Abstract
This study proposes a novel method for multipurpose image watermarking for both ownership verification and tampered region localization. Two watermarks (robust and fragile) are inserted into the host image. Robust watermark insertion is done by PSO (particle swarm optimization) optimized scaling of the singular values; utilizing the singular value decomposition (SVD). Doing so, leads to reduction in visibility changes (better imperceptibility) of host image as well as enhanced performance of watermarked image towards attacks (better robustness). Fragile watermark insertion is done by making use of SVD and chaotic sequence (block feature’s dependent). The image is first divided into non overlapped blocks and block based Arnold transformed is performed. Then after, block grouping is done of scrambled blocks to breakdown their independence in order to sustain the vector quantization and collage attacks. The proposed scheme is tested against various signal processing attacks and results shows a good performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Friedman, G.L.: The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans. Consum. Electron. 39(4), 905–910 (1993)
Haouzia, A., Noumeir, R.: Methods for image authentication: a survey. Multimedia Tools Appl. 39(1), 1–46 (2008)
Matsuo, T., Kurosawa, K.: On parallel hash functions based on block-ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87(1), 67–74 (2004)
Ansari, I.A., Pant, M., Neri, F.: Analysis of gray scale watermark in RGB host using SVD and PSO. In: IEEE Symposium on Computational Intelligence for Multimedia, Signal and Vision Processing (CIMSIVP), pp. 1–7 (2014)
Ansari, I.A., Pant, M.: SVD watermarking: particle swarm optimization of scaling factors to increase the quality of watermark. In: Proceedings of Fourth International Conference on Soft Computing for Problem Solving, pp. 205–214. Springer, India (2015)
Kang, Q., Li, K., Chen, H.: An SVD-based fragile watermarking scheme with grouped blocks. In: IEEE 2nd International Conference on Information Technology and Electronic Commerce (ICITEC), pp. 172–179 (2014)
Qi, X., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image Represent. 22(2), 187–200 (2011)
Chemak, C., Bouhlel, M.S., Lapayre, J.C.: A new scheme of robust image watermarking: the double watermarking algorithm. In: Proceedings of the Summer Computer Simulation Conference, pp. 1201–1208 (2007)
Niu, S.Z., Shu, N.F.: A digital image double watermarking algorithm based on DCT domain. J. Comput. Res. Dev. 46(4), 6–10 (2009)
Sharkas, M., ElShafie, D., Hamdy, N.: A dual digital-image watermarking technique. In: Proceedings of International Conference on World Academy of Science, Engineering and Technology, pp. 136–139 (2005)
Wu, K., Yan, W., Du, J.: A robust dual digital-image watermarking technique. In: IEEE International Conference on Computational Intelligence and Security Workshops, pp. 668–671 (2007)
Chen, F., He, H.J., Wang, H.X.: Variable-payload self-recovery watermarking scheme for digital image authentication. Chin. J. Comput. 35(1), 154–162 (2012)
Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–C3506 (2008)
Chamlawi, R., Khan, A., Usman, I.: Authentication and recovery of images using multiple watermarks. Comput. Electr. Eng. 36(3), 578C–584 (2010)
Shen, H., Chen, B.: From single watermark to dual watermark: a new approach for image watermarking. Comput. Electr. Eng. 38, 1310C–1324 (2012)
Song, C.L., Sudirman, S., Merabti, M.: A robust region-adaptive dual image watermarking technique. J. Vis. Commun. Image Represent. 23(3), 549–568 (2012)
Li, C., Wang, Y., Ma, B., et al.: Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput. Stand. Interfaces. 34(4), 367C–379 (2012)
Habib, M., Sarhan, S., Rajab, L.: A robust-fragile dual watermarking system in the DCT domain. In: Proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, pp. 548–553 (2005)
Phadikar, A., Maity, S.P., Mandal, M.: Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images. J. Vis. Commun. Image Represent. 23(3), 454C–466 (2012)
Rawat, S., Raman, B.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU Int. J. Electron. Commun. 65, 840–847 (2011)
Mooney, A., Keating, J.G., Heffernan, D.M.: Performance analysis of chaotic and white watermarks in the presence of common watermark attacks. Chaos Solutions Fractals. 42, 560–570 (2009)
Wu, L., Zhang, J., Deng, W., He, D.: Arnold transformation algorithm and anti-arnold transformation algorithm. In: 1st IEEE International Conference on Information Science and Engineering, pp. 1164–1167 (2009)
Ansari, I.A., Singla, R., Singh, M.: SSVEP and ANN based optimal speller design for brain computer interface. Comput. Sci. Tech. 2(2), 338–349 (2015)
Kant, S., Ansari, I.A.: An improved K means clustering with Atkinson index to classify liver patient dataset. Int. J. Syst. Assur. Eng. Manag. 1–7 (2015). doi:10.1007/s13198-015-0365-3
Eberhart, R., Kennedy, J.: A new optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micro Machine and Human Science, pp. 39–43 (1995)
Kiranyaz, S., Ince, T., Yildirim, A., Gabbouj, M.: Fractional particle swarm optimization in multidimensional search space. IEEE Trans. Syst. Man Cybern. Part B Cybern. 40(2), 298–319 (2010)
Messerschmidt, L., Engelbrecht, A.P.: Learning to play games using a PSO-based competitive learning approach. IEEE Trans. Evol. Comput. 8(3), 280–288 (2004)
Acknowledgments
This work was supported under the framework of international cooperation program managed by National Research Foundation of Korea (NRF-2013K 2A1B9066056).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ansari, I.A., Pant, M., Ahn, C.W., Jeong, J. (2015). PSO Optimized Multipurpose Image Watermarking Using SVD and Chaotic Sequence. In: Gong, M., Linqiang, P., Tao, S., Tang, K., Zhang, X. (eds) Bio-Inspired Computing -- Theories and Applications. BIC-TA 2015. Communications in Computer and Information Science, vol 562. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49014-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-662-49014-3_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-49013-6
Online ISBN: 978-3-662-49014-3
eBook Packages: Computer ScienceComputer Science (R0)