Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30174
A Nonoblivious Image Watermarking System Based on Singular Value Decomposition and Texture Segmentation

Authors: Soroosh Rezazadeh, Mehran Yazdi

Abstract:

In this paper, a robust digital image watermarking scheme for copyright protection applications using the singular value decomposition (SVD) is proposed. In this scheme, an entropy masking model has been applied on the host image for the texture segmentation. Moreover, the local luminance and textures of the host image are considered for watermark embedding procedure to increase the robustness of the watermarking scheme. In contrast to all existing SVD-based watermarking systems that have been designed to embed visual watermarks, our system uses a pseudo-random sequence as a watermark. We have tested the performance of our method using a wide variety of image processing attacks on different test images. A comparison is made between the results of our proposed algorithm with those of a wavelet-based method to demonstrate the superior performance of our algorithm.

Keywords: Watermarking, copyright protection, singular value decomposition, entropy masking, texture segmentation.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1057797

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1377

References:


[1] F. Hartung and M. Kutter, "Multimedia Watermarking Techniques," Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, 1999.
[2] R. Liu and T. Tan, "An SVD-Based Watermarking Scheme for Protecting Rightful Ownership," IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121-128, Mar. 2002.
[3] X.P. Zhang and K. Li, "Comments on "An SVD-based watermarking scheme for protecting rightful Ownership"," IEEE Transactions on Multimedia, vol. 7, no. 2, pp. 593-594, April 2005.
[4] D.V.S. Chandra, "Digital Image Watermarking Using Singular Value Decomposition," Proceedings of 45th IEEE Midwest Symposium on Circuits and Systems, Tulsa, Oklahoma, USA, vol. 3, pp. 264-267, Aug. 2002.
[5] Y.D. Chung and C.H. Kim, "Robust Image Watermarking Against Filtering Attacks," SICE Annual Conference, Fukui, Japan, vol. 3, pp. 3017-3020, Aug. 2003.
[6] T. Xianghong, Y. Lianjie, and L. Lu, N. Yamei, "Study on a Multifunction Watermarking Algorithm," Proceedings of IEEE 7th International Conference on Signal Precessing, vol. 1, pp. 848-852, Sept. 2004.
[7] T. Xianghong, Y. Lianjie, Y. Hengli, and Y. Zhongke, "A Watermarking Algorithm Based on the SVD and Hadamard Transform," Proceedings of IEEE International Conference on Communications, Circuits and Systems, vol. 2, pp. 874-877, 2005.
[8] V.I. Gorodetski, L.J. Popyack, V. Samoilov, and V.A. Skormin, "SVDBased Approach to Transparent Embedding Data into Digital Images," International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, St. Petersburg, Russia, vol. 2052, pp. 263-274, May 2001.
[9] A. B. Watson, R. Borthwick, and M. Taylor, "Image Quality and Entropy Masking," Proceedings of SPIE on Human Vision and Electronic Imaging, Vol. 3016, pp. 2-12, 1997.
[10] S. Suthaharan, S. W. Kim, H. K. Lee, and S. Sathananthan, "Perceptually Tuned Robust Watermarking Scheme for Digital Images," Pattern Recognition Letters, vol. 21, no. 2, pp. 145-149, 2000.
[11] S. W. Kim, S. Suthaharan, "An Entropy Masking Model for Multimedia Content Watermarking," IEEE International Conference on System Sciences, 2004.
[12] R. C. Gonzalez, R. E. Woods, "Digital Image processing," Second Edition, Prentice Hall Inc, 2002.
[13] I. J.Cox, J. Killian, F. T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing,vol. 6, no. 12, pp. 1673-1687, 1997.
[14] X. G. Xia, C. G. Boncelet, and G. R. Arce, "Wavelet Transform Based Watermark for Digital Images," Optics Express, vol. 3, no. 12, pp. 497- 511, Dec. 1998.