An Efficient Digital Rights Management Technique based on Singular Value Decomposition
Vast amount of Information is available through theglobal networks which are extensively used for cross-references between databases. There is a global need to transfer audio, image and video data in electronic form to customers for better compatibility and simplicity. There are the problems of theft and distribution of intellectual property which is a great concern in the field of network security. Thus a novel technique is very essential for preserving security and authentication of digital data. Digital image watermarking techniques have been proposed to prevent unauthorized distribution of multimedia data. A digital watermark encodes the owner's license information and embeds it intothe image. Several Discrete Wavelets Transform (DWT) based techniques are used for watermarking. In order to improve the performance of the approach, this research introduces a novel water marking algorithm which uses Complex Wavelet Transform and Singular Value Decomposition. Then the SVD based image uses zero watermark algorithms which produce the zero watermark sequence. It essentially doesn’t embed any watermark in the original image, thus the watermarked image is the same as its original counterpart. Experimental results show that it has good robustness against various
attacks. Moreover, its computation is so low that it is easy to be applied into the practice of digital rights management.
Ingemar J. Cox, Gwenaël Doërr and Teddy Furon, “Watermarking Is Not Cryptography”, Lecture Notes in Computer Science, 2006, Volume 4283/2006, 1-15.
D. Kahn, “The Codebreakers; The Comprehensive History of Secret Communication from Ancient Times to the Internet” Scribner, December 1996.
B. Macq and J. Quisquater, “Cryptology for digital TV broadcasting,” Proceedings of the IEEE, vol. 83, pp. 944–957, February 1995.
J. R. Hern´andez, F. P´erez-Gonz´alez, J. M. Rodr´ıguez, and G. Nieto, “Performance analysis of a 2d-multipulse amplitude modulation scheme for data hiding and watermarking of still images,” IEEE J. Select. Areas Commun., vol. 16, pp. 510–524, 1998.
I. J. Cox, M. L. Miller, and J. A. Bloom, “Digital Watermarking,” Morgan Kaufmann Publishers, 2002.
A. Herrigel, J. O’Ruanaidh, H. Petersen, S. Pererira, and T. Pun, “Secure copyright protection techniques for digital images,” in Information Hiding (D. Aucsmith, ed.), vol. 1525 of Lecture Notes in Computer Science, (Berlin), pp. 169–190, Springer- Verlag, 1998.
Gaurav Bhatnagar and Balasubramanian Raman, “A new robust reference watermarking scheme based on DWT-SVD,” Computer Standards and Interfaces, vol. 31, no. 5, pp. 1002-1013, 2009.
Shaomin Zhu and Jianming Liu, “A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimization,” Book chapter on Springer link, Information Security Practice and Experience, pp. 136-146, 2009.
R. Schyndel, A. Tirkel, and C. Osborne, “A Digital Watermark,” Proc.IEEE Int. Conf. on Image Processing, Nov. 1994, vol. II, pp. 86-90.
F. Bartolini, M. Barni, V. Cappellini, and A. Piva, “Mask Building for Perceptually Hiding Frequency Embedded Watermarks,” Proc. Int.Conf. on Image Processing, Oct. 1998, vol. I, pp. 450-454.
D. Kundur and D. Hatzinakos, “A Robust Digital Image Watermarking Method Using Wavelet-Based Fusion,” Proc. IEEE Int. Conf. on Image Processing, Oct. 1997, vol. I, pp. 544-547.
Ruth Buse Dili, and Elijah Mwangi, “An Image Watermarking method based on the singular value transformation and the wavelet transformation,” Proceedings on IEEE, 2007.
Makhloghi, M.; Akhlaghian, F.; Danyali, H.; “Robust digital image watermarking using singular value decomposition”, 2010 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Page(s): 219 – 224, 2010.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.