Skip to main content

A SVD-Based Fragile Watermarking Scheme for Image Authentication

  • Conference paper
  • First Online:
Digital Watermarking (IWDW 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2613))

Included in the following conference series:

Abstract

A fragile watermarking scheme is proposed for authentication of images. We exploit singular values of singular value decomposition( SVD) of images to check the integrity of images. In order to make authentication data, the singular values are changed to the binary bits using modular arithmetic. The binary bits, authentication data, are inserted into the least significant bits(LSBs) of the original image. The pixels to be changed are randomly selected in the original image. The advantages of this scheme are that i) we can detect any modification of watermarked images, ii) the quality of watermarked images is very high because only a few bits of authentication data are embedded. We also propose an extension algorithm to provide localization. Experimental results show that the proposed fragile watermarking scheme can be applied to the authentication applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, I., Miller, M., Bloom, J.: Digital watermarking. Morgan Kaufmann Publishers (2001)

    Google Scholar 

  2. Podilchuk, C., Delp, E.: Digital watermarking: algorithms and applications. IEEE Signal Processing Magazine, vol. 18 (2001) 33–46

    Article  Google Scholar 

  3. Lee, S., Jung, S.: A survey of watermarking techniques applied to multimedia. Proc. IEEE International Symposium on Industrial Electronics, vol. 1 (2001) 272–277

    Google Scholar 

  4. Friedman, G.: The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Trans. Consumer Electron., vol. 39 (1993) 905–910

    Article  Google Scholar 

  5. Yeung, M., Mintzer, F.: Invisible watermarking technique for image verification. Proc. ICIP vol. 2 (1997) 680–683

    Google Scholar 

  6. Lin, C., Chang S.: A robust image authentication method surviving JPEG lossy compression. Proc. SPIE, vol. 3312 (1998) 296–307

    Google Scholar 

  7. Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Processing, vol. 10 (2001) 1593–1601

    Article  MATH  Google Scholar 

  8. Fridrich, J., Goljan, M., Du, R: Invertible authentication watermark for JPEG images. Proc. Information Technology: Coding and Computing (2001), 223–227

    Google Scholar 

  9. Liu, R., Tan, T: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia, vol. 4 (2002) 121–128

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Byun, SC., Lee, SK., Tewfik, A.H., Ahn, BH. (2003). A SVD-Based Fragile Watermarking Scheme for Image Authentication. In: Kim, H.J. (eds) Digital Watermarking. IWDW 2002. Lecture Notes in Computer Science, vol 2613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36617-2_14

Download citation

  • DOI: https://doi.org/10.1007/3-540-36617-2_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-01217-7

  • Online ISBN: 978-3-540-36617-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics