skip to main content
10.1145/1141277.1141590acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

A robust watermarking system based on SVD compression

Published:23 April 2006Publication History

ABSTRACT

Digital watermarking can be used to protect the intellectual property for multimedia data. In this paper, we introduce an image watermarking scheme based on the SVD (Singular Value Decomposition) compression. In particular, we divide the cover image into blocks and apply the SVD to each block; the watermark is embedded in all the non-zero singular values according to the local features of the cover image so as to balance embedding capacity with distortion. The watermarking system we propose is robust against typical attacks, including low-pass and high-pass filtering, as evaluated by the Checkmark benchmarking tool [19].

References

  1. M. J. Atallah, V. Raskin, C. F. Hempelmann and M. Karahan and R. Sion and U. Topkara and K. E. Triezenberg, "Natural Language Watermarking and Tamperproofing", Proceedings of the 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, LNCS, vol.2578, pp. 196--212, October 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Barni, F. Bartolini, V. Cappellini and N. Checcacci, "Object watermarking for for MPEG-4 video streams copyright protection", Proceedings of SPIE, vol.3971, pp. 465--476, Security and Watermarking of Multimedia Contents II, 2000.Google ScholarGoogle Scholar
  3. N. Checcacci, M. Barni, F. Bartolini and S. Basagni, "Robust video watermarking for wireless multimedia communications", Proceedings of Wireless Communications and Networking Conference, pp. 1530--1535, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  4. I. J. Cox, J. Kilian, T. Leightont and T. Shamoon, "Secure Spread Spectrum Watermarking for Images, Audio and Video", IEEE Transactions on Image Processing, vol.6, no.2, pp.1673--1687, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Eggers and B. Girod, Informed Watermarking, Kluwer Academic Publishers, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. E. Ganic and A. M. Eskicioglu, "Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies" Proceedings of the ACM Multimedia and Security workshop, pp.167--174, Magdeburg, Germany, September 20--21, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. H. Golub and C. F. Van Loan, Matrix Computations, 3rd ed, Baltimore: Johns Hopkins University Press, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. S. Goldstein, I. S. Reed, "Reduced-Rank Adaptive Filtering", IEEE Transactions on Signal Processing, vol.45, no.2, pp.492--496, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. K. Jain, Fundamentals of Digital Image Processing, Prentice Hall, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. N. F. Johnson, Z. Duric and S. Jajodia, Information Hiding Steganography and Watermarking - Attacks and Countermeasures, Kluwer Academic Publishers, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Kirowski and Fabien A. P. Petitcolas, "Blind Pattern Matching Attack on Watermarking Systems", IEEE Transactions on Signal Processing: special issue on Data Hiding, April 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Kirowski and Fabien A. P. Petitcolas, "Replacement Attack on Arbitrary Watermarking Systems", International Workshop on Digital Watermarking, November 2002.Google ScholarGoogle Scholar
  13. S. H. Kwok, C. C. Yang and K. Y. Tam, "Watermark Design Pattern for Intellectual Property Protection in Electronic Commerce Applications", Proceedings of the 33rd Hawaii International Conference on System Sciences, vol.46, no.10, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. X. Li, "Watermarking in secure image retrieval", Pattern Recognition Letters, vol.24, np.14, pp.2431--2434, October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. E. T. Lin and E. J. Delp, "A Review of Fragile Image Watermarks" Proceedings of the Multimedia and Security Workshop (ACM Multimedia '99), Orlando, pp. 25--29, October 1999.Google ScholarGoogle Scholar
  16. R. Liu and T. Tan, "A new SVD based Image Watermarking method", IEEE Transactions on Multimedia, 4(1), pp.121--128, March 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. N. Memon and P. W. Wong, "Protecting digital media content", Communications of ACM, Vol.41, No.7, pp.35--43, July 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. H. Ozer, B. Sankur, N. Memon, "An SVD Based Audio Watermarking Technique", Proceedings of the ACM Workshop on Multimedia and Security, August 1--2, 2005, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Pereira, S. Voloshynovskiy, M. Madueo, S. Marchand-Maillet and T. Pun, "Second generation benchmarking and application oriented evaluation", Proceedings of Information Hiding Workshop, Pittsburgh, PA, USA, April 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Sion "Proving ownership over categorical data", Proceedings of 20th International Conference on Data Engineering, Boston, Massachusetts, pp. 584--596, April 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. B. Tian, M. A. Shaikh, M. R. Azimi-Sadjadi, T. H. Vonder Haar and D. L. Reinke, "A Study of Cloud Classification with Neural Networks Using Spectral and Textural Features" IEEE Transactions on Neural Networks, vol.10, no.1, pp.138--151, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. B. Wolfgang, C. I. Podilchuk and E. J. Delp, "Perceptual Watermarks for Digital Images and Video", Proceedings of the IEEE, vol. 87, no. 7, pp.1108--1126, July 1999.Google ScholarGoogle ScholarCross RefCross Ref
  23. X-P. Zhang and K. Li, "Comments on "An SVD-Based Watermarking Scheme for Protecting Rightful Ownership", IEEE Transactions on Multimedia: Correspondence, vol.7, no.1, April 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A robust watermarking system based on SVD compression

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  SAC '06: Proceedings of the 2006 ACM symposium on Applied computing
                  April 2006
                  1967 pages
                  ISBN:1595931082
                  DOI:10.1145/1141277

                  Copyright © 2006 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 23 April 2006

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  Overall Acceptance Rate1,650of6,669submissions,25%

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader