Review on Digital Image Watermarking Based on Singular Value Decomposition

With the rapid development of computer technologies, a number of image modification methods have emerged, which have great impacts on the security of image information. Therefore, it is necessary to protect the integrity and authenticity of digital images, and digital watermarking technique consequently becomes a research hotspot. An effort is made to survey and analyze advancements of image watermarking algorithms based on singular value decomposition (SVD) in recent years. In the first part, an overview of watermarking techniques is presented and then mathematical theory of SVD is given. Besides, SVD watermarking model, features, and evaluation indexes are demonstrated. Various SVD-based watermarking algorithms, as well as hybrid watermarking algorithms based on SVD and other transforms for copyright protection, tamper detection, location, and recovery are reviewed in the last part.

[1]  Punam Bedi,et al.  Optimized gray-scale image watermarking using DWT-SVD and Firefly Algorithm , 2014, Expert Syst. Appl..

[2]  Durgesh Singh,et al.  DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection , 2017, Multimedia Tools and Applications.

[3]  Redha Benzid,et al.  A bind RGB color image watermarking based on singular value decomposition , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.

[4]  Safya Belghith,et al.  Tamper detection and self-recovery scheme by DWT watermarking , 2015 .

[5]  Nasir D. Memon,et al.  Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.

[6]  Xiao Zhou,et al.  RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform , 2017, Algorithms.

[7]  Millie Pant,et al.  SVD based fragile watermarking scheme for tamper localization and self-recovery , 2016, Int. J. Mach. Learn. Cybern..

[8]  Jing-Ming Guo,et al.  False-positive-free SVD-based image watermarking , 2014, J. Vis. Commun. Image Represent..

[9]  Kamel Mohamed Faraoun,et al.  Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms , 2015, J. Inf. Process. Syst..

[10]  Yanhong Zhang Blind watermark algorithm based on HVS and RBF neural network in DWT domain , 2009 .

[11]  Safya Belghith,et al.  Chaotic watermark for blind forgery detection in images , 2015, Multimedia Tools and Applications.

[12]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[13]  Jean-Yves Chouinard,et al.  Optimal Image Watermarking Algorithm Based on LWT-SVD via Multi-objective Ant Colony Optimization , 2011, J. Inf. Hiding Multim. Signal Process..

[14]  Jing-Ming Guo,et al.  Security attacks on the wavelet transform and singular value decomposition image watermarking , 2013, 2013 IEEE International Symposium on Consumer Electronics (ISCE).

[15]  Saeid Fazli,et al.  A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks , 2016 .

[16]  Min Wang,et al.  Feature-Based Image Watermarking Algorithm Using SVD and APBT for Copyright Protection , 2017, Future Internet.

[17]  Ralf Steinmetz,et al.  Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[18]  F. Liu,et al.  Blind Watermarking Scheme based on U matrix Through QSVD Transformation , 2015 .

[19]  Chin-Chen Chang,et al.  Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery , 2008, Pattern Recognit..

[20]  Rui Sun,et al.  A SVD- and quantization based semi-fragile watermarking technique for image authentication , 2002, 6th International Conference on Signal Processing, 2002..

[21]  Neha Narula,et al.  Comparative Analysis of DWT and DWT-SVD Watermarking Techniques in RGB Images , 2015 .

[22]  Millie Pant,et al.  PSO Optimized and Secured Watermarking Scheme Based on DWT and SVD , 2015, SocProS.

[23]  Chin-Chen Chang,et al.  A Robust and Removable Watermarking Scheme Using Singular Value Decomposition , 2016, KSII Trans. Internet Inf. Syst..

[24]  Aboul Ella Hassanien,et al.  An effective SVD-based image tampering detection and self-recovery using active watermarking , 2014, Signal Process. Image Commun..

[25]  Yugang Niu,et al.  A blind dual color images watermarking based on singular value decomposition , 2013, Appl. Math. Comput..

[26]  G. C. Langelaar,et al.  Watermarking digital image and video data , 2000 .

[27]  Wen-Chuan Wu,et al.  SVD-based self-embedding image authentication scheme using quick response code features , 2016, J. Vis. Commun. Image Represent..

[28]  R. Curto,et al.  Weyl's Theorem, a‐Weyl's Theorem, and Local Spectral Theory , 2002, math/0207064.

[29]  Hsien-Chu Wu,et al.  A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques , 2006, ICCSA.

[30]  Tingwei Quan,et al.  A robust digital watermarking algorithm based on framelet and SVD , 2015, International Symposium on Multispectral Image Processing and Pattern Recognition.

[31]  Taha H. Rassem,et al.  Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics , 2016, IET Image Process..

[32]  Shing-Tai Pan,et al.  An SVD-based watermarking scheme using improved micro-genetic algorithm , 2009, 2009 IEEE International Conference on Fuzzy Systems.

[33]  Tieniu Tan,et al.  An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..

[34]  Nasir D. Memon,et al.  Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.

[35]  Millie Pant,et al.  Robust and false positive free watermarking in IWT domain using SVD and ABC , 2016, Eng. Appl. Artif. Intell..

[36]  Ahmed H. Tewfik,et al.  A SVD-Based Fragile Watermarking Scheme for Image Authentication , 2002, IWDW.

[37]  Dharmapal Dronacharya Doye,et al.  Discrete Wavelet Transform and a Singular Value Decomposition Technique for Watermarking Based on an Adaptive Fuzzy Inference System , 2017, J. Inf. Process. Syst..

[38]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[39]  Xing Xin,et al.  A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization , 2015, J. Vis. Commun. Image Represent..

[40]  Xiao Zhou,et al.  Fragile Watermarking for Image Authentication Using the Characteristic of SVD , 2017, Algorithms.

[41]  Zhen Li,et al.  A new blind robust image watermarking scheme in SVD-DCT composite domain , 2011, 2011 18th IEEE International Conference on Image Processing.

[42]  Der-Chyuan Lou,et al.  Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..

[43]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.