{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T02:00:37Z","timestamp":1762999237469,"version":"build-2065373602"},"reference-count":32,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2017,3,30]],"date-time":"2017-03-30T00:00:00Z","timestamp":1490832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61201371"],"award-info":[{"award-number":["61201371"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Shandong Province, China","award":["ZR2015PF004"],"award-info":[{"award-number":["ZR2015PF004"]}]},{"name":"Research Award Fund for Outstanding Young and Middle-Aged Scientists of Shandong Province, China","award":["BS2013DX022"],"award-info":[{"award-number":["BS2013DX022"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Currently, most digital image watermarking schemes are affected by geometric attacks like rotation, scaling, and translation (RST). In the watermark embedding process, a robust watermarking scheme is proposed against RST attacks. In this paper, three-level discrete wavelet transform (DWT) is applied to the original image. The three-level low frequency sub-band is decomposed by the singular value decomposition (SVD), and its singular values matrix is extracted for watermarking embedding. Before the watermarking extraction, the keypoints are selected by scale-invariant feature transform (SIFT) in the original image and attacked image. By matching the keypoints in two images, the RST attacks can be precisely corrected and the better performance can be obtained. The experimental results show that the proposed scheme achieves good performance of imperceptibility and robustness against common image processing and malicious attacks, especially geometric attacks.<\/jats:p>","DOI":"10.3390\/a10020041","type":"journal-article","created":{"date-parts":[[2017,3,30]],"date-time":"2017-03-30T09:29:15Z","timestamp":1490866155000},"page":"41","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform"],"prefix":"10.3390","volume":"10","author":[{"given":"Yunpeng","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0901-2492","authenticated-orcid":false,"given":"Chengyou","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1331-7379","authenticated-orcid":false,"given":"Xiao","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,3,30]]},"reference":[{"key":"ref_1","unstructured":"Dittmann, J., Steinmetz, A., and Steinmetz, R. (1999, January 7\u201311). Content-based digital signature for motion pictures authentication and content-fragile watermarking. Proceedings of the 6th IEEE International Conference on Multimedia Computing and Systems, Florence, Italy."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/30.826378","article-title":"Fault resilient and compression tolerant digital signature for image authentication","volume":"46","author":"Lou","year":"2000","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/79.879337","article-title":"Watermarking digital image and video data","volume":"17","author":"Langelaar","year":"2000","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","article-title":"A DCT-domain system for robust image watermarking","volume":"66","author":"Barni","year":"1998","journal-title":"Signal Process."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/j.jvcir.2015.05.006","article-title":"A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization","volume":"30","author":"Qi","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/6046.985560","article-title":"An SVD-based watermarking scheme for protecting rightful ownership","volume":"4","author":"Liu","year":"2002","journal-title":"IEEE Trans. Multimedia"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1016\/j.patrec.2005.01.004","article-title":"SVD-based digital image watermarking scheme","volume":"26","author":"Chang","year":"2005","journal-title":"Pattern Recognit. Lett."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"8455","DOI":"10.1016\/j.amc.2013.03.013","article-title":"A blind dual color images watermarking based on singular value decomposition","volume":"219","author":"Su","year":"2013","journal-title":"Appl. Math. Comput."},{"key":"ref_9","first-page":"203","article-title":"Blind watermarking scheme based on U matrix through QSVD transformation","volume":"9","author":"Liu","year":"2015","journal-title":"Int. J. Secur. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Li, Z., Yap, K.H., and Lei, B.Y. (2011, January 11\u201314). A new blind robust image watermarking scheme in SVD-DCT composite domain. Proceedings of the 18th IEEE International Conference on Image Processing, Brussels, Belgium.","DOI":"10.1109\/ICIP.2011.6116241"},{"key":"ref_11","unstructured":"Sverdlov, A., Dexter, S., and Eskicioglu, A.M. (2005, January 4\u20138). Robust DCT-SVD domain image watermarking for copyright protection: Embedding data in all frequencies. Proceedings of the 13th European Signal Processing Conference, Antalya, Turkey."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"3060","DOI":"10.1109\/TIM.2010.2066770","article-title":"Digital image watermarking using discrete wavelet transform and singular value decomposition","volume":"59","author":"Lai","year":"2010","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1016\/j.csi.2008.09.031","article-title":"A new robust reference watermarking scheme based on DWT-SVD","volume":"31","author":"Bhatnagar","year":"2009","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"7858","DOI":"10.1016\/j.eswa.2014.06.011","article-title":"Optimized gray-scale image watermarking using DWT-SVD and Firefly algorithm","volume":"41","author":"Mishra","year":"2014","journal-title":"Expert Syst. Appl."},{"key":"ref_15","first-page":"339","article-title":"Comparative analysis of DWT and DWT-SVD watermarking techniques in RGB images","volume":"8","author":"Narula","year":"2015","journal-title":"Int. J. Signal Process. Image Process. Pattern Recognit."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Singh, D., and Singh, S.K. (2016). DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed. Tools Appl.","DOI":"10.1007\/s11042-016-3706-6"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.engappai.2015.12.004","article-title":"Robust and false positive free watermarking in IWT domain using SVD and ABC","volume":"49","author":"Ansari","year":"2016","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1109\/TCSVT.2003.815959","article-title":"RST-invariant digital image watermarking based on log-polar mapping and phase correlation","volume":"13","author":"Zheng","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Ye, X.Y., Chen, X.T., Deng, M., and Wang, Y.L. (2014, January 14\u201316). A SIFT-based DWT-SVD blind watermark method against geometrical attacks. Proceedings of the 7th International Congress on Image and Signal Processing, Dalian, China.","DOI":"10.1109\/CISP.2014.7003800"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Lowe, D.G. (1999, January 20\u201327). Object recognition from local scale-invariant features. Proceedings of the 7th IEEE International Conference on Computer Vision, Kerkyra, Greece.","DOI":"10.1109\/ICCV.1999.790410"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1615","DOI":"10.1109\/TPAMI.2005.188","article-title":"A performance evaluation of local descriptors","volume":"27","author":"Mikolajczyk","year":"2005","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_22","first-page":"535","article-title":"Robust image watermarking using local invariant features","volume":"45","author":"Lee","year":"2006","journal-title":"Opt. Eng."},{"key":"ref_23","first-page":"525","article-title":"A robust image watermarking based on image restoration using SIFT","volume":"20","author":"Luo","year":"2011","journal-title":"Radio Eng."},{"key":"ref_24","first-page":"3591","article-title":"Image watermarking scheme based on scale-invariant feature transform","volume":"8","author":"Lyu","year":"2014","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.procs.2010.11.030","article-title":"A blind digital watermark technique for color image based on integer wavelet transform and SIFT","volume":"2","author":"Thorat","year":"2010","journal-title":"Procedia Comput. Sci."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Pham, V.Q., Miyaki, T., Yamasaki, T., and Aizawa, K. (2007, January 16\u201319). Geometrically invariant object-based watermarking using SIFT feature. Proceedings of the 14th IEEE International Conference on Image Processing, San Antonio, TX, USA.","DOI":"10.1109\/ICIP.2007.4379868"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Zhang, L., and Tang, B. (2012, January 23\u201325). A combination of feature-points-based and SVD-based image watermarking algorithm. Proceedings of the International Conference on Industrial Control and Electronics Engineering, Xi\u2019an, China.","DOI":"10.1109\/ICICEE.2012.289"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1007\/s11042-013-1405-0","article-title":"Feature extraction and local Zernike moments based geometric invariant watermarking","volume":"72","author":"Yuan","year":"2014","journal-title":"Multimed. Tools Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.image.2016.03.007","article-title":"Geometrically invariant image watermarking based on fast radial harmonic Fourier moments","volume":"45","author":"Wang","year":"2016","journal-title":"Signal Process. Image Commun."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1864","DOI":"10.1016\/j.jss.2012.02.045","article-title":"Performance evaluation of moment-based watermarking methods: A review","volume":"85","author":"Tsougenis","year":"2012","journal-title":"J. Syst. Softw."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/BF00336961","article-title":"The structure of image","volume":"50","author":"Koenderink","year":"1984","journal-title":"Biol. Cybern."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/TPAMI.1986.4767749","article-title":"Uniqueness of the Gaussian kernel for scale-space filtering","volume":"8","author":"Babaud","year":"1986","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/10\/2\/41\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:31:36Z","timestamp":1760207496000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/10\/2\/41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,30]]},"references-count":32,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,6]]}},"alternative-id":["a10020041"],"URL":"https:\/\/doi.org\/10.3390\/a10020041","relation":{},"ISSN":["1999-4893"],"issn-type":[{"type":"electronic","value":"1999-4893"}],"subject":[],"published":{"date-parts":[[2017,3,30]]}}}