Abstract
There has been remarkable growth in the digital domain. This has led to the production
of a huge amount of digital data in the form of text messages, documents, audio/speech signals,
digital images, videos, etc. In forensics, digital information (i.e., images of crime scenes, etc.) is
very important to examine cases and collect the proof regarding the incident. This further leads to
judge the victims and culprits by the court for appropriate actions. So, even a slight change (intentional/
unintentional) may lead to the wrong judgement. Several digital signal processing tools are
easily available to process this type of digital data, which means data may get disrupted, altered, or
deform in such a way that the authenticity gets compromised. In such cases, it can be difficult to
recognize the source information as well as to check the originality/intactness of the digital data. In
the recent past, several techniques have come into existence to protect digital data against security
issues. Steganography, cryptography, and watermarking are examples of security techniques,
which have been widely used for data security and forensic applications for a long time. Specifically,
digital watermarking techniques provide many useful features to help users regarding data
security and authentication without affecting other data characteristics. This work is an attempt to
provide a review of recent digital image watermarking approaches for forensic applications.
Keywords:
Digital watermarking, forensic applications, signal processing, proof of tampering, steganography, cryptography.
[1]
Schmidt E, Cohen J. The new digital age: Reshaping the future of people, nations and business. Hachette UK Limited 2013.
[13]
Menezes AJ, Van Oorschot PC, Vanstone SA. Handbook of applied cryptography. CRC Press 2018.
[14]
Cox IJ, Miller ML, Bloom JA, Honsinger C. Digital watermarking San Francisco: Morgan Kaufmann 2002; 53.
[15]
Hariri M, Karimi R, Nosrati M. An introduction to steganography methods. World Appl Program 2011; 1(3): 191-5.
[19]
Kessler G C. An overview of cryptography. In: Handbook on Local Area Networks. 2003.
[21]
Diffie W, Hellman ME. New directions in cryptography. In: Secure communications and asymmetric cryptosystems. Routledge 2019; pp. 143-80.
[22]
Katzenbeisser S, Petitcolas FAP. Digital watermarking. London: Artech House 2000.
[25]
Cox I, Miller M, Bloom J, Fridrich J, Kalker T. Digital watermarking and steganography. Morgan Kaufmann; 2007 Nov 23;
[26]
Desai HV. Steganography, cryptography, watermarking: A comparative study. J Global Res Comput Sci 2012; 3(12): 33-5.
[27]
Razzaq MA, Shaikh RA, Baig MA, Memon AA. Digital image security: Fusion of encryption, steganography and watermarking. Int J Adv Comput Sci Appl 2017; 8(5)
[31]
Halder R, Pal S, Cortesi A. Watermarking techniques for relational databases: Survey, classification and comparison. J Univers Comput Sci 2010; 16(21): 3164-90.
[33]
Song C, Sudirman S, Merabti M. Recent advances and classification of watermarking techniques in digital images. Proceedings of Post Graduate Network Symposium. 2009; pp. 1-6.
[36]
Sharma RK, Decker S. Practical challenges for digital watermarking applications. EURASIP J Adv Signal Process 2002; 2002(2): 1-7.
[45]
Koley S. A feature adaptive image watermarking framework based on phase congruency and symmetric key cryptography. J King Saud Univ - Comput Inf Sci 2019; 34(3): 636-45.
[49]
Nyeem H, Boles W, Boyd C. Digital image watermarking: Its formal model, fundamental properties and possible attacks. EURASIP J Adv Signal Process 2014; 2014(1): 1-22.
[60]
Sisaudia V, Vishwakarma VP. Copyright protection using KELMPSO based multi-spectral image watermarking in DCT domain with local texture information based selection. Multimedia Tools Appl 2020; 1-22.