{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:58:42Z","timestamp":1764997122731,"version":"3.46.0"},"reference-count":30,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T00:00:00Z","timestamp":1495670400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1,26]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>In this paper, we present an introduction of digital image watermarking followed by important characteristics and potential applications of digital watermarks. Further, recent state-of-the-art watermarking techniques as reported by noted authors are discussed in brief. It includes the performance comparison of reported transform\/spatial domain based watermarking techniques presented in tabular form. This comprehensive survey will be significant for researchers who will be able to implement more efficient watermarking techniques. Moreover, we present a robust watermarking technique using fusion of discrete wavelet transform (DWT) and Karhunen-Loeve transform for digital images. Further, visual quality of the watermarked image is enhanced by using different image de-noising techniques. The results are obtained by varying the gain factor, size of the image watermark, different DWT sub-bands, and image processing attacks. Experimental results demonstrate that the method is imperceptible and robust for different image processing attacks.<\/jats:p>","DOI":"10.1515\/jisys-2017-0032","type":"journal-article","created":{"date-parts":[[2017,6,2]],"date-time":"2017-06-02T09:19:28Z","timestamp":1496395168000},"page":"91-103","source":"Crossref","is-referenced-by-count":10,"title":["Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images"],"prefix":"10.1515","volume":"27","author":[{"given":"Akankasha","family":"Sharma","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering , Jaypee University of Information Technology , Waknaghat, Solan, Himachal Pradesh , India"}]},{"given":"Amit Kumar","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering , Jaypee University of Information Technology , Waknaghat, Solan, Himachal Pradesh , India"}]},{"given":"Pardeep","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering , Jaypee University of Information Technology , Waknaghat, Solan, Himachal Pradesh , India"}]}],"member":"374","published-online":{"date-parts":[[2017,5,25]]},"reference":[{"key":"2025120523414628267_j_jisys-2017-0032_ref_001_w2aab3b7b6b1b6b1ab1b7b1Aa","doi-asserted-by":"crossref","unstructured":"A. Al-Haj, Combined DWT-DCT digital image watermarking, J. Comput. Sci. 3 (2007), 740\u2013746.10.3844\/jcssp.2007.740.746","DOI":"10.3844\/jcssp.2007.740.746"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_002_w2aab3b7b6b1b6b1ab1b7b2Aa","doi-asserted-by":"crossref","unstructured":"A. Al-Haj and A. Amer, Secured telemedicine using region-based watermarking with tamper localization, J. Digit. Imaging27 (2014), 737\u2013750.10.1007\/s10278-014-9709-9","DOI":"10.1007\/s10278-014-9709-9"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_003_w2aab3b7b6b1b6b1ab1b7b3Aa","doi-asserted-by":"crossref","unstructured":"M. Arsalan, S. A. Malik and A. Khan, Intelligent reversible watermarking in integer wavelet domain for medical images, J. Syst. Software85 (2012), 883\u2013894.10.1016\/j.jss.2011.11.005","DOI":"10.1016\/j.jss.2011.11.005"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_004_w2aab3b7b6b1b6b1ab1b7b4Aa","doi-asserted-by":"crossref","unstructured":"G. Bhatnagar, Q. M. J. Wu and B. Raman, A new robust adjustable watermarking scheme, Comput. Secur.31 (2011), 40\u201358.","DOI":"10.1016\/j.cose.2011.11.003"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_005_w2aab3b7b6b1b6b1ab1b7b5Aa","doi-asserted-by":"crossref","unstructured":"G. Bhatnagar, Q. M. J. Wu and B. Raman, Robust gray scale watermarking in wavelet domain, Recent Adv. Secur. Privacy Dist. Commun. Image Proc.38 (2012), 1164\u20131176.","DOI":"10.1016\/j.compeleceng.2012.02.002"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_006_w2aab3b7b6b1b6b1ab1b7b6Aa","doi-asserted-by":"crossref","unstructured":"D. Bouslimi, G. Coatrieux and C. Roux, A joint encryption encryption\/watermarking algorithm for verifying the reliability of medical images: application to echographic images, Comput. Meth. Prog. Bio.106 (2011), 47\u201354.","DOI":"10.1016\/j.cmpb.2011.09.015"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_007_w2aab3b7b6b1b6b1ab1b7b7Aa","doi-asserted-by":"crossref","unstructured":"J. Cao, H. Li, W. Luo and J. Huang, An improved spread transform dither modulation for robust and secure watermarking, IEEE24 (2016), 2718\u20132722.","DOI":"10.1109\/ICIP.2016.7532853"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_008_w2aab3b7b6b1b6b1ab1b7b8Aa","doi-asserted-by":"crossref","unstructured":"L. Chen and J. Zhao, Robust contourlet-based watermarking for depth-image-based rendering 3D images, in: IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), ISSN: 2155\u20135052, 2015.","DOI":"10.1109\/BMSB.2016.7521956"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_009_w2aab3b7b6b1b6b1ab1b7b9Aa","doi-asserted-by":"crossref","unstructured":"D. Essaidani, H. Seddik and E. Ben Braiek, Robust and blind watermarking approach based on modified delaunay triangulation, in: 2nd International Conference on Advanced Technologies for Signal and Image Processing - ATSIP\u20192016, IEEE, March 21\u201324, 2016.","DOI":"10.1109\/ATSIP.2016.7523049"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_010_w2aab3b7b6b1b6b1ab1b7c10Aa","doi-asserted-by":"crossref","unstructured":"E. Fragoso-Navarro, H. Santoyo-Garc\u00eda, K. Rangel-Espinoza, M. Nakano-Miyatake and R. Reyes-Reyes, Visible watermarking technique in compressed domain based on JND, in: International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), pp. 1\u20136, IEEE, 2015, Mexico City, Mexico.","DOI":"10.1109\/ICEEE.2015.7357921"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_011_w2aab3b7b6b1b6b1ab1b7c11Aa","doi-asserted-by":"crossref","unstructured":"M. A. Hajjaji, E.-B. Bourennane, A. B. Abdelali and A. Mtibaa, Combining Haar wavelet and Karhunen Loeve transforms for medical images watermarking, BioMed Res. Int.2014 (2014), 1\u201315.","DOI":"10.1155\/2014\/313078"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_012_w2aab3b7b6b1b6b1ab1b7c12Aa","doi-asserted-by":"crossref","unstructured":"S.-J. Horng, D. Rosiyadi, T. Li, T. Takao, M. Guo and M. K. Khan, A blind image copyright protection scheme for e-government, J. Vis. Commun. Image R.24 (2013), 1099\u20131105.10.1016\/j.jvcir.2013.07.008","DOI":"10.1016\/j.jvcir.2013.07.008"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_013_w2aab3b7b6b1b6b1ab1b7c13Aa","doi-asserted-by":"crossref","unstructured":"A. Kannammal and S. S. Rani, Two level security for medical images using watermarking\/encryption algorithms, Int. J. Imag. Syst. Tech.24 (2014), 111\u2013120.10.1002\/ima.22086","DOI":"10.1002\/ima.22086"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_014_w2aab3b7b6b1b6b1ab1b7c14Aa","doi-asserted-by":"crossref","unstructured":"M. Khalili, A secure and robust CDMA digital image watermarking algorithm based on DWT, YIQ color space and arnold transform, Signal Image Proc. Int. J.2 (2011).","DOI":"10.5121\/sipij.2011.2211"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_015_w2aab3b7b6b1b6b1ab1b7c15Aa","doi-asserted-by":"crossref","unstructured":"J. Lang and J.-Y. Sun, Digital watermarking algorithm based on hyperchaos and fractional Fourier transform, in: IEEE 14th International Conference on Communication Technology (ICCT), pp. 691\u2013694, 2012.","DOI":"10.1109\/ICCT.2012.6511287"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_016_w2aab3b7b6b1b6b1ab1b7c16Aa","doi-asserted-by":"crossref","unstructured":"J. Lei, S. Zhiyuanb, C. Yaping, F. Yong, A Haar wavelet transform based watermarking algorithm for binary images, Int. Conf. Comput. Elect. Eng.13 (2011), 2972\u20132978.","DOI":"10.1016\/j.egypro.2011.11.431"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_017_w2aab3b7b6b1b6b1ab1b7c17Aa","doi-asserted-by":"crossref","unstructured":"R. Pandey, A. K. Singh, B. Kumar and A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology, Multimed. Tools Appl.75 (2016), 14381\u201314397, DOI: 10.1007\/s11042-016-3536-6.10.1007\/s11042-016-3536-6","DOI":"10.1007\/s11042-016-3536-6"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_018_w2aab3b7b6b1b6b1ab1b7c18Aa","doi-asserted-by":"crossref","unstructured":"P. Rahmati, A. Adler and T. Tran, Watermarking in e-commerce, Int. J. Adv. Comput. Sci. Appl.4 (2013), 252\u2013265.","DOI":"10.14569\/IJACSA.2013.040634"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_019_w2aab3b7b6b1b6b1ab1b7c19Aa","doi-asserted-by":"crossref","unstructured":"D. Rosiyadi, S.-J. Horng, P. Fan, X. Wang, M. K. Khan and P. Yi, An efficient copyright protection scheme for e-government document images, in IEEE MultiMedia19 (2012), 62\u201373.10.1109\/MMUL.2011.41","DOI":"10.1109\/MMUL.2011.41"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_020_w2aab3b7b6b1b6b1ab1b7c20Aa","doi-asserted-by":"crossref","unstructured":"A. Sharma, A. K. Singh and S. P. Ghrera, Robust and Secure Multiple Watermarking Technique for Medical Images, Wireless Pers. Commun.92 (2016), 1611\u20131624, Springer US, DOI: 10.1007\/s11277-016-3625-x.","DOI":"10.1007\/s11277-016-3625-x"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_021_w2aab3b7b6b1b6b1ab1b7c21Aa","doi-asserted-by":"crossref","unstructured":"H. Shen and B. Chen, From single watermark to dual watermark: a new approach for image watermarking, Recent Adv. Secur. Privacy Dist. Commun. Image Proc.38 (2012), 1310\u20131324.","DOI":"10.1016\/j.compeleceng.2011.11.012"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_022_w2aab3b7b6b1b6b1ab1b7c22Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, Improved hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimed. Tools Appl., Springer US, 2016, DOI: 10.1007\/s11042-016-3514-z.","DOI":"10.1007\/s11042-016-3514-z"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_023_w2aab3b7b6b1b6b1ab1b7c23Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, M. Dave and A. Mohan, Hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimed. Tools Appl.75 (2015), 8381\u20138401, DOI: 10.1007\/s11042-015-2754-7, Springer US.","DOI":"10.1007\/s11042-015-2754-7"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_024_w2aab3b7b6b1b6b1ab1b7c24Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, M. Dave and A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain, Wireless Pers. Commun.83 (2015), 2133\u20132150, DOI: 10.1007\/s11277-015-2505-0, Springer US.","DOI":"10.1007\/s11277-015-2505-0"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_025_w2aab3b7b6b1b6b1ab1b7c25Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, B. Kumar, M. Dave, S. P. Ghrera and A. Mohan, Digital image watermarking: techniques and emerging applications, in: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, pp. 246\u2013272, 2016, IGI Global, USA, DOI: 10.4018\/978-1-5225-0105-3.ch011.","DOI":"10.4018\/978-1-5225-0105-3.ch011"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_026_w2aab3b7b6b1b6b1ab1b7c26Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, B. Kumar, M. Dave and A. Mohan, Robust and imperceptible dual watermarking for telemedicine applications. Wireless Pers. Commun.80 (2014), 1415\u20131433, Springer.","DOI":"10.1007\/s11277-014-2091-6"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_027_w2aab3b7b6b1b6b1ab1b7c27Aa","unstructured":"A. K. Singh, B. Kumar, S. K. Singh and A. Mohan, Multiple watermarking technique for securing online social network contents using back propagation neural network, Future Gener Comp Sy. 2016, In Press, DOI: 10.1016\/j. future.2016.11.023."},{"key":"2025120523414628267_j_jisys-2017-0032_ref_028_w2aab3b7b6b1b6b1ab1b7c28Aa","doi-asserted-by":"crossref","unstructured":"F. Wang and J. P. Allebach, Printed image watermarking using direct binary search halftoning, in: IEEE International Conference of Image Processing (ICIP), ISSN: 2381-8549, IEEE 2016.","DOI":"10.1109\/ICIP.2016.7532855"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_029_w2aab3b7b6b1b6b1ab1b7c29Aa","doi-asserted-by":"crossref","unstructured":"A. Zear, A. K. Singh and P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine, Multimed. Tools Appl. (2016), Springer US, DOI: 10.1007\/s11042-016-3862-8.","DOI":"10.1007\/s11042-016-3862-8"},{"key":"2025120523414628267_j_jisys-2017-0032_ref_030_w2aab3b7b6b1b6b1ab1b7c30Aa","doi-asserted-by":"crossref","unstructured":"Y. Zolotavkin and M. Juhola, A new scalar quantization method for digital image watermarking, J. Electr. Comput. Eng.2016 (2016) 1\u201316.","DOI":"10.1155\/2016\/9029745"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.degruyter.com\/view\/j\/jisys.2018.27.issue-1\/jisys-2017-0032\/jisys-2017-0032.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0032\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0032\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:42:18Z","timestamp":1764978138000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0032\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,25]]},"references-count":30,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,7,20]]},"published-print":{"date-parts":[[2018,1,26]]}},"alternative-id":["10.1515\/jisys-2017-0032"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2017-0032","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"type":"electronic","value":"2191-026X"},{"type":"print","value":"0334-1860"}],"subject":[],"published":{"date-parts":[[2017,5,25]]}}}