Abstract
This paper mainly comes up with a new watermarking method based on host image analysis and genetic algorithm. Through the characteristics of human visual system, the host image analysis can ensure the imperceptibility. It greatly enhance the embedding capacity of the watermark under the same visual effect, which can embed more watermark in the host image. The genetic algorithm is used in embedding process. It can not only improve the image quality, but also enhance the security and robustness of the watermarked image in a large extent. This algorithm satisfies an optimal compromise between the robustness and image quality. Besides that, the experimental results show that this method has great influence on transparency and robustness.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Botta M, Cavagnino D, Pomponiu V (2014) Fragile watermarking using Karhunen–Loeve transform: the KTL-F approach. Soft Comput. doi:10.1007/s00500-014-1373-y
Castiglione A, Pizzolante R, De Santis A, Carpentieri B, Castiglione A, Palmieri F (2015) Cloud-based adaptive compression and secure management services for 3D healthcare data. Future Gener Comput Syst 1(43):120–134
Catuogno L, Galdi C (2014) On user authentication by means of video events recognition. J Ambient Intell Humaniz Comput 5(6):909–918
Chen Y, Peng L (2009) Optimal image watermark using genetic algorithm and synergetic neural network. In: Second international conference on intelligent computation technology and automation, vol 3, pp 209–212
Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermaking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Das C, Panigrahi D, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU Int J Electron Commun 68(3):244–253
Duymaz E (2012) A novel DCT based digital audio watermarking method. In: Signal processing and communications applications conference, pp 1–4
Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Cluster Comput 16(4):887–903
Esposito C, Ficco M, Palmieri F, Castiglione A (2015) Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory. IEEE Trans Comput. doi:10.1109/TC.2015.2389952
Ficco M, Palmieri F, Castiglione A (2014) Modeling security requirements for cloud-based system development. Pract Exp Concurr Comput. doi:10.1002/cpe.3402
Frédéric L, Bailey K, Leeney M, Curran K (2013) A novel approach to digital watermarking, exploiting colour spaces. Signal Process 93(5):1268–1294
Gen M, Cheng R (1997) Genetic algorithms and engineering design. Wiley, New York
Han J, Kong J, Lu Y, Yang Y, Hou G (2006) A novel color image watermarking method based on genetic algorithm and neural networks. Lect Notes Comput Sci 4234:225–233
Iovane G, Giordano P, Borysenko SD (2011) Image watermarking via wavelet approach and face biometrics. J Ambient Intell Humaniz Comput 2:91–101
Jia S (2014) A novel blind color images watermarking based on SVD. Int J Light Electron Opt 125(12):2868–2874
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proceeding of the 29th IEEE international conference on computer communications, pp 441–445
Lin WH, Horng SJ, Kao TW, Fan PZ (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746–757
Liu Z, Chen X, Yang J, Jia C, You I (2014a) New order preserving encryption model for outsourced databases in cloud environments. J Netw Comput Appl. doi:10.1016/j.jnca.2014.07.00
Liu Z, Li J, Chen X, Yang J, Jia C (2014b) Thin-model data sharing scheme supporting keyword search in cloud storage. In: 19th Australasian conference on information security and privacy (ACISP), vol 8544, pp 115–130
Liu Z, Li J, Li J, Jia C (2014c) SQL-based fuzzy query mechanism over encrypted databases. Int J Data Warehous Min. doi:10.4018/ijdwm.2014100104
Mohanty SP, Guturu P, Kougianos E, Pati N (2006) A novel invisible color image watermarking scheme using image adaptive watermark creation and robust insertion–extraction. In: 8th IEEE international symposium on multimedia, pp 153–160
Panyavaraporn J (2013) Multiple video watermarking algorithm based on wavelet transform. In: 13th international symposium on communications and information technologies, pp 397–401
Pei Q, Wang X, Li Y, Li H (2013) Adaptive reversible watermarking with improved embedding capacity. J Syst Softw 86(11):2841–2848
Pizzolante R (2014) Protection of microscopy images through digital watermarking techniques. In: 2014 international conference on intelligent networking and collaborative systems, pp 65–72
Song J, Song J, Bao Y (2012) A blind digital watermark method based on SVD and chaos. Proc Eng 29:285–289
Tsai HH, Lai YS, Lo SC (2013) A zero-watermark scheme with geometrical invariants using SVM and PSO against geometrical attacks for image protection. J Syst Softw 86(2):335–348
Wang J, Peng H, Shi P (2011) An optimal image watermarking approach based on a multi-objective genetic algorithm. Inf Sci 181(24):5501–5514
Wei Z, Zhao B, Liu B, Su J, Xu L, Xu E (2014) A novel steganography approach for voice over IP. J Ambient Intell Humaniz Comput 5:601–610
Wen X, Zhang H, Xu X, Quan JJ (2009) A new watermarking approach based on probabilistic neural network in wavelet domain. Soft Comput 13:355–360
Wu X, Sun W (2013) Robust copyright protection scheme for digital images using overlapping DCT and SVD. Appl Soft Comput 13(2):1170–1182
Xie W, Wang Y, Sui A (2013) Video watermark based on SVD spread spectrum. In: 3rd international conference on computer science and network technology (ICCSNT), pp 1171–1173
Xu ZJ , Wang ZZ, Lu Q (2011) Research on image watermarking algorithm based on DCT. In: 3rd international conference on environmental science and information application technology, ESIAT 2011, vol 10, pp 1129–1135
Zhang C, Mu G, Chen H, Sun T, Pang L (2014a) Distributed service discovery algorithm based on ant colony algorithm. J Softw 9(1):70–75
Zhang Y, Xu Z, Benxiong H (2014b) Channel capacity analysis of the generalized spread spectrum watermarking in audio signals. Signal Process Lett 22(5):519–523
Zhou W, Jiang G, Yu M, Shao F, Peng Z (2014) Reduced-reference stereoscopic image quality assessment based on view and disparity zero-watermarks. Signal Process Image Commun 29(1):167–176
Acknowledgments
The authors are grateful to the support of the Science Technology Research Foundation of Jilin Provincial Education Department under Grant No. 2015411, Social Science Research of Jilin Province Education Department under Grant No. 2014B035.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Han, J., Zhao, X. & Qiu, C. A digital image watermarking method based on host image analysis and genetic algorithm. J Ambient Intell Human Comput 7, 37–45 (2016). https://doi.org/10.1007/s12652-015-0298-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-015-0298-3