..............................
            ..............................
            ..............................
            
A Region Adaptive Robust Watermarking Scheme
        
         To  counter  the  security  breaches,  came  the  need  of  watermarking  which  is  one  of  the  efficient  methods to maintain 
the  integrity  of  the  digital  content  and  prove  the  rightful  ownership.  Region  adaptive  watermarking  is   the  technique  which  is 
based on the content of the image which is required  to be protected against the various possible attacks. Homogeneity analysis 
of  the  image  has  been  made  using  the  quad  tree  base d  image  segmentation  method  to  chalk  out  the  approp riate  sites  for 
embedding  the  secret  information.  The  information  i s  itself  extracted  from  the  image  in  terms  of  a  feature  which  is  hidden 
using  the  Singular  Value  Decomposition  (SVD)  proper ties  in  the  cover  image.  The  robustness  of  the  proposed  algorithm 
against  the  various  attacks  has  been  validated  by  a ttaining  high  Peak  to  Signal  Noise  Ratio  (PSNR)  and   Normalized  Cross 
Correlation (NCC) values in the experiments carried  out.   
     
            [1] Amirgholipour S. and Aboosaleh S., A Pre- Filtering Method to Improve Watermark Detection Rate in DCT Based Watermarking, The International Arab Journal of Information Technology , vol. 11, no. 2, pp. 178-185, 2014.
[2] Bangaleea R. and Rughooputh H., Effect of Channel Coding on the Performance of Spatial Watermarking for Copyright Protection, in Proceedings of the 6 th IEEE Africon Conference in Africa , pp. 149-153, 2002.
[3] Bao P. and Ma X., Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition, IEEE Transactions on Circuits and Systems for Video Technology , vol. 15, no. 1, pp. 96-102,2005.
[4] Barni M., Bartolini F., Rosa A., and Pivaa A., Optimum Decoding and Detection of Multiplicative Watermarks, IEEE Transaction Signal Processing , vol. 51, no. 4, pp. 1118-1123, 2003.
[5] Bas P., Chassery J., and Macq B., Geometrically Invariant Watermarking using Feature Points, IEEE Transactions on Image Processing, vol. 11, no. 9, pp. 1014-1028, 2002.
[6] Basso A., Bergadano F., Cavagnino D., Pomponiu V., and Vernone A., A Novel Block- Based Watermarking Scheme Using the SVD Transform, available at: mdpi.com/journal/algorithms, last visited 2009.
[7] Bovik A., Huang T., and Munson D., Robust Wavelet-based Video Watermarking using Edge Detection, Adv. Elect. Eng. Comp. Sci. , 399, pp. 173-182, 2009.
[8] Calagna M., Guo H., Mancini, L., and Jajodia, S., A Robust Watermarking System based on SVD Compression in Proceedings of ACM Symposium on Applied Computing, Dijon, France, pp. 1341-1347, 2006. 522 The International Arab Journal of Information Techn ology, Vol. 13, No. 5, September 2016
[9] Chandra D., Digital Image Watermarking using Singular Value Decomposition, in Proceedings of the 45 th Midwest Symposium on Circuits and Systems , pp. 264-272, 2002.
[10] Chang C., Hu Y., and Lin C., A Digital Watermarking Scheme Based on Singular Value Decomposition, in Proceedings of the 1 st International Symposium, ESCAPE 2007 , Hangzhou, China, pp. 82-93, 2007.
[11] Cox I., Killian J., Leighton F., and Shamoon T., Secure Spread Spectrum Watermarking for Multimedia, IEEE Transaction Image Processing , vol. 6, no. 12, pp. 1673-1687, 1997.
[12] Djurovic I., Stankovic S., and Pitas I., Digital Watermarking in the Fractional Fourier Transformation Domain, Journal of Network and Computer Applications , vol. 24, no. 2, pp. 167-173, 2001.
[13] Ganic E. and Eskicioglu A., Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies, in Proceedings of ACM Multimedia and Security Workshop (MM and SEC04 ), pp. 166-174, 2004.
[14] Ganic E., Zubair N., and Eskicioglu A., An Optimal Watermarking Scheme based on Singular Value Decomposition, in Proceedings of IASTED International Conference on Communication, Network and Information Security, New York, USA, pp. 1-6, 2003.
[15] Gorodetski V., Popyack L., and Samoilov V., SVD Based Approach to Transparent Embedding Data into Digital Images, in Proceedings of the International Workshop on Mathematical Methods , Models and Architectures for Computer Network Security , pp. 263-274, 2001.
[16] Hsieh M., Tseng D., and Huang Y., Hiding Digital Watermarks Using Multiresolution Wavelet Transform, IEEE Transactions on Industrial Electronics, vol. 48, no. 5, pp. 875- 882, 2001.
[17] Huang F. and Guan Z., A Hybrid SVD-DCT Watermarking Method based on LPSNR, Pattern Recognition Letters , vol. 25, no. 15, pp. 1769-1775,2004.
[18] Kim Y., and Oh I., Watermarking Text Document Images using Edge Direction Histograms, Pattern Recognition Letter , vol. 25, no. 11, pp. 1243-1251, 2004.
[19] Lee C. and Lee Y., An Adaptive Digital Image Watermarking Technique for Copyright Protection, IEEE Transactions on Consumer Electronic , vol. 45, no. 4, pp. 363-370, 1999.
[20] Liu R. and Tan T., A SVD-Based Watermarking Scheme for Protecting Rightful Ownership, IEEE Transactions on Multimedia , vol. 4, no. 1, pp. 121-128, 2002.
[21] Meerwald P. and Uhl A., A Survey of Wavelet-Domain Watermarking Algorithms, in Proceedings of Symposium, Electronic Imaging, Conference on Security and Watermarking of Multimedia Contents , San Jose, USA, 2001.
[22] Quan L. and Qmgsong A., A Combination of DCT-Based and SVD-Based Watermarking Scheme, in Proceedings of 7th International Conference on Signal Processing , pp. 873- 876,2004.
[23] Senthi V., Bhaskar I., and Bhaskar R., Digital Image Watermarking using Edge Detection and Wavelets with Robustness Analysis against JPEG Compression Attacks, in Proceedings of International Conference on Innovations in Information Technology , Al Ain, pp. 583-587, 2008.
[24] Sverdlov A., Dexter S., and Eskicioglu A., Robust DCT-SVD Domain Image Watermarking for Copyright Protection: Embedding Data in All Frequencies, available at: http://kilyos.ee.bilkent.edu.tr/~signal/ defevent/papers/cr1023.pdf, last visited 2005.
[25] Tsekeridou S., Nikolaidis N., Sidiropoulos N., and Pitas I., Copyright Protection of Still Images using Self-Similar Chaotic Watermarks, in Proceedings of IEEE International Conference on Image Processing , Vancouver, pp. 411-414, 2000.
[26] Wong P. and Memon N., Secret and Public Key Image Watermarking Schemes for image Authentication and Ownership Verification, IEEE Transactions on Image Processing , vol. 10, no. 10, pp. 1593-1600, 2001.
[27] Wu M. and Liu B., Data hiding in image and Video. I. Fundamental Issues and Solutions, IEEE Transaction Image Process , vol. 12, no. 6, pp. 685-695, 2003. Priyanka Singh received BTech degree from HBTI, Kanpur, MTech degree from MNNIT, Allahabad and presently pursuing PhD from MNNIT, Allahabad. Her areas of interests include digital watermarking, vi sual cryptography, and security related concepts. Suneeta Agarwal received PhD degree from IIT, Kanpur is Head of Department of Computer Science and Engineering Department in MNNIT, Allahabad and professor at the same. She has numerous contributions in various International and National Journals. Her areas of interests include image processing, automata theory, compression, pattern matching and fingerprint recognitions.
