CFP last date
22 April 2024
Reseach Article

SVD based Image Watermarking Scheme

Published on None 2010 by Deepa Mathew K
Evolutionary Computation for Optimization Techniques
Foundation of Computer Science USA
ECOT - Number 1
None 2010
Authors: Deepa Mathew K
67cee129-0f01-4713-b287-c1c2929e114a

Deepa Mathew K . SVD based Image Watermarking Scheme. Evolutionary Computation for Optimization Techniques. ECOT, 1 (None 2010), 21-24.

@article{
author = { Deepa Mathew K },
title = { SVD based Image Watermarking Scheme },
journal = { Evolutionary Computation for Optimization Techniques },
issue_date = { None 2010 },
volume = { ECOT },
number = { 1 },
month = { None },
year = { 2010 },
issn = 0975-8887,
pages = { 21-24 },
numpages = 4,
url = { /specialissues/ecot/number1/1531-134/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Evolutionary Computation for Optimization Techniques
%A Deepa Mathew K
%T SVD based Image Watermarking Scheme
%J Evolutionary Computation for Optimization Techniques
%@ 0975-8887
%V ECOT
%N 1
%P 21-24
%D 2010
%I International Journal of Computer Applications
Abstract

To embed watermark is a way to increase the robustness of the image. In this paper the singular value decomposition (SVD) based image watermarking scheme is proposed. The output result of SVD is more secure and robust. In the proposed scheme D and U components are used for embedding watermark. Unlike other transforms which uses fixed orthogonal bases, SVD uses non fixed orthogonal bases. The result of SVD gives good accuracy, good robustness and good imperceptibility in resolving rightful ownership of watermarked image. With the increased use of SVD watermarking scheme, the watermarking technology in the transform domain has been greatly developed.

References
  1. Liang-Hua Chen, Jyh-Jiun Lin, 2003. “Mean Quantization Based Image Watermarking”, Proceedings Of The Image Vision And Computing 21, pp 717-727
  2. R.B. Wolfgang, E.J. Delp, 1996. “A Watermark For Digital Images”, Proceedings Of The International Conference On Image Processing 3
  3. N. Nikolaidis, I. Pitas, 1998. “Robust Image Watermarking In The Spatial Domain”, Signal Processing 66 (3) pp 385–403.
  4. P.W. Wong, N. Memon, 2001. “Secret And Public Key Image Watermarking Schemes For Image Authentication And Ownership Verification”, IEEE Trans. Image Process. 10 (10) pp 1593–1601.
  5. T.H. Chen, D.S. Tsai, 2006. “Owner–Customer Right Protection Mechanism Using A Watermarking Scheme And A Watermarking Protocol”, Pattern Recogn. 39 (8) pp 1530–1541.
  6. C.Y. Lin, S.F. Chang, 2001. “A Robust Image Authentication Method Distinguishing JPEG Compression From Malicious Manipulation”, IEEE Trans. Circuits Systems Video Technol. 11 (2) 153–168.
  7. C.T. Hsu, J.L. Wu, 1999. “Hidden Digital Watermarks In Images”, IEEE Trans. Image Process. 8 (1) pp 58–68.
  8. M. Barni, F. Bartolini, V. Cappellini, .A. Piva, 1997.” A DCT-Domain System For Robust Image Watermarking”, Signal Process. 66 pp357–372.
  9. Athanasios Nikolaidis and Ioannis Pitas, 2003.” Asymptotically Optimal Detection For Additive Watermarking In The DCT And DWT Domains”, IEEE Transactions On Image Processing, Vol. 12, No. 5
  10. Ben Wang, Jinkou Ding, Qiaoyan Wen, Xin Liao, Cuixiang Liu, 2009. “An Image Watermarking Algorithm Based On DWT DCT And SVD”, Proceedings of IC-NIDC
  11. Feng Liu, Yangguang Liu, 2008. “A Watermarking Algorithm for Digital Image Based on DCT and SVD”. Congress on Image and Signal Processing
  12. LIU Rui-zhen, Tan Tie-niu.2001. “SVD Based Digital Watermarking Method”. Acta Electronica Sinica, Vol.29, No.2.
  13. H.C. Andrews and C.L. Patterson,1976. “Singular Value Decomposition (SVD) Image Coding”,IEEE Trans. On Communications, Nol. COM-24, No. 4, pp. 425– 432
  14. R.Z. Liu and T.N. Tan,2002. “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”, IEEE Trans. On Multimedia, Vol. 4, No. 1, pp. 121–128.
Index Terms

Computer Science
Information Sciences

Keywords

Watermark Singular value decomposition (SVD) extracting embedding