Advertisement

Cuckoo Search Algorithm for the Selection of Optimal Scaling Factors in Image Watermarking

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 258)

Abstract

This paper introduces the application of an evolutionary algorithm, called the cuckoo search (CS), in finding the optimal scaling factors in digital image watermarking to improve robustness and imperceptibility. It is the first application of the cuckoo search technique to the image watermarking problem. The basic idea is to treat digital image watermarking as an optimization problem and then solve it using CS. Apply one-level redundant discrete wavelet transform (RDWT) to the cover image then the singular values of all sub bands are modified by embedding the watermark multiplied by scaling factors. The scaling factors are optimized using the cuckoo search algorithm to obtain the highest possible robustness without compromising with quality. To investigate the robustness of the scheme several attacks are applied to seriously distort the watermarked image. Empirical analysis of the results has demonstrated the efficiency of the proposed technique.

Keywords

Redundant discrete wavelet transform Singular value decomposition Cuckoo search algorithm Optimized scaling factors 

References

  1. 1.
    Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Sig. Process. 66(3), 385–403 (1998)CrossRefMATHGoogle Scholar
  2. 2.
    Liu, J.-C., Chen, S.-Y.: Fast two-layer image watermarking without referring to the original image and watermark. Image Vis. Comput. 19(14), 1083–1097 (2001)CrossRefGoogle Scholar
  3. 3.
    Lin, S.D., Shie, S.-C., Guo, J.Y.: Improving the robustness of DCT-based image watermarking against JPEG compression. Comput. Stand. Interfaces 32, 54–60 (2010)CrossRefGoogle Scholar
  4. 4.
    Phadikar, A., Maity, S.P., Verma, B.: Region based QIM digital watermarking scheme for image database in DCT domain. Comput. Electr. Eng. 37, 339–355 (2011)CrossRefMATHGoogle Scholar
  5. 5.
    Wu, X., Sun, W.: Robust copyright protection scheme for digital images using overlapping DCT and SVD. Appl. Soft Comput. 13(2), 1170–1182 (2013)CrossRefGoogle Scholar
  6. 6.
    Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia 4(1), 121–128 (2002)CrossRefGoogle Scholar
  7. 7.
    Mohammad, A.A., Alhaj, A., Shaltaf, S.: An improved SVD-based watermarking scheme for protecting rightful ownership. Sig. Process. 88(9), 2158–2180 (2008)CrossRefMATHGoogle Scholar
  8. 8.
    Lu, W., Lu, H., Chung, F.-L.: Feature based robust watermarking using image normalization. Comput. Electr. Eng. 36, 2–18 (2010)CrossRefMATHGoogle Scholar
  9. 9.
    Rawat, S., Raman, B.: A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Sig. Process. 92(6), 1480–1491 (2012)CrossRefGoogle Scholar
  10. 10.
    Run, R.-S., Horng, S.-J., Lai, J.-L., Kao, T.-W., Chen, R.-J.: An improved SVD-based watermarking technique for copyright protection. Expert Syst. Appl. 39, 673–689 (2012)CrossRefGoogle Scholar
  11. 11.
    Ouhsain, M., Hamza, A.B.: Image watermarking scheme using nonnegative matrix factorization and wavelet transform. Expert Syst. Appl. 36(2), 2123–2129 (2009)CrossRefGoogle Scholar
  12. 12.
    Ganic, E., Eskicioglu, A.M.: Robust DWT-SVD domain image watermarking: embedding data in all frequencies. In: Proceedings of the ACM Multimedia and Security Workshop, pp. 166–174 (2004)Google Scholar
  13. 13.
    Song, C., Sudirman, S., Merabti, M.: A robust region-adaptive dual image watermarking technique. J. Vis. Commun. Image R. 23, 549–568 (2012)CrossRefGoogle Scholar
  14. 14.
    Bhatnagar, G., Wu, J.Q.M.: Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform. Future Gener. Comput. Syst. 29(1), 182–195 (2013)CrossRefMathSciNetGoogle Scholar
  15. 15.
    Makbol, N.M., Khoo, B.E.: Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. Int. J. Electron. Commun. (AEÜ) 65, 658–663 (2012). http://dx.doi.org/10.1016/j.aeue.2012.06.008 Google Scholar
  16. 16.
    Rastegar, S., Namazi, F., Yaghmaie, K., Aliabadian, A.: Hybrid watermarking algorithm based on singular value decomposition and radon transform. Int. J. Electron. Commun. (AEU) 65, 658–663 (2011)CrossRefGoogle Scholar
  17. 17.
    Lai, C.C.: A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digit. Sig. Process. 21, 522–527 (2011)CrossRefGoogle Scholar
  18. 18.
    Maity, S.P., Maity, S., Sil, J., Delpha, C.: Collusion resilient spread spectrum watermarking in M-band wavelets using, GA-fuzzy hybridization. J. Syst. Softw. 86(1), 47–59 (2013)CrossRefGoogle Scholar
  19. 19.
    Vahedi, E., Zoroofi, R.A., Shiva, M.: Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles. Digit. Sig. Process. 22, 153–162 (2012)CrossRefGoogle Scholar
  20. 20.
    Tsai, H.-H., Jhuang, Y.-J., Lai, Y.-S.: An SVD-based image watermarking in wavelet domain using SVR and PSO. Appl. Soft Comput. 12(8), 2242–2453 (2012)Google Scholar
  21. 21.
    Tsai, H.-H., Lai, Y.-S., Lo, S.-C.: A zero-watermark scheme with geometrical invariants using SVM and PSO against geometrical attacks for image protection. J. Syst. Softw. 86(2), 335–348 (2013)CrossRefGoogle Scholar
  22. 22.
    Wang, Y.-R., Lin, W.-H., Yang, L.: An intelligent watermarking method based on particle swarm optimization. Expert Syst. Appl. 38(7), 8024–8029 (2011)CrossRefGoogle Scholar
  23. 23.
    Aslantas, V.: An optimal robust digital image watermarking based on SVD using differential evolution algorithm. Opt. Commun. 282, 769–777 (2009)CrossRefGoogle Scholar
  24. 24.
    Yang, X.S., Deb, S.: Cuckoo search via levey flights. In: Proceedings of World Congress on Nature and Biologically Inspired Computing’ NABIC-2009, pp. 210–214 (2009)Google Scholar
  25. 25.
    Yang, X.S., Deb, S.: Engineering optimisation by Cuckoo search. Int. J. Math. Model. Numer. Optim. 1(4), 330–343 (2010)MATHGoogle Scholar
  26. 26.
    Bhargava, V., Fateen, S.E.K., Bonilla-Petriciolet, A.: Cuckoo search: a new nature-inspired optimization method for phase equilibrium calculations. Fluid Phase Equilib. 337, 191–200 (2013)CrossRefGoogle Scholar
  27. 27.
    Gandomi, A.H., Yang, X.S., Alavi, A.H.: Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems. Eng. Comput. 29, 17–35 (2013)CrossRefGoogle Scholar
  28. 28.
    Bulatović, R.R., Đorđević, S.R., Đorđević, V.S.: Cuckoo search algorithm: a metaheuristic approach to solving the problem of optimum synthesis of a six-bar double dwell linkage. Mech. Mach. Theory 61, 1–13 (2013)CrossRefGoogle Scholar
  29. 29.
    Yildiz, A.R.: Cuckoo search algorithm for the selection of optimal machining parameters in milling operations. Int. J. Adv. Manuf. Technol. 64, 55–61 (2013)CrossRefGoogle Scholar
  30. 30.
    Valian, E., Tavakoli, S., Mohanna, S., Haghi, A.: Improved cuckoo search for reliability optimization problems. Comput. Ind. Eng. 64, 459–468 (2013)CrossRefGoogle Scholar
  31. 31.
    Moravej, Z., Akhlaghi, A.: A novel approach based on cuckoo search for DG allocation in distribution network. Electr. Power Energy Syst. 44, 672–679 (2013)CrossRefGoogle Scholar
  32. 32.
    Mantegna, R.N.: Fast, accurate algorithm for numerical simulation of Levy stable stochastic processes. Phys. Rev. 49, 4677–4683 (1994)Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringSungkyunkwan UniversitySuwonRepublic of Korea
  2. 2.Department of Applied Sciences and EngineeringIIT RoorkeeRoorkeeIndia

Personalised recommendations