Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its wide- ly used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital water- mark inside the information so that ownership of the information cannot be claimed by third party. With a lot of information available on various search engines, to protect the ownership of information is a crucial area of research. In recent year, several digital watermarking techniques are presented based on discrete cosine transform (DCT), discrete wavelets transform (DWT) and discrete fourier transforms (DFT). In this paper, we proposed an algorithm for digital image watermarking technique based on singular value decomposition; both of the L and U components are explored for watermarking algorithm. This technique refers to the watermark embedding procedure and wa- termark extracting procedure. Digital image watermarking techniques for copyright protection is robust. The experimental results prove that the quality of the watermarked image is good and that there is strong resistant against many attacks. The image watermarking tech- niques help to achieve artificial intelligence. Digital image watermarking is the most effective solution in this area and its use to protect the information is increasingly exponentially day by day.
[1]
Markus G. Kuhn,et al.
Attacks on Copyright Marking Systems
,
1998,
Information Hiding.
[2]
Sung-Hwan Jung,et al.
A survey of watermarking techniques applied to multimedia
,
2001,
ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570).
[3]
Chin-Chen Chang,et al.
SVD-based digital image watermarking scheme
,
2005,
Pattern Recognit. Lett..
[4]
Ioannis Pitas,et al.
Robust image watermarking in the spatial domain
,
1998,
Signal Process..
[5]
Jean-Paul M. G. Linnartz,et al.
Some general methods for tampering with watermarks
,
1998,
IEEE J. Sel. Areas Commun..
[6]
V. Santhi,et al.
A Review on Geometric Invariant Digital Image Watermarking Techniques
,
2011
.
[7]
Jian Zhao,et al.
Embedding Robust Labels into Images for Copyright Protection
,
1995,
KnowRight.
[8]
Jagdish Chandra Patra,et al.
A simple ICA-based digital image watermarking scheme
,
2008,
Digit. Signal Process..
[9]
Ingemar J. Cox,et al.
Digital watermarking for copyright protection: a communications perspective
,
2001,
IEEE Communications Magazine.
[10]
Zoran Bojkovic,et al.
Multimedia contents security: watermarking diversity and secure protocols
,
2003,
6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service, 2003. TELSIKS 2003..