A DCT-domain system for robust image watermarking
Signal Processing
Digital watermarking in the fractional Fourier transformation domain
Journal of Network and Computer Applications
SVD-Based Approach to Transparent Embedding Data into Digital Images
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Robust DWT-SVD domain image watermarking: embedding data in all frequencies
Proceedings of the 2004 workshop on Multimedia and security
An SVD-based watermarking scheme for protecting rightful ownership
IEEE Transactions on Multimedia
Toward robust logo watermarking using multiresolution image fusion principles
IEEE Transactions on Multimedia
Comments on "An SVD-based watermarking scheme for protecting rightful Ownership"
IEEE Transactions on Multimedia
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Image adaptive watermarking using wavelet domain singular value decomposition
IEEE Transactions on Circuits and Systems for Video Technology
Improved SVD-DWT based digital image watermarking against watermark ambiguity
Proceedings of the 2007 ACM symposium on Applied computing
Two properties of SVD and its application in data hiding
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Hi-index | 0.00 |
In some Singular Value Decomposition (SVD) based watermarking techniques, singular values (SV) of the cover image are used to embed the SVs of the watermark image. In detection, singular vectors of the watermark image are used to construct the embedded watermark. A problem faced with this approach is to obtain the resultant watermark as the image whose singular vectors are used for restoring the watermark, namely, what is searched that is found. In this paper, we propose a Discrete Cosine Transform (DCT) DC subband watermarking technique in SVD domain against this ambiguity by embedding the singular vectors of the watermark image, too, as a control parameter. We give the experimental results of the proposed technique against some attacks.