Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2448556.2448562acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Genetic swarm based robust image watermarking

Published: 17 January 2013 Publication History

Abstract

This paper presents a new method for adaptive watermark strength optimization in Discrete Cosine Transform (DCT) domain. Watermarking is a method to embed secret information in the host medium. Optimal sub-band and strength selection for watermark is the most critical aspect in the whole process and it had attracted many researchers in the recent past. In the proposed method, DCT sub-band is selected using Genetic Algorithm (GA) and watermark strength is intelligently selected through Particle Swarm Optimization (PSO). GA performs well at exploring a vast search space and it selects the suitable sub-band for watermark embedding. Perceptual shaping of the watermark is done in such a way that watermark embedding is imperceptible to the human visual system. The proposed method shows promising results against different attacks, such as low-pass filter, high-pass filter, median filters, shifting and cropping the marked image. Further, experimental results have shown better performance of the proposed method as compared with the current approaches in practice.

References

[1]
E. Ercelebi, L. Batakçi, "Audio watermarking scheme based on embedding strategy in low frequency components with a binary image source", Digital Signal Processing, vol. 19, issue 2, pp. 265--277, 2009.
[2]
X. Yang, P. Niu, W. Qi, "A new adaptive digital audio watermarking based on support vector machine", Journal of Network and Computer Applications, vol. 31, issue 4, pp. 735--749, 2008.
[3]
G. Chen, Y. Cheng, Y. Wang, "A Robust Adaptive Video Watermarking Algorithm based on HVS", In Proceeding of The 9th International Conference for Young Computer Scientists, pp. 1424--1428, 2008.
[4]
Y. Lin, J. Zhao, "A new video watermarking algorithm based on 1D DFT and random transform source", Signal Processing, vol. 90, issue 2, pp. 626--639, 2010.
[5]
Q. S. Ai, Q. Liu, Z. D. Zhou, L. Yang, "A new digital watermarking scheme for 3D triangular mesh models", Signal Processing, vol. 89, issue 11, pp. 2159--2170, 2009.
[6]
W. Wang, G. Zheng, J. Yong, H. Gu, "A numerically stable fragile watermarking scheme for authenticating 3D models", Computer Aided Design, vol. 40, issue 5, pp. 634--645, 2008.
[7]
A. Khan, A. M. Mirza and A. Majid, "Intelligent perceptual shaping of a digital watermark: exploiting characteristics of human visual system", International Journal of Knowledge-based Intelligent Engineering Systems, (KES), vol. 9, pp. 1--11, 2005.
[8]
A. Khan, A. M. Mirza, "Genetic Perceptual shaping: utilizing cover image and conceivable attack information during watermark embedding", in Information fusion, vol. 8, issue 4, pp. 354--365, 2007.
[9]
Sikander, M. Ishtiaq, M. A. Jaffar, A. M. Mirza, "Adaptive digital image watermarking using Genetic Algorithm" In Proceeding of IEEE International Conference on Information Science and Applications (ICISA 2010), Seoul, Korea, April, 2010.
[10]
M. Ishtiaq, B. Sikander, M. A. Jaffar, Aziz Khan, "Adaptive watermark strength selection using Particle Swarm Optimization" ICIC Express Letters An International Journal of Research and Surveys, Volume 4, Issue 6(B), December 2010.
[11]
L. Zne-Jung, L. Shih-Wei, S. Shun-Feng, L. Chun-Yen, "A hybrid watermarking technique applied to digital images", Applied Soft Computing, pp. 798--808, vol. 8, issue 1, 2008.
[12]
D. A. Goldberg, "Genetic Algorithms in Search, Optimization and Machine Learning", Addision-Wesley, Reading, MA, 1989.
[13]
Z. Michalewicz, Genetic algorithms + data structure = evolution programs, Springer-Verlag, Berlin, 1994.
[14]
M. Gen, R. Cheng, Genetic Algorithms and Engineering Design, John Wiley & Sons, Inc., 1997.
[15]
J. Kennedy, R. Eberhart, "Particle swarm optimization", In Proceedings of the IEEE International Conference on Neural Networks (Perth, Australia), IEEE Service Center, Piscataway, NJ, pp. 1942--1948, 1995.
[16]
C. A. C. Coello, G. T. Pulido, M. S. Lechuga, "Handling multiple objectives with particle swarm optimization", IEEE Transactions on Evolutionary Computations, vol. 8, issue. 3, pp. 256--279, 2004.
[17]
C.-M. Huang, C. -J. Huang, M. Wang, "A particle swarm optimization to identifying the ARMAX model for short-term load forecasting", IEEE transactions on Power Systems, vol. 20, issue 2, pp. 1126--1133, 2005.
[18]
W. Xia, Z. Wu, "An effective hybrid optimization approach for multi-objective flexible job-shop scheduling problems", Computers and Industrial Engineering, vol. 48, issue 2, pp. 409--425, 2005.
[19]
I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, "A Secure, robust watermark for multimedia," Workshop on Information Hiding, Newton Institute, Univ. of Cambridge, May 1996.
[20]
A. Piva, M. Barni, F. Bartolini, V. Cappellini, "DCT-based watermark recovering without resorting to the uncorrupted original image", Proceeding of International Conference on Image Processing, vol. 1 pp. 520--523, 1997.

Cited By

View all
  • (2023)Comparative Study Of Five Mppt Controls In Two-Stage Three-Phase Grid-Connected Photovoltaic Systems Under Partial Shading ConditionsThe Scientific Bulletin of Electrical Engineering Faculty10.2478/sbeef-2023-000423:1(21-30)Online publication date: 14-Sep-2023
  • (2018)DWT-based grey-scale image watermarking using area of best fit equation and cuckoo search algorithmInternational Journal of Computational Science and Engineering10.5555/3160607.316061415:3-4(236-247)Online publication date: 20-Dec-2018
  • (2014)A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)10.1109/CICYBS.2014.7013372(1-7)Online publication date: Dec-2014
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '13: Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
January 2013
772 pages
ISBN:9781450319584
DOI:10.1145/2448556
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 January 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. DCT
  2. PSO
  3. genetic algorithms
  4. optimal band and watermark strength selection
  5. watermarking

Qualifiers

  • Research-article

Conference

ICUIMC '13
Sponsor:

Acceptance Rates

Overall Acceptance Rate 251 of 941 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Comparative Study Of Five Mppt Controls In Two-Stage Three-Phase Grid-Connected Photovoltaic Systems Under Partial Shading ConditionsThe Scientific Bulletin of Electrical Engineering Faculty10.2478/sbeef-2023-000423:1(21-30)Online publication date: 14-Sep-2023
  • (2018)DWT-based grey-scale image watermarking using area of best fit equation and cuckoo search algorithmInternational Journal of Computational Science and Engineering10.5555/3160607.316061415:3-4(236-247)Online publication date: 20-Dec-2018
  • (2014)A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)10.1109/CICYBS.2014.7013372(1-7)Online publication date: Dec-2014
  • (2014)Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)10.1109/CICYBS.2014.7013361(1-8)Online publication date: Dec-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media