By Topic

Improved RST-attacks resilient image watermarking based on joint SVD-DCT

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Gupta, P.K. ; Samrat Ashok Technol. Inst., Vidisha, India ; Shrivastava, S.K.

The risk of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. Several types of watermarking algorithms have been developed so far each of which has its own advantages and limitations. Among this recently Singular Value Decomposition (SVD) based watermarking has attracted researchers due to its simplicity and some attractive mathematical properties of SVD. SVD-DCT based watermarking given by Sverdlov has limitation to high angle rotation, large degree scaling. Also translation attack is not done. In proposed improved RST attacks invariant image watermarking based on joint SVD-DCT, a preprocessing step before the watermark extraction is proposed which makes the algorithm resilient to geometric attack i.e. RST attack. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm against RST attacks and some other attacks. Experimental results have been compared with existing algorithm which seems to be promising.

Published in:

Computer and Communication Technology (ICCCT), 2010 International Conference on

Date of Conference:

17-19 Sept. 2010