{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:57:37Z","timestamp":1761580657972,"version":"build-2065373602"},"reference-count":61,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2009,1,22]],"date-time":"2009-01-22T00:00:00Z","timestamp":1232582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>In this paper, a block-based watermarking scheme based on the Singular Value Decomposition (SVD) is proposed. Our watermark, a pseudo-random Gaussian sequence, is embedded by modifying the angles formed by the right singular vectors of each block of the original image. The orthogonality property of the right singular vector matrix is preserved during the embedding process. Several experiments have been carried out to test the performance of the proposed scheme against different attack scenarios. We conclude that the proposed scheme is resistant against common signal processing operations and attacks, while it preserves the quality of the original image.<\/jats:p>","DOI":"10.3390\/a2010046","type":"journal-article","created":{"date-parts":[[2009,1,22]],"date-time":"2009-01-22T10:30:48Z","timestamp":1232620248000},"page":"46-75","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["A Novel Block-based Watermarking Scheme Using the SVD Transform"],"prefix":"10.3390","volume":"2","author":[{"given":"Alessandro","family":"Basso","sequence":"first","affiliation":[{"name":"Department of Computer Science, Universit\u00e0 degli Studi di Torino, 10149, Torino, Italy"}]},{"given":"Francesco","family":"Bergadano","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Universit\u00e0 degli Studi di Torino, 10149, Torino, Italy"}]},{"given":"Davide","family":"Cavagnino","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Universit\u00e0 degli Studi di Torino, 10149, Torino, Italy"}]},{"given":"Victor","family":"Pomponiu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Universit\u00e0 degli Studi di Torino, 10149, Torino, Italy"}]},{"given":"Annamaria","family":"Vernone","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Universit\u00e0 degli Studi di Torino, 10149, Torino, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2009,1,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Seitz, J., and Jahnke, T. (2005). Digital Watermarking for Digital Media, Information Science Publishing.","DOI":"10.4018\/978-1-59140-518-4"},{"key":"ref_2","unstructured":"Katzenbeisser, S.C., and Petitcolas, F.A.P. (1999). Information Techniques for Steganography and Digital Watermarking, Artech House."},{"key":"ref_3","unstructured":"Schyndel, R.G., Tirkel, A.Z., and Osborne, C.F. (1994, January November). A digital watermark. Proceedings of IEEE International Conference on Image Processing (ICIP\u201994), Austin Texas, USA."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/79.879337","article-title":"Watermarking Digital Image and Video Data","volume":"17","author":"Langelaar","year":"2000","journal-title":"IEEE Signal Processing Magazine"},{"key":"ref_5","unstructured":"Wollan, H. Digital Watermarking in Still Images. Available on http:\/\/cda.morris.umn.edu\/~lopezdr\/seminar\/spring2000\/wollan.pdf."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/49.668975","article-title":"Image-adaptive watermarking using visual models","volume":"16","author":"Podilchuk","year":"1998","journal-title":"IEEE J. Sel. Are. Comm."},{"key":"ref_7","unstructured":"Cox, I., Kilian, J., Leighton, F. T., and Shamoon, T. IEEE Transaction on Image Processing."},{"key":"ref_8","unstructured":"Ruanaidh, J.J.K., Dowling, W.J., and Boland, F.M. (, January September). Phase watermarking of digital images. Proceedings of the 1996 International Conference on Image Processing, Lausanne, Switzerland."},{"key":"ref_9","unstructured":"Dugad, R., Ratakonda, K., and Ahuja, N. (1998, January October). A new wavelet-based scheme for watermarking images. International Conference on Image Processing Proceedings (ICIP 98), Chicago, USA."},{"key":"ref_10","unstructured":"Wolfgang, R. B., Podilchuk, C. I., and Delp, E. J. (, January July). Perceptual watermarks for digital images and video. Proceedings of the IEEE, Bellingham, USA."},{"key":"ref_11","unstructured":"Bartolini, F., Barni, M., Cappellini, V., and Piva, A. (, 1998). Mask building for perceptually hiding frequency embedded watermarks. Proceedings of the International Conference on Image Processing (ICIP 98), Chicago, Illinois, USA."},{"key":"ref_12","unstructured":"Lin, E.T., and Delp, E.J. (, January October). A Review of Fragile Image Watermarks. Proceedings of ACM Multimedia & Security Workshop, Orlando, USA."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, Stefan, and Petitcolas, F.A.P. (2000). Information Hiding Techniques for Steganography and Digital Watermarking, Artech House.","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"ref_14","unstructured":"Craver, S., Memon, D. N., Yeo, B.-L., and Minerva, M. M. (, 1997). Can invisible watermarks resolve rightful ownerships?. Proceedings of SPIE, Bellingham, USA."},{"key":"ref_15","unstructured":"Wu, H.-C., Yeh, C.-P., and Tsai, C.-S. (2006). Workshop on Applied Cryptography and Information Security (ACIS 2006), LNCS 3982, Springer Berlin\/Heidelberg."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Ling, H.-C., Phan, C.-W., and Heng, S.-H. (, January June). Attacks on SVD-Based Watermarking Schemes. Proceedings of ISI 2008 Workshop, Taipei, Taiwan, LNCS 5075, Springer Berlin\/Heidelberg, Germany.","DOI":"10.1007\/978-3-540-69304-8_10"},{"key":"ref_17","unstructured":"Yang, J.-F., and Lu, C.-L. IEEE Transaction on Image Processing."},{"key":"ref_18","unstructured":"Andrews, H.C., and Patterson, C.L. IEEE Transactions on Communications."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Shnayderman, A., Gusev, A., and Eskicioglu, A. (2004, January January). A Multidimensional Image Quality Measure Using Singular Value Decomposition. Proceedings of the SPIE Image Quality and System Performance Conference, San Jose, California, USA.","DOI":"10.1117\/12.530554"},{"key":"ref_20","unstructured":"Gorodetski, V.I., Popyack, L.J., and Samoilov, V. (, 2001). SVD-Based Approach to Transparent Embedding Data into Digital Images. Proceedings of International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS01), St. Petersburg, Russia."},{"key":"ref_21","unstructured":"Calagna, M., Guo, H., Mancini, L.V., and Jajodia, S. (-27,, January April). Robust Watermarking System based on SVD Compression. Proceedings of the 2006 ACM Symposium on Applied Computing, Dijon, France."},{"key":"ref_22","unstructured":"Liu, J., Niu, X., and Kong, W. (, January December). Image watermarking scheme based on singular value decomposition. International Conference on Intelligent Information Hiding and Multimedia, Pasadena, California, USA."},{"key":"ref_23","unstructured":"Liu, R., and Tan, T. (, January March). A new SVD based Image Watermarking method. IEEE Transactions on Multimedia, Piscataway, New Jersey, USA."},{"key":"ref_24","unstructured":"Ganic, E., Zubair, N., and Eskicioglu, A. M. (2003, January December). An Optimal Watermarking Scheme Based on Singular Value Decomposition. Proceedings of the IASTED International Conference on Communication, Network, and Information Security (CNIS 2003), Uniondale, New York, USA."},{"key":"ref_25","unstructured":"Chandra, D. (2002, January August). Digital image watermarking using singular value decomposition. Proceedings of the IEEE 45th Midwest Symposium on Circuits and Systems, Oklahoma State University, USA."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.csi.2005.03.006","article-title":"A semi-blind digital watermarking scheme based on singular value decomposition","volume":"28","author":"Shieh","year":"2006","journal-title":"Computer Standards & Interfaces"},{"key":"ref_27","unstructured":"Chang, C.-C., Hu, Y.-S., and Lin, C.-C. (, January September). A Digital watermarking scheme based on singular value decomposition. Proceedings of the International Symposium on Combinatory, Algorithms, Probabilistic and Experimental Methodologies Hangzhou, China, LNCS 4614, Springer Berlin\/Heidelberg, Germany."},{"key":"ref_28","unstructured":"Chang, C.-C., Lin, C.-C., and Hu, Y.-S. International Journal of Innovative Computing, Information and Control (IJICIC)."},{"key":"ref_29","first-page":"17","article-title":"A Robust Digital Image Watermarking Scheme using Singular Value Decomposition (SVD), Dither Quantization and Edge Detection","volume":"8","author":"Mohan","year":"2008","journal-title":"ICGST-GVIP J."},{"key":"ref_30","unstructured":"Rezazadeh, S., and Yazdi, M. (2006, January May). A Nonoblivious Image Watermarking System Based on Singular Value Decomposition and Texture Segmentation. Proceedings of the World Academy of Science, Engineering and Technology, Budapest, Hungary."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2158","DOI":"10.1016\/j.sigpro.2008.02.015","article-title":"An improved SVD-based watermarking scheme for protecting rightful ownership","volume":"88","author":"Mohammad","year":"2008","journal-title":"Signal Processing"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Ting, G.C.-W. (, 2006). Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme. Proceedings of Information Security and Cryptology (ICISC 2005), Seoul, Korea, LNCS 3935, Springer Berlin\/Heidelberg, Germany.","DOI":"10.1007\/11734727_30"},{"key":"ref_33","unstructured":"Wu, Y. IEEE Transactions On Multimedia."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1109\/TMM.2005.843357","article-title":"Comments on An SVD-Based watermarking scheme for protecting rightful Ownership","volume":"7","author":"Zhang","year":"2005","journal-title":"IEEE Trans. Multimed."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Yavuz, E., and Telatar, Z. (, 2006). SVD Adapted DCT Domain DC Sub-band Image Watermarking Against Watermark Ambiguity. Proceedings of International Workshop on Multimedia Content Representation, Classification and Security (IW-MRCS2006). LNCS 4105, Istanbul, Turkey.","DOI":"10.1007\/11848035_11"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L., and Bloom, J.A. (2001). Digital Watermarking, Morgan Kaufmann Publishers Inc.","DOI":"10.1016\/B978-155860714-9\/50009-2"},{"key":"ref_37","unstructured":"Craver, S., Memon, D.N., Yeo, B.-L., and Yeung, M.M. (, January May). Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications, California, USA."},{"key":"ref_38","unstructured":"Ghazy, R., El-Fishawy, N., Hadhoud, M., Dessouky, M., and El-Samie, F. (, January March). An efficient block-by block SVD-based image watermarking scheme. Proceedings of the 24th National Radio Science Conference, Cairo, Egypt."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1016\/j.patrec.2005.01.004","article-title":"SVD-based Digital Image Watermarking scheme","volume":"26","author":"Chang","year":"2005","journal-title":"Pattern Recognition Letters"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Patra, J.C., Soh, W., Ang, E.L., and Meher, P.K. (2006, January December). An Improved SVD-Based Watermarking Technique for Image and Document Authentication. Circuits and Systems (APCCAS 2006), IEEE Asia Pacific, Singapore.","DOI":"10.1109\/APCCAS.2006.342276"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"7","DOI":"10.4304\/jmm.3.1.7-15","article-title":"A Robust Digital Image Watermarking Scheme using Singular Value Decomposition","volume":"3","author":"Mohan","year":"2008","journal-title":"J. Multimed."},{"key":"ref_42","first-page":"54","article-title":"On SVD-based watermarking algorithm","volume":"8","author":"Chung","year":"2007","journal-title":"Appl. Math. Comput."},{"key":"ref_43","unstructured":"Sverdlov, A., Dexter, S., and Eskicioglu, A. M. (, January September). Robust DCT-SVD domain image watermarking for copyright protection: embedding data in all frequencies. Proceedings of 13th European Signal Processing Conference (EUSIPCO2005), Antalya, Turkey."},{"key":"ref_44","unstructured":"Tsai, C.-F., and Yang, W.-Y. (, January December). Real-Time Color Image Watermarking Based on D-SVD Scheme. Advances in Image and Video Technology, LNCS 4872, Springer Berlin\/Heidelberg, Germany."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Liu, F., and Liu, Y. (2008, January May). watermarking Algorithm for Digital Image based on DCT and SVD. IEEE Congress on Image and Signal Processing, Sanya, Hainan, China.","DOI":"10.1109\/CISP.2008.412"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Ganic, E., and Eskicioglu, A.M. (2004, January September). Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies. Proceedings of the ACM Multimedia and Security workshop, Magdeburg, Germany.","DOI":"10.1145\/1022431.1022461"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Lin, C.-H., Liu, J.-C., and Han, P.-C. (2008, January June). On the Security of the Full-Band Image Watermark for Copyright Protection. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan.","DOI":"10.1109\/SUTC.2008.16"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Li, H., Wang, S., Song, W., and Wen, Q. (, 2005). A Novel Watermarking Algorithm Based on SVD and Zernike Moments. LNCS 3495, Springer Berlin\/Heidelberg, Germany.","DOI":"10.1007\/11427995_41"},{"key":"ref_49","unstructured":"Tang, X., Yang, L., Li, L., and Niu, Y. (, 2004). Study on a Multifunctional watermarking Algorithm. In Proceedings of IEEE ICSP\u20192004, Istanbul, Turkey."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1002\/scj.10371","article-title":"A cropping-robust watermarking method based on singular value decomposition and Haar transformation","volume":"34","author":"Sugiyama","year":"2003","journal-title":"Syst. Comp. Japan"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Byun, S.-C., Lee, S.-K., Tewfik, A. H., and Ahn, B.-H. (, 2003). A SVD-Based Fragile Watermarking Scheme for Image Authentication. Proceedings of First International Workshop (IWDW 2002), Seoul, Korea, LNCS 2613, Springer Berlin\/Heidelberg, Germany.","DOI":"10.1007\/3-540-36617-2_14"},{"key":"ref_52","unstructured":"Sun, R., Sun, H., and Yao, T. (, 2002). A SVD and quantization based semi-fragile watermarking technique for image authentication. Proceedings of the 6th International Conference on Signal Processing (ICSP\u201902), Rochester, USA."},{"key":"ref_53","unstructured":"Zeng, W., and Liu, B. (, January November). A statistical watermark detection technique without using original images for resolving rightful ownership of digital images. IEEE Transactions on Image Processing, Piscataway, New Jersey, USA."},{"key":"ref_54","unstructured":"Stathaki, T., and Dafas, P. (2003, January September). Digital Image Watermarking Using Block-Based Karhunen-Loeve Transform. Proceedings of the 3rd International Symposium (ISPA), Rome, Italy."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Anderson, E., Bai, Z., Bischof, C., Blackford, S., Demmel, J., Dongarra, J., Croz, D.J., Greenbaum, A., Hammarling, S., Mckenney, A., and Sorensen, D. (1999). LAPACK User\u2019s Guide, SIAM. [third edition].","DOI":"10.1137\/1.9780898719604"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1002\/cem.1122","article-title":"Resolving the sign ambiguity in the singular value decomposition","volume":"22","author":"Bro","year":"2008","journal-title":"J. Chemometr."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Lu, C.-S. (2005). Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property, Idea Group Publishing (an imprint of Idea Group Inc.). Chapter 2.","DOI":"10.4018\/978-1-59140-192-6"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Li, L.-J., Wang, G., and Li, F.-F. (, 2007). OPTIMOL: automatic Object Picture collecTion via Incremental MOdel Learning. IEEE Computer Vision and Pattern Recognition (CVPR), Minneapolis, USA.","DOI":"10.1109\/CVPR.2007.383048"},{"key":"ref_59","unstructured":"Schaefer, G., and Stich, M. (, 2004). UCID - An Uncompressed Colour Image Database. Proceedings of SPIE, Storage and Retrieval Methods and Applications for Multimedia, San Jose, USA."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Schlauweg, M., Pr\u00f6frock, D., Zeibich, B., and M\u00fcller, E. (, 2006). Dual watermarking for protection of rightful ownership and secure image authentication. Proceedings of the 4th ACM international workshop on Contents protection and security, Santa Barbara, California, USA.","DOI":"10.1145\/1178766.1178781"},{"key":"ref_61","unstructured":"Web Resource: http:\/\/reference.wolfram.com\/ mathematica\/ref\/ArcTan.html."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/2\/1\/46\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T22:09:44Z","timestamp":1760220584000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/2\/1\/46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1,22]]},"references-count":61,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2009,3]]}},"alternative-id":["a2010046"],"URL":"https:\/\/doi.org\/10.3390\/a2010046","relation":{},"ISSN":["1999-4893"],"issn-type":[{"type":"electronic","value":"1999-4893"}],"subject":[],"published":{"date-parts":[[2009,1,22]]}}}