Abstract
Threats and attacks on networks have increased significantly with the recent advancement of technologies. In order to avoid such problems, watermarking techniques was introduced. However, several popular watermarking techniques consume much more time to embed and extract the hidden message. In this current work, a randomized singular value decomposition (rSVD)-based watermarking technique has been proposed in order to avoid such problems. In this work, firstly, the watermark is embedded into the cover image using singular value decomposition, and then the rSVD is employed. Finally, the obtained results were compared to check the time complexity of both methods and to compare the quality of watermarked image and recovered watermarks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Huang J, Shi YQ (1998) Adaptive image watermarking scheme based on visual masking. IEEE Electron Lett 34(8):748–750
Mohammed AA, Sidqi H-M (2011) Robust image watermarking scheme based on wavelet technique. Int J Comput Sci Secur 5(4):394–404
Arathi C (2012) A semi fragile image watermarking technique using block based SVD. Int J Comput Sci Inf Technol 3(2):3644–3647
Ganicand E, Eskicioglu AM (2005) Robust embedding of visual watermarks usig DWT-SVD. J Electron Imaging 14(4):1–9
Zhang J, Erway J, Hu X, Zhang Q, Plemmons R (2012) Randomized SVD methods in hyperspectral imaging. J Electr Comput Eng 2012:1–15
Drinea E, Drineas P, Huggins P (2001) A randomized singular value decomposition algorithm for image processing applications. In: Panhellenic Conference on Informatics (PCI)
Halko N, Martinsson PG, Tropp JA (2011) Finding structure with randomness: probabilistic algorithms for constructing approximate matrix decompositions. SIAM Rev 53(2):217–288
Bhagyashri K, Joshi MY (2010) Robust image watermarking based on singular value decomposition and discrete wavelet transform. In: 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT) 5:337–341
Dey N, Bose S, Chakraborty S, Mukherjee A, Madhulika, Samanta S (2013) Parallel image segmentation using multi-threading and k-means algorithm. In: IEEE international conference on computational intelligence and computing research (ICCIC), pp 26–28. doi:10.11.9/ICCIC.2013.6724171
Zhanh L, Li A (2009) Robust watermarking scheme based on singular value of decomposition in DWT domain. In: Information processing, Asia Pacific Confrence (APCIP), vol 2, pp 19–22. doi:10.1109/APCIP.2009.141
Kamble S, Maheshkar V, Agarwal S, Srivastava VK (2011) DWT-based multiple watermarking for privacy and security of digital images in e-commerce. In: International conference on multimedia, signal processing and communication technologies (IMPACT), pp 224–227. doi:10.1109/MSPCT.2011.615048
Singh SP, Rawat P, Agarwal S (2012) A robust watermarking approach using DCT-DWT. Int J Emerg Technol Adv Eng 2(8)
Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based intravascular ultrasound video watermarking. In: Second World Congress on information and communication technologies (WICT 2012), Trivandrum, India: October 30–November 02, 2012 (IEEE Xplore)
Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based blind watermarking technique of gray scale image in electrooculogram signal. In: international conference on intelligent systems design and applications (ISDA-2012), Kochi, 27–29 Nov 2012 (IEEE Xplore)
Wang A, Zhang C, Hao P (2010) A blind video watermark detection method based on 3d-DWT transform. In: 17th IEEE international conference on image processing (ICIP)
Bhattacharya T, Dey N, Chaudhuri SRB (2012) A session based multiple image hiding technique using DWT and DCT. Int J Comput Appl 38
Dey N, Bardhan Roy A, Dey S (2011) A novel approach of color image hiding using RGB color planes and DWT. Int J Comput Appl 36(5). ISSN: 0975–8887
Pal AK, Das P, Dey N (2013) Odd-even embedding scheme based modified reversible watermarking technique using Blueprint. arXiv preprint arXiv:1303.5972
Dey N, Chakraborty S, Samanta S. Optimization of watermarking in biomedical signal. Lambert Publication, Heinrich-Böcking-Straße 6, 66121 Saarbrücken, Germany. ISBN-13: 978-3-659-46460-7
Dey N, Nandi B, Das P, Das A, Chaudhuri SS (2013) Retention of electrocardiogram features insignificantly devalorized as an effect of watermarking for a multi-modal biometric authentication system. In: Advances in biometrics for secure human authentication and recognition, pp 450. ISBN: 9781466582422
Dey N, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the blind–watermarked electroencephalogram signal in wireless telemonitoring using Alattar’s method. In: 5th International conference on security of information and networks (SIN 2012). In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2012, Jaipur, India
Das P, Munshi R, Dey N (2012) Alattar’s method based reversible watermarking technique of EPR within heart sound in wireless telemonitoring. Intellectual Property Rights And Patent Laws, IPRPL-2012, Jadavpur University, August 25
Dey N, Dey M, Biswas D, Das P, Das A, Chaudhuri SS. Tamper detection of electrocardiographic signal using watermarked bio-hash code in wireless cardiology. Spec Issue Int J Signal Imaging Syst Eng Inderscience (in press)
Deb K, Al-Seraj MS, Hoque MM, Sarkar MIH (2012) Combined DWT–DCT based digital image watermarking technique for copyright protection. In: Electrical & Computer Engineering (ICECE), 7th International conference
Bhattacharya T, Dey N, Chaudhuri SRB (2012) A session based multiple image hiding technique using DWT and DCT. Int J Comput Appl 38
Dey N, Dey G, Chakraborty S, Chaudhuri SS (2014) Feature analysis of blind watermarked electromyogram signal in wireless telemonitoring. Concepts and Trends in Healthcare Information System of the Annals of Information Systems Series (In press)
Dey N, Samanta S, Yang XS, Chaudhuri SS, Das A (2013) Optimization of scaling factors in electrocardiogram signal watermarking using Cuckoo Search. Int J Bio-Inspired Comput 5(5):315–326
Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Using DWT analysis of P, QRS and T components and cardiac output modified by blind watermarking technique within the electrocardiogram signal for authentication in the wireless telecardiology. I.J. Image, Graphics and Signal Processing (IJIGSP). ISSN: 2074-9074
Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: International conference on electronic systems, signal processing and computing technologies, Nagpur, 09–11 January 2014, pp 105–110
Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Lifting wavelet transformation based blind watermarking technique of photoplethysmographic signals in wireless telecardiology. In: Second World Congress on information and communication technologies (WICT 2012), pp 230–235
Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference on communications, devices and intelligent systems (CODIS), pp 624–627
Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based intravascular ultrasound video watermarking. In: Second World Congress on information and communication technologies (WICT 2012), pp 224–229
Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based blind watermarking technique of gray scale image in electrooculogram signal. In: International conference on intelligent systems design and applications (ISDA-2012), pp 680–685
Chakraborty S, Samanta S, Mukherjee A, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC), pp 1–6
Dey N, Mishra G, Nandi B, Pal M, Das A, Chaudhuri SS (2012) Wavelet based watermarked normal and abnormal heart sound identification using spectrogram analysis. In: 2012 IEEE international conference on computational intelligence and computing research (ICCIC), pp 1–7
Dey N, Maji P, Das P, Das A, Chaudhuri SS (2013) An edge based watermarking technique of medical images without devalorizing diagnostic parameters. In: International conference on advances in technology and engineering, pp 1–5
Dey N, Das P, Biswas D, Maji P, Das A, Chaudhuri SS (2013) Visible watermarking within the region of non-interest of medical images based on fuzzy C-means and Harris corner detection. In: The fourth international workshop communications security & information assurance (CSIA-2013) [Springer], pp 161–168
Dey N, Biswas S, Roy AB, Das A, Chaudhuri SS (2012) Analysis of photoplethysmographic signals modified by reversible watermarking technique using prediction-error in wireless telecardiology. In: International conference of intelligent Infrastructure, 47th annual national convention of CSI, McGraw-Hill Proceeding
Réthoré J, Gravouil A, Morestin F, Combescure A (2005) Estimation of mixed-mode stress intensity factors using digital image correlation and an interaction integral. Int J Fract 132(1):65–79
Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm in optimization of scaling factors for manifold medical information embedding. J Med Imaging Health Inf 4(3):384–394
Samanta S, Dey N, Das P, Acharjee S, Chaudhuri SS (2012) Multilevel threshold based gray scale image segmentation using cuckoo search. In: International conference on emerging trends in electrical, communication and information technologies-ICECIT, Dec. 12–23
Tyagi S, Bharadwaj K (2014) A particle swarm optimization approach to fuzzy case-based reasoning in the framework of collaborative filtering. Int J Rough Sets Data Anal 1(1)
Ashour AS, Samanta S, Dey N, Kausar N, Abdessalemkaraa WBK, Hassanien A. Computed tomography image enhancement using cuckoo search: a log transform based approach. J Signal Inf Process 6(4)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Chakraborty, S., Chatterjee, S., Dey, N., Ashour, A.S., Hassanien, A.E. (2017). Comparative Approach Between Singular Value Decomposition and Randomized Singular Value Decomposition-based Watermarking. In: Dey, N., Santhi, V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-44790-2_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44789-6
Online ISBN: 978-3-319-44790-2
eBook Packages: EngineeringEngineering (R0)