Attacks on SVD-Based watermarking schemes
One major application of a watermarking scheme is to protect the copyright of a content owner by embedding the owner's watermark into the content. Recently, two watermarking schemes were proposed by Chang et al. [1, 2], which are based on singular value decomposition (SVD). In this paper, we pr...
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Published: |
SPRINGER-VERLAG BERLIN
2008
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2785/ |
| _version_ | 1848790149252513792 |
|---|---|
| author | Huo-Chong, Ling Raphael C. -W., Phan Swee-Huay, Heng |
| author_facet | Huo-Chong, Ling Raphael C. -W., Phan Swee-Huay, Heng |
| author_sort | Huo-Chong, Ling |
| building | MMU Institutional Repository |
| collection | Online Access |
| description | One major application of a watermarking scheme is to protect the copyright of a content owner by embedding the owner's watermark into the content. Recently, two watermarking schemes were proposed by Chang et al. [1, 2], which are based on singular value decomposition (SVD). In this paper, we present attacks on these watermarking schemes and show how the designers' security claims can be invalidated, namely related to robustness and protection of rightful ownership. Our results are the first known attacks on these SVD-based watermarking schemes. |
| first_indexed | 2025-11-14T18:08:01Z |
| format | Article |
| id | mmu-2785 |
| institution | Multimedia University |
| institution_category | Local University |
| last_indexed | 2025-11-14T18:08:01Z |
| publishDate | 2008 |
| publisher | SPRINGER-VERLAG BERLIN |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | mmu-27852011-09-14T05:03:08Z http://shdl.mmu.edu.my/2785/ Attacks on SVD-Based watermarking schemes Huo-Chong, Ling Raphael C. -W., Phan Swee-Huay, Heng T Technology (General) QA75.5-76.95 Electronic computers. Computer science One major application of a watermarking scheme is to protect the copyright of a content owner by embedding the owner's watermark into the content. Recently, two watermarking schemes were proposed by Chang et al. [1, 2], which are based on singular value decomposition (SVD). In this paper, we present attacks on these watermarking schemes and show how the designers' security claims can be invalidated, namely related to robustness and protection of rightful ownership. Our results are the first known attacks on these SVD-based watermarking schemes. SPRINGER-VERLAG BERLIN 2008 Article NonPeerReviewed Huo-Chong, Ling and Raphael C. -W., Phan and Swee-Huay, Heng (2008) Attacks on SVD-Based watermarking schemes. INTELLIGENCE AND SECURITY INFORMATICS, 5075. pp. 83-91. http://apps.webofknowledge.com/full_record.do?product=WOS&search_mode=GeneralSearch&qid=1&SID=X18DcEAFF3IHaF4gfEh&page=83&doc=823 |
| spellingShingle | T Technology (General) QA75.5-76.95 Electronic computers. Computer science Huo-Chong, Ling Raphael C. -W., Phan Swee-Huay, Heng Attacks on SVD-Based watermarking schemes |
| title | Attacks on SVD-Based watermarking schemes |
| title_full | Attacks on SVD-Based watermarking schemes |
| title_fullStr | Attacks on SVD-Based watermarking schemes |
| title_full_unstemmed | Attacks on SVD-Based watermarking schemes |
| title_short | Attacks on SVD-Based watermarking schemes |
| title_sort | attacks on svd-based watermarking schemes |
| topic | T Technology (General) QA75.5-76.95 Electronic computers. Computer science |
| url | http://shdl.mmu.edu.my/2785/ http://shdl.mmu.edu.my/2785/ |