{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:34:51Z","timestamp":1777372491987,"version":"3.51.4"},"reference-count":14,"publisher":"World Scientific Pub Co Pte Lt","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Image Grap."],"published-print":{"date-parts":[[2018,10]]},"abstract":"<jats:p> Nowadays, digital watermarking is employed for authentication and copyright protection. In this paper, a secure image watermarking scheme based on lifting wavelet transform (LWT) and singular value decomposition (SVD), is proposed. Both LWT and SVD are used as mathematical tools for embedding watermark in the host image. In this work, the watermark is a speech signal which is segmented into shorted portions having the same length. This length is equal to 256 and these different portions constitute the different columns of a speech image. The latter is then embedded into a grayscale or color image (the host image). This procedure is performed in order to insert into an image a confidential data which is in our case a speech signal. But instead of embedding this speech signal directly into the image, we transform it into a matrix and treated it as an image (\u201ca speech image\u201d). Of course, this speech signal transformation permits us to use LWT-2D and SVD to both the host image and the watermark (\u201ca speech image\u201d). The proposed technique is applied to a number of grayscale and color images. The obtained results from peak signal-to-noise ratio (PSNR) and structural similarity (SSIM) computations show the performance of the proposed technique. Experimental evaluation also shows that the proposed scheme is able to withstand a number of attacks such as JPEG compression, mean and median attacks. In our evaluation of the proposed technique, we used another technique of secure image watermarking based on DWT-2D and SVD. <\/jats:p>","DOI":"10.1142\/s0219467818500213","type":"journal-article","created":{"date-parts":[[2018,11,9]],"date-time":"2018-11-09T07:47:55Z","timestamp":1541749675000},"page":"1850021","source":"Crossref","is-referenced-by-count":8,"title":["Secure Image Watermarking Based on LWT and SVD"],"prefix":"10.1142","volume":"18","author":[{"given":"Mourad","family":"Talbi","sequence":"first","affiliation":[{"name":"Laboratoire des Semi-conducteurs, des Nanostructures et des Technologies Avanc\u00e9es, Centre de Recherches et des Technologies de L\u2019Energie, Technopole de Borj-C\u00e9dria, BP: 95, Hammam-Lif 2050, Tunisia"}]},{"given":"Med Salim","family":"Bouhlel","sequence":"additional","affiliation":[{"name":"Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), Sfax, Tunisia"}]}],"member":"219","published-online":{"date-parts":[[2018,11,8]]},"reference":[{"key":"S0219467818500213BIB002","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.01.004"},{"key":"S0219467818500213BIB003","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2005.03.006"},{"key":"S0219467818500213BIB004","doi-asserted-by":"publisher","DOI":"10.1109\/6046.985560"},{"key":"S0219467818500213BIB008","first-page":"856","author":"Fang L.","year":"2006","journal-title":"1st Int. Symp. Pervasive Computing and Applications"},{"key":"S0219467818500213BIB009","first-page":"450","author":"Xiao-Qing","year":"2009","journal-title":"Int. Conf. Signal Processing Systems"},{"key":"S0219467818500213BIB012","doi-asserted-by":"publisher","DOI":"10.1117\/1.2130331"},{"key":"S0219467818500213BIB013","doi-asserted-by":"publisher","DOI":"10.1117\/1.1951647"},{"issue":"9","key":"S0219467818500213BIB015","first-page":"111","volume":"4","author":"Singh S.","year":"2015","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"key":"S0219467818500213BIB016","doi-asserted-by":"publisher","DOI":"10.1007\/s12046-012-0089-x"},{"key":"S0219467818500213BIB017","doi-asserted-by":"publisher","DOI":"10.1007\/BF02476026"},{"key":"S0219467818500213BIB019","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.12.021"},{"key":"S0219467818500213BIB020","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13681-8_46"},{"key":"S0219467818500213BIB021","author":"Verma V. S.","year":"2014","journal-title":"SIViP"},{"issue":"1","key":"S0219467818500213BIB022","volume":"1","author":"Joseph A.","year":"2013","journal-title":"Int. J. Signal Image Process."}],"container-title":["International Journal of Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219467818500213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T15:09:52Z","timestamp":1565104192000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219467818500213"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":14,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2018,11,8]]},"published-print":{"date-parts":[[2018,10]]}},"alternative-id":["10.1142\/S0219467818500213"],"URL":"https:\/\/doi.org\/10.1142\/s0219467818500213","relation":{},"ISSN":["0219-4678","1793-6756"],"issn-type":[{"value":"0219-4678","type":"print"},{"value":"1793-6756","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10]]}}}