Table 1 The summary of related works.
From: Convolutional neural network and wavelet composite against geometric attacks a watermarking approach
Reference | Technique | Strengths | Limitations |
---|---|---|---|
Zear et al.23 | DWT + DCT + SVD | Multiple watermarking, good robustness | Moderate imperceptibility, limited payload |
Fazli & Moeini24 | DWT + DCT + SVD | Geometric attack resistance | Complex embedding, limited scalability |
Singh et al.25 | SVD + BPNN | Noise reduction via neural networks | Lower PSNR (~ 34.88 dB), limited robustness |
Ernawan & Ariatmanto27 | Scaling factor techniques | Copyright protection, flexible scaling | Vulnerable to geometric distortions |
Awasthi & Srivastava28 | SURF + LWT + DCT + SVD | Efficient descriptor computation | High computational cost |
Ravichandran et al.30 | ROI-based watermarking | Accurate tamper detection | Application-specific, limited generalizability |
AlShaikh et al.31 | Pigeon algorithm + DCT | Optimised embedding locations | Limited to DCT domain |
Kumar et al.32 | PSO + LWT + Hessenberg | Robust medical watermarking | Requires tuning of PSO parameters |
Begum et al.39 | DWT + SVD | Enhanced imperceptibility and robustness | Vulnerable to false positives in SVD |
Tang & Zhou40 | DWT + SVD + FRFT | Fractional domain robustness | Complex transform domain operations |
Adi et al.42 | Adaptive matrix + chaotic sequencing | Efficient tamper detection | Fragile watermarking, less robust |
Mali & Agilandeeswari43 | DCNN + wavelet + fractional optimization | Deep learning-based robustness | High training time, complex architecture |
Proposed work | DWT + SVD + CNN + Compression | High payload, imperceptibility, robustness, and multi-watermarking | Requires CNN training, moderate complexity |