Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1655925.1656097acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicisConference Proceedingsconference-collections
research-article

Watermarking schema using an artificial immune system in spatial domain

Published: 24 November 2009 Publication History

Abstract

In this paper, we propose a robust watermarking method for image copyright protection in spatial domain based on artificial immune system (AIS). Our method optimizes robustness and imperceptibility which are known to be inversely proportional to each other. The robustness of our watermark method was tested extensively against attacks by lossy JPEG compression. Performance of proposed method was evaluated by comparing with the genetic watermarking method and also the randomly chosen block based watermark method. The experiments indicate that our method is better at robustness over genetic watermarking method. We have shown that our method improves the robustness and imperceptibility comparing with the randomly chosen block based watermarking.

References

[1]
Pan, J. S., Huang, H. C., Jain, L. C. 2004. Intelligent watermarking techniques. Series on innovative Intelligence Vol 7.
[2]
Li, L.-D., Guo, B.-L. 2009. Localized image watermarking in spatial domain resistant to geometric attacks. International Journal of Electronics and Communications. 63, 123--131.
[3]
Mohammad, A. A., Alhaj, A., Shaltaf, S. 2008. An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Processing. 88, 2158--2180.
[4]
Pan, J. S., Huang, H. C., Wang, F. H. 2001. Genetic watermarking techniques. Proceedings of the fifth international conference on information engineering systems&Allied technologies. 1032--1036.
[5]
Tsai, H. H., Sun, D. W. 2007. Color image watermark extraction based on support vector machines. Information Sciences. 177, 550--569.
[6]
Darmstaedter, V., Delaigle, J.-F., Quisquater, J. J., Macq, B. 1998. Low Cost Spatial Watermarking. Comput. and Graphics. 22(4), 417--424.
[7]
Holland, J. 1975. Adaptation in natural and artificial systems. The Michigan University Press.
[8]
Deb, K. 2001. Multi-objective optimization using evolutionary algorithms. John wiley and sons.
[9]
Osyczka, A. 2002. Evolitionary algorithms for single and multicriteria design optimization. Physica-Verlag.
[10]
Musilek, P., Lau, A., Reformat, M., Wyard-scott, L. 2006. Immune programming. Information Sciences. 176, 972--1002.
[11]
Jerne, N. K. 1974. Towards a network theory of the immune system. Ann. Immunol (Inst. Pasteur). 125C, 373--389.
[12]
Dasgupta, D., Forrest, S. 1999. Artificial immune systems in industrial applications. IEEE. 257--267.
[13]
De Castro, L. N., VonZuben, F. J. 1999. Artificial Immune Systems Part I -- Basic Theory and Applications. TR-DCA 01/99.
[14]
Engin, O., Doyen, A. 2004. A new approach to solve hybrid flow shop scheduling problems by artificial immune system. Future generation computer systems. 20, 1083--1095.
[15]
De Castro, L. N., VonZuben, F. J. 2000. Artificial Immune Systems Part II -- A Survey of Applications. DCA-RT 02/00.
[16]
Wang, X., Gao, X. Z., Ovaska, S. J. 2004. Artificial Immune Optimization methods and applications-A survey. IEEE Int. Conf. on Systems, Man and Cybernetics. 3415--3420.
[17]
Perelsen, A. S., Oster, G. F. 1979. Theoretical Studies of Clonal Selection: Minimal Antibody Repertuarie Size and Reliability of Self-Nonself Discrimination. J. Theor. Biol. 81, 645--670.
[18]
Ada, G. L., Nossal, G. 1987. The Clonal Selection Theory. Scientific American, 257(2), 50--57.
[19]
Forrest, S., Perelson, A., Allen, L., Cherukuri, R. 1994. Self-Nonself Discrimination in a Computer. Proc. of the IEEE Symposium on Research in Security and Privacy. 202--212.

Cited By

View all
  • (2017)Optimized watermarking technique using PCA-DWT and log filter2017 International Conference on Networks & Advances in Computational Technologies (NetACT)10.1109/NETACT.2017.8076754(126-130)Online publication date: Jul-2017
  • (2010)Block-based digital image watermarking using Genetic Algorithm2010 6th International Conference on Emerging Technologies (ICET)10.1109/ICET.2010.5638488(204-209)Online publication date: Oct-2010

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIS '09: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
November 2009
1479 pages
ISBN:9781605587103
DOI:10.1145/1655925
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • AICIT
  • ETRI
  • KISTI

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 November 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. artificial immune system
  2. genetic algorithm
  3. spatial domain watermarking
  4. watermarking

Qualifiers

  • Research-article

Conference

ICIS '09
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2017)Optimized watermarking technique using PCA-DWT and log filter2017 International Conference on Networks & Advances in Computational Technologies (NetACT)10.1109/NETACT.2017.8076754(126-130)Online publication date: Jul-2017
  • (2010)Block-based digital image watermarking using Genetic Algorithm2010 6th International Conference on Emerging Technologies (ICET)10.1109/ICET.2010.5638488(204-209)Online publication date: Oct-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media