LWT-DCT-SVD and DWT-DCT-SVD based watermarking schemes with their performance enhancement using Jaya and Particle swarm optimization and comparison of results under various attacks

被引:25
作者
Awasthi, Divyanshu
Srivastava, Vinay Kumar
机构
[1] Department of Electronics and Communication Engineering, MNNIT, Allahabad
关键词
Digital image watermarking; PSO; JAYA optimization; Discrete cosine transform; Discrete wavelet transform; Lifting wavelet transform; Performance comparison; IMAGE WATERMARKING; TRANSFORM; ROBUST;
D O I
10.1007/s11042-022-12456-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Robust and undetectable watermarking scheme is important for copyright protection. This paper proposes a DWT-DCT-SVD and LWT-DCT-SVD based image watermarking technology, as well as a comparison of the DWT and LWT systems. The host picture is first divided into sub-bands throughout the embedding phase using multilevel DWT or LWT. The image is divided into various high and low-frequency sub-bands using DWT. LWT breaks up the original filters into a series of smaller structures and provides a faster algorithm. The ensuing sub-bands area unit is then used as the input for DCT. The SVD is performed after applying DCT. The watermark is then inserted into the input image sub-band by using particle swarm optimization intelligence and JAYA optimization to discover an acceptable scale factor. The proposed methodology is compared with other methods under a variety of first-generation and second-generation attacks, including filtering, noise, JPEG compression, JPEG2000 compression, sharpening, thresholding, dithering, motion blur, and shear attack. Furthermore, the proposed watermarking system has a reasonable level of robustness and imperceptibility in the face of most attacks, therefore it is a suitable technique for Copywrite protection. This paper proposes two watermarking schemes based on discrete wavelet transform (DWT) namely DWT-DCT-SVD and lifting wavelet transform (LWT) based scheme namely LWT-DCT-SVD. The comparison of these two schemes is also carried out.
引用
收藏
页码:25075 / 25099
页数:25
相关论文
共 34 条
  • [1] Allaf AH, 2018, P 3 INT C SMART CIT, P472
  • [2] [Anonymous], 2008, 3 INT C COMM SYST SO
  • [3] [Anonymous], 2015, 2015 IEEE INT C COMP
  • [4] Arya RK, 2015, 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P2042, DOI 10.1109/ICACCI.2015.7275917
  • [5] Ayangar Vijay R., 2010, 2010 International Conference on Multimedia Computing and Information Technology (MCIT 2010), P105, DOI 10.1109/MCIT.2010.5444871
  • [6] Chandra DVS, 2002, 2002 45TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III, CONFERENCE PROCEEDINGS, P264
  • [7] The redundant discrete wavelet transform and additive noise
    Fowler, JE
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2005, 12 (09) : 629 - 632
  • [8] Study and Analysis of Robust DWT-SVD Domain Based Digital Image Watermarking Technique Using MATLAB
    Furqan, Asna
    Kumar, Munish
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 638 - 644
  • [9] False-positive-free SVD-based image watermarking
    Guo, Jing-Ming
    Prasetyo, Heri
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) : 1149 - 1163
  • [10] Face recognition using the discrete cosine transform
    Hafed, ZM
    Levine, MD
    [J]. INTERNATIONAL JOURNAL OF COMPUTER VISION, 2001, 43 (03) : 167 - 188