Sie sind auf Seite 1von 14

SN Author Year

1 AR.Arunachalam 2013
2 Amy Tun and Yadana Thein 2013
3 Dr. Ajit Singh, Meenakshi Gahlawat 2013
4 Kamal Kant Hiran Ruchi Doshi 2013
5 Dr.Sangeeta D. Jadhav 2013
6 Ms T.SREELEKHA1, Dr M. DHAMODHAR REDDY2, Dr T. RAMASHRI3 2013
7 K. Chaitanya, E. Sreenivasa Reddy & K. Gangadhara Rao 2013
8 Ovidiu COSMA 2013
9 Md. Maklachur Rahman1 2013
10 Henri Bruno Razafindradina1 and Attoumani Mohamed Karim2 2013
11 Naida.H.Nazmudeen1, Farsana.F.J2 2014
12 K.Anusudha 1, N.Venkateswaren2 2014

13 Nasrin M. Makbol, Bee Ee Khoo 2014


14 Md Saiful Islam and Ui Pil Chong 2014
15 Almas Abbasi1, 2, Woo Chaw Seng1, and Imran Shafiq Ahmad3 2014
16 Mya Thidar Kyaw, and Kyi Soe 2014
17 Poonam H. Mahajan, Pramod B. Bhalerao 2014
18 Ms.Pallavi patil1, Dr. D.S. Bormane2, 2014
19 LianjieDong*1andRuihongWang2 2014
20 Chia-Chen Lin1, Chin-Chen Chang2,4,, and Yi-Hui Chen3 2014
21 P. Shanthi ,R. S. Bhuvaneswaran 2014
22 *J.S. LeenaJasmine, **L. Prabha 2014
23 Zhu Yuefeng1, 2, Lin Li 2 2015
24 Ritu Chhikara 2015
25 Su Young Han 2015
26 Rifat Kurban,Hakki Bozpolat,Florenc Skuka 2015
27 Sumalatha Muthyala,Sivadanam Bharath Kumar,Prof. B. SubbaReddy 2015
28 Md. Atiqur Rahman & M. M. Fazle Rabbi 2015
29 D. KIRAN KUMAR1, N. NAGA MALLIKARJUN 2015
30 AliBenoraira*,KhierBenmahammedandNoureddineBoucenna 2015
31 Souad Bekkouch* and Kamel Mohamed Faraoun* 2015
32 Qing Lv1, a, Hua Zhao1, b *, Jinxing Liu 2, 2015
33 Shaila R Hallur *, Suresh Kuri and G. H. Kulkarni 2015
34 Huang-Nan Huang1, Der-Fa Chen2, Chiu-Chun Lin2, Shuo-Tsung Chen1* and Wei 2015
35 FARZANEH SARKARDEH1 and MEHDI KHALILI2 2015
36 Jie Zhao* 2015
37 Ishpreet Kaur1, Amandeep Mavi2 2015
38 H. B. Kekre ,T. Sarode ,S. Natu 2015
39 Bhagyashri D. Shende ,Prof. Mrs. R. J. Shelke 2015
40 Mrs. R.J. Shelke,Dr. Mrs. S.S. Apte 2015
Slant transform
1 Maurace M anugh and Ralph R Martin 1995
2 Xunzhan Zhu, Anthony T.S. Ho 2003
3 Anthony T.S. Ho, Xunzhan Zhu, Jun Shen 2003
4 Alimohammad Latif 2011
5 2012
6
Topic
Imperceptible Digital Image Watermarking
Digital Image Watermarking Scheme Based on LWT and DCT
Secure Data Transmission using Watermarking and Image Compression
Robust & Secure Digital Image Watermarking Technique using Concatenation Process
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
WATERMARKING ALGORITHM USING EDGE DETECTION TECHNIQUE AND DCT, DST, FFT
Digital Color Image Watermarking using DWTDCT Coefficients in RGB Planes
Robust watermarking of color images based on the Discrete Wavelet Transform
ADWT,DCTANDSVDBASEDWATERMARKING TECHNIQUE TOPROTECTTHEIMAGEPIRACY
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
A New Method for Satellite Image Security Using DWT-DCT Watermarking and AES Encryption
Energy Based Wavelet Domain Medical Image Watermarking

A new robust and secure digital image watermarking scheme based on the integer wavelet transform
decomposition
A Digital Image Watermarking Algorithm Based on DWT DCT and SVD
Multi Block based Image Watermarking in Wavelet Domain Using Genetic Programming
A New Scheme of Neural Network and DCT-Domain Based Digital Watermarking
A Blind Digital Image Watermarking using Joint DCT-DWT and Twin Encoding Methodology
Digital Image Watermarking Techniques Using Transform Domain
AblinddigitalwatermarkingalgorithmbasedonDWT
A Novel SVD-based Watermarking Scheme for Protecting Rightful Ownership of Digital Images
Robust Chaos Based Image Watermarking Scheme for Fractal-Wavelet
An Efficient Secure Image Watermarking Using Wavelet Transform
DIGITAL IMAGE WATERMARKING ALGORITHMS BASED ON DUAL TRANSFORM DOMAIN AND SELF-RECOV
A WAVELET BASED DIGITAL IMAGE WATERMARKING SCHEME USING LSB TECHNIQUE
Digital Image Watermarking using wavelet packet and hybrid Filter
Image watermarking using DC components of DCT
A ROBUST IMAGE WATERMARKING USING BWT-SVD
Non-Blind DWT-SVD based Watermarking Technique for RGB Image
Robust Blind Image Watermarking using DWT and SVD Composite Function with QR-Code
Blindimagewatermarkingtechnique basedondifferentialembeddinginDWTand DCTdomains
Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms
Digital Watermarking Algorithm Based on Sequence Pair and Wavelet Transform
Robust Digital Watermarking using DWT-DCT-SVD Algorithms for Color Image
Improving SVD-based image watermarking via block-by-block optimization on singular values
EFFECTIVE SVD-YCBCR COLOR IMAGE WATERMARKING
Robust Image Watermarking Algorithm Based on Radon and Analytic Fourier-Mellin Transforms
Hybridization of DWT, CZT and Modified SVD for Digital Image Watermarking
Performance Analysis of Watermarking using SVD of watermark in Non-sinusoidal Column and Row Tra
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG2000 AND ENCRYPTION TECHNIQ
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES

A truncation method for computing slant transformation with application to IP


A Slant Transform Watermarking for Copyright Protection of Satellite Images
Slant Transform Watermarking for Digital Images
A Watermarking Scheme Based on the Parametric Slant-Hadamard Transform
Journal
International Journal of Innovative Research in Computer and Communication Engineering
IACSIT International Journal of Engineering and Technology
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
International Journal of ICT and Management
Computer Science & Information Technology (CS & IT)
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering
Global Journal of Computer Science and Technology Graphics & Vision
Journal of Electronic and Computer Engineering
International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT
nternational Journal on Cryptography and Information Security (IJCIS
International Journal of Innovative Research in Science, Engineering and Technology
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

Digital Signal Processing


International Journal of Computer and Communication Engineering
The International Arab Journal of Information Technology
International Conference on Advances in Engineering and Technology
International Journal of Innovative Technology and Exploring Engineering
International Journal of Advanced Research in Electronics and Communication Engineerin
JournalofChemicalandPharmaceuticalResearch
Journal of Information Hiding and Multimedia Signal Processin
Applied Mathematical Sciences
International Journal of Computer Trends and Technology
INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS
International Journal of Computer Engineering and Applications
Advanced Science and Technology Letters
ICIT 2015 The 7th International Conference on Information Technology
INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND SCIENTIFIC RESEARCH
Global Journal of Researches in Engineering: Electrical and Electronics Engineering
internatioal journal of scientific engineering and research technology
EURASIPJournalonAdvancesinSignal Processing
journal of information processing
3rd International Conference on Management, Education, Information and Control (MEICI 2015)
International Journal of Current Engineering and Technology
EURASIPJournal on image and video processing
International Journal of Computer Networks and Communications Security
The Open Automation and Control Systems Journal
International Journal of Computer Science and Mobile Computing
African Journal of Computing & ICT
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY

IEEE transaction on communication


IEEE
Visual Communications and Image Processing 2003
Journal of Information Hiding and Multimedia Signal Processing
Page
1321-1326
272-277
1709-1715
111-121
109-116
5982-5989

16-21
21-32
23-30
69-76
7132-7140

356-360
582-589
320-325
22-26
198-202
78-89
124-143
1593-1604
133-137
199-219
139-146
148-152
344-348
149-154

4967-4972

1375-1380
2722-2727
110-116
1071-1074
271-277
09t022

2103-2110
1178-1180
1912-1920
377-386
Methods
4 DWT, arnold scrambled watermark, Linear method of embedding
LWT>DCT; watermark>PN sequence key; fusion by PN sequence 0 and 1 function
DCT > compress watermarked image using improved huffman coding algo
Simple concatenation using zero matrix
Texture extraction- dwt of textured portion; embed watermark in dwt part of image
image>canny>DST,FFT,DCT to image finally SVD
DWT>DCT(HH);watermak dct;replace bits of coverimage by that of watermarks
DWT
zigzag (dct)> dwt >svd> normal embedding technique
dwt > add falling edge or rising edge depending on value of watermark 0 or 1
DWT >DCT; watermark >AES; normal embedding technique

IWT>SVD
DWT>DCT>SVD
2DWT>LH and
log-sigmoid HL in to
transfer multiple
function blocks>
is used add watermark
in input in each independent
layer, tan-sigmoid blocks
transfer function is in hidden layer an
rate backpropagation algorithm is used as training algorithm, DCT to embed watermark
3 DWT> Convert into blocks>DCT>convert into array of 0s and 1s ;add up using PN sequence
Normal DWT and DWT-SVD algorithm
DWT>wavelet coefficient selection;watermark>arnold and DWT; modify coefficient with watermark va
image>blocks>select on the basis of pseudo noise>svd>embed watermark
DWT + chaotic map ( arnold and logistic map)>
LWT>compression using arithmetic coding> embed using a key
dwt>dct
DWT>selected sub band converted into bit sequence and apply huffman coding; message>bit sequen
image>dwt>coefficients;watermark>PN sequence;
image>divided into blocks> DCT; watermark embed
is created using random function with standard normal d
each block
BWT>SVD, normal way of embedding watermark
4 DWT > SVD , normal embedding technique
watermark>toros auto orphism to scramble ;image>2dwt>blocks>SVD to each blocks
DWT>LL>zigzag>DCT>differential embedding
DWT>LL & HH >DCT > SVD > embed watermark; used encryption algo like RAS and SHA5
image>DWT;watermark>sequence bits> embed watermark
DWT>DCT>SVD; normal embedding technique
3DWT > block >SVD > embed watermark
zigzag (dct)>svd> normal embedding technique

dct>dwt>czt>modified svd>embed watermark normally


image> col n row transform> MF sorting; watermark> svd> embed watermark
image> jpeg2000 encoder> encryption RC4> watermarking using spread spectrum
image>DCT >block;JND factor calculator; watermark> dct; embed using normal equation but use jnd

truncation algorithm for 1 d and 2 d array of data presented using slant transform
image; watermark > slant transform; embed normally
image; watermark > slant transform; embed normally
image>slant in block wise> middle band frequencies;watermark > replace middle band using PN gen
image>GA guided slant in block wise> Middle band frequencies; watermark> replace middleband usi
Before (Max) After (Max)
PSNR NC PSNR NC
X X X X
47.3425 X X X
X X X X
38.751 X X X

74.6991 1 48.9297 1
92.6841 1 94.6734 1

40.6685 0.9997

62.82

51.209
good values of psnr before & after
46.093 0.958 X 0.965
43.5883 X X low values
Low values in all respect and non blind watermarking
45 0.996
35.98 51.79
55.87 55.87
42

67
43.16
117.2014 0.939
68.98432
54 1
44.1514
BCR discussed

57
41.6981

low performance

55.052 55.059
76.68

33.956
Remarks

No statistical values were presented


blind and spread spectrum type; no additional statistical values provided
due to usage of compression, space and time is reduced; no statistical data provided
no use
good idea but attack can easily destroy watermark
non blind watermarking technique

semi blind technique


non blind watermarking technique

AES complexity and semi blind type

nd watermarking
the image is at the same time under a variety of attacks, the robustness of the watermarking algorith
Good one
poor performance

non blind technique

seems good
Better than DCT, DWT transformed algo.

Das könnte Ihnen auch gefallen