An Extensive Analysis of Digital Image Watermarking Techniques

Authors

  • Sachin Gaur B. T. Kumaon Institute of Technology Dwarahat,India
  • Varun Barthwal H.N.B Garhwal University Pauri Garhwal, India

Keywords:

DWT, DCT, SVD, LSB, ISB, PSNR, NCC, BER

Abstract

With recent advancements in information technology, digital media authenticity has become a major problem, and much study has been done to preserve digital media ownership. In all these investigations, digital image watermarking has become a crucial method. In digital image watermarking, digital content or a watermark is planted in a host image and can be removed to safeguard the host image's ownership. The two primary categories of digital image watermarking approaches are frequency domain and spatial domain. Spatial watermarking involves modifying an image's pixel values with techniques such as least significant bit (LSB) and intermediate significant bit (ISB), whereas frequency domain watermarking involves modifying an image's frequency components with techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD). An overview of digital image watermarking, including its different types, characteristics, applications, and techniques, is given in this study. The quality of watermarking techniques is also examined using assessment metrics like PSNR and NCC, as well as various assaults that can be used against watermarked images. This wider perspective review on digital image watermarking is for those researchers who wish to get started and conduct research in this area.

Downloads

Download data is not yet available.

References

N. Tarhouni, M. Charfeddine, and C. Ben, “Novel and Robust Image Watermarking for Copyright Protection and Integrity Control,” Circuits, Syst. Signal Process.,vol. 39,pp.5059–5103,2020. https://doi.org/10.1007/s00034-020-01401-1

L. Verma, “A Review on Digital Image Watermarking Using Transformation and Optimization Techniques,” in 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), 2020, pp. 1008–1012. doi: 10.1109/ICACCCN51052.2020.9362885.

C. I. Podilchuk and E. J. Delp, “Digital Watermarking: Algorthim and Applications,” IEEE Signal Process. Mag., vol. 18, no. 4, pp. 33–46, 2001.

N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Processing, vol. 66, no. 3, pp. 385–403, 1998. https://doi.org/10.1016/S0165-1684(98)00017-6

W. N. Cheung, “DIGITAL IMAGE WATERMARKING IN SPATIAL AND TRANSFORM DOMAINS,” in IEEE Conference, 2000, vol. 3, pp. 374–378. doi: 10.1109/TENCON.2000.892292.

C. Pun, “A Novel DFT-based Digital Watermarking System for Images,” ICSP2006 Proc., vol. 2, no. 8, pp. 3–6, 2006. doi: 10.1109/ICOSP.2006.345581.

T. K. Tewari, “An Improved and Robust DCT based Digital Image Watermarking Scheme,” Int. J. Comput. Appl., vol. 3, no. May 2014, pp. 28–32, 2010. 10.5120/699-980

G. Tianming and W. Yanjie, “DWT-based Digital Image Watermarking Algorithm,” 2011, vol. 3 no. 2, pp. 163–166. doi: 10.1109/ICEMI.2011.6037879.

M. Begum and M. S. Uddin, “Digital Image Watermarking Techniques: A Review,” Inf. Rev., MDPI, vol. 11, no. 110, pp. 2–38, 2020.; https://doi.org/10.3390/info11020110

N. A. Loan, S. Member, N. N. Hurrah, and S. Member, “Secure and Robust Digital Image Watermarking using Coefficient Differencing and Chaotic Encryption,” IEEE ACCESS, vol. 6, pp.19876-19897 no. c, 2018. doi: 10.1109/ACCESS.2018.2808172.

H. H. Larijani and G. R. Rad, “A New Spatial Domain Algorithm for Gray Scale Images Watermarking,” in Proceedings of the International Conference on Computer and Communication Engineering, 2008, pp. 157–161. doi: 10.1109/ICCCE.2008.4580587.

Q. Kester, L. Nana, A. C. Pascu, S. Gire, M. Jojo, and N. N. Quaynor, “A Spatial Domain Watermarking Approach for Digital Images based on Image Features built on Formal Concepts Analysis,” Int. J. Comput. Appl., vol. 119, no. 7, pp. 5–10, 2015.

G. R. Manjula, Ajit Danti “A NOVEL HASH BASED LEAST SIGNIFICANT BIT ( 2-3-3 ) IMAGE STEGANOGRAPHY IN SPATIAL DOMAIN,” vol. 4, no. 1, pp. 11–20, 2015.

J. Abraham and V. Paul, “An imperceptible spatial domain color image watermarking scheme,” vol. 31, issue-1 pp. 125–133, 2019.

S. D. Muyco and A. A. Hernandez, “Least Significant Bit Hash Algorithm for Digital Image Watermarking Least Significant Bit Hash Algorithm for Digital Image Watermarking Authentication,” no. April, 2019. https://doi.org/10.1145/3330482.3330523

V. Kitanovski, D. Taskovski and S. Bogdanova, "Watermark Generation using Image-dependent Key for Image Authentication," EUROCON 2005 - The International Conference on "Computer as a Tool", Belgrade, Serbia, 2005, pp. 947-950, doi: 10.1109/EURCON.2005.1630103.

C. -M. Pun, "High Capacity and Robust Digital Image Watermarking," 2009 Fifth International Joint Conference on INC, IMS and IDC, Seoul, Korea (South), 2009, pp. 1457-1461, doi: 10.1109/NCM.2009.85.

J. C. Patra, J. E. Phua and D. Rajan, "DCT domain watermarking scheme using Chinese Remainder Theorem for image authentication," 2010 IEEE International Conference on Multimedia and Expo, Singapore, 2010, pp. 111-116, doi: 10.1109/ICME.2010.5583326.

L. Laouamer and O. Tayan, “A Semi-Blind Robust DCT Watermarking Approach for Sensitive Text Images,” Arab J Sci Eng, vol. 40, pp. 1097–1109, 2015.

S. Roy and A. K. Pal, A Blind DCT based Color Watermarking Algorithm for Embedding Multiple Watermarks “Department of Computer Science and Engineering, Department of Computer Science and Engineering,” AEUE - Int. J. Electron. Commun., 2016

V. P. Vishwakarma and V. Sisaudia, “Gray-scale image watermarking based on DE-KELM in DCT domain domain,” in Procedia Computer Science, 2018, vol. 132, no. Iccids, pp. 1012–1020. https://doi.org/10.1016/j.procs.2018.05.017

S. Liu, Z. Pan, and H. Song, “Digital image watermarking method based on DCT and fractal encoding,” IET Image Process. Spec., pp. 815–821, 2017. DOI:10.1049/IET-IPR.2016.0862

B. Kaur, A. Kaur, and J. Singh, “STEGANOGRAPHIC APPROACH FOR HIDING IMAGE IN DCT DOMAIN,” Int. J. Adv. Eng. Technol., vol. 1, issue. 3, pp. 72-78, 2011.

F. Y. Shih and S. Y. T. Wu, “Combinational image watermarking in the spatial and frequency domains,” Pattern Recognit., vol. 36, issue. 4 pp. 969–975, 2003. https://doi.org/10.1016/S0031-3203(02)00122-X

J. R. Aparna and S. Ayyappan, "Comparison of digital watermarking techniques," International Conference for Convergence for Technology-2014, Pune, India, 2014, pp. 1-6, doi: 10.1109/I2CT.2014.7092189.

Y. Zhang, "Digital Watermarking Technology: A Review," 2009 ETP International Conference on Future Computer and Communication, Wuhan, China, 2009, pp. 250-252, doi: 10.1109/FCC.2009.76.

C. . -Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller and Y. M. Lui, "Rotation, scale, and translation resilient watermarking for images," in IEEE Transactions on Image Processing, vol. 10, no. 5, pp. 767-782, May 2001, doi: 10.1109/83.918569

C. De Vleeschouwer, J. -F. Delaigle and B. Macq, "Invisibility and application functionalities in perceptual watermarking an overview," in Proceedings of the IEEE, vol. 90, no. 1, pp. 64-77, Jan. 2002, doi: 10.1109/5.982406.

M. Utku Celik, G. Sharma, E. Saber and A. Murat Tekalp, "Hierarchical watermarking for secure image authentication with localization," in IEEE Transactions on Image Processing, vol. 11, no. 6, pp. 585-595, June 2002, doi: 10.1109/TIP.2002.1014990.

Ping Wah Wong, "A public key watermark for image verification and authentication," Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), Chicago, IL, USA, 1998, pp. 455-459 vol.1, doi: 10.1109/ICIP.1998.723526.

Z. Chen, Y. Chen, W. Hu, and D. Qian, “Wavelet Domain Digital Watermarking Algorithm Based on Threshold Classification,” vol. 1, pp. 129–136, 2015. https://doi.org/10.1007/978-3-319-20469-7_15

M. Haribabu, C. H. Bindu, and K. Veera, “A Secure & Invisible Image Watermarking Scheme Based on Wavelet Transform in HSI color space,” Procedia - Procedia Comput. Sci., vol. 93, no. September, pp. 462–468, 2016. https://doi.org/10.1016/j.procs.2016.07.234

S. Jia, Q. Zhou, and H. Zhou, “A Novel Color Image Watermarking Scheme Based on DWT and QR Decomposition,” J. Appl. Sci. Eng., vol. 20, no. 2, pp. 193–200, 2017.

N. Kashyap, “Image Watermarking Using 3-Level Discrete Wavelet Transform (DWT),” I.J.Modern Educ. Comput. Sci., no. April, pp. 50–56, 2012.

R. Choudhary and G. Parmar, "A robust image watermarking technique using 2-level discrete wavelet transform (DWT)," 2016 2nd International Conference on Communication Control and Intelligent Systems (CCIS), Mathura, India, 2016, pp. 120-124, doi: 10.1109/CCIntelS.2016. 7878213..

C.-C. Chang, P. Tsai, and C.-C. Lin, “SVD-based digital image watermarking scheme,” Pattern Recognit. Lett., vol. 26,Issue no. 10, pp. 1577–1586, 2005. https://doi.org/10.1016/j.patrec.2005.01.004

S. J. Katti, Vyagreswara Rao Namuduri and K. R. Namuduri, "A practical approach for evaluating the capacity of watermarking channel," Proceedings of 2005 International Conference on Intelligent Sensing and Information Processing, 2005., Chennai, India, 2005, pp. 193-198, doi: 10.1109/ICISIP.2005.1529447.

Y. Yusof and O. O. Khalifa, “Wavelet Transform,” in IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, 2007, no. May, pp. 14–17.

H. Yang, Y. Liang, X. Wang, and S. Ji, “A DWT- BASED EVALUATION METHOD OF IMPERCEPTIBILITY OF,” in Proceedings of the 2007 International Conference on Wavelet Analysis and Pattern Recognition, Beijing, China, 2007, pp. 2–4.

C. Song, S. Sudirman, M. Merabti and D. Llewellyn-Jones, "Analysis of Digital Image Watermark Attacks," 2010 7th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, 2010, pp. 1-5, doi: 10.1109/CCNC.2010.5421631.

Poljicak, L. Mandic, and D. Agic, “Discrete Fourier transform – based watermarking method with an optimal Discrete Fourier transform – based watermarking method with an optimal implementation radius,” Jour nal Electron. I maging, no. july, 2011 DOI:10.1117/1.3609010.

M. C. F. Garcia-ugalde and M. N. H. Perez-meana, “Robust watermarking method in DFT domain for effective management of medical imaging,” 2013. https://doi.org/10.1007/s11760-013-0555-x

V. Aslantas, A. Latif Dogan and S. Ozturk, "DWT-SVD based image watermarking using Particle Swarm Optimizer," 2008 IEEE International Conference on Multimedia and Expo, Hannover, Germany, 2008, pp. 241-244, doi: 10.1109/ICME.2008. 4607416..

Xiaoyi Zhou, Jixin Ma and Wencai Du, "SoW: A hybrid DWT-SVD based secured image watermarking," PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System, Harbin, China, 2013, pp. 197-200, doi: 10.1109/SNS-PCS.2013. 6553864..

H. Tao, J. M. Zain, and A. N. Abdalla, “Robust Image Watermarking Theories and Techniques: A Review,” vol. 12, issue no.1 January, pp. 122–138, 2014.

Gorai and A. Ghosh, "Gray-level Image Enhancement By Particle Swarm Optimization," 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC), Coimbatore, India, 2009, pp. 72-77, doi: 10.1109/NABIC.2009.5393603

K. T. K.Kuppusamy, “Optimized Image Watermarking Scheme Based On PSO,” Int. coference Model. Optim. Comput., vol. 38, pp. 493–503, 2012.

S. Tyagi, H. V. Singh, R. Agarwal and S. K. Gangwar, "Digital watermarking techniques for security applications," 2016 International Conference on Emerging Trends in Electrical Electronics & Sustainable Energy Systems (ICETEESES), Sultanpur, India, 2016, pp. 379-382, doi: 10.1109/ICETEESES.2016. 7581413..

Dixit, “A Review on Digital Image Watermarking Techniques,” I.J. Image, Graph. Signal Process., vol. 4, no. April, pp. 56–66, 2017. DOI: 10.5815/ijigsp.2017.04.07

V. S. Rao, R. S. Shekhawat and V. K. Srivastava, "A DWT-DCT-SVD based digital image watermarking scheme using particle swarm optimization," 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science, Bhopal, India, 2012, pp. 1-4, doi: 10.1109/SCEECS.2012.6184795.

F. Thakkar and V. K. Srivastava, “A particle swarm optimization and block-SVD-based watermarking for digital,” Turkish J. Electr. Eng. Comput. Sci., vol. 25, no. 8, pp. 3273–3288, 2017.

S. M. Arora, “A DWT-SVD based Robust Digital Watermarking for Digital A DWT-SVD based Robust Digital Watermarking for Digital Images,” Procedia Comput. Sci., ScienceDirect vol. 132, pp. 1441–1448, 2018. https://doi.org/10.1016/j.procs.2018.05.076

Y. Gangadhar, V. S. G. Akula, and P. C. Reddy, “Biomedical Signal Processing and Control An evolutionary programming approach for securing medical images using watermarking scheme in invariant discrete wavelet transformation,” Biomed. Signal Process. Control, vol. 43, pp. 31–40, 2018.

V. Kumar, R. Lautan, M. Faisal, and K. M. Pandey, “Dwt and Particle Swarm Optimization Based Digital Image Watermarking,” Int. J. Eng. Res. Technol., vol. 2, no. 9, pp. 2144–2149, 2013.

A. S. Seif Eddine Naffouti · Anis Kricha, “A sophisticated and provably grayscale image watermarking system,” Vis. Comput., pp. 1–40, 2022. https://doi.org/10.1007/s00371-022-02587-y

Mohan, “Multiple Watermarking Technique for Securing Online Social Network Contents using Back Propagation Neural Network,” Future Generation Computer SystemsVolume 86, September 2018, Pages 926-939

Onur JANE, Ersin ELBAS¸I “A new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition” Turkish Journal of Electrical Engineering & Computer Sciences pp.1354-1366, 2014.

P. Sridhar, “A Robust Digital Image Watermarking in Hybrid Frequency Domain,” Int. J. Eng. Technol., vol. 7, pp. 243–248, 2018.

A. Kumar, “A Review on Implementation of Digital Image Watermarking Techniques Using LSB and DWT,” Inf. Commun. Technol. Sustain. Dev. Adv. Intell. Syst. Comput., pp. 595–602, 2020. https://doi.org/10.1007/978-981-13-7166-0_5

K. Abdulrahman and S. Ozturk, “A novel hybrid DCT and DWT based robust watermarking algorithm for color images,” Multimed. Tools Appl 78, 17027–17049 2019. https://doi.org/10.1007/s11042-018-7085-z

D. G. Savakar and A. Ghuli, “Robust Invisible Digital Image Watermarking Using Hybrid Scheme,” Arab J Sci Eng 44, 3995–4008 (2019). https://doi.org/10.1007/s13369-019-03751-8.

R. Pizzolante, A. Castiglione, B. Carpentieri, A. De Santis, and A. Castiglione, “Protection of Microscopy Images Through Digital Watermarking Techniques,” in 2014 International Conference on Intelligent Networking and Collaborative Systems Protection, 2014, pp. 65–72. doi: 10.1109/INCoS.2014.116.

Zear, A., Singh, A.K. & Kumar, P. A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77, 4863–4882 (2018). https://doi.org/10.1007/s11042-016-3862-8

T. T. Takore, “A New Robust and Imperceptible Image Watermarking Scheme Based on Hybrid Transform and PSO,” I.J. Intell. Syst. Appl., vol. 11, no. November, pp. 50–63, 2018. DOI: 10.5815/ijisa.2018.11.06

X. Zhou, H. Zhang, and C. Wang, “A Robust ImageWatermarking Technique Based on DWT, APDCBT, and SVD,” Symmetry (Basel)., vol. 10, issue 77, pp. 2–14, 2018. https://doi.org/10.3390/sym10030077

Y. Zhang, C. Wang, X. Wang, and M. Wang, “Feature-Based Image Watermarking Algorithm Using SVD and APBT for Copyright Protection,” Futur. Internet, vol. 9, no. 13, pp. 2–15, 2017. https://doi.org/10.3390/fi9020013

Jamal, S.S., Khan, M.U. & Shah, T. A Watermarking Technique with Chaotic Fractional S-Box Transformation. Wireless Pers Commun 90, 2033–2049 (2016). https://doi.org/10.1007/s11277-016-3436-0

J. Wang and Z. Du, “A Method of Processing Color Image Watermarking Based on the Haar Wavelet,” J. Vis. Commun. Image Represent., p. 102627, 2019.

D. Vaishnavi and T. S. Subashini, “Robust and Invisible Image Watermarking in RGB Color space using SVD,” Procedia - Procedia Comput. Sci., vol. 46, no. Icict 2014, pp. 1770–1777, 2015.

Mohanarathinam, A., Kamalraj, S., Prasanna Venkatesan, G.K.D. et al. Digital watermarking techniques for image security: a review. J Ambient Intell Human Comput 11, 3221–3229 (2020). https://doi.org/10.1007/s12652-019-01500-1

J. Cox, M. L. Miller, and I. Way, “A review of watermarking and the importance of perceptual modeling,” proceedings.spiedigitallibrary.org, vol. 3016, pp. 92–99, 2014. DOI:10.1117/12.274502

F. Cayre, C. Fontaine and T. Furon, "Watermarking security: theory and practice," in IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3976-3987, Oct. 2005, doi: 10.1109/TSP.2005.855418.

P. Luis, P. Comesa, and J. Ram, “Watermarking Security: A Survey,” Trans. DHMS I, LNCS, pp. 41–72, 2006. https://doi.org/10.1007/11926214

J. Cox and J. M. G. Linnartz, “A review of watermarking principles and practices,” Digit. Signal Process. Multimed. Syst., vol. chapter 28, no. July 2000, pp. 461–485, 2015.

J. Cox, M.L. Miller and J.A. Bloom., “Digital Watermarking and steganography”, 2nd ed. Morgan Kaufmann Publishers, San Francisco, USA, Volume 02, Issue 10 (October 2013) 2008.

I. Podilchuk and Wenjun Zeng, "Image-adaptive watermarking using visual models," in IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 525-539, May 1998, doi: 10.1109/49.668975.

Li and F. Yang, “One-dimensional neighborhood forming strategy for fragile watermarking,” J. Electron. Imaging, vol. 12, no. 2, pp. 284–291, 2003.

H. Ling, R. C. Phan, and S. Heng, Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition “International Journal of Electronics and Communications., vol. 67, no. 10, pp. 894–897, 2013

Goos, G.; Hartmanis, J.; Van Leeuwen, J. Cloud Computing and Security In Proceedings of the 4th International Conference, ICCCS, Haikou, China, 8–10 June 2018; pp. 691–697.

P’erez-Freire, L.; Na, P.C.; Ramon, J.; Troncoso-Pastoriza, J.R.; Gonzalez, F.P. Watermarking Security: A Survey. In Transactions on Data Hiding and Multimedia Security; Lecture Notes in Computer Science: Berlin/Heidelberg, Germany, pp. 41–72. 2006

Bruce, A.M. A Review of Digital Watermarking. Available online: https://pdfs.semanticscholar.org/d6eb/c1a3e1676df1b5a32033417215e8da096ac4.pdf (accessed on 16 February 2020

Kumar, S. Basant, K. Ghanshyam, and S. Anand, Medical Image Watermarking. 2017.

A. F. Qasim, F. Meziane, and R. Aspin, “Digital watermarking : Applicability for developing trust in medical imaging workflows state of the art review,” Comput. Sci. Rev., vol. 27, pp. 45–60, 2018.

Olanrewaju, R.F. Development of Intelligent Digital Watermarking via Safe Region. Ph.D. Thesis, Kulliyyah of Engineering, International Islamic University Malaysia, Selangor, Malaysia, 2011.

N. Wu and M. Hwang, “Data Hiding: Current Status and Key Issues,” Int. J. Netw. Secur., vol. 4, no. 1, pp. 1–9, 2007.

Habes, A. Information Hiding in BMP Image Implementation, Analysis and Evaluation. Inf. Transm. Comput. Netw., 6, 1–10. 2006 https://www.researchgate.net/publication/298223442_Information_hiding_algorithm_using_BMP_image

Way, H. Fung, and C. Utfpr, “A Review Study on Image Digital Watermarking,” in The Tenth International Conference on Networks, , no. 1, pp. 24–28, 2011

A. M. Z. and A. A. Manaf, “A Novel Digital Watermarking Tec hnique Based on ISB (Intermediate Significant Bit),” World Acad. Sci. Eng. Technol. Int. J. Comput. Inf. Eng. Vol3, vol. 3, no. 2, pp. 444–451, 2009.

G. N. Mohammed and A. Yasin, “Robust Image Watermarking Based on Dual Intermediate Significant Bit (DISB ),” 6th International Conference on CSIT, 2014, pp. 18–22. 2014

N. AHMED, T. NATARAJAN, AND K. R. RAO,Discrete, Cosine Transfonn, IEEE TRANSACTIONS ON COMPUTERS,., vol. 7, no. January, pp. 90–93, 1974.

Discrete Wavelet Transform. Available online: https://en.wikipedia.org/wiki/Discrete_wavelet_transform (accessed on 23 October 2019).

Kehtarnavaz, N. Digital Signal Processing System Design, 2nd ed.; Elsevier: Cambridge, MA, USA, 2008.

P. Bao and X. Ma, “Transactions Letters, Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition,” IEEE Trans. Circuits Syst. Video Technol., vol. 15, no. 1, pp. 96–102, 2005.

S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers, and J. K. Su, “Attacks on digital watermarks: Classification, estimation-based attacks, and benchmarks,” IEEE Commun. Mag., vol. 39, no. 8, pp. 118–125, 2001.

S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, “Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications,” IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 573–586, 1998.

Menezes, A.J., et al., Handbook of Applied Cryptography. 1996: CRC Press. 780 pages

Deepthi Anand", U.C. Niranjan,“WATERMARKING MEDICAL IMAGES WITH PATIENT INFORMATION” Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Vol. 20, issue-No 2,1998

R. Liu, W. Trappe, J. Wang, M. Wu, and H. Zhao, EURASIP Book Series on Signal Processing and Communications Multimedia Fingerprinting Forensics for Traitor Tracing

Perez-Siguas, R. ., Matta-Solis, H. ., Millones-Gomez, S. ., Matta-Perez, H. ., Cruzata-Martinez, A. ., & Meneses-Claudio, B. . (2023). Comparison of Social Skills of Nursing Students from Two Universities of Lima. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2), 14–19. https://doi.org/10.17762/ijritcc.v11i2.6105

Juan Garcia, Guðmundsdóttir Anna, Johansson Anna, Maria Jansen, Anna Wagner. Machine Learning for Decision Science in Healthcare and Medical Systems. Kuwait Journal of Machine Learning, 2(4). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/210

Downloads

Published

25.12.2023

How to Cite

Gaur, S. ., & Barthwal, V. . (2023). An Extensive Analysis of Digital Image Watermarking Techniques. International Journal of Intelligent Systems and Applications in Engineering, 12(1), 121–145. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3771

Issue

Section

Research Article