{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T17:25:19Z","timestamp":1775150719013,"version":"3.50.1"},"reference-count":24,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2019,12,26]],"date-time":"2019-12-26T00:00:00Z","timestamp":1577318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007053","name":"Korea Institute of Energy Technology Evaluation and Planning","doi-asserted-by":"publisher","award":["20172510102130"],"award-info":[{"award-number":["20172510102130"]}],"id":[{"id":"10.13039\/501100007053","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Proof of ownership on multimedia data exposes users to significant threats due to a myriad of transmission channel attacks over distributed computing infrastructures. In order to address this problem, in this paper, an efficient blind symmetric image watermarking method using singular value decomposition (SVD) and the fast Walsh-Hadamard transform (FWHT) is proposed for ownership protection. Initially, Gaussian mapping is used to scramble the watermark image and secure the system against unauthorized detection. Then, FWHT with coefficient ordering is applied to the cover image. To make the embedding process robust and secure against severe attacks, two unique keys are generated from the singular values of the FWHT blocks of the cover image, which are kept by the owner only. Finally, the generated keys are used to extract the watermark and verify the ownership. The simulation result demonstrates that our proposed scheme is highly robust against numerous attacks. Furthermore, comparative analysis corroborates its superiority among other state-of-the-art methods. The NC of the proposed method is numerically one, and the PSNR resides from 49.78 to 52.64. In contrast, the NC of the state-of-the-art methods varies from 0.7991 to 0.9999, while the PSNR exists in the range between 39.4428 and 54.2599.<\/jats:p>","DOI":"10.3390\/sym12010052","type":"journal-article","created":{"date-parts":[[2019,12,27]],"date-time":"2019-12-27T05:37:08Z","timestamp":1577425028000},"page":"52","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["SVD-Based Image Watermarking Using the Fast Walsh-Hadamard Transform, Key Mapping, and Coefficient Ordering for Ownership Protection"],"prefix":"10.3390","volume":"12","author":[{"given":"Tahmina","family":"Khanam","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Chittagong University of Engineering and Technology (CUET), Chattogram-4349, Bangladesh"}]},{"given":"Pranab Kumar","family":"Dhar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Chittagong University of Engineering and Technology (CUET), Chattogram-4349, Bangladesh"}]},{"given":"Saki","family":"Kowsar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Chittagong University of Engineering and Technology (CUET), Chattogram-4349, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5185-1062","authenticated-orcid":false,"given":"Jong-Myon","family":"Kim","sequence":"additional","affiliation":[{"name":"School of IT Convergence, University of Ulsan, Ulsan 44610, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2019,12,26]]},"reference":[{"key":"ref_1","first-page":"12","article-title":"A robust HDR images watermarking method using artificial bee colony algorithm","volume":"41","author":"Bakhsh","year":"2018","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"3387","DOI":"10.1109\/TIP.2018.2815181","article-title":"Halftone image watermarking by content aware double-sided embedding error diffusion","volume":"27","author":"Guo","year":"2018","journal-title":"IEEE Trans. Image Process."},{"key":"ref_3","first-page":"13","article-title":"An efficient and secure robust watermarking scheme for document images using Integer wavelets and block coding of binary watermarks","volume":"24","author":"Chetan","year":"2015","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_4","first-page":"2893","article-title":"Geometrically invariant image watermarking using connected objects and gravity centers","volume":"7","author":"Wanga","year":"2013","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.imavis.2013.02.002","article-title":"Contrast adaptive removable visible watermarking (CARVW) mechanism","volume":"31","author":"Lin","year":"2013","journal-title":"Image Vis. Comput."},{"key":"ref_6","first-page":"8455","article-title":"A blind dual color images watermarking based on singular value decomposition","volume":"219","author":"Su","year":"2013","journal-title":"Appl. Math. Comput."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1170","DOI":"10.1016\/j.asoc.2012.09.028","article-title":"Robust copyright protection scheme for digital images using overlapping DCT and SVD","volume":"13","author":"Wu","year":"2013","journal-title":"Appl. Soft Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.cose.2011.11.003","article-title":"A new robust adjustable logo watermarking scheme","volume":"31","author":"Bhatnagar","year":"2012","journal-title":"Comput. Secur."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2442","DOI":"10.1016\/j.asoc.2012.02.021","article-title":"An SVD-based image watermarking in wavelet domain using SVR and PSO","volume":"12","author":"Tsai","year":"2012","journal-title":"Appl. Soft Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1016\/j.sigpro.2011.11.001","article-title":"A dual cepstrum based watermarking scheme with self-synchronization","volume":"92","author":"Hun","year":"2012","journal-title":"Signal Process."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1016\/j.csi.2011.02.003","article-title":"An information hiding scheme with minimal image distortion","volume":"33","author":"Lin","year":"2011","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"3866","DOI":"10.1016\/j.ins.2009.07.014","article-title":"A new data hiding scheme for binary image authentication with small image distortion","volume":"179","author":"Lee","year":"2009","journal-title":"Inf. Sci."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1055","DOI":"10.1007\/s11045-017-0487-7","article-title":"A new algorithm of blind color image watermarking based on LU decomposition","volume":"29","author":"Su","year":"2018","journal-title":"Multidimens. Syst. Signal Process."},{"key":"ref_14","first-page":"29","article-title":"A semi blind self reference image watermarking in DCT using Singular Value Decomposition","volume":"62","author":"Murty","year":"2013","journal-title":"Int. J. Comput. Appl."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1408","DOI":"10.1016\/j.dsp.2009.10.015","article-title":"A robust associative watermarking technique based on vector quantization","volume":"20","author":"Shen","year":"2010","journal-title":"Digit. Signal Process."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1016\/j.csi.2008.09.031","article-title":"A new robust reference watermarking scheme based on DWT-SVD","volume":"31","author":"Bhatnagar","year":"2009","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Zhou, X., Zhang, H., and Wang, C. (2018). A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry, 10.","DOI":"10.3390\/sym10030077"},{"key":"ref_18","first-page":"298","article-title":"An efficient image watermarking scheme using BFS technique based on Hadamar Transform","volume":"3","author":"Sarker","year":"2013","journal-title":"Smart Comput. Rev."},{"key":"ref_19","first-page":"5","article-title":"Robust digital image watermarking technique using image normalization and Discrete Cosine Transformation","volume":"65","author":"Kumar","year":"2013","journal-title":"Int. J. Comput. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1559","DOI":"10.1016\/j.proeng.2012.01.173","article-title":"A new digital watermarking algorithm based on WBCT","volume":"29","author":"Liua","year":"2012","journal-title":"Procedia Eng."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3060","DOI":"10.1109\/TIM.2010.2066770","article-title":"Digital image watermarking using Discrete Wavelet Transform and Singular Value Decomposition","volume":"59","author":"Lai","year":"2010","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2158","DOI":"10.1016\/j.sigpro.2008.02.015","article-title":"An improved SVD-based watermarking scheme for protecting rightful ownership","volume":"88","author":"Mohammad","year":"2008","journal-title":"Signal Process."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"17027","DOI":"10.1007\/s11042-018-7085-z","article-title":"A novel hybrid DCT and DWT based robust watermarking algorithm for color images","volume":"78","author":"Ahmed","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"12655","DOI":"10.1007\/s11042-017-4909-1","article-title":"Effective color image watermarking scheme using YCbCr color space and QR code","volume":"77","author":"Patvardhan","year":"2018","journal-title":"Multimed. Tools Appl."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/1\/52\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:45:56Z","timestamp":1760190356000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/1\/52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,26]]},"references-count":24,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,1]]}},"alternative-id":["sym12010052"],"URL":"https:\/\/doi.org\/10.3390\/sym12010052","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,26]]}}}