Digital watermarking in the fractional Fourier transformation domain
Journal of Network and Computer Applications
SVD-Based Approach to Transparent Embedding Data into Digital Images
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Robust DWT-SVD domain image watermarking: embedding data in all frequencies
Proceedings of the 2004 workshop on Multimedia and security
A hybrid SVD-DCT watermarking method based on LPSNR
Pattern Recognition Letters
Watermarking text document images using edge direction histograms
Pattern Recognition Letters
A robust watermarking system based on SVD compression
Proceedings of the 2006 ACM symposium on Applied computing
Optimum decoding and detection of multiplicative watermarks
IEEE Transactions on Signal Processing
An SVD-based watermarking scheme for protecting rightful ownership
IEEE Transactions on Multimedia
An adaptive digital image watermarking technique for copyright protection
IEEE Transactions on Consumer Electronics
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Geometrically invariant watermarking using feature points
IEEE Transactions on Image Processing
Data hiding in image and video .I. Fundamental issues and solutions
IEEE Transactions on Image Processing
Image adaptive watermarking using wavelet domain singular value decomposition
IEEE Transactions on Circuits and Systems for Video Technology
A digital watermarking scheme based on singular value decomposition
ESCAPE'07 Proceedings of the First international conference on Combinatorics, Algorithms, Probabilistic and Experimental Methodologies
Hi-index | 0.00 |
Security breaches are increasing day by day as the technology is innovating and opening new doors. There are various counter measures to keep a check on them and one such method is the watermarking. Region based watermarking is the approach where an important area of the original image is selected to hide the secret information. This is done to make the watermarking more robust to the various attacks and retain the commercial value of the image as any damage to this region would result in deterioration of the value of the image. One such quad tree based approach to select the region of interest (ROI) and then to utilize the properties of the singular value decomposition (SVD) transform to hide the watermark is being proposed here. The robustness of the methodology against the various attacks is validated by the experimental results.