scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition

01 Feb 2013-Aeu-international Journal of Electronics and Communications (AEUE-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS)-Vol. 67, Iss: 2, pp 102-112
TL;DR: A new image watermarking scheme based on the Redundant Discrete Wavelet Transform (RDWT) and the Singular Value Decomposition (SVD) that showed a high level of robustness not only against the image processing attacks but also against the geometrical attacks which are considered as difficult attacks to resist.
Abstract: Copyright protection and proof of ownership are two of the main important applications of the digital image watermarking. The challenges faced by researchers interested in digital image watermarking applications lie in the creation of new algorithms to serve those applications and to be resistant to most types of attacks, especially the geometrical attacks. Robustness, high imperceptibility, security, and large capacity are four essential requirements in any watermarking scheme. This paper presents a new image watermarking scheme based on the Redundant Discrete Wavelet Transform (RDWT) and the Singular Value Decomposition (SVD). The gray scale image watermark was embedded directly in the singular values of the RDWT sub-bands of the host image. The scheme achieved a large capacity due to the redundancy in the RDWT domain and at the same time preserved high imperceptibility due to SVD properties. Embedding the watermarking pixel's values without any modification inside the wavelet coefficient of the host image overcomes the security issue. Furthermore, the experimental results of the proposed scheme showed a high level of robustness not only against the image processing attacks but also against the geometrical attacks which are considered as difficult attacks to resist.
Citations
More filters
Journal ArticleDOI
TL;DR: This paper presents a review of the digital video watermarking techniques in which their applications, challenges, and important properties are discussed, and categorizes them based on the domain in which they embed the watermark.
Abstract: The illegal distribution of a digital movie is a common and significant threat to the film industry. With the advent of high-speed broadband Internet access, a pirated copy of a digital video can now be easily distributed to a global audience. A possible means of limiting this type of digital theft is digital video watermarking whereby additional information, called a watermark, is embedded in the host video. This watermark can be extracted at the decoder and used to determine whether the video content is watermarked. This paper presents a review of the digital video watermarking techniques in which their applications, challenges, and important properties are discussed, and categorizes them based on the domain in which they embed the watermark. It then provides an overview of a few emerging innovative solutions using watermarks. Protecting a 3D video by watermarking is an emerging area of research. The relevant 3D video watermarking techniques in the literature are classified based on the image-based representations of a 3D video in stereoscopic, depth-image-based rendering, and multi-view video watermarking. We discuss each technique, and then present a survey of the literature. Finally, we provide a summary of this paper and propose some future research directions.

181 citations


Cites methods from "Robust blind image watermarking sch..."

  • ...Another hybrid watermarking technique, in which a redundant DWT (RDWT) is used with the SVD to embed a watermark in an image, was proposed by Makbol and Khoo [166]....

    [...]

Journal ArticleDOI
TL;DR: A challenge due to the false positive problem which may be faced by most of SVD-based watermarking schemes has been solved in this work by adopting a digital signature into the watermarked image.

172 citations

Journal ArticleDOI
01 Jan 2014-Optik
TL;DR: In this paper, the authors applied differential evolution (DE) algorithm to balance the tradeoff between robustness and imperceptibility by exploring multiple scaling factors in image watermarking.

168 citations

Journal ArticleDOI
TL;DR: This study presents a robust block-based image watermarking scheme based on the singular value decomposition (SVD) and human visual system in the discrete wavelet transform (DWT) domain that outperformed several previous schemes in terms of imperceptibility and robustness.
Abstract: Digital watermarking has been suggested as a way to achieve digital protection. The aim of digital watermarking is to insert the secret data into the image without significantly affecting the visual quality. This study presents a robust block-based image watermarking scheme based on the singular value decomposition (SVD) and human visual system in the discrete wavelet transform (DWT) domain. The proposed method is considered to be a block-based scheme that utilises the entropy and edge entropy as HVS characteristics for the selection of significant blocks to embed the watermark, which is a binary watermark logo. The blocks of the lowest entropy values and edge entropy values are selected as the best regions to insert the watermark. After the first level of DWT decomposition, the SVD is performed on the low-low sub-band to modify several elements in its U matrix according to predefined conditions. The experimental results of the proposed scheme showed high imperceptibility and high robustness against all image processing attacks and several geometrical attacks using examples of standard and real images. Furthermore, the proposed scheme outperformed several previous schemes in terms of imperceptibility and robustness. The security issue is improved by encrypting a portion of the important information using Advanced Standard Encryption a key size of 192-bits (AES-192).

160 citations

Journal ArticleDOI
TL;DR: An optimal discrete wavelet transform-singular value decomposition (DWT-SVD) based image watermarking scheme using self-adaptive differential evolution (SDE) algorithm is presented and maintains a satisfactory image quality and watermark can still be identified after various attacks even though the watermarked image is seriously distorted.

159 citations

References
More filters
Book
23 Nov 2007
TL;DR: This new edition now contains essential information on steganalysis and steganography, and digital watermark embedding is given a complete update with new processes and applications.
Abstract: Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications

1,773 citations

Journal ArticleDOI
TL;DR: A novel watermarking algorithm based on singular value decomposition (SVD) is proposed and results show that the newwatermarking method performs well in both security and robustness.
Abstract: Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. There are two important issues that watermarking algorithms need to address. First, watermarking schemes are required to provide trustworthy evidence for protecting rightful ownership. Second, good watermarking schemes should satisfy the requirement of robustness and resist distortions due to common image manipulations (such as filtering, compression, etc.). In this paper, we propose a novel watermarking algorithm based on singular value decomposition (SVD). Analysis and experimental results show that the new watermarking method performs well in both security and robustness.

978 citations

Journal ArticleDOI
TL;DR: A hybrid image-watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is proposed, which is able to withstand a variety of image-processing attacks.
Abstract: The main objective of developing an image-watermarking technique is to satisfy both imperceptibility and robustness requirements. To achieve this objective, a hybrid image-watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is proposed in this paper. In our approach, the watermark is not embedded directly on the wavelet coefficients but rather than on the elements of singular values of the cover image's DWT subbands. Experimental results are provided to illustrate that the proposed approach is able to withstand a variety of image-processing attacks.

568 citations

Journal ArticleDOI
TL;DR: In this letter, a precise relationship between RDWT-domain and original-signal-domain distortion for additive white noise in the RDWT domain is derived.
Abstract: The behavior under additive noise of the redundant discrete wavelet transform (RDWT), which is a frame expansion that is essentially an undecimated discrete wavelet transform, is studied. Known prior results in the form of inequalities bound distortion energy in the original signal domain from additive noise in frame-expansion coefficients. In this letter, a precise relationship between RDWT-domain and original-signal-domain distortion for additive white noise in the RDWT domain is derived.

331 citations

Journal ArticleDOI
01 Aug 2000
TL;DR: A novel method for embedding watermarks into a host image in the frequency domain is proposed and demonstrates that the watermark is robust to various attacks.
Abstract: A novel technique for embedding watermarks into a host image in the frequency domain is proposed. Unlike the traditional techniques, the method addresses that the watermark is embedded at low frequency. The weighted correction is also used to improve the imperceptibility of the watermark. Moreover the watermark is self-extractable and the algorithm is simple. Experimental results demonstrate that the watermark is robust to various attacks.

324 citations