Skip to main content

Advertisement

Log in

A digital image watermarking method based on host image analysis and genetic algorithm

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

This paper mainly comes up with a new watermarking method based on host image analysis and genetic algorithm. Through the characteristics of human visual system, the host image analysis can ensure the imperceptibility. It greatly enhance the embedding capacity of the watermark under the same visual effect, which can embed more watermark in the host image. The genetic algorithm is used in embedding process. It can not only improve the image quality, but also enhance the security and robustness of the watermarked image in a large extent. This algorithm satisfies an optimal compromise between the robustness and image quality. Besides that, the experimental results show that this method has great influence on transparency and robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Botta M, Cavagnino D, Pomponiu V (2014) Fragile watermarking using Karhunen–Loeve transform: the KTL-F approach. Soft Comput. doi:10.1007/s00500-014-1373-y

  • Castiglione A, Pizzolante R, De Santis A, Carpentieri B, Castiglione A, Palmieri F (2015) Cloud-based adaptive compression and secure management services for 3D healthcare data. Future Gener Comput Syst 1(43):120–134

    Article  Google Scholar 

  • Catuogno L, Galdi C (2014) On user authentication by means of video events recognition. J Ambient Intell Humaniz Comput 5(6):909–918

  • Chen Y, Peng L (2009) Optimal image watermark using genetic algorithm and synergetic neural network. In: Second international conference on intelligent computation technology and automation, vol 3, pp 209–212

  • Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermaking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  • Das C, Panigrahi D, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU Int J Electron Commun 68(3):244–253

    Article  Google Scholar 

  • Duymaz E (2012) A novel DCT based digital audio watermarking method. In: Signal processing and communications applications conference, pp 1–4

  • Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Cluster Comput 16(4):887–903

    Article  Google Scholar 

  • Esposito C, Ficco M, Palmieri F, Castiglione A (2015) Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory. IEEE Trans Comput. doi:10.1109/TC.2015.2389952

  • Ficco M, Palmieri F, Castiglione A (2014) Modeling security requirements for cloud-based system development. Pract Exp Concurr Comput. doi:10.1002/cpe.3402

  • Frédéric L, Bailey K, Leeney M, Curran K (2013) A novel approach to digital watermarking, exploiting colour spaces. Signal Process 93(5):1268–1294

  • Gen M, Cheng R (1997) Genetic algorithms and engineering design. Wiley, New York

  • Han J, Kong J, Lu Y, Yang Y, Hou G (2006) A novel color image watermarking method based on genetic algorithm and neural networks. Lect Notes Comput Sci 4234:225–233

  • Iovane G, Giordano P, Borysenko SD (2011) Image watermarking via wavelet approach and face biometrics. J Ambient Intell Humaniz Comput 2:91–101

    Article  Google Scholar 

  • Jia S (2014) A novel blind color images watermarking based on SVD. Int J Light Electron Opt 125(12):2868–2874

    Article  Google Scholar 

  • Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proceeding of the 29th IEEE international conference on computer communications, pp 441–445

  • Lin WH, Horng SJ, Kao TW, Fan PZ (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746–757

  • Liu Z, Chen X, Yang J, Jia C, You I (2014a) New order preserving encryption model for outsourced databases in cloud environments. J Netw Comput Appl. doi:10.1016/j.jnca.2014.07.00

  • Liu Z, Li J, Chen X, Yang J, Jia C (2014b) Thin-model data sharing scheme supporting keyword search in cloud storage. In: 19th Australasian conference on information security and privacy (ACISP), vol 8544, pp 115–130

  • Liu Z, Li J, Li J, Jia C (2014c) SQL-based fuzzy query mechanism over encrypted databases. Int J Data Warehous Min. doi:10.4018/ijdwm.2014100104

  • Mohanty SP, Guturu P, Kougianos E, Pati N (2006) A novel invisible color image watermarking scheme using image adaptive watermark creation and robust insertion–extraction. In: 8th IEEE international symposium on multimedia, pp 153–160

  • Panyavaraporn J (2013) Multiple video watermarking algorithm based on wavelet transform. In: 13th international symposium on communications and information technologies, pp 397–401

  • Pei Q, Wang X, Li Y, Li H (2013) Adaptive reversible watermarking with improved embedding capacity. J Syst Softw 86(11):2841–2848

  • Pizzolante R (2014) Protection of microscopy images through digital watermarking techniques. In: 2014 international conference on intelligent networking and collaborative systems, pp 65–72

  • Song J, Song J, Bao Y (2012) A blind digital watermark method based on SVD and chaos. Proc Eng 29:285–289

  • Tsai HH, Lai YS, Lo SC (2013) A zero-watermark scheme with geometrical invariants using SVM and PSO against geometrical attacks for image protection. J Syst Softw 86(2):335–348

    Article  Google Scholar 

  • Wang J, Peng H, Shi P (2011) An optimal image watermarking approach based on a multi-objective genetic algorithm. Inf Sci 181(24):5501–5514

    Article  Google Scholar 

  • Wei Z, Zhao B, Liu B, Su J, Xu L, Xu E (2014) A novel steganography approach for voice over IP. J Ambient Intell Humaniz Comput 5:601–610

  • Wen X, Zhang H, Xu X, Quan JJ (2009) A new watermarking approach based on probabilistic neural network in wavelet domain. Soft Comput 13:355–360

  • Wu X, Sun W (2013) Robust copyright protection scheme for digital images using overlapping DCT and SVD. Appl Soft Comput 13(2):1170–1182

  • Xie W, Wang Y, Sui A (2013) Video watermark based on SVD spread spectrum. In: 3rd international conference on computer science and network technology (ICCSNT), pp 1171–1173

  • Xu ZJ , Wang ZZ, Lu Q (2011) Research on image watermarking algorithm based on DCT. In: 3rd international conference on environmental science and information application technology, ESIAT 2011, vol 10, pp 1129–1135

  • Zhang C, Mu G, Chen H, Sun T, Pang L (2014a) Distributed service discovery algorithm based on ant colony algorithm. J Softw 9(1):70–75

  • Zhang Y, Xu Z, Benxiong H (2014b) Channel capacity analysis of the generalized spread spectrum watermarking in audio signals. Signal Process Lett 22(5):519–523

  • Zhou W, Jiang G, Yu M, Shao F, Peng Z (2014) Reduced-reference stereoscopic image quality assessment based on view and disparity zero-watermarks. Signal Process Image Commun 29(1):167–176

Download references

Acknowledgments

The authors are grateful to the support of the Science Technology Research Foundation of Jilin Provincial Education Department under Grant No. 2015411, Social Science Research of Jilin Province Education Department under Grant No. 2014B035.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jialing Han.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, J., Zhao, X. & Qiu, C. A digital image watermarking method based on host image analysis and genetic algorithm. J Ambient Intell Human Comput 7, 37–45 (2016). https://doi.org/10.1007/s12652-015-0298-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-015-0298-3

Keywords

Navigation