Robust DWT-SVD domain image watermarking: embedding data in all frequencies
Proceedings of the 2004 workshop on Multimedia and security
A hybrid SVD-DCT watermarking method based on LPSNR
Pattern Recognition Letters
Attacks on SVD-Based Watermarking Schemes
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Attacks on a Block Based SVD Watermarking Scheme
ITNG '09 Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations
SVD-based digital image watermarking scheme
Pattern Recognition Letters
Analysis on the improved SVD-based watermarking scheme
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm
Digital Signal Processing
Ambiguity attacks on the ganic-eskicioglu robust DWT-SVD image watermarking scheme
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
An SVD-based watermarking scheme for protecting rightful ownership
IEEE Transactions on Multimedia
Comments on "An SVD-based watermarking scheme for protecting rightful Ownership"
IEEE Transactions on Multimedia
Comments on “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”
IEEE Transactions on Multimedia
A digital watermarking scheme based on singular value decomposition
ESCAPE'07 Proceedings of the First international conference on Combinatorics, Algorithms, Probabilistic and Experimental Methodologies
Hi-index | 0.00 |
Watermarking schemes allow a cover image to be embedded with a watermark, for diverse applications including proof of ownership and covert communication. In this paper, we present attacks on watermarking scheme proposed by Huang and Guan. This scheme is hybrid singular value decomposition (SVD) based scheme in the sense that they employ both SVD and other techniques for watermark embedding and extraction. By attacks, we mean that we show how the designers' security claim, related to proof of ownership application can be invalidated. Our results are the first known attacks on this hybrid SVD-based watermarking scheme.