{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:35Z","timestamp":1750306835403,"version":"3.41.0"},"reference-count":29,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Canada Chair Research Program"},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2013,12]]},"abstract":"<jats:p>In this article, a novel logo watermarking scheme is proposed based on wavelet frame transform, singular value decomposition and automatic thresholding. The proposed scheme essentially rectifies the ambiguity problem in the SVD-based watermarking. The core idea is to randomly upscale the size of host image using reversible random extension transform followed by the embedding of logo watermark in the wavelet frame domain. After embedding, a verification phase is casted with the help of a binary watermark and toral automorphism. At the extraction end, the binary watermark is first extracted followed by the verification of watermarked image. The logo watermark is extracted if and only if the watermarked image is verified. The security, attack and comparative analysis confirm high security, efficiency and robustness of the proposed watermarking system.<\/jats:p>","DOI":"10.1145\/2542205.2542207","type":"journal-article","created":{"date-parts":[[2014,1,2]],"date-time":"2014-01-02T13:09:43Z","timestamp":1388668183000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Secure randomized image watermarking based on singular value decomposition"],"prefix":"10.1145","volume":"10","author":[{"given":"Gaurav","family":"Bhatnagar","sequence":"first","affiliation":[{"name":"University of Winnipeg"}]},{"given":"Q. M. Jonathan","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Windsor"}]},{"given":"Pradeep K.","family":"Atrey","sequence":"additional","affiliation":[{"name":"University of Winnipeg"}]}],"member":"320","published-online":{"date-parts":[[2013,12,27]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.03.003"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/875759"},{"volume-title":"Proceeding of IEEE International Workshop on Multimedia Signal Processing","author":"Awrangjeb M.","key":"e_1_2_2_3_1","unstructured":"Awrangjeb , M. and Lu , G . 2008. A robust content-based watermarking technique . In Proceeding of IEEE International Workshop on Multimedia Signal Processing ( Cairns, Australia). 713--718. Awrangjeb, M. and Lu, G. 2008. A robust content-based watermarking technique. In Proceeding of IEEE International Workshop on Multimedia Signal Processing (Cairns, Australia). 713--718."},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.801587"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.05.006"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICVGIP.2008.15"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.09.031"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021969131000347X"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2004.836753"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2079551"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.2137650"},{"key":"e_1_2_2_12_1","unstructured":"Jain C. Arora S. and Panigrahi P. K. 2008. A reliable SVD based watermarking scheme. ArXiv 1--8.  Jain C. Arora S. and Panigrahi P. K. 2008. A reliable SVD based watermarking scheme. ArXiv 1--8."},{"key":"e_1_2_2_13_1","first-page":"5","article-title":"La cryptographie militaire","author":"Kerckhoffs A.","year":"1883","unstructured":"Kerckhoffs , A. 1883 . La cryptographie militaire . J. Sci. Milit. IX , 5 -- 83 . Kerckhoffs, A. 1883. La cryptographie militaire. J. Sci. Milit. IX, 5--83.","journal-title":"J. Sci. Milit."},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2010.2066770"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00142-X"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.918569"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020263"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000486.2000489"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/6046.985560"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1413862.1413865"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.09.017"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2007.911585"},{"key":"e_1_2_2_23_1","first-page":"469","article-title":"A feature-based digital image watermarking for copyright protection and content authentication","volume":"5","author":"Tsai J.-S.","year":"2007","unstructured":"Tsai , J.-S. , Huang , W.-B. , Chen , C.-L. , and Kuo , Y.-H. 2007 . A feature-based digital image watermarking for copyright protection and content authentication . In Proceedings of IEEE International Conference on Image Processing. 5 , 469 -- 472 . Tsai, J.-S., Huang, W.-B., Chen, C.-L., and Kuo, Y.-H. 2007. A feature-based digital image watermarking for copyright protection and content authentication. In Proceedings of IEEE International Conference on Image Processing. 5, 469--472.","journal-title":"Proceedings of IEEE International Conference on Image Processing."},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2005.846774"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244232"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2055570"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2005.843357"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815959"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2240136.2240143"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2542205.2542207","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2542205.2542207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:56Z","timestamp":1750234196000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2542205.2542207"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["10.1145\/2542205.2542207"],"URL":"https:\/\/doi.org\/10.1145\/2542205.2542207","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2013,12]]},"assertion":[{"value":"2012-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-12-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}