skip to main content
research-article

Secure randomized image watermarking based on singular value decomposition

Published: 27 December 2013 Publication History

Abstract

In this article, a novel logo watermarking scheme is proposed based on wavelet frame transform, singular value decomposition and automatic thresholding. The proposed scheme essentially rectifies the ambiguity problem in the SVD-based watermarking. The core idea is to randomly upscale the size of host image using reversible random extension transform followed by the embedding of logo watermark in the wavelet frame domain. After embedding, a verification phase is casted with the help of a binary watermark and toral automorphism. At the extraction end, the binary watermark is first extracted followed by the verification of watermarked image. The logo watermark is extracted if and only if the watermarked image is verified. The security, attack and comparative analysis confirm high security, efficiency and robustness of the proposed watermarking system.

Supplementary Material

a4-bhatnagar-apndx.pdf (bhatnagar.zip)
Supplemental movie, appendix, image and software files for, Secure randomized image watermarking based on singular value decomposition

References

[1]
Albuquerque, M. P., Esquef, I. A., and Mello, A. R. G. 2004. Image thresholding using Tsallis entropy. Patt. Rec. Lett. 25, 1059--1065.
[2]
Awrangjeb, M. 2012. Robust signature-based copyright protection scheme using the most significant gray-scale bits of the image. Adv. Multimed. 875759:1--875759:17.
[3]
Awrangjeb, M. and Lu, G. 2008. A robust content-based watermarking technique. In Proceeding of IEEE International Workshop on Multimedia Signal Processing (Cairns, Australia). 713--718.
[4]
Bas, P., Chassery, J. M., and Macq, B. 2002. Geometrically invariant watermarking using feature points. IEEE Trans. Image Proc. 11, 9, 1014--1028.
[5]
Bazi, Y., Bruzzone, L., and Melgani, F. 2007. Image thresholding based on the EM algorithm and the generalized Gaussian distribution. Patt. Recog. 40, 619--634.
[6]
Bhatnagar, G. and Raman, B. 2008. Robust watermarking scheme based on multiresolution fractional Fourier transform. In Proceedings of Indian Conference on Computer Vision, Graphics & Image Processing. 1--8.
[7]
Bhatnagar, G. and Raman, B. 2009. A new reference watermarking scheme based on DWT-SVD. Comput. Stand. Interfaces 31, 5, 1002--1013.
[8]
Bhatnagar, G. and Raman, B. 2010. Distributed multiresolution discrete Fourier transform and its application to watermarking. Int. J. Wavel. Multires. Inf. Proc. 8, 2, 225--241.
[9]
Briassouli, A. and Strintzis, M. G. 2004. Optimal watermark detection under quantization in the transform domain. IEEE Trans. Circ. Syst. Video Tech. 14, 12, 1308--1319.
[10]
Cui, L. and Li, W. 2011. Adaptive multiwavelet-based watermarking through JPW masking. IEEE Trans. Image Proc. 20, 4, 1047--1060.
[11]
Ganic, E. and Eskicioglu, A. M. 2005. Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. J. Electron. Imag. 14, 043004:1--13.
[12]
Jain, C., Arora, S., and Panigrahi, P. K. 2008. A reliable SVD based watermarking scheme. ArXiv, 1--8.
[13]
Kerckhoffs, A. 1883. La cryptographie militaire. J. Sci. Milit. IX, 5--83.
[14]
Lai, C. C. and Tsai, C. C. 2010. Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrument. Measure. 59, 11, 3060--3063.
[15]
Lee, W. B. and Chen, T. H. 2002. A public verifiable copy protection technique for still images. J. Syst. Softw. 62, 3, 195--204.
[16]
Lin, C. Y., Wu, M., Bloom, J. A., Cox, I. J., Miller, M. L., and Liu, Y. 2001. Rotation, scale, and translation resilient watermarking for images. IEEE Trans. Image Proc. 10, 5, 767--782.
[17]
Lin, P. Y., Lee, J. S., and Chang, C. C. 2009. Dual digital watermarking for internet media based on hybrid strategies. IEEE Trans. Circ. Syst. Video Tech. 19, 8, 1169--1177.
[18]
Lin, P.-Y., Lee, J.-S., and Chang, C.-C. 2011. Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans. Multimed. Comput. Commun. Appl. 7, 3, 15:1--15:20.
[19]
Liu, R. and Tan, T. 2002. An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 4, 1, 121--128.
[20]
Mohanty, S. P. and Bhargava, B. K. 2008. Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks. ACM Trans. Multimed. Comput. Commun. Appl. 5, 2, 12:1--12:21.
[21]
Sahoo, P. K. and Arora, G. 2006. Image thresholding using two-dimensional Tsallis-Havrda-Charvat entropy. Patt. Recog. Lett. 27, 520--528.
[22]
Sang, J. and Alam, M. S. 2008. Fragility and robustness of binary-phase-only-filter-based fragile/semi-fragile digital image watermarking. IEEE Trans. Instrument Measure. 57, 3, 595--606.
[23]
Tsai, J.-S., Huang, W.-B., Chen, C.-L., and Kuo, Y.-H. 2007. A feature-based digital image watermarking for copyright protection and content authentication. In Proceedings of IEEE International Conference on Image Processing. 5, 469--472.
[24]
Wu, Y. 2005. On the security of an SVD-based ownership watermarking. IEEE Trans. Multimed. 7, 4, 624--627.
[25]
Yavuz, E. and Telatar, Z. 2007. Improved SVD-DWT based digital image watermarking against watermark ambiguity. In Proceedings of ACM Symposium on Applied Computing. 1051--1055.
[26]
You, X., Du, L., Cheung, Y.-M., and Chen, Q. 2010. A blind watermarking scheme using new nontensor product wavelet filter banks. IEEE Trans. Image Proc. 19, 12, 3271--3284.
[27]
Zhang, X. and Li, K. 2005. Comments on an SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 7, 3, 593--594.
[28]
Zheng, D., Zhao, J., and Saddik, A. E. 2003. RST-invariant digital image watermarking based on log-polar mapping and phase correlation. IEEE Trans. Circ. Syst. Video Tech. 13, 8, 753--765.
[29]
Zhu, X. and Chen, C. W. 2012. A joint layered scheme for reliable and secure mobile JPEG-2000 streaming. ACM Trans. Multimed. Comput. Communi. Appl. 8, 3, 30:1--30:23.

Cited By

View all
  • (2023)An Efficient CNN-based Prediction for Reversible Data HidingProceedings of the 5th ACM International Conference on Multimedia in Asia10.1145/3595916.3626359(1-5)Online publication date: 6-Dec-2023
  • (2023)Eliminating orthonormal constraints of SVD to guarantee full retrievability of blind watermarkingMultimedia Tools and Applications10.1007/s11042-023-16004-683:9(25365-25391)Online publication date: 19-Aug-2023
  • (2021)A Novel HDR Image Zero-Watermarking Based on Shift-Invariant Shearlet TransformSecurity and Communication Networks10.1155/2021/66627002021Online publication date: 1-Jan-2021
  • Show More Cited By

Index Terms

  1. Secure randomized image watermarking based on singular value decomposition

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 10, Issue 1
    December 2013
    166 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/2559928
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 December 2013
    Accepted: 01 April 2013
    Revised: 01 March 2013
    Received: 01 September 2012
    Published in TOMM Volume 10, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Digital watermarking
    2. automatic thresholding
    3. chaotic map
    4. reversible random extension transform
    5. singular value decomposition
    6. wavelet frame transform

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)An Efficient CNN-based Prediction for Reversible Data HidingProceedings of the 5th ACM International Conference on Multimedia in Asia10.1145/3595916.3626359(1-5)Online publication date: 6-Dec-2023
    • (2023)Eliminating orthonormal constraints of SVD to guarantee full retrievability of blind watermarkingMultimedia Tools and Applications10.1007/s11042-023-16004-683:9(25365-25391)Online publication date: 19-Aug-2023
    • (2021)A Novel HDR Image Zero-Watermarking Based on Shift-Invariant Shearlet TransformSecurity and Communication Networks10.1155/2021/66627002021Online publication date: 1-Jan-2021
    • (2020)A Novel Zero-Watermarking Scheme Based on Variable Parameter Chaotic Mapping in NSPD-DCT DomainIEEE Access10.1109/ACCESS.2020.30048418(182391-182411)Online publication date: 2020
    • (2020)Hybrid Watermarking Algorithm Using Clifford Algebra With Arnold Scrambling and Chaotic EncryptionIEEE Access10.1109/ACCESS.2020.29882988(76386-76398)Online publication date: 2020
    • (2019)Enhanced Secret Image Sharing Using POB Number SystemSecurity with Intelligent Computing and Big-data Services10.1007/978-3-030-16946-6_8(94-102)Online publication date: 17-Apr-2019
    • (2018)A recent survey on image watermarking techniques and its application in e-governanceMultimedia Tools and Applications10.1007/s11042-017-5222-877:3(3597-3622)Online publication date: 1-Feb-2018
    • (2017)Secure Cloud-Based Image Tampering Detection and Localization Using POB Number SystemACM Transactions on Multimedia Computing, Communications, and Applications10.1145/307714013:3(1-23)Online publication date: 28-Jun-2017
    • (2017)A robust color image watermarking using local invariant significant bitplane histogramMultimedia Tools and Applications10.1007/s11042-016-3935-876:3(3403-3433)Online publication date: 1-Feb-2017
    • (2017)DWT-SVD and DCT based robust and blind watermarking scheme for copyright protectionMultimedia Tools and Applications10.1007/s11042-016-3706-676:11(13001-13024)Online publication date: 1-Jun-2017
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media