<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Comprehensive Review on Digital Image Watermarking</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Shweta</forename><surname>Wadhera</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Deen Dayal Upadhyaya College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<settlement>New Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Research Scholar</orgName>
								<orgName type="institution">Sharda University</orgName>
								<address>
									<settlement>Greater Noida</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Deepa</forename><surname>Kamra</surname></persName>
							<affiliation key="aff2">
								<orgName type="department">Department of Management Studies</orgName>
								<orgName type="institution" key="instit1">Deen Dayal Upadhyaya College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<settlement>New Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ankit</forename><surname>Rajpal</surname></persName>
							<affiliation key="aff3">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>New Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Aruna</forename><surname>Jain</surname></persName>
							<affiliation key="aff4">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Bharati College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<settlement>New Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vishal</forename><surname>Jain</surname></persName>
							<affiliation key="aff5">
								<orgName type="department" key="dep1">School of Engineering and Technology</orgName>
								<orgName type="department" key="dep2">Department of Computer Science and Engineering</orgName>
								<orgName type="institution">Sharda University Greater Noida</orgName>
								<address>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A Comprehensive Review on Digital Image Watermarking</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">3BFACEA8055F8C87E5B3D475DBDD9581</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T12:18+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Digital Watermarking</term>
					<term>Digital images</term>
					<term>review</term>
					<term>visual imperceptibility</term>
					<term>robustness</term>
					<term>copyright protection</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The advent of the Internet led to the easy availability of digital data like images, audio, and video. Easy access to multimedia gives rise to the issues such as content authentication, security, copyright protection, and ownership identification. Here, we discuss the concept of digital image watermarking with a focus on the technique used in image watermark embedding and extraction of the watermark. The detailed classification along with the basic characteristics, namely visual imperceptibility, robustness, capacity, security of digital watermarking is also presented in this work. Further, we have also discussed the recent application areas of digital watermarking such as healthcare, remote education, electronic voting systems, and the military. The robustness is evaluated by examining the effect of image processing attacks on the signed content and the watermark recoverability. The authors believe that the comprehensive survey presented in this paper will help the new researchers to gather knowledge in this domain. Further, the comparative analysis can enkindle ideas to improve upon the already mentioned techniques.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>In the present era, the secret to the success of an organization is all about the information it can gather. Also, of concern is how effectively it can stop others from accessing the information generated through its operations and processes. The popularity and availability of the Internet, easy access to digital storage devices, have made the creation, replication, and distribution of digital media hassle-free. This has led to the strong need of developing methods for preventing copyright breaches <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>.</p><p>The technique of digital watermarking is being applied widely to the situations where an organization wants to deter the data from spilling into the public domain. It is extremely crucial in cases where the company is in direct fiduciary relationship with its customers and must protect their information as well <ref type="bibr" target="#b0">[1]</ref>.</p><p>WCNC-2021: Workshop on Computer Networks &amp; Communications, May 01, 2021, Chennai, India. EMAIL: shweta.du@gmail.com (Shweta Wadhera) ORCID: 0000-0002-3123-9976 (Shweta Wadhera) Digital Watermarking is a method to provide protection from any tampering or alteration <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5]</ref>. It provides security and authentication to digital content. The digital watermarking process involves the insertion of signal, information into the original media content. The inserted information is then uncovered and extracted to report the actual owner of the digital media.</p><p>Watermarking involves embedding data called watermark or digital signature or label into the digital media. This watermark can be extracted for revealing the authenticity of the media object <ref type="bibr" target="#b5">[6]</ref>. As an example of a watermark, we can imagine a visible "seal" over an image. A digital watermarking algorithm has three basic parts: -1. Watermark 2. The Encoding algorithm 3. The decoding algorithm <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8]</ref>. This technique may be used for copyright safeguarding and embedding fingerprints, placing authentication for data integrity checks, and confidential communication. Another important application of watermarking techniques includes tracing illegal users with an objective that the owner can approach the regulatory authorities. It can be useful for ensuring that data pertaining to people who buy and sell digital media, kept in record for each transaction. Further track of this data can be kept for controlling copyright breaches. In fact, strict measures must be implemented for this unlawful distribution of digital content.</p><p>The paper is consolidated as follows: section 2 presents the classification of digital watermarking based on various characteristics. Section 3 describes the prominent features of digital watermarking. Section 4 covers the recent areas of application for watermarking. Section 5 presents the various types of attacks. In section 6 we analyze the highlights and results of related work by various authors and section 7 presents the conclusions and future scope in the direction of image watermarking.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Classification of Digital Watermarking</head><p>The section describes the classification of digital watermarking based on various criteria such as robustness, perceptibility, domain, and detection process, multimedia. Further we also briefly present the different popular watermarking techniques.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Based on Characteristics/Robustness</head><p>Robust: Robust watermarking is preferred when copyright information is required to be inserted. Robustness is indicated if the embedded watermark even after some attack is not damaged. It can withstand several attacks. It is seen that for copyright protection, a robust watermark is advantageous.</p><p>Fragile: One can easily find out from the status of the watermark if the data has been altered. For integrity protection, this watermark is preferred.</p><p>Semi-fragile: Some extent of change is tolerated by a semi-fragile watermark <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b5">6]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Based on Perceptibility</head><p>Perceptible: A watermark that is visible is known as perceptible.</p><p>Imperceptible: Incase the watermark is invisible then it is known as imperceptible watermark. In this, information which is embedded into the image is not visible. In such cases one can prove the ownership of your image with the help of imperceptible watermark <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b25">26]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Based on Domain</head><p>Frequency domain: First, the transforming of the image to the frequency domain is carried out. In this type of watermarking different transformation techniques are applied such as DCT, DFT, and DWT <ref type="bibr" target="#b26">[27]</ref>.</p><p>Spatial Domain: Watermarking in this domain moderately changes the value of pixels, of arbitrarily selected portions of images; the watermark is inserted in the host image. No conversion or transformation is applied in the spatial domain. LSB, Patchwork method, SSM Modulation are some of the popular spatial domain-based techniques <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref>.</p><p>Generally, the watermarking carried out in the frequency domain is more robust as compared to the one carried out in the spatial domain.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.1.">Spatial Domain</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Least Significant bit (LSB) method</head><p>In this method, the watermark is inserted in the least significant bit (LSB of image pixels. Ideally, either of two ways is used for embedding. In one approach, the LSB of an image is substituted with a pseudo-noise (PN) sequence, while another approach adds this PN sequence to the LSB. LSB technique provides ease of use but compromises on the robustness parameter against attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Patchwork Method</head><p>Patchwork method randomly picks n pairs of image points (x, y). The data in the x region is lightened and data in the y region is darkened. However, this technique can withstand a series of attacks, but it lacks in terms of capacity. This method employs a technique of subdividing an image signal into non-overlapping blocks of 8 × 8 size. Further, block-wise DCT is performed, and thereafter the choice of coefficients to be watermarked is carried out. Finally, an inverse DCT is applied on each 8 × 8 block to obtain the signed image.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Discrete wavelets transform (DWT)</head><p>In this method, the image is subjected to a sequence of low-pass and high-pass filters. An image is decomposed into four equal sub-bands where each sub-band comprises low frequency (LL), horizontal features (LH), vertical features (HL), and diagonal features (HH). It is a preferred algorithm as it provides a robust and secure watermarking method <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b26">27]</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4.">Based on Detection process</head><p> Blind: Those watermarking processes fall in this category wherein the removal of the embedded information requires only the watermarked image. Its applications can be copyright protection, evoting, etc. <ref type="bibr" target="#b8">[9]</ref>.</p><p> Non-Blind: In this type of watermarking, the process copies along with the text data, the host image, and the inserted information for the retrieval of the watermark. Its application is seen in copyright protection <ref type="bibr" target="#b8">[9]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.5.">Based on Multimedia</head><p> Text Watermarking: It consists of components like words, punctuations, sentences, etc.</p><p>Transformation is done on one of these components and is embedded as a watermark <ref type="bibr" target="#b2">[3]</ref>.</p><p> Image Watermarking: Large-size images are there which has to be watermarked. In the case of images, we require robust watermarks, which should be imperceptible <ref type="bibr" target="#b2">[3]</ref>.</p><p> Video watermarking: In this case, it is difficult to get imperceptible watermark.</p><p> Graphic Watermarking: In 2D or 3D digital graphics, a watermark is embedded. It provides copyright protection.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Basic Characteristics of Digital Watermarking</head><p>Mentioned here are various features of Digital Watermarking.</p><p> Robustness: The robustness feature indicates that the digital watermark can resist various processing operations and attacks. Then it is considered to be robust <ref type="bibr" target="#b13">[14]</ref>.</p><p> Imperceptibility: The imperceptibility feature indicates that a digital watermark should not be seen by the human eye. One should not be able to see the embedded watermark. It can only be identified by specialized procedures. The watermark should be such that the viewer should not be able to see it and the process of embedding a watermark should be such that the quality of the content is maintained <ref type="bibr" target="#b13">[14]</ref>.</p><p> Security: The security feature indicates that irrespective of targeted attacks, the inserted digital watermark cannot be removed. Watermark security describes that altering or removing a watermark without any deterioration to the host signal should be arduous. Watermarking security can be explained as a way to provide secrecy, ownership, and protection of data <ref type="bibr" target="#b1">[2]</ref>.</p><p> Capacity: The amount of information embedded in a watermarked image also known as data payload <ref type="bibr" target="#b2">[3]</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Recent Applications of Watermarking</head><p> Copyright protection: As we are aware that images can be easily circulated and are freely available over the internet. These images can be used commercially. So copyright protection of data is needed and for this Digital Watermarking is very useful. The inserted digital watermark will be used to identify the copyright owner <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b8">9]</ref>.</p><p> Fingerprint: Fingerprinting in digital watermarking can be put up as a method for embedding some distinctiveness. The fingerprint should be difficult to alter. The information inserted is related to the customer. It is through this fingerprinting that it is revealed about those authorized customers who are involved in the circulation of copyright data by breaching the agreement <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b26">27]</ref>.  Broadcast Monitoring: Over the years it has been seen that availability and accessibility to media content have increased exponentially. Also, the content is available through the internet. In such times, it has become important for content owners and copyright owners to know about the real distributor of content. Digital Watermarking has an important role here <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b25">26]</ref>.</p><p> Medical Application: Embedding of patient name in the MRI-scan, CT-scan or X-ray reports can be done using visible watermarking. The treatment of the patient depends on these medical reports. So to avoid mixing of reports the technique of visible watermarking can be used <ref type="bibr" target="#b8">[9]</ref>.</p><p> Electronic Voting System: The Internet has spread all over the country from big towns to small villages. Electronic voting helps to carry out elections, keeping the security aspect into consideration <ref type="bibr" target="#b8">[9]</ref>.</p><p> Remote Education: Lack of teachers poses a big problem in small villages. Smart Technology needs to be adopted for distance learning. In this case watermarking plays its role in the authentic transmission of study material over the internet <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b26">27]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Attacks on Watermarking</head><p>A digital Watermarking scheme is always assessed by the fact that how robust it is over attacks. Attack on any watermark is used to harm the inserted watermark or enfeeble the watermark's discovery. Hampering the protection, which a watermark provides to digital content, is the objective of any attack. Watermarking attacks can be classified as follows -Geometry attack, Protocol attack, Cryptographic attack, and removal attack <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b11">12]</ref>.</p><p> Geometry Attack: Such processing is done over the watermark image which alters the geometry of the image like rotation, cropping, etc. These can be further classified into -scaling, cropping, rotation, and translation <ref type="bibr" target="#b5">[6]</ref>.  Removal Attack: This attack aims at removing the inserted data from the digital image. If it is not able to, yet they try to destroy the embedded information <ref type="bibr" target="#b28">[29]</ref>.  Protocol Attack: The attacks which come under this category, do not damage the embedded data. Two types of Protocol attacks are there: Invertible, Copy attack. So a watermark should be noninvertible and should not be copied. A watermark is invertible when the attacker removes his own watermark from the host data. The attacker then pretends to be the owner of the data. This shows that for copyright protection, watermarks should be non-invertible <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b28">29]</ref>.</p><p> Copy Attack: It is also a form of Protocol attack. In this also the watermark is not destroyed. Instead, the attacker estimates the watermark from host data. It is then copied to other data <ref type="bibr" target="#b12">[13]</ref>.</p><p> Cryptographic Attack: These types of attacks include those which break the security in watermarking techniques. With this, they can extract the inserted watermark data or can insert some delusive watermark. The Brute-force and Oracle attacks fall under this category <ref type="bibr" target="#b28">[29]</ref>.</p><p>In order to present an exhaustive survey on image watermarking, we created a repository of more than 50 papers on Mendeley and 35 papers were used to develop the background of digital watermarking and 19 papers were found relevant in the area of image watermarking.</p><p>Table <ref type="table" target="#tab_0">1</ref> summarizes the watermarking schemes proposed by various research groups in the past few years through the comparative analysis.  <ref type="table" target="#tab_0">1</ref>, a study and evaluation of work done in digital watermarking techniques in past are enumerated. The spatial domain and frequency domain techniques are some popular techniques examined in the past. Also, it has been observed that the spatial domain digital watermarking technique is less robust and hence less preferred. The performance of the watermarked image is evaluated through robustness, imperceptibility, security, and capacity. Among these the most preferred criteria, were the visual imperceptibility of the watermarked image and the robustness of the watermarking. In fact, the future work holds scope by combining techniques and using them in hybrid form to not only enhances the robustness of the watermarked image, but it may also reduce the drawbacks of each method considered separately.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>This paper gives an overview of techniques of digital image watermarking along with the detailed classification and characteristics. The various application areas such as medical, remote education, military, electronic voting systems have been presented. It has been seen that data security has become a top priority due to the extensive transmission of digital data. So, for providing authorized data or safeguarding important data, digital watermarking is used. The performance of the watermarked images is evaluated through robustness, imperceptibility, security, and capacity. These are analyzed using peak signal to noise ratio and bit-error ratio. It was observed that robustness was a preferred criterion. Invisible watermarking is carried out for content authentication and proof of ownership. Research groups have preferred frequency domain techniques and have tried to work on balancing between robustness and visual imperceptibility. Through the paper, we analyze various watermarking methods in digital images used in the recent past.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: The block diagram of Digital Watermarking Concept</figDesc><graphic coords="2,148.80,250.56,314.16,171.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Classification of Digital watermarking</figDesc><graphic coords="4,127.20,71.76,357.36,227.28" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Three level decomposition in 2D DWT</figDesc><graphic coords="4,158.88,520.32,294.24,175.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Basic Characteristics</figDesc><graphic coords="6,106.56,72.00,398.88,135.48" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Applications of Digital Watermarking</figDesc><graphic coords="6,150.84,445.44,309.84,204.84" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Types of Attacks on Digital Watermarking</figDesc><graphic coords="7,168.48,490.56,274.56,213.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 :</head><label>1</label><figDesc>Comprehensive survey of recent image watermarking schemes</figDesc><table><row><cell>Research</cell><cell>Title</cell><cell>Technique used</cell><cell>Input</cell><cell>Visual</cell><cell>Robustness</cell></row><row><cell>group</cell><cell></cell><cell></cell><cell></cell><cell>Imperceptibility</cell><cell></cell></row><row><cell>Abraham</cell><cell>"An</cell><cell>Spatial domain</cell><cell>Cover image</cell><cell>PSNR =</cell><cell>NCC = Range</cell></row><row><cell>and Paul</cell><cell>imperceptible</cell><cell>Simple Image</cell><cell>Colored</cell><cell>47.6 dB</cell><cell>[0.9917 -1]</cell></row><row><cell>[6]</cell><cell>spatial domain</cell><cell>Region Detector</cell><cell>image of</cell><cell></cell><cell></cell></row><row><cell></cell><cell>color image</cell><cell>(SIRD): Estimation</cell><cell>Size:</cell><cell>SSIM =</cell><cell>BER= Range</cell></row><row><cell></cell><cell>watermarking</cell><cell>of most suitable</cell><cell>512 x 512 x 3</cell><cell>0.9904</cell><cell>[0.7500-0]</cell></row><row><cell></cell><cell>scheme"</cell><cell>portion within the</cell><cell>pixels</cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell>block of an image.</cell><cell></cell><cell></cell><cell>Attacks</cell></row><row><cell></cell><cell></cell><cell></cell><cell>Watermark</cell><cell></cell><cell>considered:</cell></row><row><cell></cell><cell></cell><cell></cell><cell>Size:</cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>64 x 64 pixels</cell><cell></cell><cell>Salt and</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Pepper,</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Poisson,</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Speckle,</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>average</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>filtering,</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Gaussian LPF,</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Sharpening,</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>JPEG</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Compression,</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Cropping,</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Resizing</cell></row><row><cell>Liu et al.</cell><cell>"Secure and</cell><cell>Scrambling</cell><cell>Cover image</cell><cell>PSNR</cell><cell>NCC Range</cell></row><row><cell>[7]</cell><cell>robust digital</cell><cell>Watermark: RSA</cell><cell>Colored</cell><cell>Range =</cell><cell>=[0.6053 -</cell></row><row><cell></cell><cell>image</cell><cell>Encryption</cell><cell>Size: 512 x</cell><cell>[38.68 -48.03]</cell><cell>0.9673]</cell></row><row><cell></cell><cell>watermarking</cell><cell></cell><cell>512 pixels</cell><cell>dB</cell><cell></cell></row><row><cell></cell><cell>scheme using</cell><cell>DWT + SVD Hybrid</cell><cell></cell><cell></cell><cell>Attacks</cell></row></table></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0" />			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A recent survey on image watermarking techniques and its application in e-governance</title>
		<author>
			<persName><forename type="first">C</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Multimedia Tools and Applications</title>
		<imprint>
			<biblScope unit="volume">77</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="3597" to="3622" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A survey of digital watermarking techniques, applications and attacks</title>
		<author>
			<persName><forename type="first">P</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Chadha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Engineering and Innovative Technology (IJEIT)</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="165" to="175" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A Recent survey on multimedia and database watermarking</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Yadav</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Multimedia Tools and Applications</title>
		<imprint>
			<biblScope unit="volume">79</biblScope>
			<biblScope unit="issue">27</biblScope>
			<biblScope unit="page" from="20149" to="20197" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Digital watermarking and steganography</title>
		<author>
			<persName><forename type="first">I</forename><surname>Cox</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Miller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bloom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Fridrich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kalker</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>Morgan kaufmann</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Performance analysis of spatial domain digital watermarking techniques</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dutta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2016 International conference on information communication and embedded systems (ICICES)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2016-02">2016. February</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">An imperceptible spatial domain color image watermarking scheme</title>
		<author>
			<persName><forename type="first">J</forename><surname>Abraham</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Paul</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of King Saud University-Computer and Information Sciences</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="125" to="133" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Secure and robust digital image watermarking scheme using logistic and RSA encryption</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Ma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Expert Systems with Applications</title>
		<imprint>
			<biblScope unit="volume">97</biblScope>
			<biblScope unit="page" from="95" to="105" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Medical Image Watermarking: Techniques and Applications</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mohan</forename><forename type="middle">A</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Book series on Multimedia Systems and Applications</title>
				<meeting><address><addrLine>USA</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Survey of robust and imperceptible watermarking</title>
		<author>
			<persName><forename type="first">N</forename><surname>Agarwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Multimedia Tools and Applications</title>
		<imprint>
			<biblScope unit="volume">78</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="8603" to="8633" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A study on robustness of block entropy based digital image watermarking techniques with respect to various attacks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dutta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International conference on recent trends in electronics, information &amp; communication technology (RTEICT)</title>
				<imprint>
			<date type="published" when="2016-05">2016. May. 2016</date>
			<biblScope unit="page" from="1802" to="1806" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Analysis of digital image watermark attacks</title>
		<author>
			<persName><forename type="first">C</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sudirman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Merabti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Llewellyn-Jones</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">7th IEEE Consumer Communications and Networking Conference</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2010-01">2010. January. 2010</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Attacks on digital watermarks: classification, estimation based attacks, and benchmarks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Voloshynovskiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pereira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Pun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Eggers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">K</forename><surname>Su</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE communications Magazine</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="118" to="126" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Attacks on digital watermarks: classification, estimation based attacks, and benchmarks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Voloshynovskiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pereira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Pun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Eggers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">K</forename><surname>Su</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE communications Magazine</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="118" to="126" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A robust semi-blind watermarking for color images based on multiple decompositions</title>
		<author>
			<persName><forename type="first">P</forename><surname>Vaidya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">M</forename><surname>Pvssr</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Multimedia Tools and Applications</title>
		<imprint>
			<biblScope unit="volume">76</biblScope>
			<biblScope unit="issue">24</biblScope>
			<biblScope unit="page" from="25623" to="25656" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Digital image watermarking method based on DCT and fractal encoding</title>
		<author>
			<persName><forename type="first">S</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Pan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Song</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IET image processing</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="815" to="821" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Robust invisible digital image watermarking using hybrid scheme</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">G</forename><surname>Savakar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ghuli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Arabian Journal for Science and Engineering</title>
		<imprint>
			<biblScope unit="volume">44</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="3995" to="4008" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">A new DCT-based robust image watermarking method using teaching-learning-based optimization</title>
		<author>
			<persName><forename type="first">M</forename><surname>Moosazadeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ekbatanifard</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Information Security and Applications</title>
		<imprint>
			<biblScope unit="volume">47</biblScope>
			<biblScope unit="page" from="28" to="38" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">New rapid and robust color image watermarking technique in spatial domain</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Su</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Yao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="30398" to="30409" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Improved wavelet-based image watermarking through SPIHT</title>
		<author>
			<persName><forename type="first">C</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Multimedia Tools and Applications</title>
		<imprint>
			<biblScope unit="volume">79</biblScope>
			<biblScope unit="issue">15</biblScope>
			<biblScope unit="page" from="11069" to="11082" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A robust blind color image watermarking based on Fourier transform domain</title>
		<author>
			<persName><forename type="first">K</forename><surname>Fares</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Amine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Salah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Optik</title>
		<imprint>
			<biblScope unit="volume">208</biblScope>
			<biblScope unit="page">164562</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">New image blind watermarking method based on two-dimensional discrete cosine transform</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Su</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Optik</title>
		<imprint>
			<biblScope unit="volume">204</biblScope>
			<biblScope unit="page">164152</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">An improved DWT-SVD domain watermarking for medical information security</title>
		<author>
			<persName><forename type="first">A</forename><surname>Anand</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Communications</title>
		<imprint>
			<biblScope unit="volume">152</biblScope>
			<biblScope unit="page" from="72" to="80" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Bi-directional extreme learning machine for semi-blind watermarking of compressed images</title>
		<author>
			<persName><forename type="first">A</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rajpal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bala</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of information security and applications</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="page" from="71" to="84" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Digital image watermarking through encryption and DWT for copyright protection</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">P</forename><surname>Ambadekar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Jain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Khanapuri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Recent Trends in Signal and Image Processing</title>
				<meeting><address><addrLine>Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="187" to="195" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Survey on digital watermarking techniques</title>
		<author>
			<persName><forename type="first">D</forename><surname>Shukla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Tiwari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Dubey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Signal Processing, Image Processing and Pattern Recognition</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="239" to="244" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Secure data hiding techniques: a survey</title>
		<author>
			<persName><forename type="first">L</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Multimedia Tools and Applications</title>
		<imprint>
			<biblScope unit="volume">79</biblScope>
			<biblScope unit="issue">23</biblScope>
			<biblScope unit="page" from="15901" to="15921" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">A Review on Digital Image Watermarking Techniques</title>
		<author>
			<persName><forename type="first">A</forename><surname>Dixit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dixit</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Image, Graphics &amp; Signal Processing</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Role of Digital Watermark in e-governance and ecommerce</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sherekar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Thakare</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Jain</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Science and Network Security</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="257" to="261" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Digital watermarking techniques, applications and attacks applied to digital media: a survey</title>
		<author>
			<persName><forename type="first">E</forename><surname>Hussein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Belal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">threshold</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page">6</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">An approximate Schur decomposition-based spatial domain color image watermarking method</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Su</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="4358" to="4370" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Multiple scaling factors based Semi-Blind watermarking of grayscale images using OS-ELM neural network</title>
		<author>
			<persName><forename type="first">A</forename><surname>Rajpal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bala</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2016-08">2016. August. 2016</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Parallel multi-core CPU and GPU for fast and robust medical image watermarking</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">M</forename><surname>Hosny</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Darwish</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Salah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="77212" to="77225" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Adaptive image watermarking algorithm based on an efficient perceptual mapping model</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">B</forename><surname>Taha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ngadiran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Ehkan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="66254" to="66267" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Fast digital watermarking of uncompressed colored images using bidirectional extreme learning machine</title>
		<author>
			<persName><forename type="first">A</forename><surname>Rajpal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bala</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Joint Conference on Neural Networks (IJCNN)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2017-05">2017. May. 2017</date>
			<biblScope unit="page" from="1361" to="1366" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">A new chaotic image watermarking scheme based on SVD and IWT</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">H</forename><surname>Alshoura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Zainol</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">S</forename><surname>Teh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Alawida</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="43391" to="43406" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
