2019
DOI: 10.3390/sym12010052
|View full text |Cite
|
Sign up to set email alerts
|

SVD-Based Image Watermarking Using the Fast Walsh-Hadamard Transform, Key Mapping, and Coefficient Ordering for Ownership Protection

Abstract: Proof of ownership on multimedia data exposes users to significant threats due to a myriad of transmission channel attacks over distributed computing infrastructures. In order to address this problem, in this paper, an efficient blind symmetric image watermarking method using singular value decomposition (SVD) and the fast Walsh-Hadamard transform (FWHT) is proposed for ownership protection. Initially, Gaussian mapping is used to scramble the watermark image and secure the system against unauthorized detection… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(23 citation statements)
references
References 21 publications
(65 reference statements)
0
18
0
Order By: Relevance
“…In this study, in order to get good result, the chosen value for ∆, β, and m are 42, 10, and 4, respectively which are used as secret key K. Table 1 illustrates an analysis between the suggested and various recent algorithms [19][20][21] for imperceptibility of various images. From this Table, we noticed that the PSNR and SSIM values of the suggested algorithm range from 54.1823 to 54.1823 and 0.9285 to 0.9696, respectively, whereas the PSNR and SSIM values of the recent methods range from 48.62 to 53.32 and 0.9321 to 0.9123, respectively Symmetry 2020, 12, 486 9 of 14 indicating that the suggested algorithm has higher PSNR and SSIM than the recent advanced methods presented in [19][20][21]. This is because watermark data is placed into the first row fourth column of the matrix R attained from the FBT coefficients of b * component of original host image.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…In this study, in order to get good result, the chosen value for ∆, β, and m are 42, 10, and 4, respectively which are used as secret key K. Table 1 illustrates an analysis between the suggested and various recent algorithms [19][20][21] for imperceptibility of various images. From this Table, we noticed that the PSNR and SSIM values of the suggested algorithm range from 54.1823 to 54.1823 and 0.9285 to 0.9696, respectively, whereas the PSNR and SSIM values of the recent methods range from 48.62 to 53.32 and 0.9321 to 0.9123, respectively Symmetry 2020, 12, 486 9 of 14 indicating that the suggested algorithm has higher PSNR and SSIM than the recent advanced methods presented in [19][20][21]. This is because watermark data is placed into the first row fourth column of the matrix R attained from the FBT coefficients of b * component of original host image.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…Besides, it yields watermarked images with high quality. Furthermore, it shows more excellent result in comparison with the recent state-of-the-art algorithms [19][20][21] for imperceptibility and robustness. It is because watermark information is inserted into the first row fourth column of the upper triangular matrix acquired from the FBT coefficients of b * component of original image using a new embedding equation.…”
Section: Introductionmentioning
confidence: 84%
See 3 more Smart Citations