DOI QR코드

DOI QR Code

Review on Digital Image Watermarking Based on Singular Value Decomposition

  • Wang, Chengyou (School of Mechanical, Electrical and Information Engineering, Shandong University) ;
  • Zhang, Yunpeng (School of Mechanical, Electrical and Information Engineering, Shandong University) ;
  • Zhou, Xiao (School of Mechanical, Electrical and Information Engineering, Shandong University)
  • Received : 2017.02.13
  • Accepted : 2017.05.30
  • Published : 2017.12.31

Abstract

With the rapid development of computer technologies, a number of image modification methods have emerged, which have great impacts on the security of image information. Therefore, it is necessary to protect the integrity and authenticity of digital images, and digital watermarking technique consequently becomes a research hotspot. An effort is made to survey and analyze advancements of image watermarking algorithms based on singular value decomposition (SVD) in recent years. In the first part, an overview of watermarking techniques is presented and then mathematical theory of SVD is given. Besides, SVD watermarking model, features, and evaluation indexes are demonstrated. Various SVD-based watermarking algorithms, as well as hybrid watermarking algorithms based on SVD and other transforms for copyright protection, tamper detection, location, and recovery are reviewed in the last part.

Keywords

References

  1. J. Dittmann, A. Steinmetz, and R. Steinmetz, "Content-based digital signature for motion pictures authentication and content-fragile watermarking," in Proceedings of the IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, 1999, pp. 209-213.
  2. D. C. Lou and J. L. Liu, "Fault resilient and compression tolerant digital signature for image authentication," IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 31-39, 2000. https://doi.org/10.1109/30.826378
  3. G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, "Watermarking digital image and video data: A stateof-the-art overview," IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20-46, 2000. https://doi.org/10.1109/79.879337
  4. A. Mishra, C. Agarwal, A. Sharma, and P. Bedi, "Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm," Expert Systems with Applications, vol. 41, no. 17, pp. 7858-7867, 2014. https://doi.org/10.1016/j.eswa.2014.06.011
  5. X. J. Qi and X. Xin, "A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization," Journal of Visual Communication and Image Representation, vol. 30, pp. 312-327, 2015. https://doi.org/10.1016/j.jvcir.2015.05.006
  6. Z. Li, K. H. Yap, and B. Y. Lei, "A new blind robust image watermarking scheme in SVD-DCT composite domain," in Proceedings of the 18th IEEE International Conference on Image Processing, Brussels, Belgium, 2011, pp. 2757-2760.
  7. R. E. Curto and Y. M. Han, "Weyl's theorem, a-Weyl's theorem, and local spectral theory," Journal of the London Mathematical Society, vol. 67, no. 2, pp. 499-509, 2003. https://doi.org/10.1112/S0024610702004027
  8. Y. H. Zhang, "Blind watermark algorithm based on HVS and RBF neural network in DWT domain," WSEAS Transactions on Computers, vol. 8, no. 1, pp. 174-183, 2009.
  9. O. Benrhouma, H. Hermassi, A. A. A. El-Latif, and S. Belghith, "Chaotic watermark for blind forgery detection in images," Multimedia Tools and Applications, vol. 75, no. 14, pp. 8695-8718, 2016. https://doi.org/10.1007/s11042-015-2786-z
  10. O. Benrhouma, H. Hermassi, and S. Belghith, "Tamper detection and self-recovery scheme by DWT watermarking," Nonlinear Dynamics, vol. 79, no. 3, pp. 1817-1833, 2015. https://doi.org/10.1007/s11071-014-1777-3
  11. P. L. Lin, C. K. Hsieh, and P. W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 38, no. 12, pp. 2519-2529, 2005. https://doi.org/10.1016/j.patcog.2005.02.007
  12. Y. P. Zhang, C. Y. Wang, and X. Zhou, "RST resilient watermarking scheme based on DWT-SVD and scale-invariant feature transform," Algorithms, vol. 10, no. 2, article no. 41, pp. 1-21, 2017.
  13. S. Dadkhah, A. A. Manaf, Y. Hori, A. E. Hassanien, and S. Sadeghi, "An effective SVD-based image tampering detection and self-recovery using active watermarking," Signal Processing: Image Communication, vol. 29, no. 10, pp. 1197-1210, 2014. https://doi.org/10.1016/j.image.2014.09.001
  14. M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol. 9, no. 3, pp. 432-441, 2000. https://doi.org/10.1109/83.826780
  15. J. Fridrich, M. Goljan, and N. Memon, "Cryptanalysis of the Yeung-Mintzer fragile watermarking technique," Journal of Electronic Imaging, vol. 11, no. 2, pp. 262-274, 2002. https://doi.org/10.1117/1.1459449
  16. P. W. Wong and N. Memon, "Secret and public key authentication watermarking schemes that resist vector quantization attack," in Proceedings of the SPIE - Security and Watermarking of Multimedia Contents II, San Jose, CA, USA, 2000, pp. 417-427.
  17. C. C. Chang, Y. H. Fan, and W. L. Tai, "Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 2, pp. 654-661, 2008. https://doi.org/10.1016/j.patcog.2007.06.003
  18. Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image quality assessment: From error visibility to structural similarity," IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600-612, 2004. https://doi.org/10.1109/TIP.2003.819861
  19. F. Liu, H. Feng, and C. Lu, "Blind watermarking scheme based on U matrix through QSVD transformation," International Journal of Security and Its Applications, vol. 9, no. 4, pp. 203-216, 2015. https://doi.org/10.14257/ijsia.2015.9.4.19
  20. R. Z. Liu and T. N. Tan, "An SVD-based watermarking scheme for protecting rightful ownership," IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121-128, 2002. https://doi.org/10.1109/6046.985560
  21. N. E. H. Golea, R. Seghir, and R. Benzid, "A bind RGB color image watermarking based on singular value decomposition," in Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications, Hammamet, Tunisia, 2010, article no. 5586967, pp. 1-5.
  22. Q. T. Su, Y. G. Niu, H. L. Zhou, and X. X. Liu, "A blind dual color images watermarking based on singular value decomposition," Applied Mathematics and Computation, vol. 219, no. 16, pp. 8455-8466, 2013. https://doi.org/10.1016/j.amc.2013.03.013
  23. Y. F. Di, C. F. Lee, Z. H. Wang, C. C. Chang, and J. J. Li, "A robust and removable watermarking scheme using singular value decomposition," KSII Transactions on Internet & Information Systems, vol. 10, no. 12, pp. 5268-5285, 2016. https://doi.org/10.3837/tiis.2016.12.008
  24. J. M. Guo and H. Prasetyo, "False-positive-free SVD-based image watermarking," Journal of Visual Communication and Image Representation, vol. 25, no. 5, pp. 1149-1163, 2014. https://doi.org/10.1016/j.jvcir.2014.03.012
  25. Y. P. Zhang, C. Y. Wang, X. L. Wang, and M. Wang, "Feature-based image watermarking algorithm using SVD and APBT for copyright protection," Future Internet, vol. 9, no. 2, article no. 13, pp. 1-15, 2017.
  26. M. Y. Xiao, Z. B. He, and T. W. Quan, "A robust digital watermarking algorithm based on framelet and SVD," in Proceedings of the SPIE - The 9th International Symposium on Multispectral Image Processing and Pattern Recognition, Enshi, Hubei, China, 2015, article no. 981119, pp. 1-6.
  27. N. Narula, D. Sethi, and P. P. Bhattacharya, "Comparative analysis of DWT and DWT-SVD watermarking techniques in RGB images," International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 8, no. 4, pp. 339-348, 2015. https://doi.org/10.14257/ijsip.2015.8.4.29
  28. D. Singh and S. K. Singh, "DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection," Multimedia Tools and Applications, vol. 76, no. 11, pp. 13001-13024, 2017. https://doi.org/10.1007/s11042-016-3706-6
  29. S. Fazli and M. Moeini, "A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks," Optik, vol. 127, no. 2, pp. 964-972, 2016. https://doi.org/10.1016/j.ijleo.2015.09.205
  30. N. M. Makbol, B. E. Khoo, and T. H. Rassem, "Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics," IET Image Processing, vol. 10, no. 1, pp. 34-52, 2016. https://doi.org/10.1049/iet-ipr.2014.0965
  31. S. Bekkouch and K. M. Faraoun, "Robust and reversible image watermarking scheme using combined DCT-DWT-SVD transforms," Journal of Information Processing Systems, vol. 11, no. 3, pp. 406-420, 2015. https://doi.org/10.3745/JIPS.02.0021
  32. I. A. Ansari, M. Pant, and C. W. Ahn, "PSO optimized and secured watermarking scheme based on DWT and SVD," in Proceedings of the 5th International Conference on Soft Computing for Problem Solving, Roorkee, India, 2015, pp. 411-424.
  33. K. Loukhaoukha, J. Y. Chouinard, and M. H. Taieb, "Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization," Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 4, pp. 303-319, 2011.
  34. C. C. Lai, C. C. Tsai, and S. T. Pan, "An SVD-based watermarking scheme using improved micro-genetic algorithm," in Proceedings of the IEEE International Conference on Fuzzy Systems, Jeju Island, Korea, 2009, pp. 1875-1878.
  35. I. A. Ansari, M. Pant, and C. W. Ahn, "Robust and false positive free watermarking in IWT domain using SVD and ABC," Engineering Applications of Artificial Intelligence, vol. 49, pp. 114-125, 2016. https://doi.org/10.1016/j.engappai.2015.12.004
  36. S. Lalani and D. D. Doye, "Discrete wavelet transform and a singular value decomposition technique for watermarking based on an adaptive fuzzy inference system," Journal of Information Processing Systems, vol. 13, no. 2, pp. 340-347, 2017. https://doi.org/10.3745/JIPS.03.0067
  37. J. M. Guo and H. Prasetyo, "Security attacks on the wavelet transform and singular value decomposition image watermarking," in Proceedings of the 17th IEEE International Symposium on Consumer Electronics, Hsinchu, Taiwan, 2013, pp. 217-218.
  38. R. Sun, H. Sun, and T. R. Yao, "A SVD- and quantization based semi-fragile watermarking technique for image authentication," in Proceedings of the 6th International Conference on Signal Processing, Beijing, China, 2002, pp. 1592-1595.
  39. S. C. Byun, S. K. Lee, A. H. Tewfik, and B. H. Ahn, "A SVD-based fragile watermarking scheme for image authentication," in Proceedings of the 1st International Workshop on Digital Watermarking, Seoul, Korea, 2002, pp. 170-178.
  40. H. Zhang, C. Y. Wang, and X. Zhou, "Fragile watermarking for image authentication using the characteristic of SVD," Algorithms, vol. 10, no. 1, article no. 27, pp. 1-12, 2017.
  41. H. C. Wu, C. P. Yeh, and C. S. Tsai, "A semi-fragile watermarking scheme based on SVD and VQ techniques," in Proceedings of the International Conference on Computational Science and Its Applications: Part III, Glasgow, UK, 2006, pp. 406-415.
  42. W. C. Wu and Z. W. Lin, "SVD-based self-embedding image authentication scheme using quick response code features," Journal of Visual Communication and Image Representation, vol. 38, pp. 18-28, 2016. https://doi.org/10.1016/j.jvcir.2016.02.005
  43. I. A. Ansari, M. Pant, and C. W. Ahn, "SVD based fragile watermarking scheme for tamper localization and self-recovery," International Journal of Machine Learning and Cybernetics, vol. 7, no. 6, pp. 1225-1239, 2016. https://doi.org/10.1007/s13042-015-0455-1
  44. M. Moniruzzaman, M. A. K. Hawlader, M. F. Hossain, and M. A. Rashid, "SVD and chaotic system based watermarking approach for recovering crime scene image," in Proceedings of the 8th International Conference on Electrical and Computer Engineering, Dhaka, Bangladesh, 2014, pp. 132-135.