A review of image watermarking for identity protection and verification
File(s)
Author(s)
Sharma, Sunpreet
Zou, Ju Jia
Fang, Gu
Shukla, Panchamkumar
Cai, Weidong
Type
Journal Article
Abstract
Identity protection is an indispensable feature of any information security system. An identity can exist in the form of digitally written signatures, biometric information, logos, etc. It serves the vital purpose of the owners’ verification and provides them with a safety net against their imposters, so its protection is essential. Numerous security mechanisms are being developed to achieve this goal, and information embedding is prominent among all. It consists of cryptography, steganography, and watermarking; collectively, they are known as data hiding (DH) techniques. In addition to providing insight into various DH techniques, this review prominently covers the image watermarking works that have positively influenced its relevant research area. To that end, one of the main aspects of this study is its inclusive nature in reviewing watermarking techniques, via which it aims to provide a 360∘ view of the watermarking technology. The main contributions of this study are summarised below.
Date Issued
2024-03
Date Acceptance
2023-08-31
Citation
Multimedia Tools and Applications, 2024, 83 (11), pp.31829-31891
ISSN
1380-7501
Publisher
Springer
Start Page
31829
End Page
31891
Journal / Book Title
Multimedia Tools and Applications
Volume
83
Issue
11
Copyright Statement
© The Author(s) 2023. This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
License URL
Identifier
https://link.springer.com/article/10.1007/s11042-023-16843-3
Publication Status
Published
Date Publish Online
2023-09-19