
Scheme”
logo.</p>
      <p>
        DCT + SVD Hybrid
Moosaza “A new
DCTdeh and based robust
Ekbatanif image
ard [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] watermarking
method using
teachinglearning-Based
optimization”
      </p>
      <p>Image
watermarking
scheme based on
DCT
Teaching-LearningBased Optimization
(TLBO): Automatic
detection of
embedding
parameters and
suitable position for
inserting the
watermark.</p>
      <p>512 x 512
pixels</p>
      <p>
        SSIM=
Kumar et
al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]
      </p>
      <p>DWT + DCT + SVD
Set Partitioning in
Hierarchical Tree
(SPIHT) and Arnold
transform for
enhancing
robustness.</p>
      <p>Range[0.92310.9414]
PSNR=
Range
[25.31- 38.47]
SSIM=
Range
[0.9713110.999954 ]
PSNR &gt; 40 dB</p>
      <p>NCC=
Range
[0.94220.9990 ]
Attacks
Considered
Salt &amp; Pepper,
Gaussian
Noise, JPEG
compression,
cropping,
Rotation,
Scaling
attacks,
Sharpening
Mask, Median
Filter,
Histogram
NCC=
Range[0.64370.98265]
Attacks
considered
noise, Median
filter,
cropping,
Rotation
NCC =
Range [0.9997
– 1]
machine for Bi-directional ELM
semi-blind (B-ELM): Variant of
watermarking of ELM is modeled
compressed with LL4
images” coefficients for</p>
      <p>Semi-blind
recovery.
Watermark
Binary
Size:
32 x 32 Pixels
Cover Image
Size:
228 × 228
Pixels
Watermark
Size:
grayscale
image
90 × 90
pixels
Cover Image
Size:
512 x 512
Pixels</p>
      <p>SSIM=
Range
[0.9960
0.9969]
PSNR=
54.96 dB</p>
      <p>Moments of the
polar complex
exponential
transform obtained
using Simplified
exact kernels are
used for the
restoration of
watermark.</p>
      <p>
        Sharpening,
Blurring,
Scaling,
Cropping
BER &lt;=0.0029
Attacks
Considered :
JPEG
Compression,
Rotation,
Gaussian
noise, Salt &amp;
Pepper
NCC=
For colored
images
Range
[0.9100 – 1.0]
For Grayscale
images
Range
[0.9358 – 1.0]
BER=
For colored
images
Range
[0 – 0.0156]
For Grayscale
images
Range
[0 – 0.0176]
Attacks
Considered :
Rotation at
various
angles, Scaling
factor,
Translation,
Scaling +
Rotation,
Taha et
al. [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ]
“Adaptive Image Integer-based lifting
Watermarking wavelet transform
Algorithm Based is used.
on an Efficient
Perceptual
Mapping
Model”
      </p>
      <sec id="sec-12-1">
        <title>Alshoura et al. [35]</title>
        <p>Learning
Machine”
“A New Chaotic</p>
      </sec>
      <sec id="sec-12-2">
        <title>Image</title>
      </sec>
      <sec id="sec-12-3">
        <title>Watermarking</title>
      </sec>
      <sec id="sec-12-4">
        <title>Scheme Based on SVD and IWT”</title>
        <p>Machine (ELM) and
Bi-directional ELM
(B-ELM)</p>
      </sec>
      <sec id="sec-12-5">
        <title>IWT-SVD Hybrid is used.</title>
      </sec>
      <sec id="sec-12-6">
        <title>Random key is</title>
        <p>generated using
cover image and the
watermark image.</p>
      </sec>
      <sec id="sec-12-7">
        <title>This key is utilized</title>
        <p>for embedding of
watermark using
chaotic multiple
scaling factors
(CMSF).</p>
        <sec id="sec-12-7-1">
          <title>Cover image</title>
        </sec>
      </sec>
      <sec id="sec-12-8">
        <title>Size :</title>
        <p>512 x 512</p>
      </sec>
      <sec id="sec-12-9">
        <title>Pixels</title>
        <sec id="sec-12-9-1">
          <title>Watermark</title>
        </sec>
      </sec>
      <sec id="sec-12-10">
        <title>Grayscale image</title>
      </sec>
      <sec id="sec-12-11">
        <title>Size:</title>
        <p>256 x 256</p>
      </sec>
      <sec id="sec-12-12">
        <title>Pixels PSNR= Range [46.85 – 52.33] dB</title>
        <p>In Table 1, a study and evaluation of work done in digital watermarking techniques in past are
enumerated. The spatial domain and frequency domain techniques are some popular techniques examined
in the past. Also, it has been observed that the spatial domain digital watermarking technique is less
robust and hence less preferred. The performance of the watermarked image is evaluated through
robustness, imperceptibility, security, and capacity. Among these the most preferred criteria, were the
visual imperceptibility of the watermarked image and the robustness of the watermarking. In fact, the
future work holds scope by combining techniques and using them in hybrid form to not only enhances the
robustness of the watermarked image, but it may also reduce the drawbacks of each method considered
separately.</p>
      </sec>
    </sec>
    <sec id="sec-13">
      <title>6. Conclusions</title>
      <p>This paper gives an overview of techniques of digital image watermarking along with the detailed
classification and characteristics. The various application areas such as medical, remote education,
military, electronic voting systems have been presented. It has been seen that data security has become a
top priority due to the extensive transmission of digital data. So, for providing authorized data or
safeguarding important data, digital watermarking is used. The performance of the watermarked images is
evaluated through robustness, imperceptibility, security, and capacity. These are analyzed using peak
signal to noise ratio and bit-error ratio. It was observed that robustness was a preferred criterion. Invisible
watermarking is carried out for content authentication and proof of ownership. Research groups have
preferred frequency domain techniques and have tried to work on balancing between robustness and
visual imperceptibility. Through the paper, we analyze various watermarking methods in digital images
used in the recent past.
7. References</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>A. K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>A recent survey on image watermarking techniques and its application in e-governance</article-title>
          .
          <source>Multimedia Tools and Applications</source>
          ,
          <volume>77</volume>
          (
          <issue>3</issue>
          ),
          <fpage>3597</fpage>
          -
          <lpage>3622</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Chadha</surname>
            ,
            <given-names>R. S.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>A survey of digital watermarking techniques, applications and attacks</article-title>
          .
          <source>International Journal of Engineering and Innovative Technology (IJEIT)</source>
          ,
          <volume>2</volume>
          (
          <issue>9</issue>
          ),
          <fpage>165</fpage>
          -
          <lpage>175</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>B. K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Yadav</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>A Recent survey on multimedia and database watermarking</article-title>
          .
          <source>Multimedia Tools and Applications</source>
          ,
          <volume>79</volume>
          (
          <issue>27</issue>
          ),
          <fpage>20149</fpage>
          -
          <lpage>20197</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Cox</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bloom</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fridrich</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Kalker</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>Digital watermarking and steganography</article-title>
          . Morgan kaufmann.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Dutta</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2016</year>
          ,
          <article-title>February)</article-title>
          .
          <article-title>Performance analysis of spatial domain digital watermarking techniques</article-title>
          .
          <source>In 2016 International conference on information communication and embedded systems (ICICES)</source>
          (pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Abraham</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Paul</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>An imperceptible spatial domain color image watermarking scheme</article-title>
          .
          <source>Journal of King</source>
          Saud University-Computer and Information Sciences,
          <volume>31</volume>
          (
          <issue>1</issue>
          ),
          <fpage>125</fpage>
          -
          <lpage>133</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , Liu,
          <string-name>
            <surname>R.</surname>
          </string-name>
          , Zhang,
          <string-name>
            <given-names>L.</given-names>
            , &amp;
            <surname>Ma</surname>
          </string-name>
          ,
          <string-name>
            <surname>Z.</surname>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Secure and robust digital image watermarking scheme using logistic and RSA encryption</article-title>
          .
          <source>Expert Systems with Applications</source>
          ,
          <volume>97</volume>
          ,
          <fpage>95</fpage>
          -
          <lpage>105</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Singh</surname>
            <given-names>AK</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
            <given-names>B</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            <given-names>G</given-names>
          </string-name>
          and
          <string-name>
            <surname>Mohan</surname>
            <given-names>A</given-names>
          </string-name>
          (
          <year>2017</year>
          )
          <article-title>Medical Image Watermarking: Techniques and Applications</article-title>
          .
          <source>Book series on Multimedia Systems and Applications</source>
          , Springer, USA.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Agarwal</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>A. K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>P. K.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Survey of robust and imperceptible watermarking</article-title>
          .
          <source>Multimedia Tools and Applications</source>
          ,
          <volume>78</volume>
          (
          <issue>7</issue>
          ),
          <fpage>8603</fpage>
          -
          <lpage>8633</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Dutta</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2016</year>
          , May).
          <article-title>A study on robustness of block entropy based digital image watermarking techniques with respect to various attacks</article-title>
          .
          <source>In 2016 IEEE International conference on recent trends in electronics, information &amp; communication technology (RTEICT)</source>
          (pp.
          <fpage>1802</fpage>
          -
          <lpage>1806</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Song</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sudirman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Merabti</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Llewellyn-Jones</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2010</year>
          ,
          <article-title>January)</article-title>
          .
          <article-title>Analysis of digital image watermark attacks</article-title>
          .
          <source>In 2010 7th IEEE Consumer Communications and Networking Conference</source>
          (pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Voloshynovskiy</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pereira</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pun</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eggers</surname>
            ,
            <given-names>J. J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>J. K.</given-names>
          </string-name>
          (
          <year>2001</year>
          ).
          <article-title>Attacks on digital watermarks: classification, estimation based attacks, and benchmarks</article-title>
          .
          <source>IEEE communications Magazine</source>
          ,
          <volume>39</volume>
          (
          <issue>8</issue>
          ),
          <fpage>118</fpage>
          -
          <lpage>126</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Voloshynovskiy</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pereira</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pun</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eggers</surname>
            ,
            <given-names>J. J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>J. K.</given-names>
          </string-name>
          (
          <year>2001</year>
          ).
          <article-title>Attacks on digital watermarks: classification, estimation based attacks, and benchmarks</article-title>
          .
          <source>IEEE communications Magazine</source>
          ,
          <volume>39</volume>
          (
          <issue>8</issue>
          ),
          <fpage>118</fpage>
          -
          <lpage>126</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Vaidya</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>PVSSR</surname>
            ,
            <given-names>C. M.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>A robust semi-blind watermarking for color images based on multiple decompositions</article-title>
          .
          <source>Multimedia Tools and Applications</source>
          ,
          <volume>76</volume>
          (
          <issue>24</issue>
          ),
          <fpage>25623</fpage>
          -
          <lpage>25656</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Song</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Digital image watermarking method based on DCT and fractal encoding</article-title>
          .
          <source>IET image processing</source>
          ,
          <volume>11</volume>
          (
          <issue>10</issue>
          ),
          <fpage>815</fpage>
          -
          <lpage>821</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Savakar</surname>
            ,
            <given-names>D. G.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ghuli</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Robust invisible digital image watermarking using hybrid scheme</article-title>
          .
          <source>Arabian Journal for Science and Engineering</source>
          ,
          <volume>44</volume>
          (
          <issue>4</issue>
          ),
          <fpage>3995</fpage>
          -
          <lpage>4008</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Moosazadeh</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ekbatanifard</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>A new DCT-based robust image watermarking method using teaching-learning-based optimization</article-title>
          .
          <source>Journal of Information Security and Applications</source>
          ,
          <volume>47</volume>
          ,
          <fpage>28</fpage>
          -
          <lpage>38</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yuan</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Yao</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>New rapid and robust color image watermarking technique in spatial domain</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>7</volume>
          ,
          <fpage>30398</fpage>
          -
          <lpage>30409</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>A. K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Improved wavelet-based image watermarking through SPIHT</article-title>
          .
          <source>Multimedia Tools and Applications</source>
          ,
          <volume>79</volume>
          (
          <issue>15</issue>
          ),
          <fpage>11069</fpage>
          -
          <lpage>11082</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Fares</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Amine</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Salah</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>A robust blind color image watermarking based on Fourier transform domain</article-title>
          .
          <source>Optik</source>
          ,
          <volume>208</volume>
          ,
          <fpage>164562</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Yuan</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>New image blind watermarking method based on two-dimensional discrete cosine transform</article-title>
          .
          <source>Optik</source>
          ,
          <volume>204</volume>
          ,
          <fpage>164152</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Anand</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>A. K.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>An improved DWT-SVD domain watermarking for medical information security</article-title>
          .
          <source>Computer Communications</source>
          ,
          <volume>152</volume>
          ,
          <fpage>72</fpage>
          -
          <lpage>80</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Mishra</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rajpal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp; Bala,
          <string-name>
            <surname>R.</surname>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Bi-directional extreme learning machine for semi-blind watermarking of compressed images</article-title>
          .
          <source>Journal of information security and applications</source>
          ,
          <volume>38</volume>
          ,
          <fpage>71</fpage>
          -
          <lpage>84</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Ambadekar</surname>
            ,
            <given-names>S. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jain</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Khanapuri</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Digital image watermarking through encryption and DWT for copyright protection</article-title>
          .
          <source>In Recent Trends in Signal and Image Processing</source>
          (pp.
          <fpage>187</fpage>
          -
          <lpage>195</lpage>
          ). Springer, Singapore.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Shukla</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tiwari</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Dubey</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Survey on digital watermarking techniques</article-title>
          .
          <source>International Journal of Signal Processing, Image Processing and Pattern Recognition</source>
          ,
          <volume>9</volume>
          (
          <issue>1</issue>
          ),
          <fpage>239</fpage>
          -
          <lpage>244</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>A. K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>P. K.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Secure data hiding techniques: a survey</article-title>
          .
          <source>Multimedia Tools and Applications</source>
          ,
          <volume>79</volume>
          (
          <issue>23</issue>
          ),
          <fpage>15901</fpage>
          -
          <lpage>15921</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Dixit</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Dixit</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>A Review on Digital Image Watermarking Techniques</article-title>
          .
          <source>International Journal of Image, Graphics &amp; Signal Processing</source>
          ,
          <volume>9</volume>
          (
          <issue>4</issue>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Sherekar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thakare</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Jain</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Role of Digital Watermark in e-governance and ecommerce</article-title>
          .
          <source>International Journal of Computer Science and Network Security</source>
          ,
          <volume>8</volume>
          (
          <issue>1</issue>
          ),
          <fpage>257</fpage>
          -
          <lpage>261</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Hussein</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Belal</surname>
            ,
            <given-names>M. A.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>Digital watermarking techniques, applications and attacks applied to digital media: a survey</article-title>
          .
          <source>threshold</source>
          ,
          <issue>5</issue>
          ,
          <fpage>6</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yuan</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>An approximate Schur decomposition-based spatial domain color image watermarking method</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>7</volume>
          ,
          <fpage>4358</fpage>
          -
          <lpage>4370</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Rajpal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mishra</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp; Bala,
          <string-name>
            <surname>R.</surname>
          </string-name>
          (
          <year>2016</year>
          ,
          <article-title>August)</article-title>
          .
          <article-title>Multiple scaling factors based Semi-Blind watermarking of grayscale images using OS-ELM neural network</article-title>
          .
          <source>In 2016 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)</source>
          (pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Hosny</surname>
            ,
            <given-names>K. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Darwish</surname>
            ,
            <given-names>M. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Salah</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Parallel multi-core CPU and GPU for fast and robust medical image watermarking</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>6</volume>
          ,
          <fpage>77212</fpage>
          -
          <lpage>77225</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <surname>Taha</surname>
            ,
            <given-names>T. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ngadiran</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ehkan</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Adaptive image watermarking algorithm based on an efficient perceptual mapping model</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>6</volume>
          ,
          <fpage>66254</fpage>
          -
          <lpage>66267</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Rajpal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mishra</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp; Bala,
          <string-name>
            <surname>R.</surname>
          </string-name>
          (
          <year>2017</year>
          , May).
          <article-title>Fast digital watermarking of uncompressed colored images using bidirectional extreme learning machine</article-title>
          .
          <source>In 2017 International Joint Conference on Neural Networks (IJCNN)</source>
          (pp.
          <fpage>1361</fpage>
          -
          <lpage>1366</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Alshoura</surname>
            ,
            <given-names>W. H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zainol</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teh</surname>
            ,
            <given-names>J. S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Alawida</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>A new chaotic image watermarking scheme based on SVD and IWT</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>8</volume>
          ,
          <fpage>43391</fpage>
          -
          <lpage>43406</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>