scispace - formally typeset
Journal ArticleDOI

An SVD-based watermarking scheme for protecting rightful ownership

Ruizhen Liu, +1 more
- 01 Mar 2002 - 
- Vol. 4, Iss: 1, pp 121-128
TLDR
A novel watermarking algorithm based on singular value decomposition (SVD) is proposed and results show that the newwatermarking method performs well in both security and robustness.
Abstract
Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. There are two important issues that watermarking algorithms need to address. First, watermarking schemes are required to provide trustworthy evidence for protecting rightful ownership. Second, good watermarking schemes should satisfy the requirement of robustness and resist distortions due to common image manipulations (such as filtering, compression, etc.). In this paper, we propose a novel watermarking algorithm based on singular value decomposition (SVD). Analysis and experimental results show that the new watermarking method performs well in both security and robustness.

read more

Citations
More filters
Book ChapterDOI

Image Watermarking Based on Reflectance Modification

TL;DR: In the proposed method, the reflectance component is extracted from the YCbCr color space of the host image pixels, and used to carry a binary watermark image with the same size.
Proceedings ArticleDOI

Contourlet based image watermarking using QR decomposition

TL;DR: An image watermarking algorithm based on Contourlet Transform (CT) and QR factorization method that is imperceptible and robust against image processing attacks such as Gaussian noise, scaling, compression, salt and pepper noise is presented.
Proceedings ArticleDOI

Singular Value Decomposition Watermarking Method for Medical Image

TL;DR: This paper presents a digital watermarking method based on SVD, the method was simple, clear principles from the experimental results, and the method can meet the actual demand.
Proceedings ArticleDOI

Holographic watermarking based on off-axis hologram and DWT

TL;DR: A holographic watermark scheme is proposed by combining off-axis hologram with discrete wavelet transform (DWT) and it is demonstrated that the watermark perceptual quality and robustness increase by reducing the watermarks file size.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Singular value decomposition and least squares solutions

TL;DR: The decomposition of A is called the singular value decomposition (SVD) and the diagonal elements of ∑ are the non-negative square roots of the eigenvalues of A T A; they are called singular values.
Journal ArticleDOI

Multimedia data-embedding and watermarking technologies

TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Journal ArticleDOI

Rotation, scale and translation invariant spread spectrum digital image watermarking

TL;DR: In this paper, a Fourier-Mellin-based approach is used to construct watermarks which are designed to be unaffected by any combination of rotation and scale transformations, and a novel method of CDMA spread spectrum encoding is introduced which allows one to embed watermark messages of arbitrary length and which need only a secret key for decoding.
Journal ArticleDOI

A DCT-domain system for robust image watermarking

TL;DR: A new watermarking algorithm is presented: the method, which operates in the frequency domain, embeds a pseudo-random sequence of real numbers in a selected set of DCT coefficients, which is adapted to the image by exploiting the masking characteristics of the human visual system, thus ensuring the watermark invisibility.
Related Papers (5)