scispace - formally typeset
Journal ArticleDOI

An SVD-based watermarking scheme for protecting rightful ownership

Ruizhen Liu, +1 more
- 01 Mar 2002 - 
- Vol. 4, Iss: 1, pp 121-128
TLDR
A novel watermarking algorithm based on singular value decomposition (SVD) is proposed and results show that the newwatermarking method performs well in both security and robustness.
Abstract
Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. There are two important issues that watermarking algorithms need to address. First, watermarking schemes are required to provide trustworthy evidence for protecting rightful ownership. Second, good watermarking schemes should satisfy the requirement of robustness and resist distortions due to common image manipulations (such as filtering, compression, etc.). In this paper, we propose a novel watermarking algorithm based on singular value decomposition (SVD). Analysis and experimental results show that the new watermarking method performs well in both security and robustness.

read more

Citations
More filters

igital image copyright protection scheme based n visual cryptography and singular value ecomposition

TL;DR: Experimental results show that the proposed digital image copyright protection scheme, compared with existing schemes, achieves stronger robustness against several common attacks.
Proceedings ArticleDOI

Hybrid watermarking algorithm based on singular value decomposition and Steerable Pyramid

TL;DR: The proposed scheme is a Hybrid watermarking algorithm based on singular value decomposition (SVD) and Steerable Pyramid (SP) wavelet transform that is robust against image processing attacks.
Proceedings ArticleDOI

An SVD-based Self-Embedding Watermarking Method for Image Authentication

TL;DR: A new self-embedding watermarking method for image authentication is presented, which extracts image features from the U component of the SVD domain to generate watermark.

Robust Image Watermarking Using Three Domains of SVD

TL;DR: Robustness of the proposed algorithm is verified by applying attacks like rotation, rows removal, cropping, salt & pepper noise, speckle noise and gaussian noise to indicate the proposed method is able to survive for different attacks.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Singular value decomposition and least squares solutions

TL;DR: The decomposition of A is called the singular value decomposition (SVD) and the diagonal elements of ∑ are the non-negative square roots of the eigenvalues of A T A; they are called singular values.
Journal ArticleDOI

Multimedia data-embedding and watermarking technologies

TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Journal ArticleDOI

Rotation, scale and translation invariant spread spectrum digital image watermarking

TL;DR: In this paper, a Fourier-Mellin-based approach is used to construct watermarks which are designed to be unaffected by any combination of rotation and scale transformations, and a novel method of CDMA spread spectrum encoding is introduced which allows one to embed watermark messages of arbitrary length and which need only a secret key for decoding.
Journal ArticleDOI

A DCT-domain system for robust image watermarking

TL;DR: A new watermarking algorithm is presented: the method, which operates in the frequency domain, embeds a pseudo-random sequence of real numbers in a selected set of DCT coefficients, which is adapted to the image by exploiting the masking characteristics of the human visual system, thus ensuring the watermark invisibility.
Related Papers (5)