Skip to main content
Erschienen in: International Journal of Machine Learning and Cybernetics 1/2018

18.01.2015 | Original Article

Robust image watermarking scheme in lifting wavelet domain using GA-LSVR hybridization

verfasst von: Rajesh Mehta, Navin Rajpal, Virendra P. Vishwakarma

Erschienen in: International Journal of Machine Learning and Cybernetics | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents an imperceptible, robust, secure and efficient image watermarking scheme in lifting wavelet domain using combination of genetic algorithm (GA) and Lagrangian support vector regression (LSVR). First, four subbands low–low (LL), low–high (LH), high–low (HL) and high–high (HH) are obtained by decomposing the host image from spatial domain to frequency domain using one level lifting wavelet transform. Second, the approximate image (LL subband) is divided into non overlapping blocks and the selected blocks based on the fuzzy entropy are used to embed the binary watermark. Third, based on the correlation property of each transformed selected block, significant lifting wavelet coefficient act as target to LSVR and its neighboring coefficients (called feature vector) are set as input to LSVR to find optimal regression function. This optimal regression function is used to embed and extract the scrambled watermark. In the proposed scheme, GA is used to solve the problem of optimal watermark embedding strength, based on the noise sensitivity of each selected block, in order to increase the imperceptibility of the watermark. Due to the good learning capability and high generalization property of LSVR against noisy datasets, high degree of robustness is achieved and is well suited for copyright protection applications. Experimental results on standard and real world images show that proposed scheme not only efficient in terms of computational cost and memory requirement but also achieve good imperceptibility and robustness against geometric and non geometric attacks like JPEG compression, median filtering, average filtering, addition of noise, sharpening, scaling, cropping and rotation compared with the state-of-art techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Agarwal C, Mishra A, Sharma A (2013) Gray-scale image watermarking using GA-BPN hybrid network. J Vis Commun Image R. 24(7):1135–1146CrossRef Agarwal C, Mishra A, Sharma A (2013) Gray-scale image watermarking using GA-BPN hybrid network. J Vis Commun Image R. 24(7):1135–1146CrossRef
2.
Zurück zum Zitat Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik 125(1):428–434CrossRef Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik 125(1):428–434CrossRef
3.
Zurück zum Zitat Aslantas V (2008) A singular value decomposition based image watermarking using genetic algorithm. Int J Electron Commun 62(5):386–394CrossRef Aslantas V (2008) A singular value decomposition based image watermarking using genetic algorithm. Int J Electron Commun 62(5):386–394CrossRef
4.
Zurück zum Zitat Avci Engin, Avci Derya (2009) An expert system based on fuzzy entropy for automatic threshold selection in image processing. Expert Syst Appl 36:3077–3085CrossRef Avci Engin, Avci Derya (2009) An expert system based on fuzzy entropy for automatic threshold selection in image processing. Expert Syst Appl 36:3077–3085CrossRef
5.
Zurück zum Zitat Balasundaram S, Kapil (2010) On Lagrangian support vector regression. Expert Syst Appl 37(12):8784–8792CrossRef Balasundaram S, Kapil (2010) On Lagrangian support vector regression. Expert Syst Appl 37(12):8784–8792CrossRef
6.
Zurück zum Zitat Balasundaram S, Tanveer M (2013) On Lagrangian twin support vector regression. Neural Comput Appl 22:S257–S267CrossRef Balasundaram S, Tanveer M (2013) On Lagrangian twin support vector regression. Neural Comput Appl 22:S257–S267CrossRef
7.
Zurück zum Zitat Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J. 25:313–335CrossRef Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J. 25:313–335CrossRef
8.
Zurück zum Zitat Chen GY, Kegl B (2010) Invariant pattern recognition using contourlets and AdaBoost. Pattern Recogn 43(3):579–583CrossRefMATH Chen GY, Kegl B (2010) Invariant pattern recognition using contourlets and AdaBoost. Pattern Recogn 43(3):579–583CrossRefMATH
9.
Zurück zum Zitat Chen HY, Zhu YS (2012) A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique. J Zhejiang Univ-Sci C (Comput & Electron) 13(8):573–584CrossRef Chen HY, Zhu YS (2012) A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique. J Zhejiang Univ-Sci C (Comput & Electron) 13(8):573–584CrossRef
10.
Zurück zum Zitat Chu W-C (2003) DCT based image watermarking using sub-sampling. IEEE Trans Multimed 5(1):34–38CrossRef Chu W-C (2003) DCT based image watermarking using sub-sampling. IEEE Trans Multimed 5(1):34–38CrossRef
11.
Zurück zum Zitat Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 12(6):1673–1687CrossRef Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 12(6):1673–1687CrossRef
12.
13.
Zurück zum Zitat Ding S, Yu J, Huang B-QH (2014) An overview on twin support vector machines. Artif Intell Rev 42:245–252CrossRef Ding S, Yu J, Huang B-QH (2014) An overview on twin support vector machines. Artif Intell Rev 42:245–252CrossRef
14.
Zurück zum Zitat Fan W, Chen J, Zhen J (2005) SPIHT algorithm based on fast lifting wavelet transform in image compression. In: Hao Y et al (eds) CIS 2005, Part II, LNAI, vol 3802., pp 838–844 Fan W, Chen J, Zhen J (2005) SPIHT algorithm based on fast lifting wavelet transform in image compression. In: Hao Y et al (eds) CIS 2005, Part II, LNAI, vol 3802., pp 838–844
15.
Zurück zum Zitat Feng G, Qian Z, Dai N (2012) Reversible watermarking via extreme learning machine prediction. Neurocomputing 82:62–68CrossRef Feng G, Qian Z, Dai N (2012) Reversible watermarking via extreme learning machine prediction. Neurocomputing 82:62–68CrossRef
16.
Zurück zum Zitat Gen M, Cheng R (1997) Genetic algorithms and engineering design. Wiley, New York Gen M, Cheng R (1997) Genetic algorithms and engineering design. Wiley, New York
17.
Zurück zum Zitat Halder R, Pal S, Cortesi A (2010) Watermarking techniques for relational databases: survey, classifications and comparison. J Univers Comput Sci 16(21):3164–3190 Halder R, Pal S, Cortesi A (2010) Watermarking techniques for relational databases: survey, classifications and comparison. J Univers Comput Sci 16(21):3164–3190
18.
Zurück zum Zitat Huang H-C, Chu C-M, Pan J-S (2009) The optimized copyright protection scheme with genetic watermarking. Soft Comput 13:333–343CrossRef Huang H-C, Chu C-M, Pan J-S (2009) The optimized copyright protection scheme with genetic watermarking. Soft Comput 13:333–343CrossRef
19.
Zurück zum Zitat Khemchandani R, Karpatne A, Chandra S (2013) Twin support vector regression for the simultaneous learning of a function and its derivatives. Int J Mach Learn Cybernet 4(1):51–63CrossRef Khemchandani R, Karpatne A, Chandra S (2013) Twin support vector regression for the simultaneous learning of a function and its derivatives. Int J Mach Learn Cybernet 4(1):51–63CrossRef
20.
Zurück zum Zitat Klir GJ, Yuan B (1995) Fuzzy sets and Fuzzy logic: theory and applications. Prentice Hall, New JerseyMATH Klir GJ, Yuan B (1995) Fuzzy sets and Fuzzy logic: theory and applications. Prentice Hall, New JerseyMATH
21.
Zurück zum Zitat Lei B, Soon I-Y, Zhou F, Li Z, Lei H (2012) A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition. Sig Process 92(9):1985–2001CrossRef Lei B, Soon I-Y, Zhou F, Li Z, Lei H (2012) A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition. Sig Process 92(9):1985–2001CrossRef
22.
Zurück zum Zitat Lin WH, Wang YR, Hong SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11509–11516CrossRef Lin WH, Wang YR, Hong SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11509–11516CrossRef
23.
Zurück zum Zitat Loukhaoukha K, Chouinard J-Y, Taieb M-H (2010) Multi-Objective genetic algorithm optimization for image watermarking based on singular value decomposition and Lifting wavelet transform. Lect Notes Comput Sci (LNCS) 6134:394–403CrossRef Loukhaoukha K, Chouinard J-Y, Taieb M-H (2010) Multi-Objective genetic algorithm optimization for image watermarking based on singular value decomposition and Lifting wavelet transform. Lect Notes Comput Sci (LNCS) 6134:394–403CrossRef
24.
Zurück zum Zitat Maity SP, Maity S, Sil J, Delpha C (2013) Collusion resilient spread spectrum watermarking in M-band wavelet using GA-fuzzy hybridization. J Syst Softw 86(1):47–59CrossRef Maity SP, Maity S, Sil J, Delpha C (2013) Collusion resilient spread spectrum watermarking in M-band wavelet using GA-fuzzy hybridization. J Syst Softw 86(1):47–59CrossRef
25.
Zurück zum Zitat Mangasarian OL, Musciant DR (2001) Lagrangian support vector machines. J Mach Learn Res 1:161–177MathSciNetMATH Mangasarian OL, Musciant DR (2001) Lagrangian support vector machines. J Mach Learn Res 1:161–177MathSciNetMATH
26.
Zurück zum Zitat Mehta R, Mishra A, Singh R, Rajpal N (2010) Digital watermarking in DCT domain using finite newton support vector regression. In: IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing IIH-MSP (2010), pp 123–126 Mehta R, Mishra A, Singh R, Rajpal N (2010) Digital watermarking in DCT domain using finite newton support vector regression. In: IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing IIH-MSP (2010), pp 123–126
27.
Zurück zum Zitat Mehta R, Rajpal N, Vishwakarma VP (2014) Subband discrete cosine transform based grayscale image watermarking using general regression neural network. Int J Signal Imaging Syst. ISSN online: 1748-0701 (forthcoming articles) Mehta R, Rajpal N, Vishwakarma VP (2014) Subband discrete cosine transform based grayscale image watermarking using general regression neural network. Int J Signal Imaging Syst. ISSN online: 1748-0701 (forthcoming articles)
28.
Zurück zum Zitat Nikolaidis N, Pitas I (1998) Robust image watermarking in the spatial domain. Sig Process 66(3):385–403CrossRefMATH Nikolaidis N, Pitas I (1998) Robust image watermarking in the spatial domain. Sig Process 66(3):385–403CrossRefMATH
29.
Zurück zum Zitat Pablo RP, Juan CR, Rosiles JG (2014) A nonlinear least squares quasi-Newton strategy for LP-SVR hyper-parameters selection. Int J Mach Learn Cybernet 5(4):579–597CrossRef Pablo RP, Juan CR, Rosiles JG (2014) A nonlinear least squares quasi-Newton strategy for LP-SVR hyper-parameters selection. Int J Mach Learn Cybernet 5(4):579–597CrossRef
30.
Zurück zum Zitat Peng J, Zhang D (2009) Image encryption and chaotic cellular neural network. In: Tsai JJP, Yu PS (eds) Machine learning in cyber trust. Springer, New York, pp 183–213 Peng J, Zhang D (2009) Image encryption and chaotic cellular neural network. In: Tsai JJP, Yu PS (eds) Machine learning in cyber trust. Springer, New York, pp 183–213
31.
Zurück zum Zitat Peng H, Wang J, Wang W (2010) Image watermarking method in multiwavelet domain based on support vector machines. J Syst Softw 83:1470–1477CrossRef Peng H, Wang J, Wang W (2010) Image watermarking method in multiwavelet domain based on support vector machines. J Syst Softw 83:1470–1477CrossRef
32.
Zurück zum Zitat Piao CR, Beack S, Woo D-M, Han S-S (2006) A blind watermarking algorithm based on HVS and RBF neural network for digital image. Lect Notes Comput Sci (LNCS) 4221:493–496CrossRef Piao CR, Beack S, Woo D-M, Han S-S (2006) A blind watermarking algorithm based on HVS and RBF neural network for digital image. Lect Notes Comput Sci (LNCS) 4221:493–496CrossRef
33.
Zurück zum Zitat Qi Z, Tian Y, Shi Y (2012) Laplacian twin support vector machine for semi-supervised classification. Neural Netw 35:46–53CrossRefMATH Qi Z, Tian Y, Shi Y (2012) Laplacian twin support vector machine for semi-supervised classification. Neural Netw 35:46–53CrossRefMATH
34.
Zurück zum Zitat Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Sig Process 92(6):1480–1491CrossRef Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Sig Process 92(6):1480–1491CrossRef
35.
Zurück zum Zitat Sharmila T, Kumar K (2012) Efficient analysis of hybrid direction lifting technique for satellite image denoising. Signal Image Video Process. Springer-Verlag London Limited, ISSN: (2012): 863–1703 Sharmila T, Kumar K (2012) Efficient analysis of hybrid direction lifting technique for satellite image denoising. Signal Image Video Process. Springer-Verlag London Limited, ISSN: (2012): 863–1703
36.
Zurück zum Zitat Shen R, Fu Y, Lu H (2005) A novel image watermarking scheme based on support vector regression. J Syst Softw 78(1):1–8CrossRef Shen R, Fu Y, Lu H (2005) A novel image watermarking scheme based on support vector regression. J Syst Softw 78(1):1–8CrossRef
37.
Zurück zum Zitat Sweldens W (1996) The lifting scheme: a custom design construction of biorthogonal wavelets. Appl Comput Harmonic Anal 3(2):186–200MathSciNetCrossRefMATH Sweldens W (1996) The lifting scheme: a custom design construction of biorthogonal wavelets. Appl Comput Harmonic Anal 3(2):186–200MathSciNetCrossRefMATH
38.
Zurück zum Zitat Tao H, Zain JM, Ahmed N, Hingwu Q (2010) An implementation of digital image watermarking based on particle swarm optimization. CCIS 87:314–320 Tao H, Zain JM, Ahmed N, Hingwu Q (2010) An implementation of digital image watermarking based on particle swarm optimization. CCIS 87:314–320
40.
Zurück zum Zitat Wang J, Peng H, Shi P (2011) An optimal image watermarking approach based on multi-objective genetic algorithm. Inf Sci 181(24):5501–5514CrossRef Wang J, Peng H, Shi P (2011) An optimal image watermarking approach based on multi-objective genetic algorithm. Inf Sci 181(24):5501–5514CrossRef
41.
Zurück zum Zitat Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos based fast image encryption algorithm. Appl Soft Comput 11:514–522CrossRef Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos based fast image encryption algorithm. Appl Soft Comput 11:514–522CrossRef
42.
Zurück zum Zitat Wu L, deng W, Zhang J, He D (2009) Arnold transformation algorithm and anti Arnold transformation algorithm. In: Proceedings of 1st International Conference on Information Science and Engineering (ICISE) 2009. pp 1164–1167 Wu L, deng W, Zhang J, He D (2009) Arnold transformation algorithm and anti Arnold transformation algorithm. In: Proceedings of 1st International Conference on Information Science and Engineering (ICISE) 2009. pp 1164–1167
43.
Metadaten
Titel
Robust image watermarking scheme in lifting wavelet domain using GA-LSVR hybridization
verfasst von
Rajesh Mehta
Navin Rajpal
Virendra P. Vishwakarma
Publikationsdatum
18.01.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Machine Learning and Cybernetics / Ausgabe 1/2018
Print ISSN: 1868-8071
Elektronische ISSN: 1868-808X
DOI
https://doi.org/10.1007/s13042-015-0329-6

Weitere Artikel der Ausgabe 1/2018

International Journal of Machine Learning and Cybernetics 1/2018 Zur Ausgabe

Neuer Inhalt