Skip to main content

PSO Optimized Multipurpose Image Watermarking Using SVD and Chaotic Sequence

  • Conference paper
  • First Online:
Bio-Inspired Computing -- Theories and Applications (BIC-TA 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 562))

Included in the following conference series:

Abstract

This study proposes a novel method for multipurpose image watermarking for both ownership verification and tampered region localization. Two watermarks (robust and fragile) are inserted into the host image. Robust watermark insertion is done by PSO (particle swarm optimization) optimized scaling of the singular values; utilizing the singular value decomposition (SVD). Doing so, leads to reduction in visibility changes (better imperceptibility) of host image as well as enhanced performance of watermarked image towards attacks (better robustness). Fragile watermark insertion is done by making use of SVD and chaotic sequence (block feature’s dependent). The image is first divided into non overlapped blocks and block based Arnold transformed is performed. Then after, block grouping is done of scrambled blocks to breakdown their independence in order to sustain the vector quantization and collage attacks. The proposed scheme is tested against various signal processing attacks and results shows a good performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Friedman, G.L.: The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans. Consum. Electron. 39(4), 905–910 (1993)

    Article  Google Scholar 

  2. Haouzia, A., Noumeir, R.: Methods for image authentication: a survey. Multimedia Tools Appl. 39(1), 1–46 (2008)

    Article  Google Scholar 

  3. Matsuo, T., Kurosawa, K.: On parallel hash functions based on block-ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87(1), 67–74 (2004)

    Google Scholar 

  4. Ansari, I.A., Pant, M., Neri, F.: Analysis of gray scale watermark in RGB host using SVD and PSO. In: IEEE Symposium on Computational Intelligence for Multimedia, Signal and Vision Processing (CIMSIVP), pp. 1–7 (2014)

    Google Scholar 

  5. Ansari, I.A., Pant, M.: SVD watermarking: particle swarm optimization of scaling factors to increase the quality of watermark. In: Proceedings of Fourth International Conference on Soft Computing for Problem Solving, pp. 205–214. Springer, India (2015)

    Google Scholar 

  6. Kang, Q., Li, K., Chen, H.: An SVD-based fragile watermarking scheme with grouped blocks. In: IEEE 2nd International Conference on Information Technology and Electronic Commerce (ICITEC), pp. 172–179 (2014)

    Google Scholar 

  7. Qi, X., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image Represent. 22(2), 187–200 (2011)

    Article  Google Scholar 

  8. Chemak, C., Bouhlel, M.S., Lapayre, J.C.: A new scheme of robust image watermarking: the double watermarking algorithm. In: Proceedings of the Summer Computer Simulation Conference, pp. 1201–1208 (2007)

    Google Scholar 

  9. Niu, S.Z., Shu, N.F.: A digital image double watermarking algorithm based on DCT domain. J. Comput. Res. Dev. 46(4), 6–10 (2009)

    Google Scholar 

  10. Sharkas, M., ElShafie, D., Hamdy, N.: A dual digital-image watermarking technique. In: Proceedings of International Conference on World Academy of Science, Engineering and Technology, pp. 136–139 (2005)

    Google Scholar 

  11. Wu, K., Yan, W., Du, J.: A robust dual digital-image watermarking technique. In: IEEE International Conference on Computational Intelligence and Security Workshops, pp. 668–671 (2007)

    Google Scholar 

  12. Chen, F., He, H.J., Wang, H.X.: Variable-payload self-recovery watermarking scheme for digital image authentication. Chin. J. Comput. 35(1), 154–162 (2012)

    Article  Google Scholar 

  13. Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–C3506 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  14. Chamlawi, R., Khan, A., Usman, I.: Authentication and recovery of images using multiple watermarks. Comput. Electr. Eng. 36(3), 578C–584 (2010)

    Article  MATH  Google Scholar 

  15. Shen, H., Chen, B.: From single watermark to dual watermark: a new approach for image watermarking. Comput. Electr. Eng. 38, 1310C–1324 (2012)

    Article  Google Scholar 

  16. Song, C.L., Sudirman, S., Merabti, M.: A robust region-adaptive dual image watermarking technique. J. Vis. Commun. Image Represent. 23(3), 549–568 (2012)

    Article  Google Scholar 

  17. Li, C., Wang, Y., Ma, B., et al.: Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput. Stand. Interfaces. 34(4), 367C–379 (2012)

    Article  Google Scholar 

  18. Habib, M., Sarhan, S., Rajab, L.: A robust-fragile dual watermarking system in the DCT domain. In: Proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, pp. 548–553 (2005)

    Google Scholar 

  19. Phadikar, A., Maity, S.P., Mandal, M.: Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images. J. Vis. Commun. Image Represent. 23(3), 454C–466 (2012)

    Article  Google Scholar 

  20. Rawat, S., Raman, B.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU Int. J. Electron. Commun. 65, 840–847 (2011)

    Article  Google Scholar 

  21. Mooney, A., Keating, J.G., Heffernan, D.M.: Performance analysis of chaotic and white watermarks in the presence of common watermark attacks. Chaos Solutions Fractals. 42, 560–570 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  22. Wu, L., Zhang, J., Deng, W., He, D.: Arnold transformation algorithm and anti-arnold transformation algorithm. In: 1st IEEE International Conference on Information Science and Engineering, pp. 1164–1167 (2009)

    Google Scholar 

  23. Ansari, I.A., Singla, R., Singh, M.: SSVEP and ANN based optimal speller design for brain computer interface. Comput. Sci. Tech. 2(2), 338–349 (2015)

    Article  Google Scholar 

  24. Kant, S., Ansari, I.A.: An improved K means clustering with Atkinson index to classify liver patient dataset. Int. J. Syst. Assur. Eng. Manag. 1–7 (2015). doi:10.1007/s13198-015-0365-3

  25. Eberhart, R., Kennedy, J.: A new optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micro Machine and Human Science, pp. 39–43 (1995)

    Google Scholar 

  26. Kiranyaz, S., Ince, T., Yildirim, A., Gabbouj, M.: Fractional particle swarm optimization in multidimensional search space. IEEE Trans. Syst. Man Cybern. Part B Cybern. 40(2), 298–319 (2010)

    Article  Google Scholar 

  27. Messerschmidt, L., Engelbrecht, A.P.: Learning to play games using a PSO-based competitive learning approach. IEEE Trans. Evol. Comput. 8(3), 280–288 (2004)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported under the framework of international cooperation program managed by National Research Foundation of Korea (NRF-2013K 2A1B9066056).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chang Wook Ahn .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ansari, I.A., Pant, M., Ahn, C.W., Jeong, J. (2015). PSO Optimized Multipurpose Image Watermarking Using SVD and Chaotic Sequence. In: Gong, M., Linqiang, P., Tao, S., Tang, K., Zhang, X. (eds) Bio-Inspired Computing -- Theories and Applications. BIC-TA 2015. Communications in Computer and Information Science, vol 562. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49014-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49014-3_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49013-6

  • Online ISBN: 978-3-662-49014-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics