CFP last date
20 January 2025
Reseach Article

A Semi-Blind Self Reference Color Image Watermarking using Singular Value Decomposition

by R. V. Phani Sirisha, G. Prasanna Kumar, P. Satyanarayana Murty
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 158 - Number 5
Year of Publication: 2017
Authors: R. V. Phani Sirisha, G. Prasanna Kumar, P. Satyanarayana Murty
10.5120/ijca2017912824

R. V. Phani Sirisha, G. Prasanna Kumar, P. Satyanarayana Murty . A Semi-Blind Self Reference Color Image Watermarking using Singular Value Decomposition. International Journal of Computer Applications. 158, 5 ( Jan 2017), 12-17. DOI=10.5120/ijca2017912824

@article{ 10.5120/ijca2017912824,
author = { R. V. Phani Sirisha, G. Prasanna Kumar, P. Satyanarayana Murty },
title = { A Semi-Blind Self Reference Color Image Watermarking using Singular Value Decomposition },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2017 },
volume = { 158 },
number = { 5 },
month = { Jan },
year = { 2017 },
issn = { 0975-8887 },
pages = { 12-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume158/number5/26903-2017912824/ },
doi = { 10.5120/ijca2017912824 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:04:00.836255+05:30
%A R. V. Phani Sirisha
%A G. Prasanna Kumar
%A P. Satyanarayana Murty
%T A Semi-Blind Self Reference Color Image Watermarking using Singular Value Decomposition
%J International Journal of Computer Applications
%@ 0975-8887
%V 158
%N 5
%P 12-17
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital multi-media data can easily be replicated and distributed. The rapid proliferation of internet raised concerns from content owners in terms of providing protection to their digital data. Image watermarking techniques are deployed to achieve these goals. In this paper, a more secured and novel color image watermarking scheme is proposed based on Singular value Decomposition (SVD). At first host image is partitioned into blocks of size p×p then found edges in each block by using various edge detection algorithms. A reference image is formed from the essential blocks whose values are less than or equal to the threshold. Embedding is done by modifying the U and V components of the reference image using U and V components of the watermark image. Segmentation of modified reference image is done and these segmented blocks are placed in their original positions to form a watermarked image. The watermarked reference image is formed from the positions of the selected blocks of watermarked image for extraction. The reverse process is executed to extract the singular values of the watermark from the watermarked reference image at hand. Analysis and experimental results are showing that the proposed algorithm is performed well and is examined against various attacks to verify robustness.

References
  1. . M. Vidyasagar, S. Han and E. Chang, “A Survey of Digital Image Watermarking Techniques,” 3rd IEEE International Conference on Industrial Informatics (INDIN), Perth, Australia, pp.709-716, Aug 10 -12, 2005.
  2. . Mr.Manjunatha Prasad.R,Dr.Shivaprakash Koliwad “A Comprehensive Survey of Contemporary Researches in Watermarking for Copyright Protection of Digital Images” IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, pp. 91–107,April 2009.
  3. . I. J. Cox, M. L. Miller, J. A. Bloom, Digital Watermarking, Academic Press,2002.
  4. . Hartung and M. Kutter, “Multimedia Watermarking Techniques,” in Proceedings of the IEEE, vol. 87, no.7, pp. 1079-1107, July 1999.
  5. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems), 2nd ed. Morgan Kaufmann, 11 2007
  6. . M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Imprint unknown, 1 2004.
  7. . Arnold M., Schmucker M., Wolthusen S.D., “Techniques and application of Digital Watermarking and Content Protection”, Eds. Northwood, Artech House, 2003.
  8. . Chi-Kwong Chan , L.M. Cheng “Hiding data in images by simple LSB substitution “Pattern Recognition 37 (2004) 469– 474 , ww.elsevier.com/locate/patcog.
  9. . Dr.M.A.Dorairangaswamy “A Robust Blind Image Watermarking Scheme in Spatial Domain for Copyright Protection” International Journal of Engineering and Technology Vol. 1, No.3,August, 2009 , ISSN: 1793-8236.
  10. . M. Kutter, F. Jordan, and F. Bossen, "Digital watermarking of color images using amplitude modulation," Journal of Electronic Imaging, vol. 7, pp. 326-332, 1998.
  11. L. Lian-Shan, L. Ren-Hou, and G. Qi, "A new watermarking method based on DWT green component of color image," in International Conference on Machine Learning and Cybernetics, vol. 6, 2004,3949-3954
  12. D. Fleet and D. Heeger, "Embedding invisible information in colorimages," in IEEE Int. Conf. on Image Processing ICIP'97, vol. 11997, pp. 532-535.
  13. M. Barni, F. Bartolini, and A. Piva, "Multichannel watermarking ofcolor images," IEEE Transactions on Circuits and Systems for Video Technology, vol. 12(3), pp. 142-156, 2002.
  14. P. Tsai, Y. C. Hu, and C. C. Chang, "A color image watermarking scheme based on color quantization," Signal Processing, pp. 95-105,2004.
  15. . Kuo_Liang Chung, Wei-Ning Yang, Young-Huai Huang, Shih_Tung Wu and Yu-Chiao Hsu " On SVD-based watermarking algorithm " Applied Mathematics and Computation 188 (2007) 54–57, Elsevier.
  16. . Digital Image Watermarking Using Singular Value Decomposition Sura Ramzi Sheriff. Raf. J. of Comp. & Math’s. , Vol. 7, No. 3, 2010 Third Scientific Conference Information Technology 2010 Nov. 29-30
  17. . AKSHYA KUMAR GUPTA, MEHUL S RAVAL " A robust and secure watermarking scheme based on singular value replacement" Sadhan ¯ a ¯ Vol. 37, Part 4, August 2012, pp. 425–440. Indian Academy of Sciences.
  18. . V. Madhuri, K. Veera Swamy " Robust Image Watermarking using Three Domains of SVD" International Journal of Research in Computer and Communication Technology, Vol 3, Issue 11, Page 1478 -1482, November - 2014.
  19. . B.Chandra Mohan, S. Srinivas Kumar "A Robust Image Watermarking Scheme using Singular Value Decomposition "Journal of Multimedia, VOL. 3, NO. 1, pp 7-15, MAY 2008.
  20. . Alessandro Basso, Francesco Bergadano, Davide Cavagnino " A Novel Block-based Watermarking Scheme Using the SVD transform" , Algorithms 2009, 2, PP 46-75; doi:10.3390/a2010046.
  21. . Ahmad A. Mohammad, , Ali Alhaj, Sameer Shaltaf " An improved SVD-based watermarking scheme for protecting rightful ownership" Signal Processing, Volume 88, Issue 9, September 2008, Pages 2158–2180-Elsevier.
  22. . C.C. Chang, P. Tsai, C.C. Lin, SVD-based digital image watermarking scheme, Pattern Recogn. Lett. 26 (2005) 1577–1586.
  23. . Chung K L,Yang W N, Y Huang, S Tung Wu and Y Chiao "On SVD-based watermarking algorithm",Applied Mathematics and Computation,2007, ELSEVIER.
Index Terms

Computer Science
Information Sciences

Keywords

Digital image watermarking Singular Value Decomposition PSNR Robustness.