An adaptive, secure and imperceptive image watermarking using swarm intelligence, Arnold transform, SVD and DWT

被引:19
作者
Falgun Thakkar [1 ]
Srivastava, Vinay Kumar [2 ]
机构
[1] GH Patel Coll Engn & Technol, Elect & Commun Engn Dept, Vv Nagar 388120, Gujarat, India
[2] Motilal Nehru Natl Inst Technol Allahabad, Elect & Commun Engn Dept, Prayagraj, Uttar Pradesh, India
关键词
Adaptive image watermarking; Particle swarm optimization; Scrambling; Security; Normalized similarity ratio; BLIND WATERMARKING; SCHEME;
D O I
10.1007/s11042-020-10220-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital image watermarking is one of the important method of copyright protection and rightful ownership of the digital image and video. In this paper, the existing algorithm based on DWT-SVD is improved and made adaptive with particle swarm optimization (PSO) which increases the robustness and imperceptibility. Existing as well as proposed algorithm based on PSO creates diagonal line in the extracted watermark image against some of the noise attacks. Further to remove diagonal line from the extracted watermark image an algorithm based on PSO and Arnold transform is proposed. Both proposed algorithms (PSO and AT-PSO) are implemented and tested with different types of cover images. The comparative analysis of these two proposed algorithms is carried out with the existing algorithm. The comparative analysis shows that under most of noise attacks both the proposed algorithms outperform over the existing algorithm in terms of Peak Signal to Noise Ratio (PSNR) and Normalized Similarity Ratio (NSR). Moreover, the imperceptibility offered by Arnold transform based algorithm is better as compared to the other proposed algorithm. Robustness of both the proposed algorithms is close to each other.
引用
收藏
页码:12275 / 12292
页数:18
相关论文
共 36 条
[1]   An optimized watermarking technique based on self-adaptive DE in DWT-SVD transform domain [J].
Ali, Musrrat ;
Ahn, Chang Wook .
SIGNAL PROCESSING, 2014, 94 :545-556
[2]  
[Anonymous], 2014, J INF HIDING MULTIME
[3]   A singular-value decomposition-based image watermarking using genetic algorithm [J].
Aslantas, Veysel .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2008, 62 (05) :386-394
[4]   An image encryption scheme based on a new hybrid chaotic map and optimized substitution box [J].
Ben Farah, M. A. ;
Farah, A. ;
Farah, T. .
NONLINEAR DYNAMICS, 2020, 99 (04) :3041-3064
[5]   A new robust reference watermarking scheme based on DWT-SVD [J].
Bhatnagar, Gaurav ;
Raman, Balasubramanian .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) :1002-1013
[6]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[7]   Block-based SVD image watermarking in spatial and transform domains [J].
Ghazy, Rania A. ;
Abbas, Alaa M. ;
Al-Zubi, Nayel ;
Hassan, Emad S. ;
El-Fishawy, Nawal A. ;
Hadhoud, Mohiy M. ;
Dessouky, Moawad I. ;
El-Rabaie, El-Sayed M. ;
Alshebeili, Saleh A. ;
Abd El-Samie, Fathi E. .
INTERNATIONAL JOURNAL OF ELECTRONICS, 2015, 102 (07) :1091-1113
[8]  
Ghazy Rania A., 2008, Progress, V8, P147
[9]   On the use of the Stirling Transform in image steganography [J].
Ghosal, S. K. ;
Mandal, J. K. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 :320-330
[10]   Binomial transform based fragile watermarking for image authentication [J].
Ghosal, S. K. ;
Mandal, J. K. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (4-5) :272-281