An optimized watermarking scheme based on genetic algorithm and elliptic curve

被引:1
作者
Azam, Naveed Ahmed [1 ,2 ]
Haider, Takreem [2 ,3 ,4 ]
Hayat, Umar [2 ,5 ]
机构
[1] Kyoto Univ, Grad Sch Informat, Dept Appl Math & Phys, Kyoto 6068501, Japan
[2] Quaid i Azam Univ, Dept Math, Islamabad 45320, Pakistan
[3] Indiana Univ, Luddy Sch Informat Comp & Engn, Bloomington, IN 47408 USA
[4] Natl Univ Sci & Technol, Coll Elect & Mech Engn, Dept Basic Sci & Humanities, Islamabad, Pakistan
[5] Univ Surrey, Dept Comp Sci, Guildford GU2 7XH, England
关键词
Image watermarking; Pseudo-random number generator; Elliptic curve; Genetic algorithm; Optimization; IMAGE WATERMARKING; WAVELET TRANSFORM; ROBUST; SELECTION;
D O I
10.1016/j.swevo.2024.101723
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital watermarking serves as a crucial tool for tracing copyright infringements and ensuring the authenticity and integrity of sensitive information. The fundamental concept involves embedding a watermark in the host information, ensuring its undetectability by unauthorized parties. The efficacy of a watermarking scheme mainly depends on achieving high levels of imperceptibility, robustness, and embedding capacity. These attributes are intricately linked to both the selection of the host information segment and the embedding factor. Existing schemes often (i) employ the entire host information for embedding, incurring computational expenses, and (ii) optimize the embedding factor without considering imperceptibility, robustness, and embedding capacity simultaneously, resulting in less secure watermarks. To address these limitations, we introduce a novel watermarking scheme leveraging elliptic curves (ECs) and genetic algorithms (GA). We model the choice of the embedding part by generating pseudo-random numbers over ECs, taking advantage of their proven sensitivity, security, and low computational complexity. Due to parallel search and adaptability to non-linear relationships of GA, the scheme employs genetic optimization with a multivariate objective function to establish a balance between imperceptibility, robustness, and embedding capacity for optimal watermarked generation. Rigorous analysis and comparisons demonstrate that our proposed scheme attains significantly higher imperceptibility, robustness, and embedding capacity compared to existing optimized schemes. Furthermore, our scheme exhibits a speed advantage, being up to 278 and 21 times faster than optimized and non-optimized schemes, respectively, thereby affirming its practical applicability.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] RST Invariant Watermarking Scheme Using Genetic Algorithm and DWT-SVD
    Chao, Yan
    Wang, Hao
    Liu, Shuying
    Liu, Huaming
    ADVANCES IN BRAIN INSPIRED COGNITIVE SYSTEMS, BICS 2018, 2018, 10989 : 665 - 675
  • [22] Image Watermarking Scheme Based on Shuffled Frog Leaping Algorithm
    Wang, Ziqiang
    Sun, Xia
    2008 IEEE INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING WORKSHOP PROCEEDINGS, VOLS 1 AND 2, 2008, : 239 - 242
  • [23] An Optimized IWT-DCT Watermarking Scheme Based on Multiple Matrix Decomposition and MOWOA2
    Wei, Deyun
    Deng, Yang
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2024, 43 (08) : 5262 - 5287
  • [24] A Novel Image Watermarking Scheme Using Firefly Algorithm
    Agarwal, Charu
    Mishra, Anurag
    Sharma, Arpita
    Chetty, Girija
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFTWARE ENGINEERING (AISE 2014), 2014, : 430 - 436
  • [25] Repeated Embedding Algorithm for Image Watermarking Based on BEMD and Hilbert Curve
    Wang X.
    Hu K.
    Hu J.
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2020, 32 (02): : 287 - 296
  • [26] An optimal image watermarking approach based on a multi-objective genetic algorithm
    Wang, Jun
    Peng, Hong
    Shi, Peng
    INFORMATION SCIENCES, 2011, 181 (24) : 5501 - 5514
  • [27] Watermarking of EEG Data to Provide Security Based on DWT-SVD and Optimized by Firefly Algorithm
    Gupta, Akash Kumar
    Chakraborty, Chinmay
    Gupta, Bharat
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2022, 13 (08) : 1 - 16
  • [28] A General Threshold Signature Scheme Based on Elliptic Curve
    Shang, Yulian
    Wang, Xiujuan
    Li, Yujuan
    Zhang, Yufei
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 89 - 92
  • [29] A novel image encryption scheme based on an elliptic curve
    Hayat, Umar
    Azam, Naveed Ahmed
    SIGNAL PROCESSING, 2019, 155 : 391 - 402
  • [30] PSO Optimized and Secured Watermarking Scheme Based on DWT and SVD
    Ansari, Irshad Ahmad
    Pant, Millie
    Ahn, Chang Wook
    PROCEEDINGS OF FIFTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2015), VOL 2, 2016, 437 : 411 - 424