Image Watermarking using Singular Value Decomposition with integration of Particle Swarm Optimization in Discrete wavelet transform
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
M. Arnold, M. Schmucker and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection. ARTECH HOUSE Publications, 2003.
D. C. Lou, H.K. Tso and J.L. Liu, "A copyright protection scheme for digital images using visual cryptography technique,"Journal of Computer Standards and Interfaces, vol. 29, pp. 125-131, 2007.
Anuradha and Rudresh Pratap Sing, “DWT Based Watermarking Algorithm using Haar Wavelet,†International Journal of Electronics and Computer Science Engineering, ISSN 2277-1956/V1N1-01-06.
Lin, W. H., Wang, Y. R., & Horng, S.J., Kao, T. W., & Pan, Y., “A blind watermarking method using maximum wavelet coefficient quantization,†Expert Systems with Applications, 36(9), 11509–11516, 2009.
Yuh-Rau Wang, Wei-Hung Lin and Ling Yang, “An intelligent watermarking method based on particle swarm optimization,†Expert Systems with Applications 38 (2011), 8024–8029.
J. Kennedy, and R. Eberhart, “Particle swarm optimization,†in Proc. IEEE Int. Conf. Neural Networks, Perth, WA, 1995, pp. 1942-1948.
K. Hameed, A. Mumtaz, S. A. M. Gilani, Digital Image Watermarking in the Wavelet Transform Domain, World Academy of Science Engineering and Technology 13, 2006.
P. Meerwald, A. Uhl, A Survey of Wavelet-Domain Watermarking Algorithms. In Proc. of SPIE, Electronics Imaging, Security and Watermarking of Multimedia Contents III, CA, USA 4314, (2001), pp. 505-516.
O. M. Al-Qershi, K. B. Ee, A Comparison Between Block-Based and Non Block-Based Watermarking Schemes based on DWT,Second International Symposium on Electronic Commerce and Security, 2009.
M. Arnold, M. Schmucker and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection. ARTECH HOUSE Publications, 2003.
B. A. Thomas and J. J. Rodriguez, "Wavelet-based color image denoising," in Proc. of International Conference on Image Processing, vol. 2, pp. 804-807, 2000.
E. Vahedi, A. Zoroofi, and M. Shiva, “A new approach for image watermarking by using particle swarm optimization,†vol. 00, no .November, pp. 24–27, 2007.
W. Liao, J. Wang, X. Wang, and J. Wang, “Improved Particle Swarm Optimization Algorithms,†pp. 77–80, 2011.
J. Kennedy, and R. Eberhart, “Particle swarm optimization,†in Proc. IEEE Int. Conf. Neural Networks, Perth, WA, 2008, pp. 1942-1948.
Kaveh Ahmadi, Ahmad Y.Javaid, “An efficient compression based on adaptive thresholding in wavelet domain using particle swarm optimizationâ€, science direct. Image communication, (2015),(33-39).
M. Al-khassaweneh, H. Al-zoubi and S. Aviyente, The multibit watermarking method for speech signals in the time frequency domain, Integrated Computer-Aided Engineering17(1) (2010), 59–67
V. Aslantas, An optimal robust digital image watermarking based on SVD using differential evolution algorithm, Optics Communications 282 2009), 769–77]
L. Jing, F. Liu and B. Liu, Robust Image Watermarking Scheme with General Regression Neural Network and FCM Algorithm, Lecture Notes in Computer Science (2008), 243–250
H. Tao, J.M. Zain and A.N. Abdalla, Particle Swarm Optimization for Digital Image Watermarking, Communications in Computer and Information Science (2010), 1–8
Lien, B. K., & Lin, W. H. (2006). A watermarking method based on maximum distance wavelet tree quantization. In Proceedings of 19th conference computer vision, graphics and image processing (pp. 269–276).
J. Sun, B. Feng, W. Xu, Particle swarm optimization with particles having quantum behavior, in Proceedings of the IEEE Congress on Evolutionary Computation, Portland, Oregon USA, pp. 325-331, 2004.
Ali, Musrrat, and Chang Wook Ahn. “Comments on “Optimized gray-scale image watermarking using DWT-SVD and Firefly Algorithmâ€." Expert Systems with Applications 42.5 (2015): 2392-2394.
Gokhale, U. M., and Y. V. Joshi. " A semi fragile watermarking algorithm based on SVD-IWT for image authentication." Int. J. Adv. Res. Comput. Commun. Eng 1.4 (2012).
Gupta, Akshya Kumar, and Mehul S. Raval. "A robust and secure watermarking scheme based on singular values replacement." Sadhana 37.4 (2012): 425-440.
Tian, Yuan, et al. "Do singular values contain adequate information for face recognition?." Pattern recognition 36.3 (2003): 649-655.
Ganic, Emir, and Ahmet M. Eskicioglu. "Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition." Journal of electronic imaging 14.4 (2005): 043004-043004.
Liu, Shao-Hui, et al. "An image fragile watermark scheme based on chaotic image pattern and pixel-pairs." Applied Mathematics and Computation 185.2 (2007): 869-882.
Bhatnagar, Gaurav, and Balasubramanian Raman. "A new robust reference watermarking scheme based on DWT-SVD." Computer Standards & Interfaces 31.5 (2009): 1002-1013.
] Lagzian, Samira, Mohsen Soryani, and Mahmood Fathy. "A new robust watermarking scheme based on RDWT-SVD." International Journal of Intelligent Information Processing 2.1 (2011): 22-29.
Haouzia, Adil, and Rita Noumeir. "Methods for image authentication: a survey." Multimedia tools and applications 39.1 (2008): 1-46.
Yadav, Upasana, et al. "Different Watermarking Techniques & its Applications: A Review." International Journal Of Scientific And Engineering Research 5.4 (2014).