Cookies Policy

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.

I accept this policy

Find out more here

Singular Value Decomposition (SVD) Based Attack on Different Watermarking Schemes

No metrics data to plot.
The attempt to load metrics for this article has failed.
The attempt to plot a graph for these metrics has failed.
The full text of this article is not currently available.

Brill’s MyBook program is exclusively available on BrillOnline Books and Journals. Students and scholars affiliated with an institution that has purchased a Brill E-Book on the BrillOnline platform automatically have access to the MyBook option for the title(s) acquired by the Library. Brill MyBook is a print-on-demand paperback copy which is sold at a favorably uniform low price.

Access this article

+ Tax (if applicable)
Add to Favorites
You must be logged in to use this functionality

image of Computing Letters

Digital Watermarking is an excellent tool at the disposal of the owners of the digital content to protect their Intellectual Property Rights (IPR). In this paper we present an attack on several watermarking schemes that forgo their claims of proving ownership of digital content. The attack takes the advantage of one-to-many relationship between the Singular value matrix and the decomposing matrix. In this paper we prove that the two ways one-to-one relationship between the watermark and the watermark dependent pattern to be hidden in the image as a necessary condition to invalidate the multiple claims of ownership of digital content. We also recommend the standardization of watermarking schemes and registration of watermarks with legal authorities so as to make the system transparent.


Full text loading...


Data & Media loading...

Article metrics loading...



Can't access your account?
  • Tools

  • Add to Favorites
  • Printable version
  • Email this page
  • Subscribe to ToC alert
  • Get permissions
  • Recommend to your library

    You must fill out fields marked with: *

    Librarian details
    Your details
    Why are you recommending this title?
    Select reason:
    Computing Letters — Recommend this title to your library
  • Export citations
  • Key

  • Full access
  • Open Access
  • Partial/No accessInformation