Skip to main content

A Cheque Watermarking System Using Singular Value Decomposition for Copyright Protection of Cheque Images

  • Conference paper
  • First Online:
Advances in Signal Processing and Intelligent Recognition Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 425))

Abstract

Recently, all bank system has online money transfer facility. It may be either by online transactions or by NEFT cheques. Bank system pays money through cash, demand draft, and online money transfer or by cheques. Few days ago, there was a flow of the physical cheques issued by bank customer from drawer to the drawee branch. This process consumes more time and increase physical work of the employee. To overcome this problem cheque truncation system (CTS) comes into picture. This system provides faster clearing and transmission of bank cheques issued by bank customer from drawer branch account to the drawee branch account.CTS transfers the cheque in image format. Due to this reason, there is a need of copyright protection to the cheque image. It can be provided by digital watermarking techniques. The digital watermarking techniques can be applied using various methods. Such as, frequency domain, spatial domain, computational intelligence technique, etc. In this paper, it is going to discuss, “A Cheque Watermarking System Using Singular Value Decomposition for Copyright Protection of Cheque Images”. The aim of this paper is to obtain secure cheque image & watermark after extraction process of watermark at drawee branch.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shnayderman, A., Gusev, A., Eskicioglu, A.M.: An SVD-Based Gray scale Image Quality Measure for Local and Global Assessment. IEEE Transaction on Image Processing 15(2), 422–429 (2006)

    Article  Google Scholar 

  2. Deepa Mathew, K.: SVD based Image Watermarking Scheme. IJCA (2010). Special Issue on Evolutionary Computation for Optimization Techniques ECOT

    Google Scholar 

  3. Hsu, C.T., Wu, J.L.: Hidden Digital Watermarks In Images. IEEE Trans. Image Process. 8(1), 58–68 (1999)

    Article  Google Scholar 

  4. Liu, R.Z., Tan, T.N.: An SVD-Based Watermarking Scheme for Protecting Rightful Ownership. IEEE Trans. On Multimedia 4(1), 121–128 (2002)

    Article  Google Scholar 

  5. Wang, B., Ding, J., Wen, Q., Liao, X., Liu, C.: An image watermarking algorithm based on DWT DCT and SVD. In: Proceedings of IC-NIDC 2009 (2009)

    Google Scholar 

  6. Bedi, S.S., Kumar, A., Kapoor, P.: Robust Secure SVD Based DCT– DWT Oriented Watermarking Technique for Image Authentication. Special Issue of the International Journal of the Computer, the Internet and Management 17(SP1), March 2009

    Google Scholar 

  7. Hernandez, J.R., Perez Gonzalez, F., Amado, M.: DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure. IEEE Transaction on Image Processing 9(1), January 2000

    Google Scholar 

  8. Panada, J., Bisht, J., Kapoor, R., Bhattacharyya, A.: Digital image watermarking in integer wavelet domain using hybrid techniques. In: International Conference on Advances in Computer Engineering (ACE), pp, 163–167 (2010)

    Google Scholar 

  9. Chan, C., Cheng, L.: Hiding Data in Images by Simple LSB Substitution. Pattern Recognition 37(3), 469–474 (2004)

    Article  MATH  Google Scholar 

  10. Na, W., Chiya, Z., Xia, L., Yunjin, W.: Enhancing iris-feature security with steganography. In: The Fifth IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 2233–2237 (2010)

    Google Scholar 

  11. Wang, S., Lin, Y.: Wavelet Tree Quantization for Copyright Protection Watermarking. IEEE Trans. Image Processing 13(2), 154–164 (2004)

    Article  Google Scholar 

  12. Nikolaidis, A., Pitas, I.: Asymptotically optimal detection for additive watermarking in the DCT and DWT domains. IEEE Trans. Image Processing 2(10), 563–571 (2003)

    Article  Google Scholar 

  13. Lin, S., Chin, C.: A Robust DCT-based Watermarking for Copyright Protection. IEEE Trans. Consumer Electronics 46(3), 415–421 (2000)

    Article  Google Scholar 

  14. Wu, Y.: On the Security of an SVD-Based Ownership Watermarking. IEEE Transactions on Multimedia 7(4), 624–627 (2005)

    Article  Google Scholar 

  15. Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia 4(1), 121–128 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sudhanshu Suhas Gonge .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Gonge, S.S., Ghatol, A. (2016). A Cheque Watermarking System Using Singular Value Decomposition for Copyright Protection of Cheque Images. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28658-7_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28656-3

  • Online ISBN: 978-3-319-28658-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics