Comprehensive review of watermarking techniques in deep-learning environments

Abstract. Recently, the demand for the generation, sharing, and storage of massive amounts of multimedia information—especially in the form of images—from different intelligent devices and sensors has increased drastically. This introduces issues including the illegal access and fraudulent usage of this information as well as other security concerns. Watermarking consists of embedding a watermark design in a digital cover and then later extracting it to provide a solution for ownership conflict and copyright violation issues involving the media data. Presently, in watermarking, the use of deep-learning approaches is incredibly beneficial due to their accuracy, superior results and strong learning ability. We present a comprehensive review of watermarking techniques in deep-learning environments. We start with basic concepts of traditional and learning-based digital watermarking; we later review the popular deep-learning model-based digital watermarking methods; then, we summarize and compare the most recent contribution in the literature; finally, we highlight obfuscation challenges and further research directions.


Introduction
In recent years, deep learning has made unprecedented progress in a wide range of image processing tasks, such as classification, segmentation, super-resolution, deblurring, and denoising. 1 It learns the data representation hierarchically from raw images by sidestepping manual feature engineering. Today, digital images are increasingly used in various applications, including healthcare, communications, forensics, education, research and development departments, etc. However, many images involve individuals' sensitive information and even organizational confidentiality; therefore, they should not be visited or viewed by unauthorized persons. Researchers have developed the watermarking scheme to deal with the security and copyright violation issues of digital data. This technique enables us to send and receive personal data from the sender to the receiver via smart devices and unsecured open channels without noticeable distortion of the host data. 2 A few well-known applications 3 of watermarking are shown in Fig. 1.
Apart from the applications mentioned here, watermarking techniques are used for a portion (as a percentage) of special applications, as shown in Fig. 2.
The primary objective of the watermarking technique is to enhance three requirements: 3 imperceptibility, capacity, and robustness. While performing watermarking, the original signal should not be visibly distorted after concealing the hidden data. 1,4 Techniques for watermarking are believed to work with other media and in additional applications; a watermarking trade-off triangle, which is shown in Fig. 3, details the requirements that any watermarking technique must meet.
The capacity requirement is identifiable by how much information (in number of bits) is conveyed by the host mark. This is contrary to the other two requirements: (i) imperceptibility, which refers to the visual quality of the watermark, and (ii) robustness, which is the capability of preserving the mark even when the carrier media experiences certain distortions.
The classical watermarking technique embeds a secret key or authentication code into the image before sending it through a public channel. Verifying the embedded private key or authentication code proves the image's authenticity. The general architecture of the watermarking technique is shown in Fig. 4. It primarily contains two processes: embedding and extraction. 5 In the embedding process, the secret watermark, cover media, and secret key are given as input to the embedding algorithm, which generates the watermarked by hiding the watermark in the cover media. The embedding algorithm uses either spatial or transform domain techniques. Encryption, encoding, and hashing [6][7][8] can also be used to improve the security of the watermarking scheme. Generally, the extraction process is the inverse of the embedding process. Let M be  the cover media, W be the watermark, S be the secret key, and Embed () be the embedding function. The watermarked media M 0 is mathematically obtained by Eq. (1). The three approaches-image-based, linguistic-based, and structure-based-can be used to embed the watermark. 9 E Q -T A R G E T ; t e m p : i n t r a l i n k -; e 0 0 1 ; 1 1 6 ; 2 5 2 EmbedðM; WÞ ¼ M 0 : (1) When transferred over a public, unprotected network, watermarked media M 0 is vulnerable to distortion or manipulation. Hence, the media could be attacked intentionally (attacker) or unintentionally (noise) during transmission. To provide copyright protection, even after an attack such as alteration, redistribution, JPEG compression, etc., the embedded watermark must be detectable, and the confidential information should be viable for extraction. Let Extract () be the extraction function and M 00 be the received watermarked media; then the watermarked media W 0 is mathematically obtained by Eq. (2) as E Q -T A R G E T ; t e m p : i n t r a l i n k -; e 0 0 2 ; 1 1 6 ; 1 3 6 ExtractðM 00 Þ ¼ W 0 : In addition to the classical watermarking schemes, deep-learning-based methods have been widely studied in recent years, achieving an outstanding performance compared with classical methods. 1,10,11 The key advantages to consider when selecting deep learning for watermarking  are 1,12 (a) watermark generation for robust watermarking, (b) finding the ideal embedding position in the cover media, (c) identifying the best embedding strength that efficiently offers a balanced trade-off between quality and robustness, (d) offering attack simulation for efficient watermark extraction, and (e) reducing errors and denoising for obtained watermarks. However, the deep-learning model also faces the challenges of model security and privacy. 13 Presently, in deep learning, watermarking approaches are incredibly beneficial for the issues of copyright violation and ownership conflicts of deep-learning models and devices. 1 Here, watermarking techniques embed useful information into deep-learning models and devices and play an essential role in ownership verification.
In the last few years, various papers containing the survey on digital media protection, devices, and artificial model protection using watermarking techniques have been published. 1,10,14,15 In Ref. 1, the authors summarized the roles and usage of deep-learning models in the different phases of the watermarking techniques. In Ref. 10, the authors discussed different watermarking methods in the artificial intelligence domain. A detailed study on the protection of deep-learning models using watermarking is summarized in Ref. 14. Authors in Ref. 15 provide surveys on intellectual property protection using deep learning. In contrast, the primary goal of our work is to provide a thorough analysis of the key aspects of deep-learning models widely used in watermarking for ownership, copyright protection and model protection. Compared with the cited articles, we provide a more thorough discussion on the usage and role of some well-known deep-learning models for watermarking. Table 1 compares the recent existing surveys in the article, including ours, based on parameters that include the deep-learning model-based study, role and usage of deep-learning models, the study of popular models for the data hiding, and the comparison of different state-of-the-art techniques for watermarking in tabular form, pie chart descriptions, and other perspectives.
This article provides a thorough analysis of watermarking methods based on well-known deep-learning models. The article's contributions are as follows: 1. First, we discuss the basic concepts of classical watermarking, recent applications, requirements, and how deep-learning techniques helps in watermarking. 2. Then, we discuss the advantages and roles of using deep learning in watermarking. 3. Next, we review the most popular deep-learning models for digital watermarking techniques and their detailed usage and merits. 4. Finally, we summarize and compare the most recent contribution in the literature, and we highlight the significant challenges with using deep-learning models for watermarking, followed by further research directions.
The organization of this paper is shown in Fig. 5. Section 2 details the deep-learning-based watermarking and their role and usage as well as different popular deep-learning models. Section 3 reviews the most recent works in the deep-learning-based watermarking domain based on the popular model used in the deep-learning field. In Sec. 4, based on the survey, we mention some of the identified issues with deep-learning-based watermarking. Finally, in Sec. 5, we conclude the paper.   watermarking has grown significantly. These networks have been used for many purposes, such as watermark generation, identification of the embedding location, determining an appropriate embedding strength, and watermark embedding and extraction. The role and usage of deep learning are shown in Fig. 7. Deep-learning models are used for the early stages of watermark generation, pre-processing, and watermark embedding. At later stages, it can be used for watermark extraction and attack simulation. Recently, deep-learning models, such as CNN, GAN, and DNN have been widely used in the field of watermarking. In this section, we discuss these deep-learning models in detail and review recent papers based on them.

CNN-based Watermarking
CNN is a deep-learning network that has convolution characteristics. It generally contains five layers: the input layer, the convolution + rectified linear unit (ReLU) layer, the pooling layer, the fully connected layer, and the output layer. CNN is inspired by the visual cortex of the human brain. A neuron is only activated in a receptive field in response to a stimulus. The CNN model takes an input (image) as a vector, and later, the convolution operation is applied to extract the essential features (kernels or filters are used for this). The ReLU activation function is used to make the negative values zero, and later, pooling is applied to reduce the number of parameters. The reduced pooled information is passed to the fully connected network by flattening the input for classification purposes. The CNN model is widely used in image watermarking and data hiding due to its lesser complexity. Though it has many applications, CNN is used primarily in watermarking for embedding the watermark, extracting the watermark, increasing the visual quality of the cover image, and identifying the best embedding location for the watermark. Ingaleshwar and Dharwadkar 18 proposed an optimization-based watermarking technique using deep CNN to embed the watermark image into the cover image. Decomposition on the cover image was performed into the different grids to obtain the related features of gridlines. The interesting region was computed using the deep CNN, which was trained using the optimization techniques. Fitness measures are used for embedding the watermark, and for that, wavelet sub-bands are selected. For recovering the watermark, cover media and fitness function are required. Compared with the methods presented in Refs. 19-23, the suggested method performs better in peak signal-to-noise ratio (PSNR). Even though the technique is robust, there has been no detailed investigation of overall embedding and recovery costs. Also, further study is needed on the robustness of the approach by performing more attacks at varying noise levels. A blind image watermarking scheme was suggested by Bagheri et al. 19 in which Mask R-CNN was used to compute the embedding strength. The watermark was embedded in the cover by computing the block into the selected discrete cosine transform (DCT) and discrete wavelet transform (DWT) blocks using lower region-of-interest pixels. Even though the watermark is extracted well, the method provides limited embedding capacity and watermark security. A wavelet-based watermarking for digital media was developed by Zheng et al. 24 to investigate the imperceptibility and robustness of the watermark. Initially, the cover media was transformed into different bands using DWT, and then the watermark data singular value was inserted into the high bands of the cover media. Then, the transformation was applied to the low bands by wavelet transformation, in which the watermark sequence was embedded into the selected low bands. The singular vector of the watermark and scrambled sequence were used to obtain the singular and watermark sequence, respectively. Later, using the CNN established the connection between the watermark, cover media, and watermarked media for robust extraction of the watermark. Due to their low embedding cost for different types of watermarks, they extend the suitability for various practical applications. In Ref. 25, a CNN based watermarking technique was developed to embed the scrambled watermark into the DWT cover image. The technique uses a fast regionbased CNN model to achieve robust and blind extraction of the embedded watermark. Compared with conventional techniques, [26][27][28][29] this method provided better classification accuracy with strong invisibility and lower execution time. However, proper investigation is needed into the robustness of performance against different image processing attacks. Plata and Syga 30 proposed a watermarking technique based on CNN to embed the spatial watermark data into the cover image. A loss function was designed by the authors for the neural network training to improve the robustness and other watermarking trade-offs. Compared with other existing work, 31-33 the scheme provides higher robustness with minimal distortion. The schemes need to be evaluated for different image processing attacks.
A deep CNN network-based blind watermarking technique for copyright protection was proposed by Mun et al. 34 In this technique, first the carrier and watermark media are divided into non-overlapping blocks. Later, the secret is computed using watermark data corresponding to the positions of the block. Subsequently, the watermark is embedded into the carrier using the deep-CNN model, and finally, the model is used to extract the watermark from the cover. The scheme is robust to different salt and pepper noise attacks with good imperceptibility. However, the cost of the method is relatively high. The encryption-compression-based watermarking technique was proposed in Ref. 35. The method uses transform domain watermarking using the lifting wavelet transform (LWT), randomized singular value decomposition (RSVD) and Heisenberg decomposition (HD). Further, a CNN-based denoising network was used to improve the extracted watermark. This technique outperformed the existing methods proposed in Refs. 36-39 with an improvement of 27.84% examined on different attacks.
A transform domain watermarking method was proposed by Hsu and Hu 40 based on quaternion discrete cosine transform (QDCT). The tradeoff between robustness and imperceptibility of the watermarked image was balanced by the grey wolf optimizer. The blind watermark extraction was used, and the denoising CNN model was used to improve the visual quality of the watermark. Based on the experimental evaluation, the watermarking technique performed better than the traditional techniques presented in Refs. 41-44. Another transform domain-based watermarking scheme was proposed by Kandi et al. 45 in using the CNN network to improve the tradeoffs of the watermark. The technique uses the auto-encoder learning capability of a CNN to improve its robustness. It uses the input-output information for embedding using the CNN weights, which are highly prone to attacks. To protect the ownership of the deep CNN network, a watermark-based scheme was proposed by Nagai et al., 46 which uses the concepts of the technique proposed in Ref. 47. In their technique, the secret is inserted into the different groups of the convolution layer of the original network. The technique is adequate, but the technique is limited to dealing with attacks such as surrogate model attacks and watermark overwriting. Another technique for protection of the ownership of a CNN network was proposed by Guan et al. 48 using the watermarking techniques. The technique uses the model compression's pruning theory to embed the hash using the secure hash algorithm (SHA-256) as watermark data into the convolution layer of the residual neural network (ResNet) 152 network. However, the technique limits the usability of the real-time applications due to their high computational costs.
Some of the recent works using the CNN model are mentioned below are also given in Table 3.
The challenges of CNN models for watermarking systems are as follows: 1. Operations such as max-pool make the CNN models significantly slower. 2. Sometimes the training process takes more time due to the misconfiguration of the network parameters. 3. A CNN model requires a larger dataset for training and processing. 4. Due to its complex nature, sometimes a CNN network runs into problems, such as overfitting or underfitting.

Generative Adversarial Network-based Watermarking
This is a deep-learning-based model with generative properties. It has two networks: the generator network and the discriminator network. The GAN network is widely used in watermarking for watermark verification and generation due to its generative and discriminative ability. GAN is also used to enhance network security by generating a unique watermark for every input. The generator network G takes random noise input Z from distribution PðZÞ and generates sample S. The goal is to replicate a particular type of distribution PðXÞ. Later, the discriminator network D discriminates between the generated (fake) samples and the actual sample. During training, the discriminator penalizes itself for misclassifying a real instance as fake or a fake instance as real. The combined generator and discriminator loss function (L) used by the GAN model is obtained by Eq.   Wu et al. 49 proposed a deep-learning model to verify the corrupted images caused by dense watermarks. The model consists of a generator and a discriminator for improving the recovered images' quality and verification performance. The generator is an autoencoder that maps densely watermarked, corrupted images to a representation vector and decodes the vector to an red-greenblue (RGB) image. The discriminator controls the contents of the generated images and minimizes the feature loss. The ResNet-46 model is used to extract the recovered images feature and ground truth images. It achieves a verification accuracy of 96.36% at the false positive rate (FPR) of 1%. In Ref. 50, the authors proposed a robust data hiding scheme using the GAN for securing genuine documents. At first, using the geometric correction, the document is adjusted to the required form. After that, the document is generated by the adversarial network, and its security is enhanced by embedding the secret information into the document using the pseudo-random number to generate a watermarked document. The technique is robust and performs better than the work mentioned in Refs. 51-53. A robust watermarking system based on variational autoencoder networks is provided by Wei et al. 54 for copyright protection. Encoder, decoder and detector subnetworks make up the embedder and extractor network. A 1-bit watermark image is embedded in the host image during training, and the encoder and decoder subnetworks build a robust representation model of the cover image. The detector subnetwork acquires the ability to extract the 1-bit mark from the watermarked image. The approach improves the visual quality of the marked image, but further research is needed to determine the robustness of watermarked images. A blind watermarking scheme based on deep learning is proposed in Ref. 55. The technique consists of four components: an encoder, a decoder, two identical noise layers, and an adversarial discriminator. The two identical layers were used to embed and extract the watermark encoder and decoder, respectively, and to make the watermark robust against different attacks. Further, an adversarial discriminator was used to improve the robustness and concealment of the watermark. The technique is robust against various attacks with good imperceptibility. However, the model complexity is very high. To prevent malicious attacks during transmission or from illegal use of diffusionweighted imaging (DWI) images, a multiscale robust watermarking technique was proposed by Fan et al. 56 The suggested technique includes multiscale characteristics and a generative adversarial. By integrating full-scale features, the DWI images are first rebuilt to mimic the original DWI images. Watermark is embedded into the multiscale reconstructed features. To enhance the visual quality of the reconstructed picture, an optimized boundary equilibrium generative adversarial network| discriminator is suggested. Finally, to learn the watermark distribution feature, pyramid filters and multiscale max-pooling are used. Fang et al. 57 introduced a unique triple-phase watermarking scheme to prevent image distortion in practice. A noise-free initial phase, a mask-guided frequency augmentation phase, and an adversarial-training phase comprise the approach. In the first phase, an encoder-decoder was trained end-to-end using a just-noticeable difference (JND) mask image loss. The encoded characteristics are then subjected to a mask-guided frequency augmentation method in the second step. Later in the final phase, it intends to train a decoder for dealing with non-differentiable distortion through adversarial training. The approach is more robust than the studies reported in Refs. 58-61. In Ref. 62, the authors proposed a semi-fragile watermarking scheme based on deep learning for media authentication. The technique consists of three modules: an encoder network, a decoder network, and an adversarial discriminator network. The encoder network encodes the input images and produces the watermarked images. After that, the marked image goes through two image transformation functions: one from a benign transformation set and the other from a malicious transformation set to produce a benign and malicious watermarked image, respectively. Later, the benign and malicious watermarked images are fed to the decoder network using an adversarial network that discriminates between the benign and malicious images. The technique is robust and provides tamper detection, but the technique needs to be investigated for additional types of image processing attacks.
Some works based on the GAN model are mentioned below and are summarized in Table 4. The challenges of the GAN model for watermarking systems include the following: 1. The irregularity between the generator and discriminator network seeds the problem of overfitting. 2. The network never converges due to the network parameters' oscillation and destabilization.

DNN-based Watermarking
The DNN is the most commonly-used network; in it, multiple hidden layers are present between two layers: the input layer and the output layer. DNNs model resembles the human brain; to be specific, a DNN takes the raw format input (image or audio) x ∈ R n and maps it to the output layer using the parametric function p ¼ F θ ðxÞ, where p ∈ ½1; n, which is based on the network architecture and combined parameters of all of the layers in the network. When training the DNN, the goal is to minimize the loss between the predicted and ground truth labels and optimize the network parameters θ. The back propagation algorithm is the widely used approach for training a DNN; in it, the loss gradient of the output layer is back propagated to update the network parameters. Training and adjusting the parameters of the DNN allows the network to learn, encode, and decode the watermark for embedding, extracting the watermark, and network protection. DNNs are widely-used in the field of watermarking for embedding and extracting the watermark.
Hou et al. 63 proposed a watermarking technique based on the enhanced version of multiple histogram modification. The method follows a particular criterion to embed a watermark into multiple histograms. Initially, the cover image decomposes into two different sets of pixels. Later, using the DNN, multiple histograms are produced by the classification method. For embedding the watermark data, the produced histograms' optimal bins are selected from each. However, the visual quality between the cover and watermarked image is excellent. Compared with the existing technique, 64-66 the technique achieves a higher PSNR, but it is necessary to assess the technique's robustness against various attacks. Further, the overall embedding cost needs to be computed. For copyright protection and ownership confirmation of DNN models, Zhang et al. presented a watermarking technique in Ref. 67. The Uchida et al. 46 method has several drawbacks; however, an upgraded threat model is employed to enable the black-box mode verification and application programming interface (API) access. The method shows good accuracy at the cost of small overhead. However, the authors do not conduct a transparent investigation of the overhead and security of the model. Another method is presented by Wu et al. 68 for deep model copyright protection and ownership verification using the watermarking technique. In this method, the output image from the deep-learning model is used to obtain the watermarked image. The embedded watermark can only be extracted by the extraction network for verification. The method's usefulness for real-time applications is constrained by the fact that it is only evaluated for three different types of attacks and there is no transparent study of the computational time of the method. To preserve intellectual property rights and to protect the ownership of the DNN, Deeba et al. 69 proposed a watermarking technique. This technique generates and embeds the watermark data into the neural network. The ownership verification is done by a specific type of input-output pair. The technique performs better, but the performance is judged based on only two attacks, and the authors do not conduct a transparent investigation of the execution time of the technique. In Ref. 70, the authors proposed a watermarking technique based on a DNN for the ownership verification of the multimedia document. The cover image is divided into 8 × 8 pixels to embed the binary watermark of 1-bit f−1; 1g. After that, at the μ'th block, the watermark image is embedded in the DCT coefficient. In the same procedure, the inverse function is applied for extraction. The technique produces a similar original and watermarked image with acceptable PSNR.
Some works based on the DNN model are mentioned below and are summarized in Table 5. The challenges of DNN models for watermarking are as follows: 1. They require lots of training data. 2. They are expensive to train due to the requirements of special processing hardware. 3. They need detailed knowledge about deep learning to train and tune the network parameters. 4. They involve the complexity of the hidden layers, creating black box types of situations.

Others Perspectives
In addition to the above-mentioned work, some other deep-learning models such as RNNs, backpropagation neural networks (BPNN), and artificial neural networks (ANN) are also used for watermarking techniques. Some of these works are mentioned below and are summarized in Table 6. For the ownership verification and copyright protection of digital color images, Sinhal et al. 71 proposed a low-cost, blind watermarking scheme. The image is first converted into a YCbCr model using a selection of 4 × 4 blocks of Y-component randomization. Later, using a low-cost ANN model to implant a binary watermark, the chosen component is dissected using integer wavelet transformation. In the LWT domain, Islam et al. 72 suggested a reliable watermarking method utilizing an ANN. The watermark is embedded using the LWT cover image's randomized coefficient, and it is extracted using an ANN model. The selected sub-band coefficient is first randomized using a key after the cover picture is modified using the LWT. Later, using a different key, the randomized coefficient is used to obtain the randomized blocks. The chosen sub-randomized band's block is then used to incorporate the watermark. ANN is utilized for watermark extraction. Overall, the approach is reliable and blind, but the embedding and extraction costs were not transparently investigated in the study, and the watermark's capacity is insufficient for practical use. The edge detection-based watermarking approach was suggested by Kazemi et al., 73 and it involves embedding private information in the edge of the color picture. An edge detector is utilized to identify the edge of the color RGB cover media, and the resulting media is subjected to a contourlet transform to calculate the directional components. Using a genetic technique, the logo image is first scrambled to provide better verification before being embedded into the cover image. The hidden watermark is extracted via a combination of differential evolution and multilayer perceptron. The approach, however, exhibits weak resilience to the few attacks. A deep-learning-based watermarking scheme was proposed by Singh et al. 74 in which multiple watermarks are embedded into the DWT-DCT domain single value of the cover image. The three-level DWT is used to first break down the cover image. The low-frequency band (LL3) and low-high bands (LH2) are taken into consideration for embedding the watermark and encoded text data into the cover picture, respectively. Later, selective encryption is used to encrypt the watermarked picture to save cost. Finally, to reduce the distortion effect applied to the extracted watermark image, a BPNN is used. The technique ensures the confidentiality of the data and shows stronger robustness against different attacks compared with Refs. 77-82. However, a transparent investigation of security and cost is required. A data-hiding method utilizing the long short-term memory-based recurrent neural network (LSTM-RNN) was proposed by Singh et al. 75 A particular criterion is used to acquire the electrocardiogram signal (TP) section of the ECG signal, which is then used to encrypt watermark data. The distortion between the original and forecasted signals is reduced using LSTM-RNN. The suggested method outperforms the conventional methods indicated in Refs. 83-92. However, the watermark's capacity is constrained, which limits the method's applicability for real-life use. A blind DCT-SVD-based watermarking technique was proposed by Wang et al. 76 Initially using the median filter, the cover image is enhanced to improve the robustness of the watermark. Later, without altering the cover picture, RCNN is used to map the association between the watermark and cover images. The technique provides better robustness and stability than the works presented in Refs. 93-98.

Challenges and Open Research Directions
Due to the strong learning ability with accurate and superior results provided by deep-learning approaches, deep-learning models are exceptionally beneficial. However, the security and privacy of deep-learning models and media data remain challenging tasks. Current studies still try to mitigate security and privacy challenges. A summary of the most recent challenges in deeplearning-based watermarking is shown in Fig. 8. The major issues with deep-learning-based watermarking are as follows: 1. There is always a need to maintain a trade-off between embedding capacity, imperceptibility, and robustness that remains challenging for most watermarking systems. 2. Most schemes did not significantly provide the solution for data security and complexity issues and a deep-learning model security. 3. Studies have shown that transform domain-based watermarking methods are more robust than spatial domain-based watermarking approaches. So, there is a need to overcome the constraints of a single type of domain method for deep-learning-based watermarking. 4. Watermark security can be improved by combining encryption with watermarking. But the complexity grows as a result. 5. To minimize the model training complexity, pre-trained models are widely used, which leads to the problems of model overwriting and surrogate model attacks. 6. Watermarking robustness highly depends upon the number of samples used during training and the loss function used. 7. Most deep-learning-based watermarking has poor embedding capacity. 8. Watermarking schemes should be robust against network pruning and a moderate amount of fine-tuning. 9. Further investigations and proposals are required to maintain the complete security of digital media, which remains an open challenge.

Conclusion
Deep learning has had impressive development in the field of image processing, and more recently, it has also been developing in the field of data concealment to give a reliable watermarking approach with effective performance. This paper provides a comprehensive survey based on the popular deep-learning model used for the watermarking schemes. Starting with the classical watermarking approach, we outlined a few of the identified limitations of the classical approach and how deep-learning techniques can be used to overcome these. Further, we mentioned the requirements that need to be considered in developing a deep-learning-based watermarking. We thoroughly covered the roles and uses of the deep-learning-based model for watermarking, as well as the article's objective, goals, strategies, model function, embedding location, results, limits, and applications, as well as recent problems. Additionally, we outlined some of the issues with deep-learning-based techniques. We hope this survey gives insight into using the deep-learning model for watermarking techniques and provides a valuable information source for potential researchers.