Bibliometric Analysis of Digital Watermarking Based on CiteSpace
Abstract
1. Introduction
2. Methodology
3. Results and Analysis
3.1. Publication Trend Analysis
- Period of Steady Development (2004–2016): The field experienced a phase of steady growth, accompanied by fluctuations in annual publication counts. While the number of annual publications remained between 200 and 400, the average annual growth rate during this period was about 3.6%, with a small decline in some individual years. These fluctuations reflect a research landscape primarily focused on robustness enhancement and conventional transform-domain watermarking techniques. Even though significant progress was made, new approaches and lines of inquiry were still required to spur additional development in watermarking technologies.
- Period of Rapid Growth (2017–2024): Since 2017, the number of papers published has entered a phase of rapid development, with an average annual growth rate of more than 6%. The annual number of publications exceeded 400 for the first time in 2017 and continued to rise, reaching a peak in 2023, where it totaled 663, an increase of about 66% compared with 2016. This pattern demonstrates that digital goods are becoming more and more commonplace globally, as well as that demand for digital copyright protection is rising. Increased interest from the public and private sectors has spurred research, which has been further driven by improvements in regulatory frameworks. Digital watermarking is anticipated to continue to be a major area of research and application in the future as it firmly establishes itself as an essential technique for data security and digital copyright protection.
3.2. Author Cooperation Network Analysis
3.3. Institution Cooperation Network Analysis
3.4. Country Cooperation Network Analysis
3.5. Keyword Co-Occurrence Clustering Analysis
- Applications in Copyright Protection and Data Integrity Verification (#6, #7): This research area took shape around 2005 and has remained steadily hot since then. With the exponential growth of digital content, integrating watermarking solutions into legal and technological frameworks has become a research hotspot. Utilizing frequency-domain methods to improve watermark tamper resistance is the main focus of recent research in this area.
- Specific Application Domains of Watermarking Technology (#1, #2, #3, #9): This is an emerging area of research that has garnered increasing attention since 2010. Audio watermarking is widely employed in digital rights management, especially in the field of music, where the demand is significant. Reversible data hiding plays a crucial role in lossless information storage, particularly in medical imaging and remote sensing, as it has the technical advantage of lossless information restoration. Color image watermarking focuses on enhancing robustness in image-based applications. Image encryption primarily addresses data security and privacy protection.
- Implementation Methods for Watermarking Technology (#0, #4, #5, #8): This is a cutting-edge direction that watermarking technology have evolved in in recent years. Deep learning is driving the advancement of intelligent watermarking algorithms, including watermark embedding and detection techniques based on convolutional neural networks (CNNs) and Generative Adversarial Networks (GANs). Other methodologies, such as computational modeling, quantum image processing, and singular-value decomposition, are also expanding the theoretical and technical foundations of watermarking research.
3.6. Timeline Visualization of Keyword Co-Occurrence Clustering Analysis
- Foundational Stage (2004–2016): During this phase, research primarily focused on the protection of image data. The representative cluster “#9 image encryption” emphasized chaotic systems and Fourier transform techniques, laying the groundwork for future watermarking advancements. Simultaneously, “#8 singular value decomposition” was widely applied and enhanced watermark robustness, gradually evolving into schemes suitable for medical imaging. Additionally, “#7 image authentication” research began to emerge, focusing on tamper detection and watermark recovery, with some studies incorporating neural network classification methods into their work. As the dissemination of digital content expanded, watermarking applications evolved beyond simple embedding and detection to include copyright protection and authentication. The “#6 copyright protection” cluster reflects the emergence of methods such as zero and semi-fragile watermarking, which began to be integrated into digital rights management systems, in the context of digital rights protection legislation and the rise of the content industry in the mid-to-late 2000s.
- Multi-Type Watermarking Stage (2017–2020): This period witnessed significant advancements in reversible data hiding and multimedia watermarking. The “#3 color image watermarking” cluster expanded from grayscale to color images, progressing from algorithms and transform-based approaches to moment-based feature extraction (zernike moments, invariants), making watermarking more suitable for multimedia content protection. Meanwhile, “#2 reversible data hiding” emerged as a research hotspot, evolving from traditional watermarking techniques to lossless data hiding. Optimizations such as the discrete wavelet transform (DWT), predictions, and quality assessments were introduced, with recent studies extending to data mining, and their application has increased significantly in medical, military, and legal fields, which have strict requirements for data integrity. The focus of research in this phase has shifted to scenario-specific adaptations and utility optimization, and the driving factors behind this include the improvement of lossless standards for medical images and the development of the multimedia content industry, which requires a wide range of watermark technologies.
- Intelligence-Driven Stage (2021–2024): In recent years, the rise of deep learning has accelerated the advancement of watermarking technology. The “#0 deep learning” cluster has become the core research direction in digital watermarking, evolving from early studies on the human visual system (HVS) to deep learning- and neural network-based techniques. The research trajectory of this cluster reflects a shift toward convolutional neural network (CNN)-driven privacy protection methods, signifying a transition from traditional security mechanisms to intelligent privacy-preserving technologies, driven by both technological and societal needs. This phase is also highly relevant to the implementation of data protection regulations such as the EU GDPR, prompting watermarking technology to be emphasized in privacy protection and data security compliance. In addition, the rapid development of the digital economy and digital assets has driven the demand for intelligent copyright protection solutions, providing both policy and industry support for research into this technology.
3.7. Keyword Burst Analysis
4. Discussion
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Pham, G.N.; Ngo, S.T.; Bui, A.N.; Tran, D.V.; Lee, S.-H.; Kwon, K.-R. Vector map random encryption algorithm based on multi-scale simplification and Gaussian distribution. Appl. Sci. 2019, 9, 4889. [Google Scholar] [CrossRef]
- Ding, C.; Tang, J.; Deng, M.; Liu, H.; Mei, X. A local encryption method for large-scale vector maps based on spatial hierarchical index and 4D hyperchaotic system. Int. J. Geogr. Inf. Sci. 2024, 38, 2272–2300. [Google Scholar] [CrossRef]
- Ren, N.; Guo, S.; Zhu, C.; Hu, Y. A zero-watermarking scheme based on spatial topological relations for vector dataset. Expert Syst. Appl. 2023, 226, 120217. [Google Scholar] [CrossRef]
- Abubahia, A.; Cocea, M. Evaluating the topological quality of watermarked vector maps. Appl. Soft Comput. 2018, 71, 849–860. [Google Scholar] [CrossRef]
- Li, Y.; Zhang, L.; Wang, X.; Zhang, X.; Zhang, Q. A novel invariant based commutative encryption and watermarking algorithm for vector maps. ISPRS Int. J. Geo-Inf. 2021, 10, 718. [Google Scholar] [CrossRef]
- Wang, X.; Yan, H.; Zhang, L.; Zhang, X.; Li, P. An encryption algorithm for vector maps based on the Gaussian random and Haar transform. J. Spat. Sci. 2023, 68, 303–318. [Google Scholar] [CrossRef]
- Abubahia, A.; Cocea, M. Advancements in GIS map copyright protection schemes—A critical review. Multimed. Tools Appl. 2017, 76, 12205–12231. [Google Scholar] [CrossRef]
- Wang, X.; Yan, H.; Zhang, L. Vector map encryption algorithm based on double random position permutation strategy. ISPRS Int. J. Geo-Inf. 2021, 10, 311. [Google Scholar] [CrossRef]
- Qu, C.; Du, J.L.; Xi, X.; Tian, H.M.; Zhang, J. A hybrid domain-based watermarking for vector maps utilizing a complementary advantage of discrete fourier transform and singular value decomposition. Comput. Geosci. 2024, 183, 105515. [Google Scholar] [CrossRef]
- Li, Y.; Wei, D.; Zhang, L. Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain. Inf. Sci. 2021, 551, 205–227. [Google Scholar] [CrossRef]
- Zhang, L.; Yan, H.; Zhu, R.; Du, P. Combinational spatial and frequency domains watermarking for 2D vector maps. Multimed. Tools Appl. 2020, 79, 31375–31387. [Google Scholar] [CrossRef]
- Cox, I.J.; Kilian, J.; Leighton, F.T.; Shamoon, T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 1997, 6, 1673–1687. [Google Scholar] [CrossRef] [PubMed]
- Xi, X.; Zhang, J.; Du, J.; Yang, Z. Desynchronization Attacks Resistant Watermarking for Remote Sensing Images Based on DWT-SVD and Normalized Feature Domain. Trans. GIS 2024, 28, 2705–2721. [Google Scholar] [CrossRef]
- Yan, H.; Zhang, L.; Yang, W. A normalization-based watermarking scheme for 2D vector map data. Earth Sci Inf. 2017, 10, 471–481. [Google Scholar] [CrossRef]
- Tang, Y.; Wang, S.; Wang, C.; Xiang, S.; Cheung, Y.-M. A highly robust reversible watermarking scheme using embedding optimization and rounded error compensation. IEEE Trans. Circuits Syst. Video Technol. 2023, 33, 1593–1609. [Google Scholar] [CrossRef]
- Wu, M.; Xi, X.; Du, J.; Zhang, X. Robust Reversible Watermarking Algorithm for Vector Maps Based on Virtual Triangle Feature Domain and Improved Quantization Index Modulation. Trans. GIS 2025, 29, e70036. [Google Scholar] [CrossRef]
- Wang, H.; Yao, H.; Qin, C.; Zhang, X. When Robust Reversible Watermarking Meets Cropping Attacks. IEEE Trans. Circuits Syst. Video Technol. 2024, 34, 13282–13296. [Google Scholar] [CrossRef]
- Hatoum, M.W.; Couchot, J.-F.; Couturier, R.; Darazi, R. Using deep learning for image watermarking attack. Signal Process. Image Commun. 2021, 90, 116019. [Google Scholar] [CrossRef]
- Pan, Z.; Xu, J.; Guo, Y.; Hu, Y.; Wang, G. Deep learning segmentation and classification for urban village using a worldview satellite image based on U-Net. Remote Sens. 2020, 12, 1574. [Google Scholar] [CrossRef]
- Berdik, D.; Otoum, S.; Schmidt, N.; Porter, D.; Jararweh, Y. A survey on blockchain for information systems management and security. Inf. Process. Manag. 2021, 58, 102397. [Google Scholar] [CrossRef]
- Jing, N.; Liu, Q.; Sugumaran, V. A blockchain-based code copyright management system. Inf. Process. Manag. 2021, 58, 102518. [Google Scholar] [CrossRef]
- Liang, W.; Zhang, D.; Lei, X.; Tang, M.; Li, K.-C.; Zomaya, A.Y. Circuit copyright blockchain: Blockchain-based homomorphic encryption for IP circuit protection. IEEE Trans. Emerg. Top. Comput. 2020, 9, 1410–1420. [Google Scholar] [CrossRef]
- Ren, N.; Wang, H.; Chen, Z.; Zhu, C.; Gu, J. A multilevel digital watermarking protocol for vector geographic data based on blockchain. J. Geovis. Spat. Anal. 2023, 7, 31. [Google Scholar] [CrossRef]
- Ren, N.; Zhao, Y.; Zhu, C.; Zhou, Q.; Xu, D. Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps. ISPRS Int. J. Geo-Inf. 2021, 10, 294. [Google Scholar] [CrossRef]
- Salman, T.; Zolanvari, M.; Erbad, A.; Jain, R.; Samaka, M. Security services using blockchains: A state of the art survey. IEEE Commun. Surv. Tutor. 2018, 21, 858–880. [Google Scholar] [CrossRef]
- Wang, B.; Jiawei, S.; Wang, W.; Zhao, P. Image copyright protection based on blockchain and zero-watermark. IEEE Trans. Netw. Sci. Eng. 2022, 9, 2188–2199. [Google Scholar] [CrossRef]
- Xu, Y.; Zhang, C.; Zeng, Q.; Wang, G.; Ren, J.; Zhang, Y. Blockchain-enabled accountability mechanism against information leakage in vertical industry services. IEEE Trans. Netw. Sci. Eng. 2020, 8, 1202–1213. [Google Scholar] [CrossRef]
- Zhu, P.; Hu, J.; Li, X.; Zhu, Q. Using blockchain technology to enhance the traceability of original achievements. IEEE Trans. Eng. Manag. 2021, 70, 1693–1707. [Google Scholar] [CrossRef]
- Kamaruddin, N.S.; Kamsin, A.; Por, L.Y.; Rahman, H. A review of text watermarking: Theory, methods, and applications. IEEE Access 2018, 6, 8011–8028. [Google Scholar] [CrossRef]
- Moulin, P. The role of information theory in watermarking and its application to image watermarking. Signal Process. 2001, 81, 1121–1139. [Google Scholar] [CrossRef]
- Tao, H.; Chongmin, L.; Zain, J.M.; Abdalla, A.N. Robust image watermarking theories and techniques: A review. J. Appl. Res. Technol. 2014, 12, 122–138. [Google Scholar] [CrossRef]
- De Vleeschouwer, C.; Delaigle, J.-F.; Macq, B. Invisibility and application functionalities in perceptual watermarking an overview. Proc. IEEE 2002, 90, 64–77. [Google Scholar] [CrossRef]
- Rashid, A. Digital watermarking applications and techniques: A brief review. Int. J. Comput. Appl. Technol. Res. 2016, 5, 147–150. [Google Scholar]
- Coatrieux, G.; Lecornu, L.; Sankur, B.; Roux, C. A review of image watermarking applications in healthcare. In Proceedings of the 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, New York, NY, USA, 30 August–3 September 2006; pp. 4691–4694. [Google Scholar]
- Tsougenis, E.D.; Papakostas, G.A.; Koulouriotis, D.E.; Tourassis, V.D. Performance evaluation of moment-based watermarking methods: A review. J. Syst. Softw. 2012, 85, 1864–1884. [Google Scholar] [CrossRef]
- Peng, F.; Lei, Y.-Z.; Long, M.; Sun, X.-M. A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput Aided Des. 2011, 43, 1018–1024. [Google Scholar] [CrossRef]
- Boenisch, F. A systematic review on model watermarking for neural networks. Front. Big Data 2021, 4, 729663. [Google Scholar] [CrossRef]
- Chou, C.-M.; Tseng, D.-C. Technologies for 3d model watermarking: A survey. Int. J. Comput. Sci. Netw. Secur. 2007, 7, 328–334. [Google Scholar]
- Chen, C. CiteSpace II: Detecting and visualizing emerging trends and transient patterns in scientific literature. J. Am. Soc. Inf. Sci. Technol. 2006, 57, 359–377. [Google Scholar] [CrossRef]
- Sun, Y.; Wu, S.; Gong, G. Trends of research on polycyclic aromatic hydrocarbons in food: A 20-year perspective from 1997 to 2017. Trends Food Sci. Technol. 2019, 83, 86–98. [Google Scholar] [CrossRef]
- Gao, J.; Li, J.; Geng, Y.; Yan, Y. Research progress of health education for adolescents based on CiteSpace analysis. Environ. Dev. Sustain. 2024, 1–40. [Google Scholar] [CrossRef]
- Li, Y.; Li, M.; Sang, P. A bibliometric review of studies on construction and demolition waste management by using CiteSpace. Energy Build. 2022, 258, 111822. [Google Scholar] [CrossRef]
- Zhang, K.; Liu, F.; Zhang, H.; Duan, Y.; Luo, J.; Sun, X.; Wang, M.; Ye, D.; Wang, M.; Zhu, Z. Trends in phytoremediation of heavy metals-contaminated soils: A web of science and CiteSpace bibliometric analysis. Chemosphere 2024, 352, 141293. [Google Scholar] [CrossRef] [PubMed]
- Zhong, D.; Li, Y.; Huang, Y.; Hong, X.; Li, J.; Jin, R. Molecular mechanisms of exercise on cancer: A bibliometrics study and visualization analysis via CiteSpace. Front. Mol. Biosci. 2022, 8, 797902. [Google Scholar] [CrossRef] [PubMed]
- Meng, Z.; Morizumi, T.; Miyata, S.; Kinoshita, H. Design scheme of copyright management system based on digital watermarking and blockchain. In Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, 23–27 July 2018; pp. 359–364. [Google Scholar]
- Lu, W.; Chen, Z.; Li, L.; Cao, X.; Wei, J.; Xiong, N.; Li, J.; Dang, J. Watermarking based on compressive sensing for digital speech detection and recovery. Sensors 2018, 18, 2390. [Google Scholar] [CrossRef]
- Tseng, K.-K.; Na, Q.; Lin, R.F.-Y. A Document Management System with Multi-biometric Watermarking for Educational Purpose. In Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kitakyushu, Japan, 16–18 December 2022; pp. 265–275. [Google Scholar]
Total Publications | Authors | Total Publications | Authors |
---|---|---|---|
108 | Chang, Chin-Chen | 27 | Li, Li |
60 | Zhang, Xinpeng | 24 | Zhang, Weiming |
48 | Singh, Amit Kumar | 23 | Zhou, Ri-Gui |
39 | Su, Qingtang | 23 | Ma, Bin |
29 | Wang, Chunpeng | 23 | Li, Jingbing |
Total Publication | Institutions | Total Publications | Institutions |
---|---|---|---|
180 | Chinese Acad Sci | 86 | Harbin Inst Technol |
153 | Feng Chia Univ | 80 | Shanghai Univ |
102 | Nanjing Univ Informat Sci & Technol | 71 | Shanghai Jiao Tong Univ |
96 | Liaoning Normal Univ | 69 | Sun Yat Sen Univ |
87 | Hunan Univ | 67 | Nanyang Technol Univ |
Total Publications | Countries/Regions | Total Publications | Countries/Regions |
---|---|---|---|
3195 | PEOPLES R CHINA | 294 | JAPAN |
1186 | INDIA | 277 | SAUDI ARABIA |
922 | TAIWAN | 266 | IRAN |
857 | USA | 265 | FRANCE |
452 | SOUTH KOREA | 246 | ENGLAND |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Weng, M.; Qu, W.; Ma, E.; Wu, M.; Dong, Y.; Xi, X. Bibliometric Analysis of Digital Watermarking Based on CiteSpace. Symmetry 2025, 17, 871. https://doi.org/10.3390/sym17060871
Weng M, Qu W, Ma E, Wu M, Dong Y, Xi X. Bibliometric Analysis of Digital Watermarking Based on CiteSpace. Symmetry. 2025; 17(6):871. https://doi.org/10.3390/sym17060871
Chicago/Turabian StyleWeng, Maofeng, Wei Qu, Eryong Ma, Mingkang Wu, Yuxin Dong, and Xu Xi. 2025. "Bibliometric Analysis of Digital Watermarking Based on CiteSpace" Symmetry 17, no. 6: 871. https://doi.org/10.3390/sym17060871
APA StyleWeng, M., Qu, W., Ma, E., Wu, M., Dong, Y., & Xi, X. (2025). Bibliometric Analysis of Digital Watermarking Based on CiteSpace. Symmetry, 17(6), 871. https://doi.org/10.3390/sym17060871