Open Access Open Access  Restricted Access Subscription or Fee Access

Enhanced Fast Robustness Digital Image Watermarking Scheme with Secure Chaotic Encryption Scheme Via Selecting Optimal Feature Points


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v9i8.2207

Abstract


In recent years, with the rapid development of internet, digital data has been widely used in various science and engineering applications. But, this development has also led to several threats and attacks from the intruders. Most of the organizations are very much concerned about the Illegal copyright activities which have become a series issue. A number of copyright protection schemes have been developed in the literature. Watermarking is one of the best known methods for copyright protection. Earlier Bit Error Rate (BER) is been observed to provide good results for choosing the optimal feature region from the watermarked image. However it fails to produce more accurate image quality measures. This research work mainly focuses on a novel technique implemented based on the simulated attacking approach and the GA-based Multi Dimensional Knapsack Problem (MDKP) solving technique to select the most sufficient feature regions for robust digital image watermarking without affecting the image quality. A major limitation in existing methods is the security problems which lead to decrease in the integrity of digital watermarking scheme. With that problem, the definite optimization problems (variant problems) cannot be resolved using genetic algorithms. To focus on the above mentioned problems, the proposed work uses two approaches. Chaotic Iterative Process encryption scheme is used to solve the security problems for watermarking image. Next, the optimal feature points can be chosen from the watermarked image by Modified version of Peak Signal Noise Ratio (MPSNR). MPSNR is based on the enhanced quality measurement of which point opposes the predefined and undefined attacks. With those two approaches the PSO algorithm is employed as a search strategy for identifying an optimal feature subset. The experimental results illustrates that comparing with various well-known feature-based techniques, the proposed method shows better performance in robust and more secure digital watermarking.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Feature Detector; Copyright Protection; Digital Watermarking; Chaotic Iterative Process Encryption; Modified Version of Peak Signal Noise Ratio (MPSNR); Particle Swarm Optimization; SUSAN Detector; Optimal Feature Point Set; Predefined and Undefined Attac

Full Text:

PDF


References


Munesh Chandra, Shika Pandey, and Rama Chaudary, "Digital Watermarking Technique for Protecting Digital Images", IEEE 2010.

H, Vallabha V. "Multiresolution Watermark Based on Wavelet Transform for Digital images." Cranes Software International Ltd, 2003.

Hernández., Fernando Pérez-González and Juan R. "A tutorial on digital watermarking." Proc. of the 33rd IEEE Annual Carnahan Conference on Security Technology, Spain, October 1999

Cox I.J, Kilian.J, Leighton F.T, and Shamoon. T, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process.,vol. 6, no. 12, pp. 1673–1687, Dec. 1997
http://dx.doi.org/10.1109/83.650120

Cox I. J, Miller M. L, and Bloom. J. A, "Digital Watermarking", San Francisco, CA: Morgan Kaufman, 2001

Dong P, Brankov J. G, Galatsanos N. P, Y. Yang, and F. Davoine, "Digital watermarking robust to geometric distortions," IEEE Trans, Image Process., vol. 14, no. 12, pp. 2140–2150, Dec. 2005.
http://dx.doi.org/10.1109/TIP.2005.857263

Serkan EMEK, Melih PAZARCI. "A Cascade DWTDCT Based Digital Watermarking Scheme" 13th European Signal Processing Conference, Turkey, 2005.

Yi-leh Wu, Divyakant Agrawal,Amr El Abbadi. "A comparison of DFT and DWT based similarity search in time-series databases." Proc. Ninth international conference on Information and knowledge management, United States of America, 2000: pp. 488 - 495.

Dong Zheng, Sha Wang, and Jiying Zhao," RST Invariant Image Watermarking Algorithm With Mathematical Modeling and Analysis of the Watermarking Processes", IEEE Transactions On Image Processing, Vol. 18, No. 5, May 2009, 1055-1068
http://dx.doi.org/10.1109/TIP.2009.2014807

D. G. Lowe, "Distinctive image features from scaleinvariant keypoints," Int. J. Comput. Vis., vol. 60, no. 2, pp. 91–110, 2004.
http://dx.doi.org/10.1023/B:VISI.0000029664.99615.94

Abu-Errub, Ali Al-Haj and Aymen. "Performance Optimization of Discrete Wavelets Transform Based Image Watermarking Using Genetic Algorithms." Journal of Computer Science, 2008: 834-841.

Zhicheng Wei, Hao Li, Jufeng Dai" Image Watermarking Based On Genetic Algorithm" School of Electronic Information Engineering, Tianjin University, Tianjin 300072, China, Department of Network Engineering, Hubei Normal University, Shijiazhuang 050016, China.

Cong Jin: Affine invariant watermarking algorithm using features matching. Digital Signal Processing 16(3): 247-254 (2006)
http://dx.doi.org/10.1016/j.dsp.2005.11.008

G. Boato, V. Conotter and F. G. B. De Natale "GA based Robustness Evaluation Method for Digital Image Watermarking" Proc. of IWDW 2007, Guangzhou, December 2007.

C.-S. Shieh, H.-C. Huang, F.-H. Wang and J.-S. Pan, "Genetic watermarking based on transform domain techniques," Pattern Recognition, vol. 37, no. 3, pp. 555-565, 2004.
http://dx.doi.org/10.1016/j.patcog.2003.07.003

Zne-Jung Lee, Shih-Wei Lin, Shun-Feng Su, Chun-Yen Lin, A hybrid watermarking technique applied to digital images, Applied Soft Computing Elsevier, vol 8, pp.798-808, 2008.
http://dx.doi.org/10.1016/j.asoc.2007.03.011

Ziqiang Wang, Xia Sun and Dexian Zhang, "Novel Watermarking Scheme based on PSO Algorithm", Bio-Inspired Computational Intelligence and Applications, Lecture Notes in Computer Science, 2007, Volume 4688, pp.307-314, 2007.

Jordi Serra Ruiz,David Magias, "D W T and T S V Q Based Semi Fragile Watermarking Scheme for Tampering Detection in Remote Sensing Images", In IEEE International Symposium on Image and Video Technology, pp. 331 –336.2010.

Wen Hsin Chang, Long-Wen Chang, "Semi-Fragile Watermarking for Image Authentication, Localization, and Recovery Using Tchebichef Moments", In IEEE International Conference on Security, vol.1, pp. 749 –754, 2010.

Rasul Enayatifar and Abdul Hanan Abdullah," Image Security via Genetic Algorithm" IACSIT Press, Singapore, 2011

H. S. Kwok and W. K.S. Tang, Chaos Solitons and Fractals, (2007) 1518–152
http://dx.doi.org/10.1016/j.chaos.2005.11.090

D. G. Lowe, "Distinctive image features from scale-invariant keypoints," Int. J. Comput.Vis., vol. 60, no. 2, pp. 91–110, Nov. 2004.
http://dx.doi.org/10.1023/B:VISI.0000029664.99615.94

J. S. Seo and C. D. Yoo, "Image watermarking based on invariant regions of scale-space representation,"IEEE Trans. Signal Process., vol. 54, no. 4, pp.1037–1049, Apr. 2006.
http://dx.doi.org/10.1109/TSP.2006.870581

Jen-Sheng Tsai, Win-Bin Huang, and Yau-Hwang Kuo, "On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking", IEEE Transactions on Image Processing, Vol. 20, No. 3, pp. 735, 2011.
http://dx.doi.org/10.1109/TIP.2010.2073475


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize