A Blind Watermarking Algorithm for Digital Image

Article Preview

Abstract:

Based on the method of SVD, a novel watermark algorithm is designed in this paper. Firstly, the SVD is performed on each segment of the original host image; Secondly, the watermark bits are formed by chaotic encrypting;Thirdly, the secret bits are embedded into the S component of the matrix by quantization; Lastly, the inverse SVD transformation is performed on each block and the watermarked image is constructed. The original host image is not required in the secret watermark recovery. Experimental results show that the watermarked image has transparent feature, and the quality of the recovered watermark is satisfying. The algorithm is strongly robust to many attacks, such as JPEG compression attack, Noise Interference and so on..

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1110-1113

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wei Li, Xiangyang Xue, and Peizhong Lu. Localized Image Watermarking Technique Robust Against Time-Scale Modification. IEEE Transactions on multimedia, VOL. 8, No. 1, FEBRUARY (2006): pp.60-69.

DOI: 10.1109/tmm.2005.861291

Google Scholar

[2] Ghazy, Rania A. El-Fishawy, Nawal A. Hadhoud, Mohiy M. Dessouky, Moawad I. El-Samie, Fathi E. Abd, An Efficient Block-by-Block SVD-Based Image Watermarking Scheme, National Radio Science Conference, 13-15 March, (2007), Cairo, Egypt, pp.1-9.

DOI: 10.1109/nrsc.2007.371376

Google Scholar

[3] R.Z. Liu and T.N. Tan, An SVD-Based Watermarking Scheme for Protecting Rightful Ownership, IEEE Trans. on Multimedia, vol. 4, no. 1, pp.121-128, (2002).

DOI: 10.1109/6046.985560

Google Scholar

[4] Yuan Tian, Tieniu Tan, Yunhong Wang and Yuchun Fang, Do singular values contain adequate information for face recognition, Pattern Recognition, vol. 36, p.649–655, (2003).

DOI: 10.1016/s0031-3203(02)00105-x

Google Scholar

[5] Jasvir Nagra, Clark Thomborson and Christian Collberg, Software Watermarking: Protective Terminology, Australian Computer Science Conference, Australasian, (2002).

Google Scholar

[6] C. Collberg and C. Thomborson, Watermark- ing, tamper proofing and obfuscation tools for software protection, IEEE Transactions on Software Engineering, (2002), 28(8): 735 -746.

DOI: 10.1109/tse.2002.1027797

Google Scholar

[7] Zhang Li-he, Yang Yi-xian and Niu Xin-xi, A survey on Software Watermarking, Journal of Software, (2003), 14(2): 268-277.

Google Scholar