Skip to main content
Log in

A Recent Survey on Multimedia and Database Watermarking

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In today’s digital era, it is very easy to copy, manipulate and distribute multimedia data over an open channel. Copyright protection, content authentication, identity theft, and ownership identification have become challenging issues for content owners/distributors. Off late data hiding methods have gained prominence in areas such as medical/healthcare, e-voting systems, military, communication, remote education, media file archiving, insurance companies, etc. Digital watermarking is one of the burning research areas to address these issues. In this survey, we present various aspects of watermarking. In addition, various classification of watermarking is presented. Here various state-of-the-art of multimedia and database watermarking is discussed. With this survey, researchers will be able to implement efficient watermarking techniques for the security of multimedia and database.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Agarwal H, Raman B, Venkat I (2015) Blind reliable invisible watermarking method in wavelet domain for face image watermark. Multimedia Tools and Applications 74(17):6897–6935

    Google Scholar 

  2. Agarwal N, Singh AK, Singh PK Survey of robust and imperceptible watermarking. Multimedia Tools and Applications pp. 1–31

  3. Agrawal R, Haas PJ, Kiernan J (2003) Watermarking relational data: framework, algorithms and analysis. The VLDB Journal—The International Journal on Very Large Data Bases 12(2):157–169

    Google Scholar 

  4. Akhtar Z, Khan E (2016) Identifying high quality jpeg compressed images through exhaustive recompression technique. In: 2016 International conference on advances in computing, communications and informatics (ICACCI), pp. 652–656. IEEE

  5. Akhtar Z, Khan E (2017) Revealing the traces of histogram equalisation in digital images. IET Image Process 12(5):760–768

    Google Scholar 

  6. Al-Sewadi HA, Aldakari ANA (2018) Improved processing speed for text watermarking algorithm in color images. In: Proceedings of the 8th International Conference on Information Systems and Technologies, p. 7. ACM

  7. Ali Z, Imran M, Alsulaiman M, Zia T, Shoaib M (2018) A zero-watermarking algorithm for privacy protection in biomedical signals. Futur Gener Comput Syst 82:290–303

    Google Scholar 

  8. Alotaibi RA, Elrefaei LA (2018) Improved capacity arabic text watermarking methods based on open word space. Journal of King Saud University-Computer and Information Sciences 30(2):236–248

    Google Scholar 

  9. Alromih A, Al-Rodhaan M, Tian Y (2018) A randomized watermarking technique for detecting malicious data injection attacks in heterogeneous wireless sensor networks for internet of things applications. Sensors 18(12):4346

    Google Scholar 

  10. Asikuzzaman M, Alam MJ, Lambert AJ, Pickering MR (2014) Imperceptible and robust blind video watermarking using chrominance embedding: a set of approaches in the dt cwt domain. IEEE transactions on Information Forensics and Security 9 (9):1502–1517

    Google Scholar 

  11. Cedillo-Hernandez A, Cedillo-Hernandez M, Miyatake MN, Meana HP (2018) A spatiotemporal saliency-modulated jnd profile applied to video watermarking. J Vis Commun Image Represent 52:106–117

    Google Scholar 

  12. Chen J, Yang F, Ma H, Lu Q (2016) Text watermarking algorithm based on semantic role labeling 2016 Third international conference on digital information processing, data mining, and wireless communications (DIPDMWC), pp. 117–120. IEEE

  13. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography Morgan kaufmann

  14. Dhar PK, Shimamura T (2015) Blind svd-based audio watermarking using entropy and log-polar transformation. Journal of Information Security and Applications 20:74–83

    Google Scholar 

  15. Doncel VR, Nikolaidis N, Pitas I (2007) An optimal detector structure for the fourier descriptors domain watermarking of 2d vector graphics. IEEE Trans Vis Comput Graph 13(5):851–863

    Google Scholar 

  16. Fallahpour M, Megías D (2015) Audio watermarking based on fibonacci numbers. IEEE Transactions on Audio Speech, and Language Processing 23 (8):1273–1282

    Google Scholar 

  17. Farri E, Ayubi P (2018) A blind and robust video watermarking based on iwt and new 3d generalized chaotic sine map. Nonlinear Dynamics 93:1875–1897

    Google Scholar 

  18. Gangadhar Y, Akula VG, Reddy PC (2018) An evolutionary programming approach for securing medical images using watermarking scheme in invariant discrete wavelet transformation. Biomedical Signal Processing and Control 43:31–40

    Google Scholar 

  19. Gross-Amblard D (2011) Query-preserving watermarking of relational databases and xml documents. ACM Transactions on Database Systems (TODS) 36(1):3

    Google Scholar 

  20. Guo F, Wang J, Li D (2006) Fingerprinting relational databases. In: Proceedings of the 2006 ACM symposium on Applied computing, pp. 487–492. ACM

  21. Gupta G, Pieprzyk J (2008) Reversible and blind database watermarking using difference expansion. In: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, p 24, ICST (Institute for Computer Sciences, Social-Informatics and ⋯

  22. Halvani O, Steinebach M, Wolf P, Zimmermann R (2013) Natural language watermarking for german texts. In: Proceedings of the first ACM workshop on Information hiding and multimedia security, pp. 193–202. ACM

  23. Horng SJ, Farfoura ME, Fan P, Wang X, Li T, Guo JM (2014) A low cost fragile watermarking scheme in h. 264/avc compressed domain. Multimedia Tools and Applications 72(3):2469–2495

    Google Scholar 

  24. Horng SJ, Rosiyadi D, Fan P, Wang X, Khan MK (2014) An adaptive watermarking scheme for e-government document images. Multimedia tools and applications 72(3):3085–3103

    Google Scholar 

  25. Horng SJ, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. Journal of Visual Communication and Image Representation 24(7):1099–1105

    Google Scholar 

  26. Hossain MS, Muhammad G, Abdul W, Song B, Gupta B (2018) Cloud-assisted secure video transmission and sharing framework for smart cities. Futur Gener Comput Syst 83:596–606

    Google Scholar 

  27. Hu HT, Chang JR, Lin SJ (2018) Synchronous blind audio watermarking via shape configuration of sorted lwt coefficient magnitudes. Signal Process 147:190–202

    Google Scholar 

  28. Hua G, Goh J, Thing VL (2015) Time-spread echo-based audio watermarking with optimized imperceptibility and robustness. IEEE/ACM Transactions on Audio. Speech, and Language Processing 23(2):227–239

    Google Scholar 

  29. Hua G, Zhao L, Zhang H, Bi G, Xiang Y (2018) Random matching pursuit for image watermarking. IEEE Transactions on Circuits and Systems for Video Technology 29(3):625–639

    Google Scholar 

  30. Huynh-The T, Hua CH, Tu NA, Hur T, Bang J, Kim D, Amin MB, Kang BH, Seung H, Lee S (2018) Selective bit embedding scheme for robust blind color image watermarking. Inf Sci 426:1–18

    Google Scholar 

  31. Hwang MJ, Lee J, Lee M, Kang HG (2017) Svd-based adaptive qim watermarking on stereo audio signals. IEEE Transactions on Multimedia 20(1):45–54

    Google Scholar 

  32. Jain R, Trivedi MC, Tiwari S (2018) Digital audio watermarking: a survey. In: Advances in computer and computational sciences, pp. 433–443. Springer

  33. Khan A, Jabeen F, Naz F, Suhail S, Ahmed M, Nawaz S (2016) Buyer seller watermarking protocols issues and challenges–a survey. J Netw Comput Appl 75:317–334

    Google Scholar 

  34. Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Information sciences 279:251–272

    Google Scholar 

  35. Khanduja V (2017) Database watermarking, a technological protective measure: Perspective, security analysis and future directions. Journal of information security and applications 37:38–49

    Google Scholar 

  36. Kumar C, Singh AK, Kumar P (2018) A recent survey on image watermarking techniques and its application in e-governance. Multimedia Tools and Applications 77 (3):3597–3622

    Google Scholar 

  37. Kumar S, Dutta A (2016) A novel spatial domain technique for digital image watermarking using block entropy. In: 2016 International conference on recent trends in information technology (ICRTIT), pp. 1–4. IEEE

  38. Kumar S, Dutta A (2016) Performance analysis of spatial domain digital watermarking techniques. In: 2016 International conference on information communication and embedded systems (ICICES), pp. 1–4. IEEE

  39. Kumar S, Dutta A (2016) A study on robustness of block entropy based digital image watermarking techniques with respect to various attacks. In: 2016 IEEE International conference on recent trends in electronics, information & communication technology (RTEICT), pp. 1802–1806. IEEE

  40. Kumar S, Singh BK (2018) A review of digital watermarking in healthcare domain. In: 2018 3Rd international conference on computational systems and information technology for sustainable solutions (CSITSS), pp. 156–159. IEEE

  41. Kutter M, Petitcolas FA (1999) Fair benchmark for image watermarking systems. In: Security and watermarking of multimedia contents, vol. 3657, pp. 226–240. International society for optics and photonics

  42. Lai CC (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digital Signal Processing 21(4):522–527

    Google Scholar 

  43. Laouamer L, Tayan O (2018) Performance evaluation of a document image watermarking approach with enhanced tamper localization and recovery. IEEE Access 6(26):144–26,166

    Google Scholar 

  44. Lei B, Zhou F, Tan EL, Ni D, Lei H, Chen S, Wang T (2015) Optimal and secure audio watermarking scheme based on self-adaptive particle swarm optimization and quaternion wavelet transform. Signal Process 113:80–94

    Google Scholar 

  45. Lin WH, Horng SJ, Kao TW, Chen RJ, Chen YH, Lee CL, Terano T (2009) Image copyright protection with forward error correction. Expert systems with applications 36(9):11,888–11,894

    Google Scholar 

  46. Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Transactions on Multimedia 10(5):746–757

    Google Scholar 

  47. Lin WH, Wang YR, Horng SJ (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36(6):9869–9878

    Google Scholar 

  48. Lin WH, Wang YR, Horng SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Systems with Applications 36(9):11,509–11,516

    Google Scholar 

  49. Lin ZX, Peng F, Long M (2017) A reversible watermarking for authenticating 2d vector graphics based on bionic spider web. Signal Processing:, Image Communication 57:134–146

    Google Scholar 

  50. Liu X, Zhang J, Wang H, Gong X, Cheng Y (2014) A novel text watermarking algorithm based on graphic watermarking framework. In: 2014 Ninth international conference on broadband and wireless computing, communication and applications, pp. 84–88. IEEE

  51. Liu X, Zhao R, Li F, Liao S, Ding Y, Zou B (2017) Novel robust zero-watermarking scheme for digital rights management of 3d videos. Signal processing:, Image communication 54:140–151

    Google Scholar 

  52. Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and rsa encryption. Expert Syst Appl 97:95–105

    Google Scholar 

  53. Liu Z, Huang Y, Huang J (2018) Patchwork-based audio watermarking robust against de-synchronization and recapturing attacks. IEEE Transactions on Information Forensics and Security 14(5):1171–1180

    Google Scholar 

  54. Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6(19):876–19,897

    Google Scholar 

  55. Loganathan A, Kaliyaperumal G (2016) An adaptive hvs based video watermarking scheme for multiple watermarks using bam neural networks and fuzzy inference system. Expert Syst Appl 63:412–434

    Google Scholar 

  56. Ma B, Wang Y, Li C, Zhang Z, Huang D (2014) Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking. Multimedia tools and applications 72(1):637–666

    Google Scholar 

  57. Madine F, Akhaee MA, Zarmehi N (2018) A multiplicative video watermarking robust to h. 264/avc compression standard. Signal Processing:, Image Communication 68:229–240

    Google Scholar 

  58. Manikandan V, Masilamani V (2018) Histogram shifting-based blind watermarking scheme for copyright protection in 5g. Computers & Electrical Engineering 72:614–630

    Google Scholar 

  59. Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Transactions on image processing 10(4):643–649

    MATH  Google Scholar 

  60. Mir N (2014) Copyright for web content using invisible text watermarking. Comput Hum Behav 30:648–653

    Google Scholar 

  61. Mishra A, Agarwal C, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using dwt–svd and firefly algorithm. Expert Syst Appl 41(17):7858–7867

    Google Scholar 

  62. Najih A, Al-Haddad S, Ramli AR, Hashim S, Nematollahi MA (2017) Digital image watermarking based on angle quantization in discrete contourlet transform. Journal of King Saud University-Computer and Information Sciences 29(3):288–294

    Google Scholar 

  63. Nezhadarya E, Ward RK (2013) Semi-blind quality estimation of compressed videos using digital watermarking. Digital Signal Processing 23(5):1483–1495

    MathSciNet  Google Scholar 

  64. Nikolaidis N, Solachidis V, Tefas A, Pitas I (2002) Watermark detection: benchmarking perspectives. In: Proceedings. IEEE international conference on multimedia and expo, vol. 2, pp. 493–496. IEEE

  65. Nouioua I, Amardjia N, Belilita S (2018) A novel blind and robust video watermarking technique in fast motion frames based on svd and mr-svd. Security and Communication Networks, Volume 2018, Article ID 6712065, Pages 1–17

  66. Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in dct domain using inter-block coefficient differencing. Digital Signal Processing 53:11–24

    Google Scholar 

  67. Peng F, Long Q, Lin ZX, Long M (2019) A reversible watermarking for authenticating 2d cad engineering graphics based on iterative embedding and virtual coordinates. Multimedia Tools and Applications 78(19):26,885–26,905

    Google Scholar 

  68. Pérez Gort ML, Feregrino Uribe C, Nummenmaa J (2017) A minimum distortion: High capacity watermarking technique for relational data. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 111–121. ACM

  69. Pournaghshband V (2008) A new watermarking approach for relational data. In: Proceedings of the 46th annual southeast regional conference on XX, pp. 127–131. ACM

  70. Preda RO, Vizireanu DN (2010) A robust digital watermarking scheme for video copyright protection in the wavelet domain. Measurement 43(10):1720–1726

    Google Scholar 

  71. Qin C, Wang H, Zhang X, Sun X (2016) Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf Sci 373:233–250

    Google Scholar 

  72. Rai A, Singh HV (2018) Machine learning-based robust watermarking technique for medical image transmitted over lte network. J Intell Syst 27(1):105–114

    Google Scholar 

  73. Rasti P, Samiei S, Agoyi M, Escalera S, Anbarjafari G (2016) Robust non-blind color video watermarking using qr decomposition and entropy analysis. J Vis Commun Image Represent 38:838–847

    Google Scholar 

  74. Renza D, Lemus C, et al. (2018) Authenticity verification of audio signals based on fragile watermarking for audio forensics. Expert Syst Appl 91:211–222

    Google Scholar 

  75. Rizzo SG, Bertini F, Montesi D, Stomeo C (2017) Text watermarking in social media. In: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, pp. 208–211. ACM

  76. Rosiyadi D, Horng SJ, Fan P, Wang X, Khan MK, Pan Y (2011) Copyright protection for e-government document images. IEEE MultiMedia 19(3):62–73

    Google Scholar 

  77. Rosiyadi D, Horng SJ, Suryana N, Masthurah N (2012) A comparison between the hybrid using genetic algorithm and the pure hybrid watermarking scheme. International Journal of Computer Theory and Engineering 4(3):329

    Google Scholar 

  78. Roy R, Ahmed T, Changder S (2018) Watermarking through image geometry change tracking. Visual Informatics 2(2):125–135

    Google Scholar 

  79. Rubio-Hernan J, De Cicco L, Garcia-Alfaro J (2017) On the use of watermark-based schemes to detect cyber-physical attacks. EURASIP Journal on Information Security 2017(1):8

    Google Scholar 

  80. Rubio-Hernan J, De Cicco L, Garcia-Alfaro J (2018) Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems. Transactions on Emerging Telecommunications Technologies 29(7):e3209

    Google Scholar 

  81. Rui X, XiaoJun C, Jinqiao S (2013) A multiple watermarking algorithm for texts mixed chinese and english. Procedia Computer Science 17:844–851

    Google Scholar 

  82. Saadi S, Merrad A, Benziane A (2019) Novel secured scheme for blind audio/speech norm-space watermarking by arnold algorithm. Signal Process 154:74–86

    Google Scholar 

  83. Sandberg H, Amin S, Johansson KH (2015) Cyberphysical security in networked control systems: an introduction to the issue. IEEE Control Syst Mag 35 (1):20–23

    MathSciNet  Google Scholar 

  84. Sarreshtedari S, Akhaee MA (2015) A source-channel coding approach to digital image protection and self-recovery. IEEE Trans Image Process 24(7):2266–2277

    MathSciNet  MATH  Google Scholar 

  85. Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques CRC press

  86. Song C, Sudirman S, Merabti M, Llewellyn-Jones D (2010) Analysis of digital image watermark attacks 2010 7Th IEEE consumer communications and networking conference, pp. 1–5. IEEE

  87. Sreenivas K, Prasad VK (2018) Fragile watermarking schemes for image authentication: a survey. International Journal of Machine Learning and Cybernetics 9(7):1193–1218

    Google Scholar 

  88. Su Q (2016) Novel blind colour image watermarking technique using hessenberg decomposition. IET image processing 10(11):817–829

    Google Scholar 

  89. Su Q, Liu D, Yuan Z, Wang G, Zhang X, Chen B, Yao T (2019) New rapid and robust color image watermarking technique in spatial domain. IEEE Access 7(30):398–30,409

    Google Scholar 

  90. Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on qr decomposition. Signal Process 94:219–235

    Google Scholar 

  91. Su Q, Niu Y, Wang Q, Sheng G (2013) A blind color image watermarking based on dc component in the spatial domain. Optik 124(23):6255–6260

    Google Scholar 

  92. Su Q, Wang G, Jia S, Zhang X, Liu Q, Liu X (2015) Embedding color image watermark in color image based on two-level dct. SIViP 9(5):991–1007

    Google Scholar 

  93. Su Q, Yuan Z, Liu D (2018) An approximate schur decomposition-based spatial domain color image watermarking method. IEEE Access 7:4358–4370

    Google Scholar 

  94. Sun X, Luo G, Huang H (2004) Component-based digital watermarking of chinese texts. In: Proceedings of the 3rd international conference on Information security, pp. 76–81. ACM

  95. Tao H, Chongmin L, Zain JM, Abdalla AN (2014) Robust image watermarking theories and techniques: a review. Journal of applied research and technology 12 (1):122–138

    Google Scholar 

  96. Thanki R, Dwivedi V, Borisagar K (2017) A hybrid watermarking scheme with cs theory for security of multimedia data Journal of King Saud University-Computer and Information Sciences

  97. Thongkor K, Amornraksa T, Delp EJ (2018) Digital watermarking for camera-captured images based on just noticeable distortion and wiener filtering. J Vis Commun Image Represent 53:146–160

    Google Scholar 

  98. Unnikrishnan K, Pramod K (2017) Robust optimal position detection scheme for relational database watermarking through holpsofa algorithm. Journal of Information Security and Applications 35:1–12

    Google Scholar 

  99. Vahedi E, Zoroofi RA, Shiva M (2012) Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles. Digital Signal Processing 22(1):153–162

    Google Scholar 

  100. Vaidya P, PVSSR CM (2018) Adaptive, robust and blind digital watermarking using bhattacharyya distance and bit manipulation. Multimedia Tools and Applications 77(5):5609–5635

    Google Scholar 

  101. Venugopala P, Sarojadevi H, Chiplunkar NN (2017) An approach to embed image in video as watermark using a mobile device. Sustainable Computing: Informatics and Systems 15:82–87

    Google Scholar 

  102. Verma VS, Jha RK (2015) An overview of robust digital image watermarking. IETE Technical review 32(6):479–496

    Google Scholar 

  103. Voloshynovskiy S, Pereira S, Pun T, Eggers JJ, Su JK (2001) Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE communications Magazine 39(8):118–126

    Google Scholar 

  104. Xiang Y, Natgunanathan I, Guo S, Zhou W, Nahavandi S (2014) Patchwork-based audio watermarking method robust to de-synchronization attacks. IEEE/ACM Transactions on Audio. Speech, and Language Processing 22 (9):1413–1423

    Google Scholar 

  105. Xiang Y, Natgunanathan I, Peng D, Hua G, Liu B (2018) Spread spectrum audio watermarking using multiple orthogonal pn sequences and variable embedding strengths and polarities. IEEE/ACM Transactions on Audio. Speech and Language Processing (TASLP) 26(3):529–539

    Google Scholar 

  106. Xiang Y, Peng D, Natgunanathan I, Zhou W (2011) Effective pseudonoise sequence and decoding function for imperceptibility and robustness enhancement in time-spread echo-based audio watermarking. IEEE Transactions on Multimedia 13 (1):2–13

    Google Scholar 

  107. Xiao D, Hu S, Zheng H (2015) A high capacity combined reversible watermarking scheme for 2-d cad engineering graphics. Multimedia Tools and Applications 74(6):2109–2126

    Google Scholar 

  108. Yassin NI, Salem NM, El Adawy MI (2014) Qim blind video watermarking scheme based on wavelet transform and principal component analysis. Alexandria Engineering Journal 53(4):833–842

    Google Scholar 

  109. Yu X, Wang C, Zhou X (2018) A survey on robust video watermarking algorithms for copyright protection. Appl Sci 8(10):1891

    Google Scholar 

  110. Yuan XC, Pun CM, Chen CP (2015) Robust mel-frequency cepstral coefficients feature detection and dual-tree complex wavelet transform for digital audio watermarking. Inf Sci 298:159–179

    Google Scholar 

  111. Zhang SR, Yao Z, Meng XC, Liu CC (2014) New digital text watermarking algorithm based on new-defined characters. In: 2014 International symposium on computer, consumer and control, pp. 713–716. IEEE

  112. Zhang W, Zeng Z, Pu G, Zhu H (2006) Chinese text watermarking based on occlusive components. In: 2006 2Nd international conference on information & communication technologies, vol. 1, pp. 1850–1854. IEEE

  113. Zhou X, Huang M, Peng Z (2007) An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image. In: Proceedings of the 2007 ACM symposium on Applied computing, pp. 254–258. ACM

Download references

Acknowledgment

The authors would like to thank reviewers for their helpful comments. We would also like to thanksthe Ministry of Human Resource Development, India and the National Institute of Technology, Jamshedpur for financial assistance.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanjay Kumar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, S., Singh, B.K. & Yadav, M. A Recent Survey on Multimedia and Database Watermarking. Multimed Tools Appl 79, 20149–20197 (2020). https://doi.org/10.1007/s11042-020-08881-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08881-y

Keywords

Navigation