scholarly journals Optimasi Hybrid Invisible Watermarking RDWT-DCT-SVD menggunakan Algoritma PSO pada Citra Digital

2020 ◽  
Vol 6 (1) ◽  
pp. 1-10
Author(s):  
Oki Januar Insani ◽  
Nendi - - ◽  
Indra Nugraha Abdullah

Begitu mudahnya di era digital ini dalam menduplikasi dan mendistribusi berbagai macam informasi khususnya pada data citra yang membuat sebagian orang menggunakan untuk keperluan yang negatif karena dengan melakukan penyimpangan informasi citra tentu melanggar hak cipta intelektual dari kepemilikan data. Metode watermarking merupakan salah satu pendekatan untuk perlindungan hak cipta. Dalam penerapan watermark ada beberapa cara, salah satunya adalah hybrid invisible watermark. Penelitian oleh Anu Bajaj pada tahun 2013 yang menggabungan teknik RDWT-DCT-SVD dengan membuktikan hasil efisiensinya dengan nilai PSNR terhadap serangan yang berbeda. Namun pada saran penelitian tersebut menyebutkan bahwa kombinasi hybrid watermarking tidak aman, sehingga pada penelitian selanjutnya disarankan harus menambahkan keamanan berupa optimasi dari segi penyisipan informasi ke dalam citra masukannya, agar dapat meningkatkan skema penilaian PSNR yang aman dan lebih tinggi. Tujuan dari penelitian ini adalah penulis menambahkan algoritma PSO untuk dikombinasi dengan metode hybrid tersebut dengan tujuan dapat menghasilkan keamanan dari segi penyisipan dan menghasilkan peningkatan dari skema PSNR. Berdasarkan hasil analisis, pengujian dan komparasi dapat disimpulkan bahwa hybrid invisible watermarking RDWT-DCT-SVD dengan optimasi PSO memiliki hasil yang signifikan lebih tinggi dengan rata-rata 50 dB sehingga memiliki  kualitas imperceptibility yang lebih baik.

2020 ◽  
Vol 20 (01) ◽  
pp. 2050002
Author(s):  
Navneet Yadav ◽  
Navdeep Goel

Robust and invisible watermarking provides a feasible solution to prove the ownership of the genuine content owner. Different watermarking algorithms have been presented by the researchers in the past but no algorithm could be termed as perfect. Proposed work puts forward a novel image-adaptive method of embedding a binary watermark in the image in a transparent manner. Discrete wavelet transform (DWT), singular value decomposition (SVD) and discrete cosine transform (DCT) are used together in the proposed hybrid watermarking scheme. Image-adaptive nature of the scheme is reflected in the usage of only high entropy [Formula: see text] blocks for the watermark embedding. Binary watermark is embedded in the DCT coefficients using a flexible strength derived from the means of the DCT coefficients. This flexible strength factor (SF) has different value for the DCT coefficients originated from different [Formula: see text] blocks. Any desired level of visual quality could be obtained by varying the adjusting parameter of the flexible SF. Side information generated in the watermark embedding is used in the detection of watermark. The presented watermarking technique shows better robustness in comparison to the three contemporary watermarking techniques.


2017 ◽  
pp. 61-93 ◽  
Author(s):  
Amit Kumar Singh ◽  
Basant Kumar ◽  
Ghanshyam Singh ◽  
Anand Mohan

Author(s):  
Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra

This paper presents a new watermarking technique using hybrid image transforms that aims to be very robust against attacks. It also aims to reduce the amount of distortion created from embedding the watermark as much as possible, and have good capacity. The proposed system uses a hybrid watermarking technique that is based on Non-Subsampled Contourlet Transform and Discrete Wavelet Transform. In addition, the proposed system makes use of the fuzzy logic to automatically choose the strength of the embedded watermark. Furthermore, the system uses Spread Spectrum Code Division Multiple Access to embed and recover the watermark after transforming the image. To enhance recoverability of the watermarks, the system uses a high level of redundancy in the embedding process, which allows a powerful Error Correcting Code to be used in the recovery process. The fuzzy logic is used to help the system in producing watermarked images that reserve their quality and not be heavily altered after embedding the watermark. Experiments were performed to measure the quality of the proposed system using JPEG compression attacks. The results showed that the proposed system is robust and has good capacity and imperceptibly although it suffers from being computationally complex.


Sign in / Sign up

Export Citation Format

Share Document