DWT-SVD based Digital Image Watermarking using Swarm Intelligence

被引:0
|
作者
Verma, Vibha [1 ]
Srivastava, Vinay Kumar [1 ]
Thakkar, Falgun [1 ]
机构
[1] MNNIT Allahabad, Dept ECE, Allahabad, Uttar Pradesh, India
来源
2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT) | 2016年
关键词
particle swarm optimization; singular value decomposition; discrete wavelet transform; peak signal to noise ratio; mean square error; normalized correlation coefficient; DIFFERENTIAL EVOLUTION; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a digital image watermarking technique based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) is proposed. For embedding the watermark, cover image is decomposed into different subbands using 2-level DWT. SVD is applied on both medium frequency subbands after 2-level decomposition of cover image. A watermark image is splitted into two equal images on column basis. These images are again resized to the size of original watermark image by zero padding. The singular value matrices of medium frequency subbands of cover image are modified by splitted watermark images using suitable scale factor obtained by Particle Swarm Optimization (PSO). Again SVD is applied on these modified singular value matrices. Inverse SVD is applied on these singular value matrices along with respective orthogonal matrices of subbands to recover the modified wavelet subbands. The Inverse DWT on these modified subbands along with remaining subbands of cover image makes the watermarked image. Extracted spitted watermark images are added together to reconstruct the original watermark. The Analysis and experimental results show that the proposed technique is more robust against common image manipulation attacks.
引用
收藏
页码:3198 / 3203
页数:6
相关论文
共 50 条
  • [11] Digital watermarking of spectral images using DWT-SVD
    Ma, Long
    Li, Changjun
    Song, Shuni
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 15 - +
  • [12] Color image watermarking algorithm based on DWT-SVD
    Yin, Cheng-Qun
    Li, Li
    Lv, An-Qiang
    Qu, Li
    2007 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND LOGISTICS, VOLS 1-6, 2007, : 2607 - 2611
  • [13] Region Adaptive Digital Image Watermarking System using DWT-SVD algorithm
    Song, Chunlin
    Xiao, Peng
    Sudirman, Sud
    Merabti, Madjid
    2014 NASA/ESA CONFERENCE ON ADAPTIVE HARDWARE AND SYSTEMS (AHS), 2014, : 196 - 201
  • [14] Image security using watermarking based on DWT-SVD and Fuzzy Logic
    Anita
    Parmar, Archana
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [15] DWT-SVD Based Watermarking on CUDA
    Li, Xujie
    Zhao, Hanli
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 434 - 437
  • [16] A DWT-SVD Based Digital Watermarking Technique for Copyright Protection
    Shah, Prasanna
    Meenpal, Toshanlal
    Sharma, Ankit
    Gupta, Vivek
    Kotecha, Amit
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [17] Digital Watermarking Algorithm Based on Digital Holographic Transform and DWT-SVD
    Wang, Zuxi
    Mao, Liugang
    Xu, Jing
    2012 THIRD INTERNATIONAL CONFERENCE ON THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (ICTMF 2012), 2013, 38 : 288 - 293
  • [18] A Hybrid Domain Color Image Watermarking Based on DWT-SVD
    Roy, Soumitra
    Pal, Arup Kumar
    IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING, 2019, 43 (02) : 201 - 217
  • [19] Color Image Watermarking using DWT-SVD and Arnold Transform
    George, Jeril
    Varma, Satishkumar
    Chatteijee, Madhumita
    2014 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2014,
  • [20] An RST invariant DWT-SVD based image watermarking scheme
    Shi, Hailiang
    Tian, Baohui
    International Review on Computers and Software, 2012, 7 (02) : 706 - 712