Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2388576.2388592acmconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

A region specific robust watermarking scheme based on singular value decomposition

Published: 25 October 2012 Publication History

Abstract

Security breaches are increasing day by day as the technology is innovating and opening new doors. There are various counter measures to keep a check on them and one such method is the watermarking. Region based watermarking is the approach where an important area of the original image is selected to hide the secret information. This is done to make the watermarking more robust to the various attacks and retain the commercial value of the image as any damage to this region would result in deterioration of the value of the image. One such quad tree based approach to select the region of interest (ROI) and then to utilize the properties of the singular value decomposition (SVD) transform to hide the watermark is being proposed here. The robustness of the methodology against the various attacks is validated by the experimental results.

References

[1]
P. Bas, J. M. Chassery, and B. Macq. Geometrically invariant watermarking using feature points. IEEE Transactions on Image Processing, 11:1014--1028, 2002.
[2]
R. Bangaleea, and H. C. S. Rughooputh. Effect of channel coding on the performance of spatial watermarking for copyright protection. Proc. of 6th IEEE Africon Conf., pages 149--153, 2002.
[3]
P.W. Wong, and N. Memon. Secret and public key image watermarking schemes for image authentication and ownership veriication. IEEE Transactions on Image Processing, 10:1593--1600, 2001.
[4]
Y.W. Kim and I. S. Oh. Watermarking text document images using edge direction histograms. Pattern Recognit. Lett., 25(11):1243--1251, 2004.
[5]
S. Tsekeridou, N. Nikolaidis, N. Sidiropoulos, and I. Pitas, I. Copyright protection of still images using self-similar chaotic watermarks. Proc. of IEEE International Conf. on Image Processing, pages 411--414, 2000.
[6]
V. Senthi, I. Bhaskar, and R. Bhaskar. Digital image watermarking using edge detection and wavelets with robustness analysis against jpeg compression attacks. Int. Conf. Innovations in Inf. Tech., pages 583--587, 2008.
[7]
C.H. Lee, and Y. K. Lee. An adaptive digital image watermarking technique for copyright protection. IEEE Transactions on Consumer Electronic, 45:363--370, 1999.
[8]
A. Bovik, T. Huang, and D. Munson. Robust wavelet-based video watermarking using edge detection. Adv. Elect. Eng. Comp. Sci., 399:173--182, 2009.
[9]
M. Barni, F. Bartolini, A. D. Rosa, and A. Pivaa. Optimum decoding and detection of multiplicative watermarks. IEEE Trans. Signal Proces., 51(4):1118--1123, 2003.
[10]
I.J. Cox, J. Killian, F. T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process., 6(12):1673--1687, 1997.
[11]
M. Wu, and B. Liu. Data hiding in image and video. I. Fundamental issues and solutions. IEEE Trans. Image Process., 12(6): 685--695, 2003.
[12]
M.S. Hsieh, and D. C. Tseng. Hiding Digital Watermarks Using Multiresolution Wavelet Transform. IEEE Transactions on Industrial Electronics, 48(5):875--882, 2001.
[13]
P. Meerwald, and A. Uhl. A Survey of Wavelet-Domain Watermarking Algorithms. Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, 4314, San Jose, CA, USA, 2001.
[14]
I. Djurovic, S. Stankovic, and I. Pitas. Digital Watermarking in the Fractional Fourier Transformation Domain. Journal of Network and Computer Applications, pages 167--173, 2001.
[15]
V.I. Gorodetski, L. J. Popyack, and V. Samoilov. SVD-Based Approach to Transparent Embedding Data into Digital Images. Proceedings of International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, pages 263--274, 2001.
[16]
D.V.S. Chandra. Digital Image Watermarking Using Singular Value Decomposition. Proceedings of 45th Midwest Symposium on Circuits and Systems (MWSCAS02), pages 264--267, 2002.
[17]
R. Liu, and T. Tan. An SVD-Based Watermarking Scheme for Protecting Rightful Ownership. IEEE Transactions on Multimedia, 4(1):121--128, 2002.
[18]
P. Bao, and X. Ma. Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition. IEEE Transactions on Circuits and Systems for Video Technology, 15(1): 96--102, 2005.
[19]
L. Quan, and A. Qmgsong. A Combination of DCT-Based and SVD-Based Watermarking Scheme. Proceedings of 7th International Conference on Signal Processing (ICSP04), 1:873--876, 2004.
[20]
E. Ganic, and A. M. Eskicioglu. Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies. Proceedings of the ACM Multimedia and Security Workshop (MM and SEC04), pages 166--174, 2004.
[21]
A. Sverdlov, S. Dexter, and A. M. Eskicioglu. Robust DCT-SVD Domain Image Watermarking for Copyright Protection: Embedding Data in All Frequencies. 13th European Signal Processing Conference, Antalya, Turkey, 2005.
[22]
E. Ganic, N. Zubair, and A. M. Eskicioglu. Proc. The IASTED Int. Conf. on Communication, Network, and Information Security, New York, USA, 85, 2003.
[23]
F. Huang, and Z. H. Guan. Pattern Recogn. Lett., 25, 1769, 2004.
[24]
M. Calagna, H. Guo, L. V. Mancini, and S. Jajodia. Proc. 2006 ACM symposium on Applied computing, Dijon, France, 1341, 2006.
[25]
A. Basso, F. Bergadano, D. Cavagnino, V. Pomponiu, and A. Vernone. Algorithms 2, 46, 2009.
[26]
J.M. Shieh, D. C. Lou, and M. C. Chang. Comp. Stand Inter., 28, 428, 2006.
[27]
C. C. Chang, Y. S. Hu, and C. C. Lin. A Digital Watermarking Scheme Based on Singular Value Decomposition. Springer-Verlag Berlin Heidelberg, pages 82--93, 2007.

Cited By

View all
  • (2017)A Dual Watermarking Scheme for Ownership Verification and Pixel Level AuthenticationProceedings of the 9th International Conference on Computer and Automation Engineering10.1145/3057039.3057042(131-135)Online publication date: 18-Feb-2017
  • (2014)Enhanced spread spectrum image watermarking with compression-encryption technique2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)10.1109/ISCO.2014.7103956(256-261)Online publication date: Jan-2014
  • (2013)A hybrid DCT-SVD based robust watermarking scheme for copyright protection2013 Africon10.1109/AFRCON.2013.6757709(1-5)Online publication date: Sep-2013

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIN '12: Proceedings of the Fifth International Conference on Security of Information and Networks
October 2012
226 pages
ISBN:9781450316682
DOI:10.1145/2388576
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 October 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. quad tree
  2. region of interest (ROI)
  3. singular value decomposition (SVD)

Qualifiers

  • Research-article

Conference

SIN '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2017)A Dual Watermarking Scheme for Ownership Verification and Pixel Level AuthenticationProceedings of the 9th International Conference on Computer and Automation Engineering10.1145/3057039.3057042(131-135)Online publication date: 18-Feb-2017
  • (2014)Enhanced spread spectrum image watermarking with compression-encryption technique2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)10.1109/ISCO.2014.7103956(256-261)Online publication date: Jan-2014
  • (2013)A hybrid DCT-SVD based robust watermarking scheme for copyright protection2013 Africon10.1109/AFRCON.2013.6757709(1-5)Online publication date: Sep-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media