scholarly journals Digital Image Watermarking Techniques: A Review

Information ◽  
2020 ◽  
Vol 11 (2) ◽  
pp. 110 ◽  
Author(s):  
Mahbuba Begum ◽  
Mohammad Shorif Uddin

Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Based on the desired applications, several suitable watermarking techniques have been developed to mitigate this concern. However, it is tough to achieve a watermarking system that is simultaneously robust and secure. This paper gives details of standard watermarking system frameworks and lists some standard requirements that are used in designing watermarking techniques for several distinct applications. The current trends of digital image watermarking techniques are also reviewed in order to find the state-of-the-art methods and their limitations. Some conventional attacks are discussed, and future research directions are given.

2020 ◽  
Vol 2020 ◽  
pp. 1-12 ◽  
Author(s):  
Mahbuba Begum ◽  
Mohammad Shorif Uddin

Digital image watermarking is an attractive research area since it protects the multimedia data from unauthorized access. For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity, and security must be maintained. Various studies regarding this concern have been performed to ensure these requirements by hybridizing different domains, such as spatial and transform domains. In this paper, we have presented an analytical study of the existing hybrid digital image watermarking methods. At first, we have given a standard framework for designing a hybrid method that ensures the basic design requirements of watermarking for various applications. After a brief literature review, we compared and analyzed the complexity of several existing hybrid methods in a tabular form. The limitations and applications of these methods are also highlighted. Finally, we summarized the challenges of the existing methods and concluded the study by giving future research directions.


Author(s):  
Yue Li ◽  
Chia-Hung Wei

Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based digital image authentication (CBDIA) techniques and data-hiding-based digital image authentication (DHBDIA) techniques. This paper not only provides some practical applications on image authentication, but also describes general frameworks of image watermarking and the general techniques, including robust watermarking, fragile watermarking, and semi-fragile watermarking. This paper also addresses the potential issues on future research directions, including managing the PRNU database, development of advanced PRNU-based blind authentication techniques, and search for digital fingerprints.


Sensors ◽  
2021 ◽  
Vol 21 (7) ◽  
pp. 2312
Author(s):  
Tom Bolton ◽  
Tooska Dargahi ◽  
Sana Belguith ◽  
Mabrook S. Al-Rakhami ◽  
Ali Hassan Sodhro

Since the purchase of Siri by Apple, and its release with the iPhone 4S in 2011, virtual assistants (VAs) have grown in number and popularity. The sophisticated natural language processing and speech recognition employed by VAs enables users to interact with them conversationally, almost as they would with another human. To service user voice requests, VAs transmit large amounts of data to their vendors; these data are processed and stored in the Cloud. The potential data security and privacy issues involved in this process provided the motivation to examine the current state of the art in VA research. In this study, we identify peer-reviewed literature that focuses on security and privacy concerns surrounding these assistants, including current trends in addressing how voice assistants are vulnerable to malicious attacks and worries that the VA is recording without the user’s knowledge or consent. The findings show that not only are these worries manifold, but there is a gap in the current state of the art, and no current literature reviews on the topic exist. This review sheds light on future research directions, such as providing solutions to perform voice authentication without an external device, and the compliance of VAs with privacy regulations.


2021 ◽  
Vol 13 (13) ◽  
pp. 7304
Author(s):  
Shang Gao ◽  
Fanchen Meng ◽  
Zhouyang Gu ◽  
Zhiyuan Liu ◽  
Muhammad Farrukh

Academic interest in ESG has grown significantly in recent years. Nevertheless, bibliometric and visualization research on this topic is still insufficient. This study aims to conduct publication metrics on the literature connected with ESG and attempt to give a research agenda for future research. In this study, we used data from the Scopus database. Various bibliometric techniques, such as bibliographic coupling and co-occurrence analysis, were combined with assorted themes to present an overview. To the best of our knowledge, there is no study that analyses the bibliographic data on ESG fields; this study is a unique contribution to the literature. This study also provides an overview of the trends and trajectories with a visual and schematic frame for the research of this topic. This may help researchers understand the current trends and future research directions, and enable future authors to conduct their studies more effectively.


2016 ◽  
Vol 26 (3) ◽  
pp. 269-290 ◽  
Author(s):  
Catherine Baethge ◽  
Julia Klier ◽  
Mathias Klier

Author(s):  
Zheng Wang ◽  
Zhixiang Wang ◽  
Yinqiang Zheng ◽  
Yang Wu ◽  
Wenjun Zeng ◽  
...  

An efficient and effective person re-identification (ReID) system relieves the users from painful and boring video watching and accelerates the process of video analysis. Recently, with the explosive demands of practical applications, a lot of research efforts have been dedicated to heterogeneous person re-identification (Hetero-ReID). In this paper, we provide a comprehensive review of state-of-the-art Hetero-ReID methods that address the challenge of inter-modality discrepancies. According to the application scenario, we classify the methods into four categories --- low-resolution, infrared, sketch, and text. We begin with an introduction of ReID, and make a comparison between Homogeneous ReID (Homo-ReID) and Hetero-ReID tasks. Then, we describe and compare existing datasets for performing evaluations, and survey the models that have been widely employed in Hetero-ReID. We also summarize and compare the representative approaches from two perspectives, i.e., the application scenario and the learning pipeline. We conclude by a discussion of some future research directions. Follow-up updates are available at https://github.com/lightChaserX/Awesome-Hetero-reID


Sign in / Sign up

Export Citation Format

Share Document