scispace - formally typeset
Proceedings ArticleDOI

Dual Watermarking Scheme via Sub-Sampling in WPT-SVD Domain

Reads0
Chats0
TLDR
A new measure BVSA is presented, which gives an image block from a set of image blocks, whose mean, standard deviation, entropy, gradient and sum of singular values is greater.
Abstract
In this paper, a dual watermarking scheme based on wavelet packet transform(WPT), singular value decomposition (SVD) and sub-sampling is presented. After dividing original image into four sub-sample images, two sub-images are selected by taking into consideration of block variance singular analysis (BVSA). Then two watermarks are embedded in the selected subimages. First watermark is embedded into one of the selected sub-image by modifying the singular values. For second watermark embedding, another sub-image is transformed into wavelet packet transform domain and embedding is again done by modifying the singular values of the selected sub-bands. After embedding, modified sub-bands are mapped to their original positions for constructing watermarked sub-image. After both embedding, watermarked image is constructed by inverse sub-sampling. Experimental results show good robustness and security of the proposed scheme. A new measure BVSA is presented, which gives an image block from a set of image blocks, whose mean, standard deviation, entropy, gradient and sum of singular values is greater.

read more

Citations
More filters

Digital Watermarking: A survey on image watermarking in Frequency Domain using Genetic Algorithm

TL;DR: The work furnished in this paper is an effort to provide a survey on the latest technologies employed in watermarking technique to maintain the quality of an image, audio and video without affecting its originality.
Book ChapterDOI

Data hiding schemes based on Singular Value Decomposition

TL;DR: This paper aims to provide the ability to communicate secretly and the capacity to protect copyrighted multimedia content against illegal distribution in order to provide an effective solution to hide information into digital contents.
Proceedings ArticleDOI

Dual wavelet watermarking using principal component analysis

TL;DR: Experimental results show good robustness and security of the proposed method against various attacks such as JPEG compression, cropping, gamma correction and Gaussian filtering.

A new scheme for dual watermarking using dwt-pca technique

TL;DR: Using dual watermark improves robustness and imperceptibility of algorithm and also takes advantage of using efficient bandwidth by embedding two watermarks into host image by applying discrete wavelet transform and principal component analysis.
References
More filters
Journal ArticleDOI

An SVD-based watermarking scheme for protecting rightful ownership

TL;DR: A novel watermarking algorithm based on singular value decomposition (SVD) is proposed and results show that the newwatermarking method performs well in both security and robustness.
Proceedings ArticleDOI

Image watermarking using DCT domain constraints

TL;DR: The algorithms proposed select certain blocks in the image based on a Gaussian network classifier such that their discrete cosine transform (DCT) coefficients fulfil a constraint imposed by the watermark code.
Journal ArticleDOI

Toward robust logo watermarking using multiresolution image fusion principles

TL;DR: A novel robust watermarking approach called FuseMark is presented based on the principles of image fusion for copy protection or robust tagging applications to decrease the problem of false negative detection without increasing the false positive detection rate.
Journal ArticleDOI

Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition

TL;DR: A hybrid nonblind scheme based on DWT and singular value decomposition (SVD) is presented, and it is shown that it is considerably more robust and reliable than a pure SVD-based scheme.
Proceedings ArticleDOI

Digital image watermarking using singular value decomposition

TL;DR: Simulation results are provided which demonstrate the robustness of the proposed technique to a variety of common image degradations and the results of the approach are compared to other transform domain watermarking methods.
Related Papers (5)