Attacks on SVD-Based watermarking schemes

One major application of a watermarking scheme is to protect the copyright of a content owner by embedding the owner's watermark into the content. Recently, two watermarking schemes were proposed by Chang et al. [1, 2], which are based on singular value decomposition (SVD). In this paper, we pr...

Full description

Bibliographic Details
Main Authors: Huo-Chong, Ling, Raphael C. -W., Phan, Swee-Huay, Heng
Format: Article
Published: SPRINGER-VERLAG BERLIN 2008
Subjects:
Online Access:http://shdl.mmu.edu.my/2785/
_version_ 1848790149252513792
author Huo-Chong, Ling
Raphael C. -W., Phan
Swee-Huay, Heng
author_facet Huo-Chong, Ling
Raphael C. -W., Phan
Swee-Huay, Heng
author_sort Huo-Chong, Ling
building MMU Institutional Repository
collection Online Access
description One major application of a watermarking scheme is to protect the copyright of a content owner by embedding the owner's watermark into the content. Recently, two watermarking schemes were proposed by Chang et al. [1, 2], which are based on singular value decomposition (SVD). In this paper, we present attacks on these watermarking schemes and show how the designers' security claims can be invalidated, namely related to robustness and protection of rightful ownership. Our results are the first known attacks on these SVD-based watermarking schemes.
first_indexed 2025-11-14T18:08:01Z
format Article
id mmu-2785
institution Multimedia University
institution_category Local University
last_indexed 2025-11-14T18:08:01Z
publishDate 2008
publisher SPRINGER-VERLAG BERLIN
recordtype eprints
repository_type Digital Repository
spelling mmu-27852011-09-14T05:03:08Z http://shdl.mmu.edu.my/2785/ Attacks on SVD-Based watermarking schemes Huo-Chong, Ling Raphael C. -W., Phan Swee-Huay, Heng T Technology (General) QA75.5-76.95 Electronic computers. Computer science One major application of a watermarking scheme is to protect the copyright of a content owner by embedding the owner's watermark into the content. Recently, two watermarking schemes were proposed by Chang et al. [1, 2], which are based on singular value decomposition (SVD). In this paper, we present attacks on these watermarking schemes and show how the designers' security claims can be invalidated, namely related to robustness and protection of rightful ownership. Our results are the first known attacks on these SVD-based watermarking schemes. SPRINGER-VERLAG BERLIN 2008 Article NonPeerReviewed Huo-Chong, Ling and Raphael C. -W., Phan and Swee-Huay, Heng (2008) Attacks on SVD-Based watermarking schemes. INTELLIGENCE AND SECURITY INFORMATICS, 5075. pp. 83-91. http://apps.webofknowledge.com/full_record.do?product=WOS&search_mode=GeneralSearch&qid=1&SID=X18DcEAFF3IHaF4gfEh&page=83&doc=823
spellingShingle T Technology (General)
QA75.5-76.95 Electronic computers. Computer science
Huo-Chong, Ling
Raphael C. -W., Phan
Swee-Huay, Heng
Attacks on SVD-Based watermarking schemes
title Attacks on SVD-Based watermarking schemes
title_full Attacks on SVD-Based watermarking schemes
title_fullStr Attacks on SVD-Based watermarking schemes
title_full_unstemmed Attacks on SVD-Based watermarking schemes
title_short Attacks on SVD-Based watermarking schemes
title_sort attacks on svd-based watermarking schemes
topic T Technology (General)
QA75.5-76.95 Electronic computers. Computer science
url http://shdl.mmu.edu.my/2785/
http://shdl.mmu.edu.my/2785/