Digital watermarking techniques, challenges, and applications: A review
Main Article Content
Abstract
With the rapid advancement of technology, the transmission of digital media over the internet has become easier and more efficient, leading to its widespread use across various fields. However, this progress has also been accompanied by increased risks of breaches, theft, and unethical digital media manipulation. Therefore, watermarking is considered one of the most essential techniques for protecting, verifying, and authenticating digital media by embedding imperceptible information within it. This paper presents a comprehensive literature review that differs from previous studies in its thorough analysis of both traditional and deep learning-based watermarking developed over the last nine years, as well as its adoption of hybrid approaches for adaptive watermarking, accompanied by various image and video datasets. This versatility makes it valuable for numerous applications, including the military, healthcare, and entertainment fields. The results highlight the necessity of adopting adaptive techniques to address the growing digital challenges. Future directions can concentrate on integrating deep learning with dynamic watermarking models to harness the effectiveness and efficiency of watermarking.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
[1] P. Aberna and L. Agilandeeswari, “Digital image and video watermarking: Methodologies, attacks, applications, and future directions,” Multimedia Tools and Applications, vol. 83, pp. 5531–5591, June 2023.
[2] Y. Luo, X. Tan, and Z. Cai, 'Robust deep image watermarking...' CMC-Comput. Mater. Contin., vol. 81, no. 1, 2024, doi: 10.32604/cmc.2024.055150
[3] M. Begum and M. S. Uddin, “Digital image watermarking techniques: A review,” Journal of Imaging, vol. 6, no. 2, Art. no. 24, 2020. https://doi.org/10.3390/info11020110.
[4] A. Malanowska, W. Mazurczyk, T. Koohpayeh Araghi, D. Megías, and M. Kuribayashi, "Digital watermarking—A meta-survey and techniques for fake news detection," IEEE Access, vol. 12, pp. 36311–36345, 2024, doi: 10.1109/ACCESS.2024.3374201.
[5] M. Gupta and R. R. Kishore, “A survey of watermarking technique using deep neural network architecture,” in 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), 2021, pp. 630–634.
[6] Y. A. Hassan and A. M. S. Rahma, (2023). An overview of robust video watermarking techniques. Iraqi Journal of Science, vol. 64, no. 7, 3613-3624. https://doi.org/10.24996/ijs.2023.64.7.38
[7] O. Evsutin, A. Melman, and R. Meshcheryakov, “Digital steganography and watermarking for digital images: A review of current research directions,” IEEE Access, vol. 8, pp. 166575–166611, 2020. https://doi.org/10.1109/ACCESS.2020.3022779.
[8] R. Thomas and M. Sucharitha, “Reversible color image watermarking scheme based on contourlet transform and principal component analysis,” in 2021 7th International Conference on Electrical Energy Systems (ICEES), 2021, pp. 1–6. IEEE. https://doi.org/10.1109/ICEES51510.2021.9383746.
[9] X. Zhong, A. Das, F. Alrasheedi, and A. Tanvir, “A brief, in-depth survey of deep learning-based image watermarking,” Applied Sciences, vol. 13, no. 21, Art. no. 11852, 2023. https://doi.org/10.3390/app132111852.
[10] D. Awasthi, A. Tiwari, P. Khare, and V. K. Srivastava, “A comprehensive review on optimization-based image watermarking techniques for copyright protection,” Expert Systems with Applications, vol. 242, Art. no. 122830, 2024. https://doi.org/10.1016/j.eswa.2023.122830.
[11] S. Sharma, J. J. Zou, G. Fang, P. Shukla, and W. Cai, “A review of image watermarking for identity protection and verification,” Multimedia. Tools Applications vol. 83, no. 11, pp. 31829-31891, 2024.
[12] S. Khalilidan, M. Mahdavi, A. Balouchestani, Z. Moti, and Y. Hallaj, “A semi-blind watermarking method for authentication of face images using autoencoders,” in 2020 6th International Conference on Web Research (ICWR), 2020, pp. 123–128. IEEE. https://doi.org/10.1109/ICWR49608.2020.9122291.
[13] R. M. G. Ferrari and A. M. H. Teixeira, “A switching multiplicative watermarking scheme for detection of stealthy cyber-attacks,” IEEE Transactions on Automatic Control, vol. 66, no. 6, pp. 2558–2573, 2021. https://doi.org/10.1109/TAC.2020.3013850.
[14] S. Wadhera, D. Kamra, A. Rajpal, A. Jain, and V. Jain, “A comprehensive review on digital image watermarking,” WCNC-2021: Workshop on Computer Networks & Communications, 2021.
[15] L. Geng, W. Zhang, H. Chen, H. Fang, and N. Yu, “Real-time attacks on robust watermarking tools in the wild by CNN,” Journal of Real-Time Image Processing, 2020. https://doi.org/10.1007/s11554-020-00941-8.
[16] S. Boujerfaoui, R. Riad, H. Douzi, F. Ros, and R. Harba, “Image watermarking between conventional and learning-based techniques: A literature review,” Electronics, vol. 12, no. 1, Art. no. 74, 2023. https://doi.org/10.3390/electronics12010074.
[17] H. M. Al-Dabbas, R. A. Azeez, and A. E. Ali, "High-accuracy models for iris recognition with merging features," Int. J. Adv. Appl. Sci., vol. 11, no. 6, pp. 89–96, 2024, doi: 10.21833/ijaas.2024.06.010.
[18] H. Tao, L. Chongmin, J. M. Zain, and A. N. Abdalla, “Robust image watermarking theories and techniques: A review,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 12, no. 2, 2014.
[19] M. A. Nematollahi, C. Vorakulpipat, and H. Gamboa Rosales, Digital watermarking techniques and trends. Springer, 2017. https://doi.org/10.1007/978-981-10-2095-7.
[20] G. Al-Kateb, I. Khaleel, and M. Aljanabi, “CryptoGenSec: A hybrid generative AI algorithm for dynamic cryptographic cyber defence,” Mesopotamian Journal of Cybersecurity, vol. 4, no. 3, pp. 22–35, 2024. https://doi.org/10.58496/MJCS/2024/013.
[21] Common Objects in Context (COCO) Dataset. Available: https://cocodataset.org/. Accessed: Dec. 30, 2024.
[22] RAISE Dataset. Available: http://loki.disi.unitn.it/RAISE. Accessed: Dec. 30, 2024.
[23] COVERAGE Dataset. Available: https://www.coverage-db.org/. Accessed: Dec. 30, 2024.
[24] USC-SIPI Image Database. Available: https://sipi.usc.edu/database/. Accessed: Dec. 31, 2024.
[25] Modified CASIA Dataset. IEEE Dataport. Available: https://ieee-dataport.org/open-access/modified-casia. Accessed: Dec. 31, 2024.
Dataset 28xhc4kyfp.
[26] CG-1050 (v1). Available: https://data.mendeley.com/datasets/28xhc4kyfp/1. Accessed: Dec. 31, 2024.
[27] CoMoFoD: Copy-Move Forgery Detection Dataset. Visual Computing Lab. Available: https://www.vcl.fer.hr/comofod/. Accessed: Jan. 1, 2025.
[28] Global Roads Inventory Project (GRIP) Dataset. Netherlands Environmental Assessment Agency, GLOBIO. Available: https://www.globio.info/download-grip-dataset. Accessed: Jan. 2, 2025.
[29] T. Wang, M. Huang, H. Cheng, B. Ma, and Y. Wang, “Robust identity perceptual watermark against deepfake face swapping,” arXiv, 2023]. Available: https://doi.org/10.48550/arXiv.2311.01357. Accessed: Jan. 3, 2025.
[30] CIFAR Dataset. GitHub. Available: https://github.com/EN10/CIFAR. Accessed: Jan. 3, 2025.
[31] C. Mo, F. Liu, M. Zhu, G. Yan, B. Qi, and C. Yang, “Image steganalysis based on deep content features clustering,” Computers, Materials & Continua, vol. 73, no. 3, pp. 5641–5659, 2023. Available: https://doi.org/10.32604/cmc.2023.039540. Accessed: Jan. 3, 2025.
[32] Y. Li, X. Yang, P. Sun, H. Qi, and S. Lyu, “Celeb-DF: A large-scale challenging dataset for deepfake forensics,” arXiv, 2020. Available: https://doi.org/10.48550/arXiv.1909.12962. Accessed: Dec. 30, 2024.
[33] Z. F. Hussain and H. R. Ibraheem, “Novel convolutional neural networks based Jaya algorithm approach for accurate deepfake video detection,” Mesopotamian Journal of Cybersecurity, vol. 2023, pp. 35–39, 2023. https://doi.org/10.58496/MJCS/2023/007.
[34] Kinetics-700 Dataset. Papers with Code. Available: https://paperswithcode.com/dataset/kinetics-700. Accessed: Dec. 31, 2024.
[35] Google. (2016). YouTube-8M: A large-scale video classification benchmark. Available: https://research.google.com/youtube8m/. Accessed: Jan. 2, 2025.
[36] Something-Something V2 Dataset. Papers with Code. Available: https://paperswithcode.com/dataset/something-something-v2. Accessed: Jan. 1, 2025.
[37] EPIC-KITCHENS-100 Dataset. University of Bristol. Available: https://epic-kitchens.github.io/. Accessed: Mar. 13, 2025.
[38] UCF101 Action Recognition Dataset. Center for Research in Computer Vision, University of Central Florida. Available: https://www.crcv.ucf.edu/data/UCF101.php. Accessed: Dec. 29, 2024.
[39] FaceForensics++. Papers with Code. Available: https://paperswithcode.com/dataset/faceforensics-1. Accessed: Dec. 28, 2024.
[40] R. S. R. Channapragada and M. V. N. K. Prasad, “Digital watermarking using fractal coding,” in Advances in Signal Processing and Intelligent Recognition Systems, S. M. Thampi, A. Abraham, and B. J. Prabhu, Eds., Springer, 2016, pp. 109–118. https://doi.org/10.1007/978-3-319-28658-7_10.
[41] S. Borah and B. Borah, “Quantization index modulation (QIM) based watermarking techniques for 3D meshes,” in 2017 Fourth International Conference on Image Information Processing (ICIIP), 2017, pp. 284–289. IEEE. https://doi.org/10.1109/ICIIP.2017.8313726.
[42] Y. Chincholkar and S. Ganorkar, “Audio watermarking algorithm implementation using patchwork technique,” in 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 2019. https://doi.org/10.1109/I2CT45611.2019.9033771.
[43] N. H. Barnouti, Z. S. Sabri, and K. L. Hameed, “Digital watermarking based on DWT (discrete wavelet transform) and DCT (discrete cosine transform),” International Journal of Engineering & Technology, vol. 7, no. 4, pp. 4825–4829, 2019. https://doi.org/10.14419/ijet.v7i4.25085.
[44] M. R. Islam, M. A. Hasan, S. M. T. Islam, N. Islam, and M. L. Hossain, “Analysis and implementation of digital watermarking using spread spectrum method,” in 2020 International Conference on System, Computation, Automation and Networking (ICSCAN), Pondicherry, India, 2020. https://doi.org/10.1109/ICSCAN49426.2020.9262285.
[45] S. Han and W. L. Zhang, “SVD-based digital watermarking algorithm for print-and-scan process,” in 2020 IEEE 20th International Conference on Communication Technology (ICCT), 2020, pp. 1427–1430. IEEE. https://doi.org/10.1109/ICCT50939.2020.9295673.
[46] M. Cedillo-Hernandez, A. Cedillo-Hernandez, and F. J. Garcia-Ugalde, “Improving DFT-based image watermarking using particle swarm optimization algorithm,” Mathematics, vol. 9, no. 15, Art. No. 1795, 2021. https://doi.org/10.3390/math9151795.
[47] J. H. Awad and B. D. Majeed, "Image watermarking based on IWT and parity bit checking," Iraqi J. Sci., vol. 62, no. 8, pp. 2726–2739, 2021, doi: 10.24996/ijs.2021.62.8.26.
[48] W. Alomoush, O. A. Khashan, A. Alrosan, H. H. Attar, A. Almomani, F. Alhosban, and S. N. Makhadmeh, “Digital image watermarking using discrete cosine transformation based linear modulation,” Journal of Cloud Computing, vol. 12, Art. no. 96, 2023. https://doi.org/10.1186/s13677-023-00413-1.
[49] Z. B. Faheem, A. Ishaq, F. Rustam, I. de la Torre Díez, D. Gavilanes, M. Masias Vergara, and I. Ashraf, “Image watermarking using least significant bit and Canny edge detection,” Sensors, vol. 23, no. 3, Art. no. 1210, 2023. https://doi.org/10.3390/s23031210.
[50] T. Wang, M. Huang, H. Cheng, B. Ma, and Y. Wang, "Robust identity perceptual watermark against deepfake face swapping," arXiv preprint arXiv:2311.01357, 2023. doi: 10.48550/arXiv.2311.01357.
[51] Y. A. Hassan and A. M. S. Rahma, “Improving video watermarking through Galois field GF(2⁴) multiplication tables with diverse irreducible polynomials and adaptive techniques,” Computers, Materials & Continua, vol. 78, no. 2, Art. no. 046149, 2024. https://doi.org/10.32604/cmc.2023.046149.
[52] A. Marjuni, G. F. Shidik, A. Syukur, D. R. I. M. Setiadi, and N. Rijati, “Toward achieving a trade-off for SVD-based image watermarking using Mojette transform,” IEEE Access, 2024. https://doi.org/10.1109/ACCESS.2024.3368528.
[53] Y. Qiu, S. Jiao, and Q. Su, “Enhancing color image watermarking via fast quaternion Schur decomposition: a high-quality blind approach,” The Visual Computer, 2024. https://doi.org/10.1007/s00371-024-03674-y.
[54] B. D. Majeed, A. H. Taherinia, H. S. Yazdi, and A. Harati, “CSRWA: Covert and severe attacks resistant watermarking algorithm,” Computers, Materials & Continua, 2025. https://doi.org/10.32604/cmc.2024.059789
[55] S. Wu, W. Lu, X. Yin, and R. Yang, “Robust watermarking against arbitrary scaling and cropping attacks,” Signal Processing, 2025. https://doi.org/10.1016/j.sigpro.2024.109655.
[56] J. Zhu, R. Kaplan, J. Johnson, and L. Fei-Fei, “HiDDeN: Hiding data with deep networks,” in Computer Vision – ECCV 2018, V. Ferrari, M. Hebert, C. Sminchisescu, and Y. Weiss, Eds., Springer, Cham, Lecture Notes in Computer Science, vol. 11219, pp. 682–697, 2018. https://doi.org/10.1007/978-3-030-01267-0_40.
[57] X. Zhong and F. Y. Shih, “A robust image watermarking system based on deep neural networks,” arXiv preprint arXiv:1908.11331, 2019. https://doi.org/10.48550/arXiv.1908.11331.
[58] J.-E. Lee, Y.-H. Seo, and D.-W. Kim, “Convolutional neural network-based digital image watermarking adaptive to the resolution of image and watermark,” Applied Sciences, vol. 10, no. 19, Art. no. 6854, 2020. https://doi.org/10.3390/app10196854.
[59] M. Ahmadi, A. Norouzi, N. Karimi, S. Samavi, and A. Emami, “ReDMark: Framework for residual diffusion watermarking based on deep networks,” Expert Systems with Applications, vol. 146, Art. no. 113157, 2020. https://doi.org/10.1016/j.eswa.2019.113157.
[60] J. Fei, Z. Xia, B. Tondi, and M. Barni, “Supervised GAN watermarking for intellectual property protection,” in 2022 IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, Dec. 12–16, 2022. IEEE. https://doi.org/10.1109/WIFS55849.2022.9975409.
[61] I. Noreen, M. S. Muneer, and S. Gillani, "Deepfake attack prevention using steganography GANs," PeerJ Comput. Sci., vol. 8, Art. no. e1125, 2022, doi: 10.7717/peerj-cs.1125.
[62] J. Huang, T. Luo, L. Li, G. Yang, H. Xu, and C.-C. Chang, “ARWGAN: Attention-guided robust image watermarking model based on GAN,” IEEE Transactions on Instrumentation and Measurement, vol. 72, Art. no. 5018417, 2023. https://doi.org/10.1109/TIM.2023.3285981.
[63] B. Wang, Z. Song, and Y. Wu, “Robust blind watermarking framework for hybrid networks combining CNN and Transformer,” in Proceedings of Machine Learning Research, vol. 222, ACML 2023, B. Yanıkoğlu and W. Buntine, Eds., 2023. https://proceedings.mlr.press/v222/wang24a/wang24a.pdf.
[64] M. Kuribayashi, T. Yasui, and A. Malik, “White box watermarking for convolution layers in fine-tuning model using the constant weight code,” Journal of Imaging, vol. 9, no. 6, p. 117, 2023. https://doi.org/10.3390/jimaging9060117.
[65] H. Deng, X. Wang, G. Yu, X. Dang, and R. P. Liu, “A novel weights-less watermark embedding method for neural network models,” IEEE 22nd International Symposium on Communications and Information Technologies (ISCIT), 2023. https://doi.org/10.1109/ISCIT57293.2023.10376108.
[66] S. Yamauchi and M. Kawamura, “A neural-network-based watermarking method approximating JPEG quantization,” Journal of Imaging, vol. 10, no. 6, Art. no. 138, 2024. https://doi.org/10.3390/jimaging10060138.
[67] H. K. Singh, N. Baranwal, K. N. Singh, and A. K. Singh, “GANMarked: Using secure GAN for information hiding in digital images,” IEEE Transactions on Consumer Electronics, 2024. https://doi.org/10.1109/TCE.2024.3406956.
[68] U. Saha, S. Saha, S. A. Fattah, and M. Saquib, “Npix2Cpix: A GAN-based image-to-image translation network with retrieval-classification integration for watermark retrieval from historical document images,” IEEE Access, 2024. https://doi.org/10.1109/ACCESS.2024.3424662.
[69] O. Evsutin, F. Ivanov, and K. Dzhanashia, “Watermarking for social network images with improved robustness through polar codes,” IEEE Access, 2024. https://doi.org/10.1109/ACCESS.2024.3446489.
[70] L. Zhu, Y. Zhao, Y. Fang, and J. Wang, “A novel robust digital image watermarking scheme based on attention U-Net++ structure,” The Visual Computer, vol. 40, pp. 8791–8807, 2024. https://doi.org/10.1007/s00371-024-03271-z
[71] G. Lin, W. Luo, P. Zheng, and J. Huang, “An audio watermarking method against re-recording distortions,” Pattern Recognition, 2025. https://doi.org/10.1016/j.patcog.2025.111366.