Open Access Open Access  Restricted Access Subscription or Fee Access

Image Processing Invisibility Cloak: A Review

Archika Jain, Ravi Agarwal, Priyanshu Mathur, Megha Sharma, Tanishka Singh


We have seen invisible people in stories, but in the world, it is still not proven that invisibility exists. This review explains the invisibility of anything with the help of various technologies. On many commonplace commercial objects, you can find difficult patterns and backdrops. Such textual data may be presented in a variety of scales, fonts, colours, and orientations. The very basic operations are performed to process the frames, which include obtaining a live video feed, loading the frames one at a time, identifying different red colour shapes inside the live feed frames, and segmenting them using previously saved images. In this, anything which is required to be made invisible is covered or highlighted with material. With the help of projector, the background image on the object is used to make it transparent.

Full Text:



Bibek Ranjan Ghosh, Siddhartha Banerjee, Jyotsna Kumar Mandal. Watermark based Image Authentication using Integer Wavelet Transform. 2022 International Conference on Inventive Computation Technologies (ICICT). 2022; 312–319.

Jaime Sarabia-Lopez, Diana Nuñez-Ramirez, David Mata-Mendoza, Eduardo Fragoso-Navarro, Manuel Cedillo-Hernandez, Mariko Nakano-Miyatake. Visible-Imperceptible Image Watermarking based on Reversible Data Hiding with Contrast Enhancement. 2020 International Conference on Mechatronics, Electronics and Automotive Engineering (ICMEAE). 2020; 29–34.

Kumari Suniti Singh, Pushpanjali Singh, Harsh Vikram Singh. Security of E-healthcare data using DWT-SVD based Hybrid watermarking. 2022 10th IEEE International Conference on Emerging Trends in Engineering & Technology Signal and Information Processing (ICETET-SIP-22). 2022; 1–6.

Md. Sohel Rana, Md. Shoaib Akther, Md. Mahbubur Rahman. Securing Multimedia Content Using Watermark and Digital Signature. 6th International Conference on Communication and Electronics Systems (ICCES-2021). 2021; 957–962.

Jun Jia, Zhongpai Gao, Menghan Hu, Xiongkuo Min, Guangtao Zhai, Xiaokang Yang. Robust Invisible Hyperlinks in Offline and Online Photographs. IEEE Trans Cybern. 2022 Jul; 52(7): 7094–7106.

Panpan Niu, Xin Shen, Tongtong Wei, Hongying Yang, Xiangyang Wang. Blind Image Watermark Decoder in UDTCWT Domain Using Weibull Mixtures-Based Vector HMT. IEEE Access. 2020; 8: 46624–46641.

Alireza Ghaemi, Habibollah Danyali. CRT-Based Robust Data Hiding Method by Extracting Features in DCT Domain. 16th International ISC Conference on Information Security and Cryptology (ISCISC 2019). 2019; 134–138.

Kavitha RS, Eranna U, Giriprasad MN. DCT-DWT Based Digital Watermarking and Extraction using Neural Networks. 2020 International Conference on Artificial Intelligence and Signal Processing (AISP). 2020; 1–5.

Nicolae Luca Iacobici, Mihaela Frigura-Iliasa, Hannelore Elfride Filipescu, Madlena Nen, Flaviu Mihai Frigura-Iliasa, Mirela Iorga. Digital Imaging Processing and Reconstruction for General Applications. SAMI 2020 IEEE 18th World Symposium on Applied Machine Intelligence and Informatics. 2020; 231–234.

Xiaoqiang Zhu, Luning Hong, Yiyu Zhou, Dan Zeng. Digital Watermarking on Package Printing for Handheld Devices. 2022 2nd International Conference on Consumer Electronics and Computer Engineering (ICCECE). 2022; 104–107.

Xingjun Wang, Yizhao Wang. Print-Cam Robust Image Watermarking Based on Hybrid Domain. 2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP). 2022; 1911–1915.

Li M, Yuan X, Chen H, Li J. Quaternion discrete Fourier transform-based color image watermarking method using quaternion QR decomposition. IEEE Access. 2020 Apr 14; 8: 72308–15.

Abhilasha Singh, Vishal Choudhary, Malay Kishore Dutta. Reversible Watermarking scheme for Validation in Biometric Images. 2019 4th International Conference on Information Systems and Computer Networks (ISCON). 2019.

Li Jiang, Xin Wang. A Tampering Detection Algorithm Based on Multidirectional Authentication.

4th International Conference on Advances in Computer Technology, Information Science and

Communications (CTISC). 2022; 1–5.

Yongchang Chen, Weiyu Yu, Guoming Chen, Qiang Chen, Qian Zhang, Haibo Shen. A Novel SVD-based Zero-Watermarking Scheme for Copyright protection. 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS). 2019; 726–731.

Vasireddy Srikanth, Pillem Ramesh. Invisibility System Using Image Processing and Optical Camouflage Technology. Int J Eng Trends Technol (IJETT). 2013 May; 4(5): 1874–1877.

Zhang L, Li XY, Liu K, Liu C, Ding X, Liu Y. Cloak of invisibility: Privacy-friendly photo capturing and sharing system. IEEE Trans Mob Comput. 2018 Oct 30; 18(11): 2488–501.

Jeebananda Panda, Ashish Sinha. A Secure Wavelet based Watermarking Approach using Psycho-Visual Redundancy in Image. 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS). 2021; 114–119.

Saood Zia S, Dur-e-Shawar Agha, Tauseef Mubeen, Muhammad Naseem, Farheen Qazi, Mustafa Ali Mir. Invisibility Cloak using Color Extraction and Image Segmentation with OpenCV. 2022 Global Conference on Wireless and Optical Technologies (GCWOT). 2022; 1–6.

Xiaojuan Shi, Chao Li, Caiyin Wang, Yue Qiao, Ying Yu. A robust digital watermarking method for textile image. 2021 IEEE 6th International Conference on Intelligent Computing and Signal Processing (ICSP 2021). 2021; 627–630.


  • There are currently no refbacks.