Advertisement

A Hybrid Approach to Digital Image Watermarking Using Singular Value Decomposition and Spread Spectrum

  • Kunal Bhandari
  • Suman K. Mitra
  • Ashish Jadhav
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3776)

Abstract

This paper compares the most utilized spread spectrum technique with the newly evolved technique based on Singular Value Decomposition (SVD) for watermarking digital images. Both techniques are tested for a variety of attacks and the simulation results show that the watermarks generated by these techniques have complimentary robustness properties. A new hybrid technique, combining both paradigms, is proposed that is capable of surviving an extremely wide range of attacks. An image is first watermarked using spread spectrum and then a SVD based watermark is added to the watermarked image. The resulting double watermarked image is extremely robust to a wide range of distortions.

Keywords

Singular Value Decomposition Watermark Image Spread Spectrum Host Image JPEG Compression 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kauffman Publisher, San Francisco (2001)Google Scholar
  2. George, M., Chouinard, J.Y., Georganas, N.: Digital Watermarking of Images and Video using Direct Sequence Spread Spectrum Techniques. In: IEEE Canadian Conference on Electrical and Computer Engineering, May 9-12, vol. 1, pp. 116–121 (1999)Google Scholar
  3. Liu, R., Tan, T.: A SVD-Based Watermarking Scheme for Protecting Rightful Ownership. IEEE Transactions on Multimedia 4(1), 121–128 (2002)CrossRefGoogle Scholar
  4. Chandra, D.V.S.: Digital Image Watermarking using SVD. In: Circuits and Systems, MWSCAS-2002, August 4-7, vol. 3, pp. III-264 - III-267 (2002)Google Scholar
  5. Gorodetski, V.I., Popyack, L.J., Samoilov, V., Skormin, V.A.: SVD-Based Approach to Transparent Embedding Data into Digital Images. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 263–274. Springer, Heidelberg (2001)Google Scholar
  6. Hartung, F., Su, J.K., Girod, B.: Spread spectrum watermarking: Malicious attacks and counterattacks. In: Proc. of Security and Watermarking of Multimedia Contents, SPIE, January 1999, vol. 3657, pp. 147–158 (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Kunal Bhandari
    • 1
  • Suman K. Mitra
    • 1
  • Ashish Jadhav
    • 1
  1. 1.Dhirubhai Ambani Institute of Information and Communication TechnologyGandhinagarIndia

Personalised recommendations