170
Views
10
CrossRef citations to date
0
Altmetric
Original Research Paper

An enhanced semi-blind DWT–SVD-based watermarking technique for digital images

, , &
Pages 29-38 | Accepted 26 Feb 2011, Published online: 12 Nov 2013

REFERENCES

  • Wang Y, Doherty JF, van Dyck RE. A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Process., 2002, 11, 77–88.
  • Carminati B, Ferrari E, Hung PCK. Security conscious web service composition, Proc. 2006 IEEE Int. Conf. on Web services: ICWS 2006, Chicago, IL, USA, September 2006, IEEE Computer Society, pp. 695–704.
  • Cheddad A, Condell J, Curran K, McKevitt P. Digital image steganography: survey and analyses of current methods. Signal Process., 2010, 90, 727–752.
  • White Paper WIPRO. Digital watermarking: a technology overview [online], 2002, 1–9 [accessed 15 October 2010]. Available at: <http://www.securitytechnet.com/resource/application>
  • Sleit A, Abusitta A. A visual cryptography based watermark technology for individual and group images. J. Syst. Cybern. Inf., 2007, 5, 24–32.
  • Prasad M, Koliwad S. A comprehensive survey of contemporary researches in watermarking for copyright protection of digital images. IJCSNS Int. J. Comput. Sci. Network Secur., 2009, 9, 91–107.
  • van Schyndel RG, Tirkel AZ, Osborne CF. A digital watermark, Proc. 1st IEEE Int. Conf. on Image processing: ICIP ’94, Austin, TX, USA, November 1994, IEEE Computer Society, pp. 86–90.
  • Pitas I. A method for signature casting on digital images, Proc. 3rd IEEE Int. Conf. on Image processing: ICIP ’96, Lausanne, Switzerland, September 1996, IEEE Signal Processing Society, pp. 215–318.
  • Chu WC. DCT-based image watermarking using subsampling. IEEE Trans. Multimedia, 2003, 5, 34–38.
  • Lin SD, Shie S, Guo JY. Improving the robustness of DCT-based image watermarking against JPEG compression. Comput. Stand. Interfaces, 2010, 32, 54–60.
  • Barni M, Bartolini F, Pive A. Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans. Image Process., 2001, 10, 783–791.
  • Reddy AA, Chatterji BN. A new wavelet based logo-watermarking scheme. Patt. Recogn. Lett., 2005, 26, 1019–1027.
  • Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia, 2002, 4, 121–128.
  • Mohan BC, Kumar SS. A robust image watermarking scheme using singular value decomposition. J. Multimedia, 2008, 3, 7–15.
  • Ganic E, Eskicioglu AM. Robust DWT–SVD domain image watermarking: embedding data in all frequencies, Proc. ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, September 2004, ACM, pp. 166–174.
  • Bhatnagar G, Raman B. A new robust reference watermarking scheme based on DWT–SVD. Comput. Stand. Interfaces, 2009, 31, 1002–1013.
  • Monemizadeh M, Seyedin SA. Optimal DWT–SVD domain image watermarking using multi-objective evolutionary algorithms, Proc. WRI World Cong. on Computer science and information engineering: CSIE 2009, Los Angeles, CA, USA, March–April 2009, IEEE Computer Society, pp. 259–263.
  • Kim K, Lee M, Lee H. Blind image watermarking scheme in DWT–SVD domain, Proc. 3rd Int. Conf. on Intelligent information hiding and multimedia signal processing: IIH-MSP 2007, Kaohsiung, Taiwan, November 2007, IEEE, pp. 477–480.
  • Wang M, Chen W. A hybrid DWT–SVD copyright protection scheme based on k-means clustering and visual cryptography. Comput. Stand. Interfaces, 2009, 31, 757–762.
  • Aslantas V. SVD and DWT–SVD domain robust watermarking using differential evolution algorithm. Lect. Notes Electr. Eng., 2009, 39, 147–159.
  • Lin C, Liu J, Shih C, Lee Y. A robust watermark scheme for copyright protection, Proc. Int. Conf. on Multimedia and ubiquitous engineering: MUE 2008, Busan, Korea, April 2008, IEEE Computer Society, pp. 132–137.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.