Comparative Approach Between Singular Value Decomposition and Randomized Singular Value Decomposition-based Watermarking

Threats and attacks on networks have increased significantly with the recent advancement of technologies. In order to avoid such problems, watermarking techniques was introduced. However, several popular watermarking techniques consume much more time to embed and extract the hidden message. In this current work, a randomized singular value decomposition (rSVD)-based watermarking technique has been proposed in order to avoid such problems. In this work, firstly, the watermark is embedded into the cover image using singular value decomposition, and then the rSVD is employed. Finally, the obtained results were compared to check the time complexity of both methods and to compare the quality of watermarked image and recovered watermarks.

[1]  Xuemei Zhang,et al.  Perceptual image quality: Effects of tone characteristics , 2005, J. Electronic Imaging.

[2]  Nilanjan Dey,et al.  An edge based blind watermarking technique of medical images without devalorizing diagnostic parameters , 2013, 2013 International Conference on Advances in Technology and Engineering (ICATE).

[3]  Nilanjan Dey,et al.  Tamper detection of electrocardiographic signal using watermarked bio–hash code in wireless cardiology , 2015 .

[4]  Nathan Halko,et al.  Finding Structure with Randomness: Probabilistic Algorithms for Constructing Approximate Matrix Decompositions , 2009, SIAM Rev..

[5]  N. Dey,et al.  Feature analysis for the reversible watermarked electrooculography signal using Low distortion Prediction-error Expansion , 2012, 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS).

[6]  Nilanjan Dey,et al.  Reversible Color Image Watermarking Using Trigonometric Functions , 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies.

[7]  Nilanjan Dey,et al.  Feature Analysis of Blind Watermarked Electromyogram Signal in Wireless Telemonitoring , 2014 .

[8]  Kamal Kant Bharadwaj,et al.  A Particle Swarm Optimization Approach to Fuzzy Case-based Reasoning in the Framework of Collaborative Filtering , 2014, Int. J. Rough Sets Data Anal..

[9]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[10]  Chao Zhang,et al.  A blind video watermark detection method based on 3D-DWT transform , 2010, 2010 IEEE International Conference on Image Processing.

[11]  Sheli Sinha Chaudhuri,et al.  Lifting Wavelet Transformation based blind watermarking technique of Photoplethysmographic signals in wireless telecardiology , 2012, 2012 World Congress on Information and Communication Technologies.

[12]  Nilanjan Dey,et al.  A Session Based Multiple Image Hiding Technique using DWT and DCT , 2012 .

[13]  Nilanjan Dey,et al.  Particle Swarm Optimization based parameter optimization technique in medical information hiding , 2013, 2013 IEEE International Conference on Computational Intelligence and Computing Research.

[14]  K. Deb,et al.  Combined DWT-DCT based digital image watermarking technique for copyright protection , 2012, 2012 7th International Conference on Electrical and Computer Engineering.

[15]  Nilanjan Dey,et al.  Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method , 2012, SIN '12.

[16]  Nilanjan Dey,et al.  Firefly Algorithm for Optimization of Scaling Factors During Embedding of Manifold Medical Information: An Application in Ophthalmology Imaging , 2014 .

[17]  Patrick S. Huggins,et al.  A Randomized Singular Value Decomposition Algorithm for Image Processing Applications , 2004 .

[18]  Jiwu Huang,et al.  Adaptive image watermarking scheme based on visual masking , 1998 .

[19]  Nilanjan Dey,et al.  DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal , 2012, 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA).

[20]  Fabrice Morestin,et al.  Estimation of mixed-mode stress intensity factors using digital image correlation and an interaction integral , 2005 .

[21]  Nilanjan Dey,et al.  Analysis of P-QRS-T Components Modified by Blind Watermarking Technique Within the Electrocardiogram Signal for Authentication in Wireless Telecardiology Using DWT , 2012 .

[22]  Nilanjan Dey,et al.  VISIBLE WATERMARKING WITHIN THE REGION OF NON -INTEREST OF MEDICAL IMAGES BASED ON FUZZY C-MEANS AND HARRIS CORNER DETECTION , 2013 .

[23]  Nilanjan Dey,et al.  Wavelet based watermarked normal and abnormal heart sound identification using spectrogram analysis , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.

[24]  M.Y. Joshi,et al.  Robust image watermarking based on singular value decomposition and discrete wavelet transform , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[25]  Qiang Zhang,et al.  Randomized SVD Methods in Hyperspectral Imaging , 2012, J. Electr. Comput. Eng..

[26]  Aihua Li,et al.  Robust Watermarking Scheme Based on Singular Value of Decomposition in DWT Domain , 2009, 2009 Asia-Pacific Conference on Information Processing.

[27]  N. Dey,et al.  DWT-DCT-SVD based intravascular ultrasound video watermarking , 2012, 2012 World Congress on Information and Communication Technologies.

[28]  Nilanjan Dey,et al.  Computed Tomography Image Enhancement Using Cuckoo Search: A Log Transform Based Approach , 2015 .

[29]  Nilanjan Dey,et al.  A Novel Approach of Color Image Hiding using RGB Color planes and DWT , 2012, ArXiv.

[30]  Vinay Kumar Srivastava,et al.  DWT-based multiple watermarking for privacy and security of digital images in e-commerce , 2011, 2011 International Conference on Multimedia, Signal Processing and Communication Technologies.

[31]  Nilanjan Dey,et al.  Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search , 2013, Int. J. Bio Inspired Comput..