A Robust Zero-Watermark Algorithm Based on Singular Value Decomposition and Discreet Cosine Transform

  • Tianyu Ye
Part of the Communications in Computer and Information Science book series (CCIS, volume 137)


A robust zero-watermark algorithm is proposed, which is based on singular value decomposition and discreet cosine transform. The image is firstly spilt into non-overlapping blocks. Afterwards, every block is conducted with singular value decomposition, and its singular value matrix is transformed with discreet cosine transform. The robust zero-watermark sequence is derived from comparing the numerical relationship between two direct coefficients from adjacent blocks. Experimental results of robustness tests show that it has good robustness against various attacks.


Digital watermarking zero-watermark singular value decomposition discreet cosine transform similarity 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Wen, Q., Sun, Y.-f., Wang, S.-x.: Concept and Application of Zero-watermark. Acta Electronica Sinica 31(2), 214–216 (2003)Google Scholar
  2. 2.
    Liu, R.-z., Tan, T.-n.: SVD Based Digital Watermarking Method. Acta Electronica Sinica 29(2), 168–171 (2001)Google Scholar
  3. 3.
    Tsai, M.-j., Hung, H.-y.: DCT and DWT-based Image Watermarking by Using Subsampling. In: Proc. of the 24th International Conference on Distributed Computing Systems Workshops, MNSA (ICDCSW 2004), Hachioji, Tokyo, Japan, pp. 184–189 (2004)Google Scholar
  4. 4.
    Huang, D.-r., Liu, J.-f.: An Embedding Strategy and Algorithm for Image Watermarking in DWT Domain. Journal of Software 13(7), 1290–1297 (2002)Google Scholar
  5. 5.
    Lahouari, G., Ahmed, B., Mohammad, K.I., Said, B.: Digital Image Watermarking Using Balanced Multiwavelets. IEEE Trans. on Signal Processing 54(4), 1519–1536 (2006)CrossRefGoogle Scholar
  6. 6.
    Sharkas, M., ElShafie, D., Hamdy, N.: A Dual Digital-image Watermarking Technique. In: Proc. of 3rd World Enformatika Conference (WEC 2005), Istanbul, Turkey, pp. 136–139 (2005)Google Scholar
  7. 7.
    Xu, L.-l., Wang, Y.-m.: Robust Digital Watermarking Scheme Resistant to Gaussian Noise, Geometric Distortion and JPEG Compression Attacks. Journal of Electronics & Information Technology 30(4), 933–936 (2008)CrossRefGoogle Scholar
  8. 8.
    Niu, S.-z., Niu, X.-x., Yang, Y.-x., Hu, W.-q.: Data Hiding Algorithm for Halftone Images. Acta Electronica Sinica 32(7), 1180–1183 (2004)Google Scholar
  9. 9.
    Yuan, D.-y., Xiao, J., Wang, Y.: Study on the Robustness of Digital Image Watermarking Algorithms to Geometric Attacks. Journal of Electronics & Information Technology 30(5), 1251–1256 (2008)CrossRefGoogle Scholar
  10. 10.
    Li, L.-d., Guo, B.-l., Biao, J.-f.: Spatial Domain Image Watermarking Scheme Robust to Geometric Attacks Based on Odd-even Quantization. Journal of Electronics & Information Technology 31(1), 134–138 (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Tianyu Ye
    • 1
  1. 1.College of Information & Electronic EngineeringZhejiang Gongshang UniversityHangzhouP.R. China

Personalised recommendations