skip to main content
10.1145/1141277.1141590acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

A robust watermarking system based on SVD compression

Published: 23 April 2006 Publication History

Abstract

Digital watermarking can be used to protect the intellectual property for multimedia data. In this paper, we introduce an image watermarking scheme based on the SVD (Singular Value Decomposition) compression. In particular, we divide the cover image into blocks and apply the SVD to each block; the watermark is embedded in all the non-zero singular values according to the local features of the cover image so as to balance embedding capacity with distortion. The watermarking system we propose is robust against typical attacks, including low-pass and high-pass filtering, as evaluated by the Checkmark benchmarking tool [19].

References

[1]
M. J. Atallah, V. Raskin, C. F. Hempelmann and M. Karahan and R. Sion and U. Topkara and K. E. Triezenberg, "Natural Language Watermarking and Tamperproofing", Proceedings of the 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, LNCS, vol.2578, pp. 196--212, October 2002.
[2]
M. Barni, F. Bartolini, V. Cappellini and N. Checcacci, "Object watermarking for for MPEG-4 video streams copyright protection", Proceedings of SPIE, vol.3971, pp. 465--476, Security and Watermarking of Multimedia Contents II, 2000.
[3]
N. Checcacci, M. Barni, F. Bartolini and S. Basagni, "Robust video watermarking for wireless multimedia communications", Proceedings of Wireless Communications and Networking Conference, pp. 1530--1535, 2000.
[4]
I. J. Cox, J. Kilian, T. Leightont and T. Shamoon, "Secure Spread Spectrum Watermarking for Images, Audio and Video", IEEE Transactions on Image Processing, vol.6, no.2, pp.1673--1687, 1997.
[5]
J. Eggers and B. Girod, Informed Watermarking, Kluwer Academic Publishers, 2002.
[6]
E. Ganic and A. M. Eskicioglu, "Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies" Proceedings of the ACM Multimedia and Security workshop, pp.167--174, Magdeburg, Germany, September 20--21, 2004.
[7]
G. H. Golub and C. F. Van Loan, Matrix Computations, 3rd ed, Baltimore: Johns Hopkins University Press, 1996.
[8]
J. S. Goldstein, I. S. Reed, "Reduced-Rank Adaptive Filtering", IEEE Transactions on Signal Processing, vol.45, no.2, pp.492--496, 1997.
[9]
A. K. Jain, Fundamentals of Digital Image Processing, Prentice Hall, 1989.
[10]
N. F. Johnson, Z. Duric and S. Jajodia, Information Hiding Steganography and Watermarking - Attacks and Countermeasures, Kluwer Academic Publishers, 2001.
[11]
D. Kirowski and Fabien A. P. Petitcolas, "Blind Pattern Matching Attack on Watermarking Systems", IEEE Transactions on Signal Processing: special issue on Data Hiding, April 2003.
[12]
D. Kirowski and Fabien A. P. Petitcolas, "Replacement Attack on Arbitrary Watermarking Systems", International Workshop on Digital Watermarking, November 2002.
[13]
S. H. Kwok, C. C. Yang and K. Y. Tam, "Watermark Design Pattern for Intellectual Property Protection in Electronic Commerce Applications", Proceedings of the 33rd Hawaii International Conference on System Sciences, vol.46, no.10, 2000.
[14]
X. Li, "Watermarking in secure image retrieval", Pattern Recognition Letters, vol.24, np.14, pp.2431--2434, October 2003.
[15]
E. T. Lin and E. J. Delp, "A Review of Fragile Image Watermarks" Proceedings of the Multimedia and Security Workshop (ACM Multimedia '99), Orlando, pp. 25--29, October 1999.
[16]
R. Liu and T. Tan, "A new SVD based Image Watermarking method", IEEE Transactions on Multimedia, 4(1), pp.121--128, March 2002.
[17]
N. Memon and P. W. Wong, "Protecting digital media content", Communications of ACM, Vol.41, No.7, pp.35--43, July 1998.
[18]
H. Ozer, B. Sankur, N. Memon, "An SVD Based Audio Watermarking Technique", Proceedings of the ACM Workshop on Multimedia and Security, August 1--2, 2005, New York.
[19]
S. Pereira, S. Voloshynovskiy, M. Madueo, S. Marchand-Maillet and T. Pun, "Second generation benchmarking and application oriented evaluation", Proceedings of Information Hiding Workshop, Pittsburgh, PA, USA, April 2001.
[20]
R. Sion "Proving ownership over categorical data", Proceedings of 20th International Conference on Data Engineering, Boston, Massachusetts, pp. 584--596, April 2004.
[21]
B. Tian, M. A. Shaikh, M. R. Azimi-Sadjadi, T. H. Vonder Haar and D. L. Reinke, "A Study of Cloud Classification with Neural Networks Using Spectral and Textural Features" IEEE Transactions on Neural Networks, vol.10, no.1, pp.138--151, 1999.
[22]
R. B. Wolfgang, C. I. Podilchuk and E. J. Delp, "Perceptual Watermarks for Digital Images and Video", Proceedings of the IEEE, vol. 87, no. 7, pp.1108--1126, July 1999.
[23]
X-P. Zhang and K. Li, "Comments on "An SVD-Based Watermarking Scheme for Protecting Rightful Ownership", IEEE Transactions on Multimedia: Correspondence, vol.7, no.1, April 2005.

Cited By

View all
  • (2018)Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applicationsMultimedia Tools and Applications10.1007/s11042-018-6218-877:24(31713-31735)Online publication date: 1-Dec-2018
  • (2016)A Survey Study on Singular Value Decomposition and Genetic Algorithm Based on Digital Watermarking TechniquesProceedings of the First International Conference on Computational Intelligence and Informatics10.1007/978-981-10-2471-9_2(7-16)Online publication date: 1-Dec-2016
  • (2015)Information Hiding: A New Multi Watermark Algorithm Using Radon TransformationInternational Journal of Information and Electronics Engineering10.7763/IJIEE.2015.V5.5795:6(460-463)Online publication date: 2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '06: Proceedings of the 2006 ACM symposium on Applied computing
April 2006
1967 pages
ISBN:1595931082
DOI:10.1145/1141277
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 April 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. digital watermarking
  2. image compression
  3. singular value decomposition

Qualifiers

  • Article

Conference

SAC06
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applicationsMultimedia Tools and Applications10.1007/s11042-018-6218-877:24(31713-31735)Online publication date: 1-Dec-2018
  • (2016)A Survey Study on Singular Value Decomposition and Genetic Algorithm Based on Digital Watermarking TechniquesProceedings of the First International Conference on Computational Intelligence and Informatics10.1007/978-981-10-2471-9_2(7-16)Online publication date: 1-Dec-2016
  • (2015)Information Hiding: A New Multi Watermark Algorithm Using Radon TransformationInternational Journal of Information and Electronics Engineering10.7763/IJIEE.2015.V5.5795:6(460-463)Online publication date: 2015
  • (2015)A comparative study on chaotic map approaches for transform domain watermarking algorithm2015 38th International Conference on Telecommunications and Signal Processing (TSP)10.1109/TSP.2015.7296451(1-5)Online publication date: Jul-2015
  • (2015)Targeted watermark removal of a SVD-based image watermarking scheme2015 7th Conference on Information and Knowledge Technology (IKT)10.1109/IKT.2015.7288669(1-6)Online publication date: May-2015
  • (2015)Targeted dewatermarking of two non-blind SVD-based image watermarking schemes2015 5th International Conference on Computer and Knowledge Engineering (ICCKE)10.1109/ICCKE.2015.7365855(80-86)Online publication date: Oct-2015
  • (2014)On the Application of Digital Video Watermarking TechnologyApplied Mechanics and Materials10.4028/www.scientific.net/AMM.496-500.2196496-500(2196-2199)Online publication date: Jan-2014
  • (2013)Data Hiding Schemes Based on Singular Value DecompositionDigital Rights Management10.4018/978-1-4666-2136-7.ch019(400-434)Online publication date: 2013
  • (2012)A region specific robust watermarking scheme based on singular value decompositionProceedings of the Fifth International Conference on Security of Information and Networks10.1145/2388576.2388592(117-123)Online publication date: 25-Oct-2012
  • (2011)Research of Digital Watermarking Algorithm Based on SVD and DWTApplied Mechanics and Materials10.4028/www.scientific.net/AMM.65.38565(385-388)Online publication date: Jun-2011
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media