CFP last date
20 December 2024
Reseach Article

Reliable SVD based Semi-blind and Invisible Watermarking Schemes

by Subhayan Roy Moulick, Siddharth Arora, Chirag Jain, Prasanta K. Panigrahi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 145 - Number 7
Year of Publication: 2016
Authors: Subhayan Roy Moulick, Siddharth Arora, Chirag Jain, Prasanta K. Panigrahi
10.5120/ijca2016910417

Subhayan Roy Moulick, Siddharth Arora, Chirag Jain, Prasanta K. Panigrahi . Reliable SVD based Semi-blind and Invisible Watermarking Schemes. International Journal of Computer Applications. 145, 7 ( Jul 2016), 1-5. DOI=10.5120/ijca2016910417

@article{ 10.5120/ijca2016910417,
author = { Subhayan Roy Moulick, Siddharth Arora, Chirag Jain, Prasanta K. Panigrahi },
title = { Reliable SVD based Semi-blind and Invisible Watermarking Schemes },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 145 },
number = { 7 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume145/number7/25287-2016910417/ },
doi = { 10.5120/ijca2016910417 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:48:07.683848+05:30
%A Subhayan Roy Moulick
%A Siddharth Arora
%A Chirag Jain
%A Prasanta K. Panigrahi
%T Reliable SVD based Semi-blind and Invisible Watermarking Schemes
%J International Journal of Computer Applications
%@ 0975-8887
%V 145
%N 7
%P 1-5
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A semi-blind watermarking scheme is presented based on Singular Value Decomposition (SVD), which makes essential use of the fact that, the SVD subspace preserves significant amount of information of an image and is a one way decomposition. The principal components are used, along with the corresponding singular vectors of the watermark image to watermark the target image. For further security, the semi-blind scheme is extended to an invisible hash based watermarking scheme. The hash based scheme commits a watermark with a key such that, it is incoherent with the actual watermark, and can only be extracted using the key. Its security is analyzed in the random oracle model and shown to be unforgeable, invisible and satisfying the property of non-repudiation.

References
  1. Golub, G.H., Reinsch, C., 1970. Singular value decomposition and least squares solutions. Numerische Mathematik, 14, 403-420.
  2. Chang, C.C., Tsai, P., Lin, C.C., 2005. SVD-based digital image watermarking scheme. Pattern Recognition Letters, 26, 1577-1586.
  3. Agarwal, R., Santhanam, M.S., 2008. Digital watermarking in the singular vector domain. International Journal of Image and Graphics, 8, 351-368.
  4. Lei, B., Tan, E.L., Chen, S., Ni, D., Wang, T., Lei, H., 2014. Reversible watermarking scheme for medical image based on differential evolution. Expert Systems with Applications, 41, 3178-3188.
  5. Calagna, M., Guo, H., Mancini, L.V., Jajodia, S., 2006. A robust watermarking system based on SVD compression. Proceedings of the 2006 ACM symposium on Applied computing, 1341-1347.
  6. Bergman, C., Davidson, J., 2005. Unitary embedding for data hiding with the SVD. Electronic Imaging 2005, International Society for Optics and Photonics, 619-630.
  7. Lai, C.C., 2011. An improved SVD-based watermarking scheme using human visual characteristics. Optics Communications, 284, 938-944.
  8. Quan, L., Qingsong, A.I., 2004. A combination of DCTbased and SVD-based watermarking scheme. International Conference on Signal Processing, 873-876.
  9. Zhou, Y., Jin, W., 2011. A novel image zerowatermarking scheme based on DWT-SVD. IEEE International Conference on Multimedia Technology, 2873-2876.
  10. Potfode, A., Kourav, D., 2016. Digital color image watermarking using DWT and SVD for data security. International Journal of Computer Applications, 141, 17-20.
  11. Tsai, H.H., Jhuang, Y.J., Lai, Y.S., 2012. An SVD-based image watermarking in wavelet domain using SVR and PSO. Applied Soft Computing, 12, 2442-2453.
  12. Pandey, P., Kumar, S., Singh, S.K., 2014. Rightful ownership through image adaptive DWT-SVD watermarking algorithm and perceptual tweaking. Multimedia Tools and Applications, 72, 723-748.
  13. Khorrami, N., Ayubi, P., Behnia, S., Ayubi, J., 2014. A svd-chaos digital image watermarking scheme based on multiple chaotic system. Signal Processing and Information Technology, 9-18.
  14. Arora, S., Acharya, J., Verma, A., Panigrahi, P.K., 2008. Multilevel thresholding for image segmentation through a fast statistical recursive algorithm. Pattern Recognition Letters, 29, 119-125.
  15. Kutter, M., Jordan, F.D., Bossen, F., 1997. Digital signature of color images using amplitude modulation. Electronic Imaging, International Society for Optics and Photonics, 518- 526.
Index Terms

Computer Science
Information Sciences

Keywords

Singular Value Decomposition (SVD) Principal Components Semi Blind Watermark Invisible Watermark Hash Code