An Adaptive Block-Based Watermarking Scheme Using RDWT-SVD and Particle Swarm Optimization

被引:0
作者
Gaur S. [1 ]
Chaudhary K. [2 ]
Goel V. [1 ,2 ]
Barthwal V. [1 ,2 ]
机构
[1] Department of Computer Science and Engineering, B. T. Kumaon Institute of Technology Dwarahat, Dwarahat
[2] Department of Information Technology, HNB Garhwal University Pauri Garhwal, Srinagar
关键词
Digital image watermarking; NCC; Particle swarm optimization; PSNR; Redundant discrete wavelet transform; Singular value decomposition;
D O I
10.1007/s42979-023-02136-x
中图分类号
学科分类号
摘要
The major goal of digital image watermarking is to acquire security, robustness and reliability against various attacks. To achieve this objective, embedding the watermark into the cover image and selecting the embedding factor is a tedious task. In this paper presents a Redundant discrete wavelet transform (RDWT), block-based singular value decomposition (SVD), and secure and robust image watermarking method using particle swarm optimization (PSO) technique for choosing the scale factor. The presented method first decomposed the cover image using RDWT and then segmented all sub-bands into non-overlapping blocks. SVD is enforced on the LL sub-band and modifies the singular values of these blocks by the watermark image. PSO is used for selecting the scaling factor to increase imperceptibility and robustness. The experimental outcomes show that the presented method performs well as compared to previously introduced techniques, is more imperceptible and highly robust against the various image processing attacks, and also removes the diagonal line problem from the extracted watermark. © 2023, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
[1]  
Miller M.L., Cox I.J., Linnartz J.-P., Kalker T., A review of watermarking principles and practices, Digit. Signal Process. Multimedia. Syst., pp. 461-485, (1999)
[2]  
Bender W., Gruhl D., Morimoto N., Lou A., Techniques for data hiding, IBMS J, 35, October, pp. 313-336, (1996)
[3]  
Cayre F., Fontaine C., Furon T., Watermarking security: theory and practice, IEEE Trans Signal Process, 53, 10, pp. 3976-3987, (2005)
[4]  
Hussein E., Belal M.A., Digital watermarking techniques, applications and attacks applied to digital media: a survey, Int J Eng Res Technol, 1, 7, pp. 1-8, (2012)
[5]  
Arai K., Rahmad C., Wavelet based image retrieval method, Int J Adv Comput Sci Appl, 3, 4, pp. 6-11, (2012)
[6]  
Podilchuk C.I., Delp E.J., Digital watermarking algorithms and applications, IEEE Signal Process Mag, 18, July, pp. 33-46, (2001)
[7]  
Rajani D., Kumar P.R., An optimized blind watermarking scheme based on principal component analysis in redundant discrete wavelet domain, Signal Process, (2020)
[8]  
Diwold K., Aderhold A., Scheidler A., Middendorf M., Performance evaluation of artificial bee colony optimization and new performance evaluation of artificial bee colony optimization and new selection schemes, MEMETIC Comput, (2011)
[9]  
Teodorovic D., B. Colony and O. Bco, Innovation in swarm intelligence, pp. 39-60, (2009)
[10]  
Sharma S., Chauhan U., Khanam R., Singh K.K., Digital watermarking using grasshopper optimization algorithm, Open Comput Sci, (2021)