Main Article Content

Ningombam Jimson
K Hemachandran


Digital watermarking is a process in which a piece of information is embedded into a digital data. In this article we review the digital watermarking scheme of image which uses DFT to embed the watermark. Digital watermarking using DFT has attracted researchers due to the fact that watermark using DFT are RST invariant compared to other scheme using other transform such as DCT or DWT. In the presented article we tried to cover all the aspect of digital watermarking particularly on DFT based scheme. We also gave some terminology used in the digital image watermarking and attacks involved.


Download data is not yet available.

Article Details



. Cox, I., Miller, M., Bloom, J., Fridrich, J., & Kalker, T. (2007). Digital watermarking and steganography. Morgan Kaufmann.

. Arnold, M., Schmucker, M., & Wolthusen, S. D. (2002). Techniques and applications of digital watermarking and content protection. Artech House.

. Potdar, V. M., Han, S., & Chang, E. (2005, August). A survey of digital image watermarking techniques. In Industrial Informatics, 2005. INDIN'05. 2005 3rd IEEE International Conference on (pp. 709-716). IEEE.

. Mohanty, S. P. (1999). Digital watermarking: A tutorial review. URL: http://www. csee. usf. edu/~ smohanty/research/Reports/WMSurvey1999Mohanty. pdf.

. Yu, B., & Jain, R. (2011). A Quick Glance at Digital Watermarking. In HTTP://WWW. CSE. WUSTL. EDU/~ JAIN/INDEX. HTML.

. Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J. J., & Su, J. K. (2001). Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE communications Magazine, 39(8), 118-126.

. Ruanaidh, J. J. O., & Pun, T. (1998). Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal processing, 66(3), 303-317.

. Kim, B. S., Choi, J. G., & Park, K. H. (2003, October). RST-resistant image watermarking using invariant centroid and reordered Fourier-Mellin transform. In International Workshop on Digital Watermarking (pp. 370-381). Springer, Berlin, Heidelberg.

. Lin, C. Y., Wu, M., Bloom, J. A., Cox, I. J., Miller, M. L., & Lui, Y. M. (2001). Rotation, scale, and translation resilient watermarking for images. IEEE Transactions on image processing, 10(5), 767-782.

. Solachidis, V., & Pitas, L. (2001). Circularly symmetric watermark embedding in 2-D DFT domain. IEEE transactions on image processing, 10(11), 1741-1753.

. Pereira, S., Ruanaidh, J. J., Deguillaume, F., Csurka, G., & Pun, T. (1999, July). Template based recovery of Fourier-based watermarks using log-polar and log-log maps. In Multimedia Computing and Systems, 1999. IEEE International Conference on (Vol. 1, pp. 870-874). IEEE.

. Licks, V., & Hordan, R. (2000). On digital image watermarking robust to geometric transformations. In Image Processing, 2000. Proceedings. 2000 International Conference on (Vol. 3, pp. 690-693). IEEE.

. Kang, X., Huang, J., Shi, Y. Q., & Lin, Y. (2003). A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE transactions on circuits and systems for video technology, 13(8), 776-786.

. Ganic, E., & Eskicioglu, A. M. (2004). A DFT-based semi-blind multiple watermarking scheme for images. CUNY Brooklyn College, 2900.

. Kusyk, J., & Eskicioglu, A. M. (2005, October). A semi-blind logo watermarking scheme for color images by comparison and modification of DFT coefficients. In Multimedia Systems and Applications VIII (Vol. 6015, p. 60150C). International Society for Optics and Photonics.

. Chiu, Y. C., & Tsai, W. H. (2004). Copyright protection by watermarking for color images against rotation and scaling attacks using peak detection and synchronization in discrete Fourier transform domain. In Proceedings of Third Workshop on Digital Archives Technologies (pp. 207-213).

. Qi, X., & Qi, J. (2007). A robust content-based digital image watermarking scheme. Signal processing, 87(6), 1264-1280.

. Poljicak, A., Mandic, L., & Agic, D. (2011). Discrete Fourier transform-based watermarking method with an optimal implementation radius. Journal of Electronic Imaging, 20(3), 033008.

. Ridzon, R., & Levicky, D. (2008, September). Robust digital watermarking in DFT and LPM domain. In ELMAR, 2008. 50th International Symposium (Vol. 2, pp. 651-654). IEEE.

. Riad, R., Harba, R., Douzi, H., Ros, F., & Elhajji, M. (2016). Robust fourier watermarking for id images on smart card plastic supports. Advances In Electrical and Comp uter Engineering, 16(4), 23-30.