Skip to main content

Comparative Approach Between Singular Value Decomposition and Randomized Singular Value Decomposition-based Watermarking

  • Chapter
  • First Online:

Part of the book series: Studies in Computational Intelligence ((SCI,volume 660))

Abstract

Threats and attacks on networks have increased significantly with the recent advancement of technologies. In order to avoid such problems, watermarking techniques was introduced. However, several popular watermarking techniques consume much more time to embed and extract the hidden message. In this current work, a randomized singular value decomposition (rSVD)-based watermarking technique has been proposed in order to avoid such problems. In this work, firstly, the watermark is embedded into the cover image using singular value decomposition, and then the rSVD is employed. Finally, the obtained results were compared to check the time complexity of both methods and to compare the quality of watermarked image and recovered watermarks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  2. Huang J, Shi YQ (1998) Adaptive image watermarking scheme based on visual masking. IEEE Electron Lett 34(8):748–750

    Article  Google Scholar 

  3. Mohammed AA, Sidqi H-M (2011) Robust image watermarking scheme based on wavelet technique. Int J Comput Sci Secur 5(4):394–404

    Google Scholar 

  4. Arathi C (2012) A semi fragile image watermarking technique using block based SVD. Int J Comput Sci Inf Technol 3(2):3644–3647

    Google Scholar 

  5. Ganicand E, Eskicioglu AM (2005) Robust embedding of visual watermarks usig DWT-SVD. J Electron Imaging 14(4):1–9

    Google Scholar 

  6. Zhang J, Erway J, Hu X, Zhang Q, Plemmons R (2012) Randomized SVD methods in hyperspectral imaging. J Electr Comput Eng 2012:1–15

    Article  MathSciNet  MATH  Google Scholar 

  7. Drinea E, Drineas P, Huggins P (2001) A randomized singular value decomposition algorithm for image processing applications. In: Panhellenic Conference on Informatics (PCI)

    Google Scholar 

  8. Halko N, Martinsson PG, Tropp JA (2011) Finding structure with randomness: probabilistic algorithms for constructing approximate matrix decompositions. SIAM Rev 53(2):217–288

    Article  MathSciNet  MATH  Google Scholar 

  9. Bhagyashri K, Joshi MY (2010) Robust image watermarking based on singular value decomposition and discrete wavelet transform. In: 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT) 5:337–341

    Google Scholar 

  10. Dey N, Bose S, Chakraborty S, Mukherjee A, Madhulika, Samanta S (2013) Parallel image segmentation using multi-threading and k-means algorithm. In: IEEE international conference on computational intelligence and computing research (ICCIC), pp 26–28. doi:10.11.9/ICCIC.2013.6724171

    Google Scholar 

  11. Zhanh L, Li A (2009) Robust watermarking scheme based on singular value of decomposition in DWT domain. In: Information processing, Asia Pacific Confrence (APCIP), vol 2, pp 19–22. doi:10.1109/APCIP.2009.141

  12. Kamble S, Maheshkar V, Agarwal S, Srivastava VK (2011) DWT-based multiple watermarking for privacy and security of digital images in e-commerce. In: International conference on multimedia, signal processing and communication technologies (IMPACT), pp 224–227. doi:10.1109/MSPCT.2011.615048

  13. Singh SP, Rawat P, Agarwal S (2012) A robust watermarking approach using DCT-DWT. Int J Emerg Technol Adv Eng 2(8)

    Google Scholar 

  14. Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based intravascular ultrasound video watermarking. In: Second World Congress on information and communication technologies (WICT 2012), Trivandrum, India: October 30–November 02, 2012 (IEEE Xplore)

    Google Scholar 

  15. Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based blind watermarking technique of gray scale image in electrooculogram signal. In: international conference on intelligent systems design and applications (ISDA-2012), Kochi, 27–29 Nov 2012 (IEEE Xplore)

    Google Scholar 

  16. Wang A, Zhang C, Hao P (2010) A blind video watermark detection method based on 3d-DWT transform. In: 17th IEEE international conference on image processing (ICIP)

    Google Scholar 

  17. Bhattacharya T, Dey N, Chaudhuri SRB (2012) A session based multiple image hiding technique using DWT and DCT. Int J Comput Appl 38

    Google Scholar 

  18. Dey N, Bardhan Roy A, Dey S (2011) A novel approach of color image hiding using RGB color planes and DWT. Int J Comput Appl 36(5). ISSN: 0975–8887

    Google Scholar 

  19. Pal AK, Das P, Dey N (2013) Odd-even embedding scheme based modified reversible watermarking technique using Blueprint. arXiv preprint arXiv:1303.5972

  20. Dey N, Chakraborty S, Samanta S. Optimization of watermarking in biomedical signal. Lambert Publication, Heinrich-Böcking-Straße 6, 66121 Saarbrücken, Germany. ISBN-13: 978-3-659-46460-7

    Google Scholar 

  21. Dey N, Nandi B, Das P, Das A, Chaudhuri SS (2013) Retention of electrocardiogram features insignificantly devalorized as an effect of watermarking for a multi-modal biometric authentication system. In: Advances in biometrics for secure human authentication and recognition, pp 450. ISBN: 9781466582422

    Google Scholar 

  22. Dey N, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the blind–watermarked electroencephalogram signal in wireless telemonitoring using Alattar’s method. In: 5th International conference on security of information and networks (SIN 2012). In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2012, Jaipur, India

    Google Scholar 

  23. Das P, Munshi R, Dey N (2012) Alattar’s method based reversible watermarking technique of EPR within heart sound in wireless telemonitoring. Intellectual Property Rights And Patent Laws, IPRPL-2012, Jadavpur University, August 25

    Google Scholar 

  24. Dey N, Dey M, Biswas D, Das P, Das A, Chaudhuri SS. Tamper detection of electrocardiographic signal using watermarked bio-hash code in wireless cardiology. Spec Issue Int J Signal Imaging Syst Eng Inderscience (in press)

    Google Scholar 

  25. Deb K, Al-Seraj MS, Hoque MM, Sarkar MIH (2012) Combined DWT–DCT based digital image watermarking technique for copyright protection. In: Electrical & Computer Engineering (ICECE), 7th International conference

    Google Scholar 

  26. Bhattacharya T, Dey N, Chaudhuri SRB (2012) A session based multiple image hiding technique using DWT and DCT. Int J Comput Appl 38

    Google Scholar 

  27. Dey N, Dey G, Chakraborty S, Chaudhuri SS (2014) Feature analysis of blind watermarked electromyogram signal in wireless telemonitoring. Concepts and Trends in Healthcare Information System of the Annals of Information Systems Series (In press)

    Google Scholar 

  28. Dey N, Samanta S, Yang XS, Chaudhuri SS, Das A (2013) Optimization of scaling factors in electrocardiogram signal watermarking using Cuckoo Search. Int J Bio-Inspired Comput 5(5):315–326

    Article  Google Scholar 

  29. Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Using DWT analysis of P, QRS and T components and cardiac output modified by blind watermarking technique within the electrocardiogram signal for authentication in the wireless telecardiology. I.J. Image, Graphics and Signal Processing (IJIGSP). ISSN: 2074-9074

    Google Scholar 

  30. Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: International conference on electronic systems, signal processing and computing technologies, Nagpur, 09–11 January 2014, pp 105–110

    Google Scholar 

  31. Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Lifting wavelet transformation based blind watermarking technique of photoplethysmographic signals in wireless telecardiology. In: Second World Congress on information and communication technologies (WICT 2012), pp 230–235

    Google Scholar 

  32. Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference on communications, devices and intelligent systems (CODIS), pp 624–627

    Google Scholar 

  33. Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based intravascular ultrasound video watermarking. In: Second World Congress on information and communication technologies (WICT 2012), pp 224–229

    Google Scholar 

  34. Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based blind watermarking technique of gray scale image in electrooculogram signal. In: International conference on intelligent systems design and applications (ISDA-2012), pp 680–685

    Google Scholar 

  35. Chakraborty S, Samanta S, Mukherjee A, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC), pp 1–6

    Google Scholar 

  36. Dey N, Mishra G, Nandi B, Pal M, Das A, Chaudhuri SS (2012) Wavelet based watermarked normal and abnormal heart sound identification using spectrogram analysis. In: 2012 IEEE international conference on computational intelligence and computing research (ICCIC), pp 1–7

    Google Scholar 

  37. Dey N, Maji P, Das P, Das A, Chaudhuri SS (2013) An edge based watermarking technique of medical images without devalorizing diagnostic parameters. In: International conference on advances in technology and engineering, pp 1–5

    Google Scholar 

  38. Dey N, Das P, Biswas D, Maji P, Das A, Chaudhuri SS (2013) Visible watermarking within the region of non-interest of medical images based on fuzzy C-means and Harris corner detection. In: The fourth international workshop communications security & information assurance (CSIA-2013) [Springer], pp 161–168

    Google Scholar 

  39. Dey N, Biswas S, Roy AB, Das A, Chaudhuri SS (2012) Analysis of photoplethysmographic signals modified by reversible watermarking technique using prediction-error in wireless telecardiology. In: International conference of intelligent Infrastructure, 47th annual national convention of CSI, McGraw-Hill Proceeding

    Google Scholar 

  40. Réthoré J, Gravouil A, Morestin F, Combescure A (2005) Estimation of mixed-mode stress intensity factors using digital image correlation and an interaction integral. Int J Fract 132(1):65–79

    Article  Google Scholar 

  41. Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm in optimization of scaling factors for manifold medical information embedding. J Med Imaging Health Inf 4(3):384–394

    Article  Google Scholar 

  42. Samanta S, Dey N, Das P, Acharjee S, Chaudhuri SS (2012) Multilevel threshold based gray scale image segmentation using cuckoo search. In: International conference on emerging trends in electrical, communication and information technologies-ICECIT, Dec. 12–23

    Google Scholar 

  43. Tyagi S, Bharadwaj K (2014) A particle swarm optimization approach to fuzzy case-based reasoning in the framework of collaborative filtering. Int J Rough Sets Data Anal 1(1)

    Google Scholar 

  44. Ashour AS, Samanta S, Dey N, Kausar N, Abdessalemkaraa WBK, Hassanien A. Computed tomography image enhancement using cuckoo search: a log transform based approach. J Signal Inf Process 6(4)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nilanjan Dey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Chakraborty, S., Chatterjee, S., Dey, N., Ashour, A.S., Hassanien, A.E. (2017). Comparative Approach Between Singular Value Decomposition and Randomized Singular Value Decomposition-based Watermarking. In: Dey, N., Santhi, V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44790-2_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44789-6

  • Online ISBN: 978-3-319-44790-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics