Abstract
One major application of a watermarking scheme is to protect the copyright of a content owner by embedding the owner’s watermark into the content. Recently, two watermarking schemes were proposed by Chang et al. [1, 2], which are based on singular value decomposition (SVD). In this paper, we present attacks on these watermarking schemes and show how the designers’ security claims can be invalidated, namely related to robustness and protection of rightful ownership. Our results are the first known attacks on these SVD-based watermarking schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chang, C.C., Hu, Y.S., Lin, C.C.: A Digital Watermarking Scheme based on Singular Value Decomposition. In: Chen, B., Paterson, M., Zhang, G. (eds.) ESCAPE 2007. LNCS, vol. 4614, pp. 82–93. Springer, Heidelberg (2007)
Chang, C.C., Lin, C.C., Hu, Y.S.: An SVD Oriented Watermark Embedding Scheme with High Qualities for the Restored Images. International Journal of Innovative Computing, Information and Control 3(2), 609–620 (2007)
Lu, C.S.: Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Idea Group Publishing (2004)
Chandra, D.V.S.: Digital Image Watermarking using Singular Value Decomposition. In: 45th IEEE International Midwest Symposium on Circuits and Systems, Tulsa, Oklahoma, vol. 3, pp. 264–267 (2002)
Huang, F., Guan, Z.H.: A Hybrid SVD-DCT Watermarking Method based on LPSNR. Pattern Recognition Letters 25, 1769–1775 (2004)
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2001)
Chung, K.L., Shen, C.H., Chang, L.C.: A Novel SVD- and VQ-based Image Hiding Scheme. Pattern Recognition Letters 22, 1051–1058 (2001)
Arnold, M., Wolthusen, S.D., Schmucker, M.: Techniques and Applications of Digital Watermarking and Content Protection. Artech House Publishers (2003)
Liu, R., Tan, T.: An SVD-based Watermarking Scheme for Protecting Rightful Ownership. IEEE Transactions on Multimedia 4(1), 121–128 (2002)
Andrews, H.C., Patterson, C.L.: Singular Value Decomposition (SVD) Image Coding. IEEE Transactions on Communications 24(4), 425–432 (1976)
Rykaczewski, R.: Comments on An SVD-based Watermarking Scheme for Protecting Rightful Ownership. IEEE Transactions on Multimedia 9(2), 421–423 (2007)
Zhang, X.P., Li, K.: Comments on An SVD-based Watermarking Scheme for Protecting Rightful Ownership. IEEE Transactions on Multimedia 7(2), 593–594 (2005)
Hwang, M.S., Chang, C.C., Hwang, K.F.: A Watermarking Technique based on One-way Hash Functions. IEEE Transactions on Consumer Electronics 45(2), 286–294 (1999)
Rabin, M.O.: Digitalized Signatures and Public Key Functions as Intractable as Factorization. Technical Report MIT/LCS/TR212, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, MA (January 1979)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ling, HC., Phan, R.C.W., Heng, SH. (2008). Attacks on SVD-Based Watermarking Schemes. In: Yang, C.C., et al. Intelligence and Security Informatics. ISI 2008. Lecture Notes in Computer Science, vol 5075. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69304-8_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-69304-8_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69136-5
Online ISBN: 978-3-540-69304-8
eBook Packages: Computer ScienceComputer Science (R0)