Skip to content
BY-NC-ND 3.0 license Open Access Published by De Gruyter December 29, 2013

A robust SVD-based image watermarking using a multi-objective particle swarm optimization

  • K. Loukhaoukha EMAIL logo , M. Nabti and K. Zebbiche
From the journal Opto-Electronics Review

Abstract

The major objective in developing a robust digital watermarking algorithm is to obtain the highest possible robustness without losing the visual imperceptibility. To achieve this objective, we proposed in this paper an optimal image watermarking scheme using multi-objective particle swarm optimization (MOPSO) and singular value decomposition (SVD) in wavelet domain. Having decomposed the original image into ten sub-bands, singular value decomposition is applied to a chosen detail sub-band. Then, the singular values of the chosen sub-band are modified by multiple scaling factors (MSF) to embed the singular values of watermark image. Various combinations of multiple scaling factors are possible, and it is difficult to obtain optimal solutions. Thus, in order to achieve the highest possible robustness and imperceptibility, multi-objective optimization of the multiple scaling factors is necessary. This work employs particle swarm optimization to obtain optimum multiple scaling factors. Experimental results of the proposed approach show both the significant improvement in term of imperceptibility and robustness under various attacks.

[1] K. Tanaka, Y. Nakamura, and K. Matsui, “Embedding secret information into a dithered multi-level image,” in Proc. IEEE. Military Communications Conf. 1, 216–2201 (1990). http://dx.doi.org/10.1109/MILCOM.1990.11741610.1109/MILCOM.1990.117416Search in Google Scholar

[2] I.J. Cox, J. Kilian, F. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE T. Image Process. 6, 1673–1687 (1997). http://dx.doi.org/10.1109/83.65012010.1109/83.650120Search in Google Scholar PubMed

[3] J.R. Hernandez, M. Amado, and F. Perez-Gonzalez, “DCT-domain watermarking techniques for still images: detector performance analysis and a new structure,” IEEE T. Image Process. 9, 55–68, (2000). http://dx.doi.org/10.1109/83.81759810.1109/83.817598Search in Google Scholar PubMed

[4] C. Hsu and J. Wu, “Hidden digital watermarks in images,” IEEE T. Image Process. 8, 58–68 (1999). http://dx.doi.org/10.1109/83.73668610.1109/83.736686Search in Google Scholar PubMed

[5] K. Loukhaoukha and J.-Y. Chouinard, “A new image water-marking algorithm based on wavelet transform,” in IEEE Canadian Conf. Electrical and Computer Engineering, 781–786, 2009. 10.1109/CCECE.2009.5090126Search in Google Scholar

[6] W. Lu, W. Sun, and H. Lu, “Robust watermarking based on DWT and nonnegative matrix factorization,” Comput. Electr. Eng. 35, 183–188 (2009). http://dx.doi.org/10.1016/j.compeleceng.2008.09.00410.1016/j.compeleceng.2008.09.004Search in Google Scholar

[7] V. Solachidis and I. Pitas, “Circularly symmetric watermark embedding in 2-D DFT domain,” IEEE T. Image Process. 10, 1741–1753 (2001). http://dx.doi.org/10.1109/83.96740110.1109/83.967401Search in Google Scholar PubMed

[8] T.K. Tsui, X.-P. Zhang, and D. Androutsos, “Colour image watermarking using multidimensional fourier transforms,” IEEE T. Information Forensics and Security 3, 16–28 (2008). http://dx.doi.org/10.1109/TIFS.2007.91627510.1109/TIFS.2007.916275Search in Google Scholar

[9] E. Abdallah, A.B. Hamza, and P. Bhattacharya, “Improved image watermarking scheme using fast Hadamard and discrete wavelet transforms,” J. Electron. Imaging. 16, 1–9 (2007). http://dx.doi.org/10.1117/1.276446610.1117/1.2764466Search in Google Scholar

[10] S.P. Maity and M.K. Kundu, “Perceptually adaptive spread transform image watermarking scheme using Hadamard transform,” Inform. Sciences. 181, 450–465 (2011). http://dx.doi.org/10.1016/j.ins.2010.09.02910.1016/j.ins.2010.09.029Search in Google Scholar

[11] P. Campisi, D. Kundur, and A. Neri, “Robust digital water-marking in the Ridgelet domain,” IEEE Signal Process. Lett. 11, 826–830 (2004). http://dx.doi.org/10.1109/LSP.2004.83546310.1109/LSP.2004.835463Search in Google Scholar

[12] H.-Y. Yu, J.-L. Fan, and X.-L. Zhang, “A robust watermark algorithm based on ridgelet transform and fuzzy c-means,” in Int. Symp. Information Engineering and Electronic Commerce, 120–124 (2009). http://dx.doi.org/10.1109/IEEC.2009.3010.1109/IEEC.2009.30Search in Google Scholar

[13] S.P. Mohanty and B.K. Bhargava, “Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks,” ACM T. Multimedia Computing, Communications and Applications 5, 12:1–12:22 (2008). 10.1145/1413862.1413865Search in Google Scholar

[14] K. Loukhaoukha and J.-Y. Chouinard, “Hybrid watermarking algorithm based on SVD and lifting wavelet transform for ownership verification,” in Proc. Canadian Workshop on Information Theory, pp. 177–182, 2009. 10.1109/CWIT.2009.5069549Search in Google Scholar

[15] H.-M. Tsai and L.-W. Chang, “A high secure reversible visible watermarking scheme,” in Proc. IEEE Int. Conf. Multimedia and Expo, pp. 2106–2109, 2007. Search in Google Scholar

[16] A. Verma and S. Tapaswi, “A novel reversible visible water-marking technique for images using noise sensitive region based watermark embedding (NSRBWE) approach,” in IEEE Eurocon, pp. 1374–1377, 2009. Search in Google Scholar

[17] D. Simitopoulos, D. Koutsonanos, and M. Strintzis, “Robust image watermarking based on generalized radon transformations,” IEEE T. Circuits and Systems for Video Technology 13, 732–745 (2003). http://dx.doi.org/10.1109/TCSVT.2003.81594710.1109/TCSVT.2003.815947Search in Google Scholar

[18] V. Aslantas, S. Ozer, and S. Ozturk, “Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms,” Opt. Commun. 282, 2806–2817 (2009). http://dx.doi.org/10.1016/j.optcom.2009.04.03410.1016/j.optcom.2009.04.034Search in Google Scholar

[19] Y.-J. Chang, R.-Z. Wang, and J.-C. Lin, “A sharing-based fragile watermarking method for authentication and self-recovery of image tampering,” Eurasip J. Advan. Sig. Pr., Article ID 846967, doi:10.1155/2008/846967, 17 pages (2008). 10.1155/2008/846967Search in Google Scholar

[20] M.-J. Tsai and C.-C. Chien, “Authentication and recovery for wavelet-based semi fragile watermarking,” Opt. Eng. 47, 067005 (10 pages) (2008). http://dx.doi.org/10.1117/1.294758010.1117/1.2947580Search in Google Scholar

[21] N. Ishihara and K. Abe, “A semi-fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication,” IEICE T. Fund. Electr., Communications and Computer Sciences E90-A, 1045–1054 (2007). 10.1093/ietfec/e90-a.5.1045Search in Google Scholar

[22] E. Ganic and A. M. Eskicioglu, “Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition,” J. Electron. Imaging 14, 043004 (2005). http://dx.doi.org/10.1117/1.213765010.1117/1.2137650Search in Google Scholar

[23] R. Liu and T. Tan, “A SVD-based watermarking scheme for protecting rightful ownership,” IEEE T. Multimedia 4, 121–128 (2002). http://dx.doi.org/10.1109/6046.98556010.1109/6046.985560Search in Google Scholar

[24] B. Mohan and S. Kumar, “A robust image watermarking scheme using singular value decomposition,” Multimed. Tools Appl. 3, 7–15 (2008). Search in Google Scholar

[25] K. Ramanjaneyulu and K. Rajarajeswari, “Wavelet-based oblivious image watermarking scheme using genetic algorithm,” IET Image Process. 6, 364–373 (2012). http://dx.doi.org/10.1049/iet-ipr.2010.034710.1049/iet-ipr.2010.0347Search in Google Scholar

[26] M. Rohani and A. Avanaki, “A watermarking method based on optimizing SSIM index by using PSO in DCT domain,” in Proc. IEEE Int. CSI Computer Conf., pp. 418–422, Tehran, 2009. 10.1109/CSICC.2009.5349616Search in Google Scholar

[27] H.-H. Tsai, Y.-J. Jhuang, and Y.-S. Lai, “An SVD-based image watermarking in wavelet domain using SVR and PSO,” Appl. Soft Comput. 12, 2442–2453 (2012). http://dx.doi.org/10.1016/j.asoc.2012.02.02110.1016/j.asoc.2012.02.021Search in Google Scholar

[28] X. P. Zhang and K. Li, “Comments on “An SVD-based watermarking scheme for protecting rightful ownership”,” IEEE T. Multimedia 7, 593–594 (2005). http://dx.doi.org/10.1109/TMM.2005.84335710.1109/TMM.2005.843357Search in Google Scholar

[29] R. Rykaczewski, “Comments on an SVD-based watermarking scheme for protecting rightful ownership”,” IEEE T. Multimedia 9, 421–423 (2007). http://dx.doi.org/10.1109/TMM.2006.88629710.1109/TMM.2006.886297Search in Google Scholar

[30] K. Loukhaoukha and J.-Y. Chouinard, “On the security of ownership watermarking of digital images based on SVD decomposition,” J. Electron. Imaging 19, 013007 (2010). http://dx.doi.org/10.1117/1.332793510.1117/1.3327935Search in Google Scholar

[31] H.-C. Ling, R. C.-W. Phan, and S.-H. Heng, “On the security of a hybrid watermarking algorithm based on singular value decomposition and Radon transform,” Int. J. Electron. Commun. 65, 958–960 (2011). http://dx.doi.org/10.1016/j.aeue.2011.06.00810.1016/j.aeue.2011.06.008Search in Google Scholar

[32] S. Rastegar, F. Namazi, K. Yaghmaie, and A. Aliabadian, “Hybrid watermarking algorithm based on singular value decomposition and radon transform,” Int. J. Electron. Commun. 65, 658–663 (2011). http://dx.doi.org/10.1016/j.aeue.2010.09.00810.1016/j.aeue.2010.09.008Search in Google Scholar

[33] E. Beltrami, “Sulle funzioni bilineari,” Giornale de Matematiche 11, 98–106 (1873) (in Italian). Search in Google Scholar

[34] C. Jordan, “Mémoire sur les formes trilinéaires,” J. Mathématiques Pures et Appliquées 19, 35–54 (1874) (in French). Search in Google Scholar

[35] L. Autonne, “Sur les groupes linéaires, réels et orthogo- naux,” Bulletin de la société mathématique de France, 1902 (in French). 10.24033/bsmf.665Search in Google Scholar

[36] C. Eckart and G. Young, “A principal axis transformation for Non-Hermitian matrices,” Bulletin of the American Mathematical Society 45, 118–121 (1939). http://dx.doi.org/10.1090/S0002-9904-1939-06910-310.1090/S0002-9904-1939-06910-3Search in Google Scholar

[37] P. Waldemar and T. Ramstad, “Image compression using singular value decomposition with bit allocation and scalar quantization,” in Proc. Nordic Signal Process. Symp., 83–86, (1996). Search in Google Scholar

[38] K. Chung, C. Shen, and L. Chang, “A novel SVD and VQ-based image hiding scheme,” Pattern Recogn. Lett. 22, 1051–1058 (2001). http://dx.doi.org/10.1016/S0167-8655(01)00044-710.1016/S0167-8655(01)00044-7Search in Google Scholar

[39] K. Konstantinides, B. Natarajan, and G. Yovanof, “Noise estimation and filtering using block-based singular value decomposition,” IEEE T. Image Process. 6, 479–483 (1997). http://dx.doi.org/10.1109/83.55735910.1109/83.557359Search in Google Scholar PubMed

[40] P. Bao and X. Ma, “Image adaptive watermarking using wavelet domain singular value decomposition,” IEEE T. Circuits and Systems for Video Technology 15, 96–102 (2005). http://dx.doi.org/10.1109/TCSVT.2004.83674510.1109/TCSVT.2004.836745Search in Google Scholar

[41] W. Sweldens, “The lifting scheme: A construction of second generation wavelets,” SIAM J. Mathematical Analysis 29, 511–546 (1997). http://dx.doi.org/10.1137/S003614109528905110.1137/S0036141095289051Search in Google Scholar

[42] I. Daubechies and W. Sweldens, “Factoring wavelet transforms into lifting steps,” J. Fourier Analysis and Application 4, 247–269 (1998). http://dx.doi.org/10.1007/BF0247602610.1007/BF02476026Search in Google Scholar

[43] J. Kennedy and R. Eberhart, “Particle Swarm Optimization,” in IEEE Int. Conf. Neural Networks 4, 1942–1948 (1995). Search in Google Scholar

[44] R. Marler and J. Arora, “Survey of multi-objective optimization methods for engineering,” Structural and Multidisciplinary Optimization 26, 369–395 (2004). http://dx.doi.org/10.1007/s00158-003-0368-610.1007/s00158-003-0368-6Search in Google Scholar

[45] K. Loukhaoukha, “Comments on “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm”,” Digit. Signal Process., 23, 1334, (2013). http://dx.doi.org/10.1016/j.dsp.2013.02.00610.1016/j.dsp.2013.02.006Search in Google Scholar

[46] C.-C. Lai, “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm”, Digit. Signal Process. 21, 522–527 (2011). http://dx.doi.org/10.1016/j.dsp.2011.01.01710.1016/j.dsp.2011.01.017Search in Google Scholar

Published Online: 2013-12-29
Published in Print: 2014-3-1

© 2014 SEP, Warsaw

This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.

Downloaded on 14.5.2024 from https://www.degruyter.com/document/doi/10.2478/s11772-014-0177-z/html
Scroll to top button