Gödelization and SVD Based Image Watermarking under Wavelet Domain

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 199)


In this digital era, with the ever growing size of multimedia database and digital media, there is a need for designing of robust methods to enhance the security of multimedia data against various attacks. One such popular technique is digital watermarking, and in this paper two different approaches for multimedia data hiding and copyright protection are implemented. Gödelization and Singular Value Decomposition techniques under frequency domain are implemented and compared.


Wavelets Watermarking Gödelization Alphabetic Coding SVD 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Schyndel, R.G.V., Tirkel, A.Z., Osborne, C.F.: A Digital Watermark. In: International Conference on Image Processing, vol. 2, pp. 86–90. IEEE, Austin (1994)Google Scholar
  2. 2.
    Li, L., Xu, H.-H., Chang, C.-C., Ma, Y.-Y.: A novel image watermarking in redistributed invariant wavelet domain. The Journal of Systems and Software 84, 923–929 (2011)CrossRefGoogle Scholar
  3. 3.
    Liu, J.F., Huang, D.R., Hu, J.Q.: The orthogonal wavelet bases for digital watermarking. Journal of Electronics and Information Technology 25(4), 453–459 (2003)Google Scholar
  4. 4.
    Huang, D.R., Liu, J.F., Huang, J.W.: A DWT-based Image Watermarking Algorithm. In: Proc. of IEEE, ICME, Tokyo, Japan, vol. I, pp. 429–432 (2001)Google Scholar
  5. 5.
    Ogden, C.J., Huff, T.: The Singular Value Decomposition and It’s Applications in Image Processing (December 1997)Google Scholar
  6. 6.
    Zhou, B., Chen, J.: A Geometric Distortion Resilient Image Watermarking Algorithm Based on SVD. Chinese Journal of Image and Graphics 9, 506–512 (2004)Google Scholar
  7. 7.
    Martin, J.: Introduction to Languages and the theory of Computation, 3rd edn., p. 462. TMH PublicationsGoogle Scholar
  8. 8.
    Lalitha Bhaskari, D., Avadhani, P.S., Damodaram, A.: A Combinatorial Approach for Information Hiding Using Steganography and Gödelization Techniques. International Journal of Systemics, Cybernetics and Informatics, 21–24 (2007) ISSN 0973-4864Google Scholar
  9. 9.
    Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 2nd edn., pp. 50–51. Pearson EducationGoogle Scholar
  10. 10.
    Lalitha Bhaskari, D., Damodaram, A., Avadhani, P.S.: Watermark Insertion Algorithm implementation using the auxiliary carry and LSB methods. In: Int. Conf. ICSCI 2006, India, pp. 666–668 (2006)Google Scholar
  11. 11.
    Kim, I., Hong, Han, S.S.: A Blind Watermarking Technique Using Wavelet Transform. In: ISIE, Pusan, Korea, pp. 1946–1950 (2001)Google Scholar
  12. 12.
    Tang, X., Wen, Q., Nian, G.: An Improved Robust Watermarking Technique in Wavelet Domain. In: Second International Conference on Multimedia and Information Technology, pp. 270–273 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Department of Computer Science EngineeringGitam UniversityVisakhapatnamIndia
  2. 2.Department of Computer Science and Systems EngineeringAUCE(A), Andhra UniversityVisakhapatnamIndia

Personalised recommendations