Review Paper on Authentication Information In Digital Watermarking and Stenography Technique

Main Article Content

Vivek Upadhyay, Prof. Suresh S. Gawande

Abstract

The rapid expansion of digital communication and multimedia data sharing over open and insecure networks has increased the risk of unauthorized access, data tampering, and copyright violations. Ensuring the authenticity and integrity of digital content has therefore become a critical requirement in modern information security systems. Digital watermarking and steganography are two prominent information hiding techniques widely employed for embedding authentication information into multimedia content such as images, audio, and video. Digital watermarking primarily aims at copyright protection, ownership verification, and tamper detection by embedding robust or fragile authentication marks within the host signal. In contrast, steganography focuses on concealing secret authentication data in an imperceptible manner, enabling covert communication without raising suspicion.


This review paper presents a comprehensive analysis of authentication mechanisms based on digital watermarking and steganography techniques. Various spatial and transform domain approaches, including Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), and Singular Value Decomposition (SVD), are examined with respect to imperceptibility, robustness, and security. Performance evaluation metrics such as Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM), payload capacity, and Bit Error Rate (BER) are discussed to assess authentication effectiveness. Furthermore, recent advancements incorporating cryptographic hashing, hybrid watermarking–steganography frameworks, and machine learning techniques are reviewed. The paper highlights key challenges, including robustness–imperceptibility trade-offs and computational complexity, and outlines future research directions for developing secure and intelligent authentication systems in multimedia applications.

Article Details

How to Cite
Vivek Upadhyay, Prof. Suresh S. Gawande. (2025). Review Paper on Authentication Information In Digital Watermarking and Stenography Technique. International Journal of Advanced Research and Multidisciplinary Trends (IJARMT), 2(4), 395–402. Retrieved from https://www.ijarmt.com/index.php/j/article/view/642
Section
Articles

References

Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros, and Md. Whaiduzzaman, “Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition for Enhanced Imperceptibility and Robustness,” MDPI, 2024.

Chao Qin, Xiaoyan Li, Zhen Zhang, Fang Li, Xiaoming Zhang, and Guang Feng, “Print-Camera Resistant Image Watermarking With Deep Noise Simulation and Constrained Learning,” IEEE Transactions on Multimedia, vol. 26, pp. 2164–2177, 2024.

Zhongliang Wang, Owen Byrnes, Hao Wang, Rui Sun, Chao Ma, Hao Chen, Qiang Wu, and Min Xue, “Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography,” IEEE Transactions on Computational Social Systems, vol. 10, no. 6, pp. 2985–2999, Dec. 2023.

Guanghui Ye, Junchao Gao, Bo Yin, Wen Xie, and Xianfeng Wei, “Deep Boosting Robustness of DNN-Based Image Watermarking via Dbmark,” in Proc. International Conference on Culture-Oriented Science and Technology (CoST), 2023, pp. 186–191.

Wenguang He, Zhanchuan Cai, and Yaomin Wang, “High-Fidelity Reversible Image Watermarking Based on Effective Prediction Error-Pairs Modification,” IEEE Transactions on Multimedia, 2020.

Nazir Ahmad Loan, Nasir Nazir Hurrah, Shabir Ahmad Parah, Jong Weon Lee, Javaid Ahmad Sheikh, and Ghulam Mohiuddin Bhat, “Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption,” IEEE Access, 2018.

Mohammad Hussain, A. W. Abdul Wahab, N. Javed, and Ki-Hyun Jung, “Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE,” IETE Technical Review, vol. 35, no. 1, pp. 53–63, 2018.

Awdhesh Kumar Shukla, Akanksha Singh, Balvinder Singh, and Amod Kumar, “A Secure and High-Capacity Data-Hiding Method Using Compression, Encryption and Optimized Pixel Value Differencing,” IEEE Access, 2018.

Anindya Bose and S. P. Maity, “Spread Spectrum Image Watermark Detection on Degraded Compressed Sensing Measurements With Distortion Minimization,” Multimedia Tools and Applications, vol. 77, no. 16, pp. 20783–20808, 2018.

Baharak A., Fatih K., Jesus Martinez Del Rincon, and Ahmed B., “Blind Image Watermark Detection Algorithm Based on Discrete Shearlet Transform Using Statistical Decision Theory,” IEEE Transactions on Computational Imaging, vol. 4, no. 1, pp. 46–59, 2018.

Etti Mathur and Manish Mathuria, “Unbreakable Digital Watermarking Using Combination of LSB and DCT,” in Proc. IEEE ICECA, 2017.

Aleksei Zhuvikin, “Selective Image Authentication Using Shearlet Coefficients Tolerant to JPEG Compression,” in Proc. IEEE Conference, pp. 681–688, 2017.

N. Senthil Kumaran and S. Abinaya, “Comparison Analysis of Digital Image Watermarking Using DWT and LSB Technique,” in Proc. ICCSP, IEEE, 2016.

Morteza Heidari, Nader Karimi, and Shadrokh Samavi, “A Hybrid DCT-SVD Based Image Watermarking Algorithm,” in Proc. Iranian Conference on Electrical Engineering (ICEE), IEEE, 2016.

Ajay Kumar Singh, Mayank Dave, and Anil Mohan, “Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain,” Wireless Personal Communications, vol. 83, no. 3, pp. 2133–2150, 2015.

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.