Skip to main content

2017 | OriginalPaper | Buchkapitel

Comparative Approach Between Singular Value Decomposition and Randomized Singular Value Decomposition-based Watermarking

verfasst von : Sayan Chakraborty, Souvik Chatterjee, Nilanjan Dey, Amira S. Ashour, Aboul Ella Hassanien

Erschienen in: Intelligent Techniques in Signal Processing for Multimedia Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Threats and attacks on networks have increased significantly with the recent advancement of technologies. In order to avoid such problems, watermarking techniques was introduced. However, several popular watermarking techniques consume much more time to embed and extract the hidden message. In this current work, a randomized singular value decomposition (rSVD)-based watermarking technique has been proposed in order to avoid such problems. In this work, firstly, the watermark is embedded into the cover image using singular value decomposition, and then the rSVD is employed. Finally, the obtained results were compared to check the time complexity of both methods and to compare the quality of watermarked image and recovered watermarks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRef Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRef
2.
Zurück zum Zitat Huang J, Shi YQ (1998) Adaptive image watermarking scheme based on visual masking. IEEE Electron Lett 34(8):748–750CrossRef Huang J, Shi YQ (1998) Adaptive image watermarking scheme based on visual masking. IEEE Electron Lett 34(8):748–750CrossRef
3.
Zurück zum Zitat Mohammed AA, Sidqi H-M (2011) Robust image watermarking scheme based on wavelet technique. Int J Comput Sci Secur 5(4):394–404 Mohammed AA, Sidqi H-M (2011) Robust image watermarking scheme based on wavelet technique. Int J Comput Sci Secur 5(4):394–404
4.
Zurück zum Zitat Arathi C (2012) A semi fragile image watermarking technique using block based SVD. Int J Comput Sci Inf Technol 3(2):3644–3647 Arathi C (2012) A semi fragile image watermarking technique using block based SVD. Int J Comput Sci Inf Technol 3(2):3644–3647
5.
Zurück zum Zitat Ganicand E, Eskicioglu AM (2005) Robust embedding of visual watermarks usig DWT-SVD. J Electron Imaging 14(4):1–9 Ganicand E, Eskicioglu AM (2005) Robust embedding of visual watermarks usig DWT-SVD. J Electron Imaging 14(4):1–9
6.
Zurück zum Zitat Zhang J, Erway J, Hu X, Zhang Q, Plemmons R (2012) Randomized SVD methods in hyperspectral imaging. J Electr Comput Eng 2012:1–15MathSciNetCrossRefMATH Zhang J, Erway J, Hu X, Zhang Q, Plemmons R (2012) Randomized SVD methods in hyperspectral imaging. J Electr Comput Eng 2012:1–15MathSciNetCrossRefMATH
7.
Zurück zum Zitat Drinea E, Drineas P, Huggins P (2001) A randomized singular value decomposition algorithm for image processing applications. In: Panhellenic Conference on Informatics (PCI) Drinea E, Drineas P, Huggins P (2001) A randomized singular value decomposition algorithm for image processing applications. In: Panhellenic Conference on Informatics (PCI)
8.
Zurück zum Zitat Halko N, Martinsson PG, Tropp JA (2011) Finding structure with randomness: probabilistic algorithms for constructing approximate matrix decompositions. SIAM Rev 53(2):217–288MathSciNetCrossRefMATH Halko N, Martinsson PG, Tropp JA (2011) Finding structure with randomness: probabilistic algorithms for constructing approximate matrix decompositions. SIAM Rev 53(2):217–288MathSciNetCrossRefMATH
9.
Zurück zum Zitat Bhagyashri K, Joshi MY (2010) Robust image watermarking based on singular value decomposition and discrete wavelet transform. In: 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT) 5:337–341 Bhagyashri K, Joshi MY (2010) Robust image watermarking based on singular value decomposition and discrete wavelet transform. In: 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT) 5:337–341
10.
Zurück zum Zitat Dey N, Bose S, Chakraborty S, Mukherjee A, Madhulika, Samanta S (2013) Parallel image segmentation using multi-threading and k-means algorithm. In: IEEE international conference on computational intelligence and computing research (ICCIC), pp 26–28. doi:10.11.9/ICCIC.2013.6724171 Dey N, Bose S, Chakraborty S, Mukherjee A, Madhulika, Samanta S (2013) Parallel image segmentation using multi-threading and k-means algorithm. In: IEEE international conference on computational intelligence and computing research (ICCIC), pp 26–28. doi:10.11.9/ICCIC.2013.6724171
11.
Zurück zum Zitat Zhanh L, Li A (2009) Robust watermarking scheme based on singular value of decomposition in DWT domain. In: Information processing, Asia Pacific Confrence (APCIP), vol 2, pp 19–22. doi:10.1109/APCIP.2009.141 Zhanh L, Li A (2009) Robust watermarking scheme based on singular value of decomposition in DWT domain. In: Information processing, Asia Pacific Confrence (APCIP), vol 2, pp 19–22. doi:10.​1109/​APCIP.​2009.​141
12.
Zurück zum Zitat Kamble S, Maheshkar V, Agarwal S, Srivastava VK (2011) DWT-based multiple watermarking for privacy and security of digital images in e-commerce. In: International conference on multimedia, signal processing and communication technologies (IMPACT), pp 224–227. doi:10.1109/MSPCT.2011.615048 Kamble S, Maheshkar V, Agarwal S, Srivastava VK (2011) DWT-based multiple watermarking for privacy and security of digital images in e-commerce. In: International conference on multimedia, signal processing and communication technologies (IMPACT), pp 224–227. doi:10.​1109/​MSPCT.​2011.​615048
13.
Zurück zum Zitat Singh SP, Rawat P, Agarwal S (2012) A robust watermarking approach using DCT-DWT. Int J Emerg Technol Adv Eng 2(8) Singh SP, Rawat P, Agarwal S (2012) A robust watermarking approach using DCT-DWT. Int J Emerg Technol Adv Eng 2(8)
14.
Zurück zum Zitat Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based intravascular ultrasound video watermarking. In: Second World Congress on information and communication technologies (WICT 2012), Trivandrum, India: October 30–November 02, 2012 (IEEE Xplore) Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based intravascular ultrasound video watermarking. In: Second World Congress on information and communication technologies (WICT 2012), Trivandrum, India: October 30–November 02, 2012 (IEEE Xplore)
15.
Zurück zum Zitat Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based blind watermarking technique of gray scale image in electrooculogram signal. In: international conference on intelligent systems design and applications (ISDA-2012), Kochi, 27–29 Nov 2012 (IEEE Xplore) Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based blind watermarking technique of gray scale image in electrooculogram signal. In: international conference on intelligent systems design and applications (ISDA-2012), Kochi, 27–29 Nov 2012 (IEEE Xplore)
16.
Zurück zum Zitat Wang A, Zhang C, Hao P (2010) A blind video watermark detection method based on 3d-DWT transform. In: 17th IEEE international conference on image processing (ICIP) Wang A, Zhang C, Hao P (2010) A blind video watermark detection method based on 3d-DWT transform. In: 17th IEEE international conference on image processing (ICIP)
17.
Zurück zum Zitat Bhattacharya T, Dey N, Chaudhuri SRB (2012) A session based multiple image hiding technique using DWT and DCT. Int J Comput Appl 38 Bhattacharya T, Dey N, Chaudhuri SRB (2012) A session based multiple image hiding technique using DWT and DCT. Int J Comput Appl 38
18.
Zurück zum Zitat Dey N, Bardhan Roy A, Dey S (2011) A novel approach of color image hiding using RGB color planes and DWT. Int J Comput Appl 36(5). ISSN: 0975–8887 Dey N, Bardhan Roy A, Dey S (2011) A novel approach of color image hiding using RGB color planes and DWT. Int J Comput Appl 36(5). ISSN: 0975–8887
19.
Zurück zum Zitat Pal AK, Das P, Dey N (2013) Odd-even embedding scheme based modified reversible watermarking technique using Blueprint. arXiv preprint arXiv:1303.5972 Pal AK, Das P, Dey N (2013) Odd-even embedding scheme based modified reversible watermarking technique using Blueprint. arXiv preprint arXiv:​1303.​5972
20.
Zurück zum Zitat Dey N, Chakraborty S, Samanta S. Optimization of watermarking in biomedical signal. Lambert Publication, Heinrich-Böcking-Straße 6, 66121 Saarbrücken, Germany. ISBN-13: 978-3-659-46460-7 Dey N, Chakraborty S, Samanta S. Optimization of watermarking in biomedical signal. Lambert Publication, Heinrich-Böcking-Straße 6, 66121 Saarbrücken, Germany. ISBN-13: 978-3-659-46460-7
21.
Zurück zum Zitat Dey N, Nandi B, Das P, Das A, Chaudhuri SS (2013) Retention of electrocardiogram features insignificantly devalorized as an effect of watermarking for a multi-modal biometric authentication system. In: Advances in biometrics for secure human authentication and recognition, pp 450. ISBN: 9781466582422 Dey N, Nandi B, Das P, Das A, Chaudhuri SS (2013) Retention of electrocardiogram features insignificantly devalorized as an effect of watermarking for a multi-modal biometric authentication system. In: Advances in biometrics for secure human authentication and recognition, pp 450. ISBN: 9781466582422
22.
Zurück zum Zitat Dey N, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the blind–watermarked electroencephalogram signal in wireless telemonitoring using Alattar’s method. In: 5th International conference on security of information and networks (SIN 2012). In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2012, Jaipur, India Dey N, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the blind–watermarked electroencephalogram signal in wireless telemonitoring using Alattar’s method. In: 5th International conference on security of information and networks (SIN 2012). In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2012, Jaipur, India
23.
Zurück zum Zitat Das P, Munshi R, Dey N (2012) Alattar’s method based reversible watermarking technique of EPR within heart sound in wireless telemonitoring. Intellectual Property Rights And Patent Laws, IPRPL-2012, Jadavpur University, August 25 Das P, Munshi R, Dey N (2012) Alattar’s method based reversible watermarking technique of EPR within heart sound in wireless telemonitoring. Intellectual Property Rights And Patent Laws, IPRPL-2012, Jadavpur University, August 25
24.
Zurück zum Zitat Dey N, Dey M, Biswas D, Das P, Das A, Chaudhuri SS. Tamper detection of electrocardiographic signal using watermarked bio-hash code in wireless cardiology. Spec Issue Int J Signal Imaging Syst Eng Inderscience (in press) Dey N, Dey M, Biswas D, Das P, Das A, Chaudhuri SS. Tamper detection of electrocardiographic signal using watermarked bio-hash code in wireless cardiology. Spec Issue Int J Signal Imaging Syst Eng Inderscience (in press)
25.
Zurück zum Zitat Deb K, Al-Seraj MS, Hoque MM, Sarkar MIH (2012) Combined DWT–DCT based digital image watermarking technique for copyright protection. In: Electrical & Computer Engineering (ICECE), 7th International conference Deb K, Al-Seraj MS, Hoque MM, Sarkar MIH (2012) Combined DWT–DCT based digital image watermarking technique for copyright protection. In: Electrical & Computer Engineering (ICECE), 7th International conference
26.
Zurück zum Zitat Bhattacharya T, Dey N, Chaudhuri SRB (2012) A session based multiple image hiding technique using DWT and DCT. Int J Comput Appl 38 Bhattacharya T, Dey N, Chaudhuri SRB (2012) A session based multiple image hiding technique using DWT and DCT. Int J Comput Appl 38
27.
Zurück zum Zitat Dey N, Dey G, Chakraborty S, Chaudhuri SS (2014) Feature analysis of blind watermarked electromyogram signal in wireless telemonitoring. Concepts and Trends in Healthcare Information System of the Annals of Information Systems Series (In press) Dey N, Dey G, Chakraborty S, Chaudhuri SS (2014) Feature analysis of blind watermarked electromyogram signal in wireless telemonitoring. Concepts and Trends in Healthcare Information System of the Annals of Information Systems Series (In press)
28.
Zurück zum Zitat Dey N, Samanta S, Yang XS, Chaudhuri SS, Das A (2013) Optimization of scaling factors in electrocardiogram signal watermarking using Cuckoo Search. Int J Bio-Inspired Comput 5(5):315–326CrossRef Dey N, Samanta S, Yang XS, Chaudhuri SS, Das A (2013) Optimization of scaling factors in electrocardiogram signal watermarking using Cuckoo Search. Int J Bio-Inspired Comput 5(5):315–326CrossRef
29.
Zurück zum Zitat Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Using DWT analysis of P, QRS and T components and cardiac output modified by blind watermarking technique within the electrocardiogram signal for authentication in the wireless telecardiology. I.J. Image, Graphics and Signal Processing (IJIGSP). ISSN: 2074-9074 Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Using DWT analysis of P, QRS and T components and cardiac output modified by blind watermarking technique within the electrocardiogram signal for authentication in the wireless telecardiology. I.J. Image, Graphics and Signal Processing (IJIGSP). ISSN: 2074-9074
30.
Zurück zum Zitat Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: International conference on electronic systems, signal processing and computing technologies, Nagpur, 09–11 January 2014, pp 105–110 Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: International conference on electronic systems, signal processing and computing technologies, Nagpur, 09–11 January 2014, pp 105–110
31.
Zurück zum Zitat Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Lifting wavelet transformation based blind watermarking technique of photoplethysmographic signals in wireless telecardiology. In: Second World Congress on information and communication technologies (WICT 2012), pp 230–235 Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Lifting wavelet transformation based blind watermarking technique of photoplethysmographic signals in wireless telecardiology. In: Second World Congress on information and communication technologies (WICT 2012), pp 230–235
32.
Zurück zum Zitat Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference on communications, devices and intelligent systems (CODIS), pp 624–627 Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference on communications, devices and intelligent systems (CODIS), pp 624–627
33.
Zurück zum Zitat Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based intravascular ultrasound video watermarking. In: Second World Congress on information and communication technologies (WICT 2012), pp 224–229 Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based intravascular ultrasound video watermarking. In: Second World Congress on information and communication technologies (WICT 2012), pp 224–229
34.
Zurück zum Zitat Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based blind watermarking technique of gray scale image in electrooculogram signal. In: International conference on intelligent systems design and applications (ISDA-2012), pp 680–685 Dey N, Das P, Das A, Chaudhuri SS (2012) DWT–DCT–SVD based blind watermarking technique of gray scale image in electrooculogram signal. In: International conference on intelligent systems design and applications (ISDA-2012), pp 680–685
35.
Zurück zum Zitat Chakraborty S, Samanta S, Mukherjee A, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC), pp 1–6 Chakraborty S, Samanta S, Mukherjee A, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC), pp 1–6
36.
Zurück zum Zitat Dey N, Mishra G, Nandi B, Pal M, Das A, Chaudhuri SS (2012) Wavelet based watermarked normal and abnormal heart sound identification using spectrogram analysis. In: 2012 IEEE international conference on computational intelligence and computing research (ICCIC), pp 1–7 Dey N, Mishra G, Nandi B, Pal M, Das A, Chaudhuri SS (2012) Wavelet based watermarked normal and abnormal heart sound identification using spectrogram analysis. In: 2012 IEEE international conference on computational intelligence and computing research (ICCIC), pp 1–7
37.
Zurück zum Zitat Dey N, Maji P, Das P, Das A, Chaudhuri SS (2013) An edge based watermarking technique of medical images without devalorizing diagnostic parameters. In: International conference on advances in technology and engineering, pp 1–5 Dey N, Maji P, Das P, Das A, Chaudhuri SS (2013) An edge based watermarking technique of medical images without devalorizing diagnostic parameters. In: International conference on advances in technology and engineering, pp 1–5
38.
Zurück zum Zitat Dey N, Das P, Biswas D, Maji P, Das A, Chaudhuri SS (2013) Visible watermarking within the region of non-interest of medical images based on fuzzy C-means and Harris corner detection. In: The fourth international workshop communications security & information assurance (CSIA-2013) [Springer], pp 161–168 Dey N, Das P, Biswas D, Maji P, Das A, Chaudhuri SS (2013) Visible watermarking within the region of non-interest of medical images based on fuzzy C-means and Harris corner detection. In: The fourth international workshop communications security & information assurance (CSIA-2013) [Springer], pp 161–168
39.
Zurück zum Zitat Dey N, Biswas S, Roy AB, Das A, Chaudhuri SS (2012) Analysis of photoplethysmographic signals modified by reversible watermarking technique using prediction-error in wireless telecardiology. In: International conference of intelligent Infrastructure, 47th annual national convention of CSI, McGraw-Hill Proceeding Dey N, Biswas S, Roy AB, Das A, Chaudhuri SS (2012) Analysis of photoplethysmographic signals modified by reversible watermarking technique using prediction-error in wireless telecardiology. In: International conference of intelligent Infrastructure, 47th annual national convention of CSI, McGraw-Hill Proceeding
40.
Zurück zum Zitat Réthoré J, Gravouil A, Morestin F, Combescure A (2005) Estimation of mixed-mode stress intensity factors using digital image correlation and an interaction integral. Int J Fract 132(1):65–79CrossRef Réthoré J, Gravouil A, Morestin F, Combescure A (2005) Estimation of mixed-mode stress intensity factors using digital image correlation and an interaction integral. Int J Fract 132(1):65–79CrossRef
41.
Zurück zum Zitat Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm in optimization of scaling factors for manifold medical information embedding. J Med Imaging Health Inf 4(3):384–394CrossRef Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm in optimization of scaling factors for manifold medical information embedding. J Med Imaging Health Inf 4(3):384–394CrossRef
42.
Zurück zum Zitat Samanta S, Dey N, Das P, Acharjee S, Chaudhuri SS (2012) Multilevel threshold based gray scale image segmentation using cuckoo search. In: International conference on emerging trends in electrical, communication and information technologies-ICECIT, Dec. 12–23 Samanta S, Dey N, Das P, Acharjee S, Chaudhuri SS (2012) Multilevel threshold based gray scale image segmentation using cuckoo search. In: International conference on emerging trends in electrical, communication and information technologies-ICECIT, Dec. 12–23
43.
Zurück zum Zitat Tyagi S, Bharadwaj K (2014) A particle swarm optimization approach to fuzzy case-based reasoning in the framework of collaborative filtering. Int J Rough Sets Data Anal 1(1) Tyagi S, Bharadwaj K (2014) A particle swarm optimization approach to fuzzy case-based reasoning in the framework of collaborative filtering. Int J Rough Sets Data Anal 1(1)
44.
Zurück zum Zitat Ashour AS, Samanta S, Dey N, Kausar N, Abdessalemkaraa WBK, Hassanien A. Computed tomography image enhancement using cuckoo search: a log transform based approach. J Signal Inf Process 6(4) Ashour AS, Samanta S, Dey N, Kausar N, Abdessalemkaraa WBK, Hassanien A. Computed tomography image enhancement using cuckoo search: a log transform based approach. J Signal Inf Process 6(4)
Metadaten
Titel
Comparative Approach Between Singular Value Decomposition and Randomized Singular Value Decomposition-based Watermarking
verfasst von
Sayan Chakraborty
Souvik Chatterjee
Nilanjan Dey
Amira S. Ashour
Aboul Ella Hassanien
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-44790-2_7

Premium Partner