Optimized SVD-based robust watermarking in the fractional Fourier domain

被引:26
作者
Abdelhakim, Assem M. [1 ]
Saad, M. H. [1 ]
Sayed, M. [1 ]
Saleh, H., I [1 ]
机构
[1] Egyptian Atom Energy Author, Radiat Engn Dept, NCRRT, Cairo, Egypt
关键词
Robust watermarking; Fractional Fourier Transform; Singular Value Decomposition; Meta-heuristic optimization; Artificial Bee Colony; BEE COLONY ALGORITHM; IMAGE WATERMARKING; TRANSFORM;
D O I
10.1007/s11042-018-6014-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital watermarking is one of the most effective methods for protecting multimedia from different kind of threats. It has been used for many purposes, like copyright protection, ownership identification, tamper detection, etc. Many watermarking applications require embedding techniques that provide robustness against common watermarking attacks, like compression, noise, filtering, etc. In this paper, an optimized robust watermarking method is proposed using Fractional Fourier Transform and Singular Value Decomposition. The approach provides a secure way for watermarking through the embedding parameters that are required for the watermark extraction. It is a block-based method, where each watermark bit is embedded in its corresponding image block. First, the transform is applied to each block, and then the singular values are evaluated through which the embedding modification is performed. The optimum fractional powers, of the transform, and the embedding strength factor are evaluated through a Meta-heuristic optimization to optimize the watermark imperceptibility and robustness. The Artificial Bee Colony is used as the Meta-heuristic optimization method. A fitness function is employed, at the optimization process, through which the maximum achievable robustness can be provided without degrading the watermarking quality below a predetermined quality threshold Qth. The effectiveness of the proposed method is demonstrated through a comparison with recent watermarking techniques in terms of the watermarking performance. The watermarking quality and robustness are evaluated for different quality threshold values. Experimental results show that the proposed approach achieves a better quality compared to that of other existing watermarking methods. On the other hand, the robustness is examined against the most common applied attacks. It is noticed that the proposed method can achieve a higher robustness degree when decreasing the quality threshold value.
引用
收藏
页码:27895 / 27917
页数:23
相关论文
共 37 条
[1]   Quality metric-based fitness function for robust watermarking optimisation with Bees algorithm [J].
Abdelhakim, Assem M. ;
Saleh, Hassan I. ;
Nassar, Amin M. .
IET IMAGE PROCESSING, 2016, 10 (03) :247-252
[2]   A quality guaranteed robust image watermarking optimization with Artificial Bee Colony [J].
Abdelhakim, Assem Mahmoud ;
Saleh, Hassan Ibrahim ;
Nassar, Amin Mohamed .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 72 :317-326
[3]   A study on particle swarm optimization and artificial bee colony algorithms for multilevel thresholding [J].
Akay, Bahriye .
APPLIED SOFT COMPUTING, 2013, 13 (06) :3066-3091
[4]   Differential evolution algorithm for the selection of optimal scaling factors in image watermarking [J].
Ali, Musrrat ;
Ahn, Chang Wook ;
Siarry, Patrick .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2014, 31 :15-26
[5]  
Anwar Muhammad Jamil, 2010, 2010 6th International Conference on Emerging Technologies (ICET), P204, DOI 10.1109/ICET.2010.5638488
[6]   A singular-value decomposition-based image watermarking using genetic algorithm [J].
Aslantas, Veysel .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2008, 62 (05) :386-394
[7]   An optimal robust digital image watermarking based on SVD using differential evolution algorithm [J].
Aslantas, Veysel .
OPTICS COMMUNICATIONS, 2009, 282 (05) :769-777
[8]   Multimodal Biometric Authentication using PSO based Watermarking [J].
Bedi, Punam ;
Bansal, Roli ;
Sehgal, Priti .
2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 :612-618
[9]  
Cox I, 2007, Digital watermarking and steganography
[10]  
Cox I. J., 2002, Digital watermarking, V53