{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T03:35:30Z","timestamp":1774064130030,"version":"3.50.1"},"reference-count":32,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2017,4,19]],"date-time":"2017-04-19T00:00:00Z","timestamp":1492560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61201371"],"award-info":[{"award-number":["61201371"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Award Fund for Outstanding Young and Middle-Aged Scientists of Shandong Province, China","award":["BS2013DX022"],"award-info":[{"award-number":["BS2013DX022"]}]},{"name":"Natural Science Foundation of Shandong Province, China","award":["ZR2015PF004"],"award-info":[{"award-number":["ZR2015PF004"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Watermarking techniques can be applied in digital images to maintain the authenticity and integrity for copyright protection. In this paper, scale-invariant feature transform (SIFT) is combined with local digital watermarking and a digital watermarking algorithm based on SIFT, singular value decomposition (SVD), and all phase biorthogonal transform (APBT) is proposed. It describes the generation process of the SIFT algorithm in detail and obtains a series of scale-invariant feature points. A large amount of candidate feature points are selected to obtain the neighborhood which can be used to embed the watermark. For these selected feature points, block-based APBT is carried out on their neighborhoods. Moreover, a coefficients matrix of certain APBT coefficients is generated for SVD to embed the encrypted watermark. Experimental results demonstrate that the proposed watermarking algorithm has stronger robustness than some previous schemes. In addition, APBT-based digital watermarking algorithm has good imperceptibility and is more robust to different combinations of attacks, which can be applied for the purpose of copyright protection.<\/jats:p>","DOI":"10.3390\/fi9020013","type":"journal-article","created":{"date-parts":[[2017,4,19]],"date-time":"2017-04-19T10:22:01Z","timestamp":1492597321000},"page":"13","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Feature-Based Image Watermarking Algorithm Using SVD and APBT for Copyright Protection"],"prefix":"10.3390","volume":"9","author":[{"given":"Yunpeng","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0901-2492","authenticated-orcid":false,"given":"Chengyou","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China"}]},{"given":"Xiaoli","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China"}]},{"given":"Min","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,4,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/79.952804","article-title":"The JPEG 2000 still image compression standard","volume":"18","author":"Skodras","year":"2001","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/30.826378","article-title":"Fault resilient and compression tolerant digital signature for image authentication","volume":"46","author":"Lou","year":"2000","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/79.879337","article-title":"Watermarking digital image and video data","volume":"17","author":"Langelaar","year":"2000","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_4","unstructured":"Van Schyndel, R.G., Tirkel, A.Z., and Osborne, C.F. (1994, January 13\u201316). A digital watermark. Proceedings of the 1st IEEE International Conference on Image Processing, Austin, TX, USA."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"7858","DOI":"10.1016\/j.eswa.2014.06.011","article-title":"Optimized gray-scale image watermarking using DWT-SVD and Firefly algorithm","volume":"41","author":"Mishra","year":"2014","journal-title":"Expert Syst. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Sakthivel, S.M., and Ravi Sankar, A. (2015, January 8\u201310). A real time watermarking of grayscale images without altering its content. Proceedings of the International Conference on VLSI Systems, Architecture, Technology and Applications, Bengaluru, India.","DOI":"10.1109\/VLSI-SATA.2015.7050469"},{"key":"ref_7","unstructured":"Jin, X.Z. (2011, January 27\u201329). A digital watermarking algorithm based on wavelet transform and Arnold. Proceedings of the International Conference on Computer Science and Service System, Nanjing, China."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"An, Z.Y., and Liu, H.Y. (2012, January 17\u201319). Research on digital watermark technology based on LSB algorithm. Proceedings of the 4th International Conference on Computational and Information Sciences, Chongqing, China.","DOI":"10.1109\/ICCIS.2012.242"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/j.jvcir.2015.05.006","article-title":"A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization","volume":"30","author":"Qi","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.aeue.2012.06.008","article-title":"Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition","volume":"67","author":"Makbol","year":"2013","journal-title":"AEU\u2014Int. J. Electron. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1080\/03772063.2007.10876174","article-title":"Secure watermarking in fractional wavelet domains","volume":"53","author":"Pujara","year":"2007","journal-title":"IETE J. Res."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1016\/j.jvcir.2016.05.001","article-title":"Robust non-blind color video watermarking using QR decomposition and entropy analysis","volume":"38","author":"Rasti","year":"2016","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_13","first-page":"299","article-title":"A combined DWT and DCT watermarking scheme optimized using genetic algorithm","volume":"8","author":"Cheng","year":"2013","journal-title":"J. Multimed."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.jvcir.2015.03.009","article-title":"Secure watermarking scheme against watermark attacks in the encrypted domain","volume":"30","author":"Guo","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1055","DOI":"10.1016\/j.aeue.2016.05.003","article-title":"A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain","volume":"70","author":"Nguyen","year":"2016","journal-title":"AEU\u2014Int. J. Electron. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.ins.2012.01.014","article-title":"Fragile watermarking tamper detection with images compressed by fuzzy transform","volume":"195","author":"Martino","year":"2012","journal-title":"Inf. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.diin.2014.03.016","article-title":"A passive approach for effective detection and localization of region level video forgery with spatio-temproal coherence analysis","volume":"11","author":"Lin","year":"2014","journal-title":"Dig. Investig."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Lowe, D.G. (1999, January 20\u201327). Object recognition from local scale-invariant features. Proceedings of the 7th IEEE International Conference on Computer Vision, Kerkyra, Greece.","DOI":"10.1109\/ICCV.1999.790410"},{"key":"ref_19","unstructured":"Mikolajczyk, K., and Schmid, C. (2003, January 18\u201320). A performance evaluation of local descriptors. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Madison, WI, USA."},{"key":"ref_20","first-page":"535","article-title":"Robust image watermarking using local invariant features","volume":"45","author":"Lee","year":"2006","journal-title":"Opt. Eng."},{"key":"ref_21","first-page":"3591","article-title":"Image watermarking scheme based on scale-invariant feature transform","volume":"8","author":"Lyu","year":"2014","journal-title":"KSII Trans. Int. Inf. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.procs.2010.11.030","article-title":"A blind digital watermark technique for color image based on integer wavelet transform and SIFT","volume":"2","author":"Thorat","year":"2010","journal-title":"Proced. Comput. Sci."},{"key":"ref_23","first-page":"525","article-title":"A robust image watermarking based on image restoration using SIFT","volume":"20","author":"Luo","year":"2011","journal-title":"Radioengineering"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Pham, V.Q., Miyaki, T., Yamasaki, T., and Aizawa, K. (2007, January 16\u201319). Geometrically invariant object-based watermarking using SIFT feature. Proceedings of the 14th IEEE International Conference on Image Processing, San Antonio, TX, USA.","DOI":"10.1109\/ICIP.2007.4379868"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Zhang, L., and Tang, B. (2012, January 23\u201325). A combination of feature-points-based and SVD-based image watermarking algorithm. Proceedings of the International Conference on Industrial Control and Electronics Engineering, Xi\u2019an, China.","DOI":"10.1109\/ICICEE.2012.289"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1016\/j.image.2009.08.002","article-title":"All phase biorthogonal transform and its application in JPEG-like image compression","volume":"24","author":"Hou","year":"2009","journal-title":"Signal Process. Image Commun."},{"key":"ref_27","first-page":"125","article-title":"Embedding binary watermark in DC components of all phase discrete cosine biorthogonal transform","volume":"9","author":"Yang","year":"2015","journal-title":"Int. J. Secur. Appl."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","article-title":"Distinctive image features from scale-invariant keypoints","volume":"60","author":"Lowe","year":"2004","journal-title":"Int. J. Comput. Vis."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/TPAMI.1986.4767749","article-title":"Uniqueness of the Gaussian kernel for scale-space filtering","volume":"8","author":"Babaud","year":"1986","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_30","unstructured":"Jain, C., Arora, S., and Panigrahi, P.K. (2008). A reliable SVD based watermarking scheme. Comput. Sci. arXiv, Available online: https:\/\/arxiv.org\/pdf\/0808.0309.pdf."},{"key":"ref_31","first-page":"191","article-title":"Image watermarking scheme based on DWT-DCT and SSVD","volume":"10","author":"Zhang","year":"2016","journal-title":"Int. J. Secur. Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"964","DOI":"10.1016\/j.ijleo.2015.09.205","article-title":"A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks","volume":"127","author":"Fzali","year":"2016","journal-title":"Optik"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/9\/2\/13\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:32:56Z","timestamp":1760207576000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/9\/2\/13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,19]]},"references-count":32,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,6]]}},"alternative-id":["fi9020013"],"URL":"https:\/\/doi.org\/10.3390\/fi9020013","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,19]]}}}