Image Watermarking Scheme Using Singular Value Decomposition, Quantization and Genetic Algorithm

被引:5
|
作者
Jagadeesh, B. [1 ]
Kumar, S. Srinivas [1 ]
Rajeswari, K. Raja [2 ]
机构
[1] JNTU, Coll Engn, ECE Dept, Kakinada, AP, India
[2] Andhra Univ, ECE Dept, Visakhapatnam, Andhra Pradesh, India
关键词
Digital Image Watermarking; Singular Value Decomposition; Quantization; Genetic Algorithm; WAVELET-BASED WATERMARKING;
D O I
10.1109/ICSAP.2010.71
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Digital Watermarking and data hiding has become an important tool for protecting digital images from theft, illegal copying and unlawful reproduction. Some digital watermarking algorithms were proposed using spatial domain and transform domain. The transform domain could be DFT, DCT, DWT or SVD. Several digital watermarking algorithms using Genetic Algorithms are available in the literature. In this paper, a modified image watermarking scheme based on Singular Value Decomposition using Genetic Algorithm (GA) is proposed. The proposed scheme is based on quantization step size optimization using the Genetic Algorithm to improve the quality of watermarked image and robustness of the watermark. This method is more secure and robust to attacks, viz., Low Pass Filtering, Median Filtering, JPEG Compression, Resizing, Row-Column blanking, Row-Column Copying etc. Superior experimental results are observed with the proposed scheme over an algorithm proposed by Sun et al. in terms of Normalized Cross correlation (NC) and Peak Signal to Noise Ratio (PSNR).
引用
收藏
页码:120 / 124
页数:5
相关论文
共 50 条
  • [21] Binary Image Watermarking Algorithm Based on Singular Value Decomposition
    Hu Zhihua
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON IMAGE ANALYSIS AND SIGNAL PROCESSING, 2009, : 98 - 100
  • [22] Digital image watermarking using singular value decomposition
    Chandra, DVS
    [J]. 2002 45TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III, CONFERENCE PROCEEDINGS, 2002, : 264 - 267
  • [23] Mistakes in the paper entitled "A singular-value decomposition-based image watermarking using genetic algorithm"
    Xing, Yan
    Tan, Jieqing
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2010, 64 (01) : 80 - 81
  • [24] A Robust and Removable Watermarking Scheme Using Singular Value Decomposition
    Di, Ya-Feng
    Lee, Chin-Feng
    Wang, Zhi-Hui
    Chang, Chin-Chen
    Li, Jianjun
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12): : 5268 - 5285
  • [25] Image Watermarking Scheme Using Genetic Algorithm
    Lai, Chih-Chin
    Yeh, Chih-Hsiang
    Ko, Chung-Hung
    Chiang, Chin-Yuan
    [J]. 2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 476 - 479
  • [26] Color Image Digital Watermarking Algorithm Based on Singular Value Decomposition
    Deng Jianghua
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 130 - 133
  • [27] An improved digital image watermarking scheme using the discrete Fourier transform and singular value decomposition
    Varghese, Justin
    Subash, Saudia
    Bin Hussain, Omer
    Nallaperumal, Krishnan
    Ramadan Saady, Mohammed
    Samiulla Khan, Mohamed
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2016, 24 (05) : 3432 - 3447
  • [28] Image watermarking based on singular value decomposition
    Liu, Jie
    Niu, Xiamu
    Kong, Wenhai
    [J]. IIH-MSP: 2006 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2006, : 457 - +
  • [29] Sutability of Singular Value Decomposition for Image Watermarking
    Singh, Neha
    Joshi, Sandeep
    Birla, Shilpi
    [J]. 2019 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2019, : 983 - 986
  • [30] A hybrid watermarking scheme using contourlet transform and singular value decomposition
    Narasimhulul, C. Venkata
    Prasad, K. Satya
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (09): : 12 - 17