{"title":"Attacks on a Block Based SVD Watermarking Scheme","authors":"H. Ling, Swee-Huay Heng, B. Goi","doi":"10.1109/ITNG.2009.37","DOIUrl":null,"url":null,"abstract":"One major application of a watermarking scheme is to protect the copyright of a content owner by embedding the owner's watermark into the content. Recently, a block based watermarking scheme was proposed by Ghazy et al., which is dependent on singular value decomposition (SVD). In the proposed scheme, the cover image is divided into blocks, and then the watermark is embedded in the singular values of each block separately. In this paper, we present attacks on this watermarking scheme and show how the designers' security claims can be invalidated, namely related to robustness and protection of rightful ownership.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Sixth International Conference on Information Technology: New Generations","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNG.2009.37","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
One major application of a watermarking scheme is to protect the copyright of a content owner by embedding the owner's watermark into the content. Recently, a block based watermarking scheme was proposed by Ghazy et al., which is dependent on singular value decomposition (SVD). In the proposed scheme, the cover image is divided into blocks, and then the watermark is embedded in the singular values of each block separately. In this paper, we present attacks on this watermarking scheme and show how the designers' security claims can be invalidated, namely related to robustness and protection of rightful ownership.