, Volume 37, Issue 4, pp 425–440 | Cite as

A robust and secure watermarking scheme based on singular values replacement

  • AKSHYA KUMAR GUPTAEmail author


Digital watermarking is an application associated with copyright protection. Any digital object can be used as a carrier to carry information. If the information is related to object then it is known as a watermark which can be visible or invisible. In the era of digital information, there are multiple danger zones like copyright and integrity violations, of digital object. In case of any dispute during rights violation, content creator can prove ownership by recovering the watermark. Two most important prerequisites for an efficient watermarking scheme are robustness and security. Watermark must be robust and recoverable even if a part of content is altered by one or more attacks like compression, filtering, geometric distortions, resizing, etc. In this work, we propose a blind watermarking scheme based on the discrete wavelet transform (DWT) and singular value decomposition (SVD). Singular values (SV’s) of high frequency (HH) band are used to optimize perceptual transparency and robustness constraints. Although most of the SVD-based schemes prove to be robust, little attention has been paid to their security aspect. Therefore, we introduce a signature-based authentication mechanism at the decoder to improve security. Resulting blind watermarking scheme is secure and robust.


Authentication security watermarking 


  1. Andrews H C and Patterson C L 1976 Singular value decomposition (SVD) image coding. IEEE Trans. Commun. 24(4): 425–432CrossRefGoogle Scholar
  2. Bhandari Kunal, Mitra Suman K and Jadhav Ashish 2005 A hybrid approach to digital image watermarking using singular value decomposition and spread spectrum. S K Pal et al (eds): PreMI, LNCS 3776: 272–275Google Scholar
  3. Chen T S, Chang C C and Hwang M S 1998 A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process. 7(10): 1485–1488MathSciNetzbMATHCrossRefGoogle Scholar
  4. Ganic Emir and Ahmet Eskicioglu M 2004 Robust DWT-SVD domain image watermarking: Embedding data in all frequencies. Proceedings of the workshop on Multimedia and Security 166–174Google Scholar
  5. Ghazy R A, El-Fishawy N A, Hadhoud M M, Dessouky M I and El-Samie F E A 2007 An efficient block-by-block SVD-based image watermarking scheme. Radio Science Conference, NRSC 1–9Google Scholar
  6. Kasmani S A and Naghsh-Nilchi A 2008 A new robust digital image watermarking technique based on joint DWT-DCT transformation. Convergence and Hybrid Information Technology ICCIT ‘08 Third International Conference 2(1): 539–544CrossRefGoogle Scholar
  7. Katzenbeisser Stefan and Petitcolas Fabien A 2000 Information hiding techniques for steganography and digital watermarking. Norwood, MA, USA: Artech House, Inc.Google Scholar
  8. Lee Sin-Joo and Jung Sung-Hwan 2001 A survey of watermarking techniques applied to multimedia. industrial electronics. Proceedings. ISIE 2001. IEEE International Symposium pp.272–277Google Scholar
  9. Liu R and Tan T 2002 A SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 4(1): 121–128CrossRefGoogle Scholar
  10. Podilchuk C I and Delp E J 2001 Digital watermarking: Algorithms and applications. Signal Process. Mag. IEEE. 18(4): 33–46CrossRefGoogle Scholar
  11. Quan Liu and Qingsong Ai 2004 Combination of DCT-based and SVD-based watermarking scheme. Signal Processing Proceedings, ICSP ‘04, 7th International Conference pp. 873–876Google Scholar
  12. Raval M S and Rege P P 2003 Discrete wavelet transform based multiple watermarking scheme. TENCON, Conference on Convergent Technologies for Asia-Pacific Region 3(1): 935–938CrossRefGoogle Scholar
  13. Zhang Xiao-Ping and Li Kan 2005 Comments on-An SVD-based watermarking scheme for protecting rightful ownership. Multimed., IEEE Trans. 7(3): 593–594CrossRefGoogle Scholar
  14. Zhou B and Chen J 2004 A geometric distortion resilient image watermarking algorithm based on SVD. Chin. J. Image Graphics. 9(1): 506–512Google Scholar

Copyright information

© Indian Academy of Sciences 2012

Authors and Affiliations

  1. 1.Dhirubhai Ambani Institute of Information and Communication TechnologyGandhinagarIndia

Personalised recommendations