scholarly journals Adaptive Robust Blind Watermarking Scheme Improved by Entropy-Based SVM and Optimized Quantum Genetic Algorithm

2019 ◽  
Vol 2019 ◽  
pp. 1-16
Author(s):  
Jun Zhang ◽  
Xiaoyi Zhou ◽  
Jilin Yang ◽  
Chunjie Cao ◽  
Jixin Ma

With the intensive study of machine learning in digital watermarking, its ability to balance the robustness and transparency of watermarking technology has attracted researchers’ attention. Therefore, quantum genetic algorithm, which serves as an intelligent optimized scheme combined with biological genetic mechanism and quantum computing, is widely used in various fields. In this study, an adaptive robust blind watermarking algorithm by means of optimized quantum genetics (OQGA) and entropy classification-based SVM (support vector machine) is proposed. The host image was divided into two parts according to the odd and even rows of the host image. One part was transformed by DCT (discrete cosine transform), and then the embedding intensity and position were separately trained by entropy-based SVM and OQGA; the other part was by DWT (discrete wavelet transform), in which the key fusion was achieved by an ergodic matrix to embed the watermark. Simulation results indicate the proposed algorithm ensures the watermark scheme transparency as well as having better resistance to common attacks such as lossy JPEG compression, image darken, Gaussian low-pass filtering, contrast decreasing, salt-pepper noise, and geometric attacks such as rotation and cropping.

2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Xiaoyi Zhou ◽  
Chunjie Cao ◽  
Jixin Ma ◽  
Longjuan Wang

Digital watermarking is an effective solution to the problem of copyright protection, thus maintaining the security of digital products in the network. An improved scheme to increase the robustness of embedded information on the basis of discrete cosine transform (DCT) domain is proposed in this study. The embedding process consisted of two main procedures. Firstly, the embedding intensity with support vector machines (SVMs) was adaptively strengthened by training 1600 image blocks which are of different texture and luminance. Secondly, the embedding position with the optimized genetic algorithm (GA) was selected. To optimize GA, the best individual in the first place of each generation directly went into the next generation, and the best individual in the second position participated in the crossover and the mutation process. The transparency reaches 40.5 when GA’s generation number is 200. A case study was conducted on a 256 × 256 standard Lena image with the proposed method. After various attacks (such as cropping, JPEG compression, Gaussian low-pass filtering (3,0.5), histogram equalization, and contrast increasing (0.5,0.6)) on the watermarked image, the extracted watermark was compared with the original one. Results demonstrate that the watermark can be effectively recovered after these attacks. Even though the algorithm is weak against rotation attacks, it provides high quality in imperceptibility and robustness and hence it is a successful candidate for implementing novel image watermarking scheme meeting real timelines.


Author(s):  
Latha Parameswaran ◽  
K Anbumani

This chapter discusses a content-based authentication technique based on inter-coefficient relationship of Discrete Wavelet Transform (DWT). Watermark is generated from the first level DWT. An image digest (which is a binary string) is generated from the second level DWT. The watermark is embedded in the mid-frequency coefficients of first level DWT as directed by the image digest. Image authentication is done by computing the Completeness of Signature. The proposed scheme is capable of withstanding incidental image processing operations such as compression and identifies any malicious tampering done on the host image.


Author(s):  
DEJEY ◽  
R. S. RAJESH

Watermarking is a potential method for the protection of ownership rights on digital images. A robust, invisible, non-blind watermarking scheme in the wavelet domain is proposed in this paper. The watermark is embedded in the mid frequency band after performing a single level wavelet decomposition using Discrete Wavelet Transform (DWT). The coefficients are grouped randomly prior to watermarking. The watermarked image is tested for various attacks including filtering and geometric attacks. The novelty of the proposed approach is that it provides better resistance to collusion attack also when compared with existing spatial domain approach. The appropriate mid frequency band for embedding the watermark is tested and the HL band proves to be the best.


2020 ◽  
pp. 2715-2739
Author(s):  
Mohamed Lebcir ◽  
Suryanti Awang ◽  
Ali Benziane

In this research paper, a new blind and robust fingerprint image watermarking scheme based on a combination of dual-tree complex wavelet transform (DTCWT) and discrete cosine transform (DCT) domains is demonstrated. The major concern is to afford a solution in reducing the consequence of geometric attacks. It is due to the fingerprint features that may be impacted by the incorporated watermark, fingerprint rotations, and displacements that result in multiple feature sets. To integrate the bits of the watermark sequence into a differential process, two DCT-transformed sub-vectors are implemented. The initial sub-vectors were obtained by sub-sampling in the host fingerprint image of both real and imaginary parts of the DTCWT wavelet coefficients. The basic difference between the relevant sub-vectors of the watermarked fingerprint image in the extraction stage directly provides the inserted watermark sequence. It is not necessary to extract watermark data from an original fingerprint image. Therefore, the technique suggested is evaluated using 80 fingerprint images from 10 persons, from both CASIA-V5-DB and FVC2002-DB2 fingerprint database. For each person, eight fingerprints are set as the template and the watermark are inserted in each image. A comparison between the obtained results with other geometric robust techniques results is performed afterwards. The comparison results show that the proposed technique has stronger robustness against common image processing processes and geometric attacks such as cropping, resizing, and rotation.


Sign in / Sign up

Export Citation Format

Share Document