Advertisement

Genetic Algorithm-Based Watermarking in Discrete Wavelet Transform Domain

  • Dongeun Lee
  • Taekyung Kim
  • Seongwon Lee
  • Joonki Paik
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4113)

Abstract

This paper presents a watermarking algorithm in the discrete wavelet transform domain using evolutionary algorithm. The proposed algorithm consists of wavelet-domain watermark insertion and genetic algorithm-based watermark extraction. More specifically watermark is inserted to the low-frequency region of wavelet transform domain, and watermark extraction is efficiently performed by using the evolutionary algorithm. The proposed watermarking algorithm is robust against various attacks such as JPEG image compression and geometric transformations.

Keywords

Genetic Algorithm Normalize Corre Watermark Image JPEG Compression Watermark Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kang, X., Huang, J., Shi, Y., Lin, Y.: A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression. IEEE Trans. Circuits, Systems for Video Technology 13, 776–786 (2003)CrossRefGoogle Scholar
  2. 2.
    Pereira, S., Pun, T.: Robust Template Matching for Affine Resistant Image Watermarking. IEEE Trans. Image Processing 9, 1123–1129 (2000)CrossRefGoogle Scholar
  3. 3.
    Reddy, A.A., Chatterji, B.N.: A New Wavelet-Based Logo-Watermarking Scheme. Pattern Recognition Letters 26, 1019–1027 (2005)CrossRefGoogle Scholar
  4. 4.
    Dawei, Z.L., Guanrong, C., Wenbo, L.: A Chaos-Based Robust Wavelet-Domain Watermarking Algorithm. Chaos, Solitons & Fractals 22, 47–54 (2004)MATHCrossRefGoogle Scholar
  5. 5.
    Deguillaume, F., Voloshynovskiy, S., Pun, T.: A Method for the Estimation and Recovering from General Affine Transform in Digital Watermarking Applications. In: Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 313–322. SPIE (2002)Google Scholar
  6. 6.
    Dugelay, J.L., Petitcolas, F.A.P.: Possible Counter-Attackers Against Random Geometric Distortions. In: Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 338–345. SPIE (2002)Google Scholar
  7. 7.
    Braudaway, G.W., Minter, F.: Automatic Recovery of Invisible Image Watermarks from Geometrically Distorted Images. In: Security and watermarking of multimedia contents I, vol. 3971, pp. 74–81. SPIE (2000)Google Scholar
  8. 8.
    Kang, X., Huang, J., Shi, Y.: An image watermarking algorithm robust to geometric distortion. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 212–223. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  9. 9.
    Ali, F.F., Nakao, Z., Chen, Y.W.: An Evolutionary Approach for Graph Coloring. In: IEEE SMC Conf., vol. 5, pp. 524–532 (1999)Google Scholar
  10. 10.
    Oh, W., Kim, H.: The Watermarking Evaluation and Certification Technique of Image. Telecommunications Technology Association 90, 95–103 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Dongeun Lee
    • 1
  • Taekyung Kim
    • 1
  • Seongwon Lee
    • 2
  • Joonki Paik
    • 1
  1. 1.Image Processing and Intelligent Systems Laboratory, Department of Image Engineering, Graduate School of Advanced Imaging Science, Multimedia, and FilmChung-Ang UniversitySeoulKorea
  2. 2.Department of Computer Engineering, College of Electronics and InformationKwangwoon UniversitySeoulKorea

Personalised recommendations