LWT-DCT-SVD and DWT-DCT-SVD based watermarking schemes with their performance enhancement using Jaya and Particle swarm optimization and comparison of results under various attacks

被引:28
作者
Awasthi, Divyanshu
Srivastava, Vinay Kumar
机构
[1] Department of Electronics and Communication Engineering, MNNIT, Allahabad
关键词
Digital image watermarking; PSO; JAYA optimization; Discrete cosine transform; Discrete wavelet transform; Lifting wavelet transform; Performance comparison; IMAGE WATERMARKING; TRANSFORM; ROBUST;
D O I
10.1007/s11042-022-12456-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Robust and undetectable watermarking scheme is important for copyright protection. This paper proposes a DWT-DCT-SVD and LWT-DCT-SVD based image watermarking technology, as well as a comparison of the DWT and LWT systems. The host picture is first divided into sub-bands throughout the embedding phase using multilevel DWT or LWT. The image is divided into various high and low-frequency sub-bands using DWT. LWT breaks up the original filters into a series of smaller structures and provides a faster algorithm. The ensuing sub-bands area unit is then used as the input for DCT. The SVD is performed after applying DCT. The watermark is then inserted into the input image sub-band by using particle swarm optimization intelligence and JAYA optimization to discover an acceptable scale factor. The proposed methodology is compared with other methods under a variety of first-generation and second-generation attacks, including filtering, noise, JPEG compression, JPEG2000 compression, sharpening, thresholding, dithering, motion blur, and shear attack. Furthermore, the proposed watermarking system has a reasonable level of robustness and imperceptibility in the face of most attacks, therefore it is a suitable technique for Copywrite protection. This paper proposes two watermarking schemes based on discrete wavelet transform (DWT) namely DWT-DCT-SVD and lifting wavelet transform (LWT) based scheme namely LWT-DCT-SVD. The comparison of these two schemes is also carried out.
引用
收藏
页码:25075 / 25099
页数:25
相关论文
共 34 条
[1]  
Allaf AH, 2018, P 3 INT C SMART CIT, P472
[2]  
[Anonymous], 2008, 3 INT C COMM SYST SO
[3]  
[Anonymous], 2015, 2015 IEEE INT C COMP
[4]  
Arya RK, 2015, 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P2042, DOI 10.1109/ICACCI.2015.7275917
[5]  
Ayangar Vijay R., 2010, 2010 International Conference on Multimedia Computing and Information Technology (MCIT 2010), P105, DOI 10.1109/MCIT.2010.5444871
[6]  
Chandra DVS, 2002, 2002 45TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III, CONFERENCE PROCEEDINGS, P264
[7]   The redundant discrete wavelet transform and additive noise [J].
Fowler, JE .
IEEE SIGNAL PROCESSING LETTERS, 2005, 12 (09) :629-632
[8]   Study and Analysis of Robust DWT-SVD Domain Based Digital Image Watermarking Technique Using MATLAB [J].
Furqan, Asna ;
Kumar, Munish .
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, :638-644
[9]   False-positive-free SVD-based image watermarking [J].
Guo, Jing-Ming ;
Prasetyo, Heri .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) :1149-1163
[10]   Face recognition using the discrete cosine transform [J].
Hafed, ZM ;
Levine, MD .
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2001, 43 (03) :167-188