Digital Watermarking in the Transform Domain with Emphasis on SVD

Digital Watermarking in the Transform Domain with Emphasis on SVD

Maria Calagna (Dipartimento di Informatica, Universita’ di Roma La Sapienza, Italy)
Copyright: © 2009 |Pages: 21
DOI: 10.4018/978-1-59904-869-7.ch003
OnDemand PDF Download:


The chapter illustrates watermarking based on the transform domain. It argues that transform-based watermarking is robust to possible attacks and imperceptible with respect to the quality of the multimedia file we would like to protect. Among those transforms commonly used in communications, we emphasize the use of singular value decomposition (SVD) for digital watermarking. The main advantage of this choice is flexibility of application. In fact, SVD may be applied in several fields where data are organized as matrices, including multimedia and communications. We present a robust SVD-based watermarking scheme for images. According to the detection steps, the watermark can be determined univocally, while other related works present flaws in watermark detection. A case study of our approach refers to the protection of geographical and spatial data in case of the raster representation model of maps.

Complete Chapter List

Search this Book:
List of Reviewers
Table of Contents
Anthony T.S. Ho
Chang-Tsun Li
Chapter 1
Hae Yong Kim, Sergio Vicente Denser Pamboukian, Paulo Sérgio Licciardi Messeder Barreto
Data hiding (DH) is a technique used to embed a sequence of bits in a cover image with small visual deterioration and the means to extract it... Sample PDF
Authentication Watermarkings for Binary Images
Chapter 2
Shiguo Lian
Since the past decade, multimedia protection technologies have been attracting more and more researchers. Among them, multimedia encryption and... Sample PDF
Secure Multimedia Content Distribution Based on Watermarking Technology
Chapter 3
Maria Calagna
The chapter illustrates watermarking based on the transform domain. It argues that transform-based watermarking is robust to possible attacks and... Sample PDF
Digital Watermarking in the Transform Domain with Emphasis on SVD
Chapter 4
Robert Caldelli, Alessandro Piva
This chapter is devoted to the analysis of the collusion attack applied to current digital video watermarking algorithms. In particular, we analyze... Sample PDF
Digital Video Watermarking and the Collusion Attack
Chapter 5
Nataša Terzija
The resistance of watermarking schemes against geometric distortions has been the subject of much research and development effort in the last 10... Sample PDF
A Survey of Current Watermarking Synchronization Techniques
Chapter 6
Martin Steinebach, Patrick Wolf
Digital watermarking promises to be a mechanism for copyright protection without being a technology for copy prevention. This sometimes makes it... Sample PDF
On the Necessity of Finding Content Before Watermark Retrieval: Active Search Strategies for Localising Watermarked Media on the Internet
Chapter 7
Fouad Khelifi, Fatih Kurugollu, Ahmed Bouridane
The problem of multiplicative watermark detection in digital images can be viewed as a binary decision where the observation is the possibility that... Sample PDF
Statistical Watermark Detection in the Transform Domain for Digital Images
Chapter 8
Christopher B. Smith, Sos S. Agaian
Modern digital steganography has evolved a number of techniques to embed information near invisibly into digital media. Many of the techniques for... Sample PDF
On Noise, Steganography, and the Active Warden
Chapter 9
Patrick Le Callet, Florent Autrusseau, Patrizio Campisi
In watermarking and data hiding context, it may be very useful to have methods checking the invisibility of the inserted data or at least, checking... Sample PDF
Visibility Control and Quality Assessment of Watermarking and Data Hiding Algorithms
Chapter 10
Maciej Liskiewicz, Ulrich Wölfel
This chapter provides an overview, based on current research, on theoretical aspects of digital steganography— a relatively new field of computer... Sample PDF
Computational Aspects of Digital Steganography
Chapter 11
Christopher B. Smith, Sos S. Agaian
Steganalysis is the art and science of detecting hidden information. Modern digital steganography has created techniques to embed information near... Sample PDF
On Steganalysis and Clean Image Estimation
Chapter 12
Hafiz Malik, Rajarathnam Chandramouli, K. P. Subbalakshmi
In this chapter we provide a detailed overview of the state of the art in steganalysis. Performance of some steganalysis techniques are compared... Sample PDF
Steganalysis: Trends and Challenges
Chapter 13
Benchmarking Steganalysis  (pages 266-290)
Andrew D. Ker
This chapter discusses how to evaluate the effectiveness of steganalysis techniques. In the steganalysis literature, numerous different methods are... Sample PDF
Benchmarking Steganalysis
Chapter 14
Matthew James Sorrell
We propose that the implementation of the JPEG compression algorithm represents a manufacturer and model-series specific means of identification of... Sample PDF
Digital Camera Source Identification Through JPEG Quantisation
Chapter 15
Hongxia Jin
This chapter discusses the cryptographic traitor tracing technology that is used to defend against piracy in multimedia content distribution. It... Sample PDF
Traitor Tracing for Multimedia Forensics
Chapter 16
Dominik Engel, Thomas Stütz, Andreas Uhl
In this chapter we investigate two different techniques for transparent/perceptual encryption of JPEG2000 files or bitstreams in the context of... Sample PDF
Efficient Transparent JPEG2000 Encryption
About the Contributors