Advertisement

The Evolutionary Computation Video Watermarking Using Quick Response Code Based on Discrete Multiwavelet Transformation

  • Mahasak Ketcham
  • Thittaporn Ganokratanaa
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 265)

Abstract

Nowadays, commercial activity on Internet and media requires a protection by increasing security. The 2D Barcode with a digital watermark is a widely interest research in security field. QR Code with invisible watermark prevents information hiding text. This paper proposes QR Code (Quick Response Code) that is embedded an invisible video watermark by using Discrete Multiwavelet transformation (DMT). We have developed an optimization technique using the genetic algorithm to search for optimal quantization step in order to improve both quality of watermarked video and robustness of the watermark. This technique does not require the original image in the watermark extraction. The experimental results show that the proposed watermarking algorithm yields watermarked image with good imperceptibility and very robust.

Keywords

2D Barcode QR Code Video Watermark Evolutionary Computation (EA) Discrete Multiwavelet Transformation (DMT) Genetic Algorithm (GA) 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    ISO/IEC 18004:2000(E), Information technology Automatic identification and data capture techniques Bar code symbology QR Code (2000)Google Scholar
  3. 3.
    Kwon, K.-R., Tewfik, A.H.: Adaptive watermarking using successive subband quantization and perceptual model based on multiwavelet transform. In: Proc. SPIE- Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 334–348 (2002)Google Scholar
  4. 4.
    Zhang, J., Wang, N., Xiong, F.: Hiding a logo watermark into the multiwavelet domain using neural networks. In: Proc. IEEE ICTAI 2002, pp. 477–482 (2002)Google Scholar
  5. 5.
    Mobasseri, B.G.: A spatial digital video watermark that survives MPEG. In: Proc. Int. Conf. Information Technology: Coding and Computing, Las Vegas, USA, pp. 68–73 (2000)Google Scholar
  6. 6.
    Tsai, H.M., Chang, L.W.: Highly imperceptible video watermarking with the Watson’s DCT-based visual model. In: Proc. IEEE Int. Conf. on Multimedia and Expo, Taipei, Taiwan, pp. 1927–1930 (2004)Google Scholar
  7. 7.
    Ge, Q., Lu, Z., Niu, X.: Oblivious video watermarking scheme with adaptive embedding mechanism. In: Proc. Int. Conf. Machine Learning and Cybernetics, Xian, China, pp. 2876–2881 (2003)Google Scholar
  8. 8.
    Hsu, C.T., Wu, J.L.: A DCT-based watermarking for videos. IEEE Transactions on Consumer Electronics 44(1), 206–216 (1998)CrossRefGoogle Scholar
  9. 9.
    Hong, I., Kim, I., Han, S.S.: A blind watermarking technique using wavelet transform. In: Proc. IEEE Int. Sym. Industrial Electronics, Pusan, Korea, pp. 1946–1950 (2001)Google Scholar
  10. 10.
    Liu, H., Chen, N., Huang, J., Huang, X., Shi, Y.Q.: A robust DWT-based video watermarking algorithm. In: Proc. IEEE Int. Sym. Circuits and Systems, Scottsdale, Arizona, pp. 631–634 (2002)Google Scholar
  11. 11.
    Niu, X., Sun, S., Xiang, W.: Multiresolution watermarking for video based on gray-level digital watermark. IEEE Transcations on Consumer Electronics 46(2), 375–384 (2000)CrossRefGoogle Scholar
  12. 12.
    Joumaa, H., Davoine, F.: Performance of an ICA video watermarking scheme using informed techniques. In: Proc. IEEE Int. Conf. Image Processing, Genoa, Italy, pp. 261–264 (2005)Google Scholar
  13. 13.
    Sun, J., Liu, J.: Data hiding with video independent components. IEEE Electronics Letters 40(14), 858–859 (2004)CrossRefGoogle Scholar
  14. 14.
    Mirza, H.H., Thai, H.D., Nagata, Y., Nakao, Z.: Digital video watermarking based on principal component analysis. In: Proc. Int. Conf. Innovative Computing, Information and Control, Kumamoto, Japan, pp. 290–294 (2007)Google Scholar
  15. 15.
    Kong, W., Yang, B., Wu, D., Niu, X.: SVD based blind video watermarking algorithm. In: Proc. Int. Conf. Innovative Computing, Information and Control, Beijing, China, pp. 265–268 (2006)Google Scholar
  16. 16.
    Attakitmongcol, K., Hardin, D.P., Wilkes, D.M.: Multiwavelet Prefilters II: Optimal Orthogonal Prefilters. IEEE Trans. on Image Processing 10, 1476–1487 (2001)CrossRefGoogle Scholar
  17. 17.
    Kumsawat, P., Pasitwilitham, K., Attakitmongcol, K., Srikaew, A.: An Artificial Intelligent Technique for Robust Digital Watermarking in Multiwavelet Domain. World Academy of Science, Engineering and Technology 60 (2011)Google Scholar
  18. 18.
    Wang, X.Y., Yang, H.Y., Cui, C.Y.: An SVM-Based Robust Digital Image Watermarking Against Desynchronization Attacks. Signal Processing 88(9), 2193–2205 (2008)CrossRefGoogle Scholar
  19. 19.
    Hirakawa, M., Iijima, J.: A Study on Data Management Using Mobile Computing With Digital Watermark Technology. In: International Conference on Service Systems and Service Management, June 8-10, pp. 186–191 (2009)Google Scholar
  20. 20.
    Vongpradhip, S., Rungraungsilp, S.: QR code using invisible watermarking in frequency domain. In: ICT and Knowledge Engineering (ICT & Knowledge Engineering), pp. 47–52 (2012)Google Scholar
  21. 21.
    Pholsomboon, S., Vongpradhip, S.: Rotation, scale, and translation resilient digital watermarking based on complex exponential function. In: TENCON 2004 (2004 IEEE Region 10 Conference), vol. 1, pp. 307–310 (2004)Google Scholar
  22. 22.
    Ketcham, M., Vongprahip, S.: An Algorithm for Intelligent AudioWatermarking Using Genetic Algorithm. In: IEEE Congress on Evolutionary Computation (CEC), Swissôtel The Stamford, Singapore, September 25-28 (2007)Google Scholar
  23. 23.
    Ketcham, M., Vongprahip, S.: Genetic Algorithm Audio Watermarking using Multiple Image-based Watermarks. In: ISCIT (October 2007)Google Scholar
  24. 24.
    Ketcham, M., Vongprahip, S.: Intelligent Audio Watermarking using Genetic Algorithm in DWT Domain. International Journal of Intelligent Technology 2(2) (2007) ISSN 1305-6417Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Information Technology Management, Faculty of Information TechnologyKing Mongkut’s University of Technology North BangkokBangkokThailand
  2. 2.King Mongkut’s University of Technology ThonburiBangkokThailand

Personalised recommendations