PSO Optimized Multipurpose Image Watermarking Using SVD and Chaotic Sequence

被引:4
作者
Ansari, Irshad Ahmad [1 ]
Pant, Millie [1 ]
Ahn, Chang Wook [2 ]
Jeong, Jaehun [2 ]
机构
[1] Indian Inst Technol, Dept ASE, Roorkee, Uttar Pradesh, India
[2] Sungkyunkwan Univ, Dept CSE, Suwon, South Korea
来源
BIO-INSPIRED COMPUTING - THEORIES AND APPLICATIONS, BIC-TA 2015 | 2015年 / 562卷
关键词
Ownership claim; Multipurpose image watermarking; Tamper localization; Singular value decomposition; Chaotic sequence; Particle swarm optimization; TAMPER DETECTION; DUAL WATERMARK;
D O I
10.1007/978-3-662-49014-3_1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This study proposes a novel method for multipurpose image watermarking for both ownership verification and tampered region localization. Two watermarks (robust and fragile) are inserted into the host image. Robust watermark insertion is done by PSO (particle swarm optimization) optimized scaling of the singular values; utilizing the singular value decomposition (SVD). Doing so, leads to reduction in visibility changes (better imperceptibility) of host image as well as enhanced performance of watermarked image towards attacks (better robustness). Fragile watermark insertion is done by making use of SVD and chaotic sequence (block feature's dependent). The image is first divided into non overlapped blocks and block based Arnold transformed is performed. Then after, block grouping is done of scrambled blocks to breakdown their independence in order to sustain the vector quantization and collage attacks. The proposed scheme is tested against various signal processing attacks and results shows a good performance.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 27 条
[1]  
[Anonymous], P 4 INT C SOFT COMP
[2]  
[Anonymous], 2014, P IEEE 80 VEH TECHN
[3]  
Ansari I. A., 2015, COMPUT SCI TECHN, V2, P338
[4]   Authentication and recovery of images using multiple watermarks [J].
Chamlawi, Rafiullah ;
Khan, Asifullah ;
Usman, Imran .
COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) :578-584
[5]  
Chemak C, 2007, P 2007 SUMM COMP SIM, P1201
[6]  
[陈帆 Chen Fan], 2012, [计算机学报, Chinese Journal of Computers], V35, P154
[7]  
Eberhart R., P 6 INT S MICROMACHI, P39, DOI DOI 10.1109/MHS.1995.494215
[8]   THE TRUSTWORTHY DIGITAL CAMERA - RESTORING CREDIBILITY TO THE PHOTOGRAPHIC IMAGE [J].
FRIEDMAN, GL .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1993, 39 (04) :905-910
[9]  
Habib M, 2005, LECT NOTES ARTIF INT, V3682, P548
[10]   Methods for image authentication: a survey [J].
Haouzia, Adil ;
Noumeir, Rita .
MULTIMEDIA TOOLS AND APPLICATIONS, 2008, 39 (01) :1-46