Call for Paper - March 2022 Edition
IJCA solicits original research papers for the March 2022 Edition. Last date of manuscript submission is February 22, 2022. Read More

SVD based Image Watermarking Scheme

Evolutionary Computation for Optimization Techniques
© 2010 by IJCA Journal
Number 1 - Article 4
Year of Publication: 2010
Deepa Mathew K

Deepa Mathew K. SVD based Image Watermarking Scheme. IJCA Special Issue on Evolutionary Computation (1):21–24, 2010. Full text available. BibTeX

	author = {Deepa Mathew K},
	title = {SVD based Image Watermarking Scheme},
	journal = {IJCA Special Issue on Evolutionary Computation},
	year = {2010},
	number = {1},
	pages = {21--24},
	note = {Full text available}


To embed watermark is a way to increase the robustness of the image. In this paper the singular value decomposition (SVD) based image watermarking scheme is proposed. The output result of SVD is more secure and robust. In the proposed scheme D and U components are used for embedding watermark. Unlike other transforms which uses fixed orthogonal bases, SVD uses non fixed orthogonal bases. The result of SVD gives good accuracy, good robustness and good imperceptibility in resolving rightful ownership of watermarked image. With the increased use of SVD watermarking scheme, the watermarking technology in the transform domain has been greatly developed.


  • Liang-Hua Chen, Jyh-Jiun Lin, 2003. “Mean Quantization Based Image Watermarking”, Proceedings Of The Image Vision And Computing 21, pp 717-727
  • R.B. Wolfgang, E.J. Delp, 1996. “A Watermark For Digital Images”, Proceedings Of The International Conference On Image Processing 3
  • N. Nikolaidis, I. Pitas, 1998. “Robust Image Watermarking In The Spatial Domain”, Signal Processing 66 (3) pp 385–403.
  • P.W. Wong, N. Memon, 2001. “Secret And Public Key Image Watermarking Schemes For Image Authentication And Ownership Verification”, IEEE Trans. Image Process. 10 (10) pp 1593–1601.
  • T.H. Chen, D.S. Tsai, 2006. “Owner–Customer Right Protection Mechanism Using A Watermarking Scheme And A Watermarking Protocol”, Pattern Recogn. 39 (8) pp 1530–1541.
  • C.Y. Lin, S.F. Chang, 2001. “A Robust Image Authentication Method Distinguishing JPEG Compression From Malicious Manipulation”, IEEE Trans. Circuits Systems Video Technol. 11 (2) 153–168.
  • C.T. Hsu, J.L. Wu, 1999. “Hidden Digital Watermarks In Images”, IEEE Trans. Image Process. 8 (1) pp 58–68.
  • M. Barni, F. Bartolini, V. Cappellini, .A. Piva, 1997.” A DCT-Domain System For Robust Image Watermarking”, Signal Process. 66 pp357–372.
  • Athanasios Nikolaidis and Ioannis Pitas, 2003.” Asymptotically Optimal Detection For Additive Watermarking In The DCT And DWT Domains”, IEEE Transactions On Image Processing, Vol. 12, No. 5
  • Ben Wang, Jinkou Ding, Qiaoyan Wen, Xin Liao, Cuixiang Liu, 2009. “An Image Watermarking Algorithm Based On DWT DCT And SVD”, Proceedings of IC-NIDC
  • Feng Liu, Yangguang Liu, 2008. “A Watermarking Algorithm for Digital Image Based on DCT and SVD”. Congress on Image and Signal Processing
  • LIU Rui-zhen, Tan Tie-niu.2001. “SVD Based Digital Watermarking Method”. Acta Electronica Sinica, Vol.29, No.2.
  • H.C. Andrews and C.L. Patterson,1976. “Singular Value Decomposition (SVD) Image Coding”,IEEE Trans. On Communications, Nol. COM-24, No. 4, pp. 425– 432
  • R.Z. Liu and T.N. Tan,2002. “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”, IEEE Trans. On Multimedia, Vol. 4, No. 1, pp. 121–128.