Skip to main content

Attacks on SVD-Based Watermarking Schemes

  • Conference paper
Intelligence and Security Informatics (ISI 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5075))

Included in the following conference series:

Abstract

One major application of a watermarking scheme is to protect the copyright of a content owner by embedding the owner’s watermark into the content. Recently, two watermarking schemes were proposed by Chang et al. [1, 2], which are based on singular value decomposition (SVD). In this paper, we present attacks on these watermarking schemes and show how the designers’ security claims can be invalidated, namely related to robustness and protection of rightful ownership. Our results are the first known attacks on these SVD-based watermarking schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chang, C.C., Hu, Y.S., Lin, C.C.: A Digital Watermarking Scheme based on Singular Value Decomposition. In: Chen, B., Paterson, M., Zhang, G. (eds.) ESCAPE 2007. LNCS, vol. 4614, pp. 82–93. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  2. Chang, C.C., Lin, C.C., Hu, Y.S.: An SVD Oriented Watermark Embedding Scheme with High Qualities for the Restored Images. International Journal of Innovative Computing, Information and Control 3(2), 609–620 (2007)

    Google Scholar 

  3. Lu, C.S.: Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Idea Group Publishing (2004)

    Google Scholar 

  4. Chandra, D.V.S.: Digital Image Watermarking using Singular Value Decomposition. In: 45th IEEE International Midwest Symposium on Circuits and Systems, Tulsa, Oklahoma, vol. 3, pp. 264–267 (2002)

    Google Scholar 

  5. Huang, F., Guan, Z.H.: A Hybrid SVD-DCT Watermarking Method based on LPSNR. Pattern Recognition Letters 25, 1769–1775 (2004)

    Article  Google Scholar 

  6. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2001)

    Google Scholar 

  7. Chung, K.L., Shen, C.H., Chang, L.C.: A Novel SVD- and VQ-based Image Hiding Scheme. Pattern Recognition Letters 22, 1051–1058 (2001)

    Article  MATH  Google Scholar 

  8. Arnold, M., Wolthusen, S.D., Schmucker, M.: Techniques and Applications of Digital Watermarking and Content Protection. Artech House Publishers (2003)

    Google Scholar 

  9. Liu, R., Tan, T.: An SVD-based Watermarking Scheme for Protecting Rightful Ownership. IEEE Transactions on Multimedia 4(1), 121–128 (2002)

    Article  Google Scholar 

  10. Andrews, H.C., Patterson, C.L.: Singular Value Decomposition (SVD) Image Coding. IEEE Transactions on Communications 24(4), 425–432 (1976)

    Article  Google Scholar 

  11. Rykaczewski, R.: Comments on An SVD-based Watermarking Scheme for Protecting Rightful Ownership. IEEE Transactions on Multimedia 9(2), 421–423 (2007)

    Article  Google Scholar 

  12. Zhang, X.P., Li, K.: Comments on An SVD-based Watermarking Scheme for Protecting Rightful Ownership. IEEE Transactions on Multimedia 7(2), 593–594 (2005)

    Article  Google Scholar 

  13. Hwang, M.S., Chang, C.C., Hwang, K.F.: A Watermarking Technique based on One-way Hash Functions. IEEE Transactions on Consumer Electronics 45(2), 286–294 (1999)

    Article  Google Scholar 

  14. Rabin, M.O.: Digitalized Signatures and Public Key Functions as Intractable as Factorization. Technical Report MIT/LCS/TR212, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, MA (January 1979)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ling, HC., Phan, R.C.W., Heng, SH. (2008). Attacks on SVD-Based Watermarking Schemes. In: Yang, C.C., et al. Intelligence and Security Informatics. ISI 2008. Lecture Notes in Computer Science, vol 5075. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69304-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69304-8_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69136-5

  • Online ISBN: 978-3-540-69304-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics