Image Watermarking using Singular Value Decomposition with integration of Particle Swarm Optimization in Discrete wavelet transform

prabhjot kaur bal


This paper proposes an additive watermarking method by using an optimization technique which make use of singular value decomposition (SVD) and makes use of Particle swarm optimization in discrete wavelet domain to enhance the watermarking scheme.SVD based watermarking Is done to provide high capacity. In order to improve the quality of images and to achieve the imperceptibility without losing robustness, an optimal scheme for embedding the secret message derived from PSO. Meanwhile PSO as a popular optimization technique and has been used as a method to balance the imperceptibility and robustness it is because PSO serves the weighting factor inside of embedding process. The proposed technique takes an advantage of Arnold transformations that provide security after successful watermark extraction.DWT is applied on the original image and the value of scaling factors to insert the watermark are obtained using PSO. Result comparisons shows that this algorithm proposed outperforms the additive work as compared to the existing algorithm.


Watermarking; Singular Value Decomposition; Particle Swarm Optimization; Arnold Transformations; Discrete wavelet transform.

Full Text:



M. Arnold, M. Schmucker and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection. ARTECH HOUSE Publications, 2003.

D. C. Lou, H.K. Tso and J.L. Liu, "A copyright protection scheme for digital images using visual cryptography technique,"Journal of Computer Standards and Interfaces, vol. 29, pp. 125-131, 2007.

Anuradha and Rudresh Pratap Sing, “DWT Based Watermarking Algorithm using Haar Wavelet,” International Journal of Electronics and Computer Science Engineering, ISSN 2277-1956/V1N1-01-06.

Lin, W. H., Wang, Y. R., & Horng, S.J., Kao, T. W., & Pan, Y., “A blind watermarking method using maximum wavelet coefficient quantization,” Expert Systems with Applications, 36(9), 11509–11516, 2009.

Yuh-Rau Wang, Wei-Hung Lin and Ling Yang, “An intelligent watermarking method based on particle swarm optimization,” Expert Systems with Applications 38 (2011), 8024–8029.

J. Kennedy, and R. Eberhart, “Particle swarm optimization,” in Proc. IEEE Int. Conf. Neural Networks, Perth, WA, 1995, pp. 1942-1948.

K. Hameed, A. Mumtaz, S. A. M. Gilani, Digital Image Watermarking in the Wavelet Transform Domain, World Academy of Science Engineering and Technology 13, 2006.

P. Meerwald, A. Uhl, A Survey of Wavelet-Domain Watermarking Algorithms. In Proc. of SPIE, Electronics Imaging, Security and Watermarking of Multimedia Contents III, CA, USA 4314, (2001), pp. 505-516.

O. M. Al-Qershi, K. B. Ee, A Comparison Between Block-Based and Non Block-Based Watermarking Schemes based on DWT,Second International Symposium on Electronic Commerce and Security, 2009.

M. Arnold, M. Schmucker and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection. ARTECH HOUSE Publications, 2003.

B. A. Thomas and J. J. Rodriguez, "Wavelet-based color image denoising," in Proc. of International Conference on Image Processing, vol. 2, pp. 804-807, 2000.

E. Vahedi, A. Zoroofi, and M. Shiva, “A new approach for image watermarking by using particle swarm optimization,” vol. 00, no .November, pp. 24–27, 2007.

W. Liao, J. Wang, X. Wang, and J. Wang, “Improved Particle Swarm Optimization Algorithms,” pp. 77–80, 2011.

J. Kennedy, and R. Eberhart, “Particle swarm optimization,” in Proc. IEEE Int. Conf. Neural Networks, Perth, WA, 2008, pp. 1942-1948.

Kaveh Ahmadi, Ahmad Y.Javaid, “An efficient compression based on adaptive thresholding in wavelet domain using particle swarm optimization”, science direct. Image communication, (2015),(33-39).

M. Al-khassaweneh, H. Al-zoubi and S. Aviyente, The multibit watermarking method for speech signals in the time frequency domain, Integrated Computer-Aided Engineering17(1) (2010), 59–67

V. Aslantas, An optimal robust digital image watermarking based on SVD using differential evolution algorithm, Optics Communications 282 2009), 769–77]

L. Jing, F. Liu and B. Liu, Robust Image Watermarking Scheme with General Regression Neural Network and FCM Algorithm, Lecture Notes in Computer Science (2008), 243–250

H. Tao, J.M. Zain and A.N. Abdalla, Particle Swarm Optimization for Digital Image Watermarking, Communications in Computer and Information Science (2010), 1–8

Lien, B. K., & Lin, W. H. (2006). A watermarking method based on maximum distance wavelet tree quantization. In Proceedings of 19th conference computer vision, graphics and image processing (pp. 269–276).

J. Sun, B. Feng, W. Xu, Particle swarm optimization with particles having quantum behavior, in Proceedings of the IEEE Congress on Evolutionary Computation, Portland, Oregon USA, pp. 325-331, 2004.

Ali, Musrrat, and Chang Wook Ahn. “Comments on “Optimized gray-scale image watermarking using DWT-SVD and Firefly Algorithm”." Expert Systems with Applications 42.5 (2015): 2392-2394.

Gokhale, U. M., and Y. V. Joshi. " A semi fragile watermarking algorithm based on SVD-IWT for image authentication." Int. J. Adv. Res. Comput. Commun. Eng 1.4 (2012).

Gupta, Akshya Kumar, and Mehul S. Raval. "A robust and secure watermarking scheme based on singular values replacement." Sadhana 37.4 (2012): 425-440.

Tian, Yuan, et al. "Do singular values contain adequate information for face recognition?." Pattern recognition 36.3 (2003): 649-655.

Ganic, Emir, and Ahmet M. Eskicioglu. "Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition." Journal of electronic imaging 14.4 (2005): 043004-043004.

Liu, Shao-Hui, et al. "An image fragile watermark scheme based on chaotic image pattern and pixel-pairs." Applied Mathematics and Computation 185.2 (2007): 869-882.

Bhatnagar, Gaurav, and Balasubramanian Raman. "A new robust reference watermarking scheme based on DWT-SVD." Computer Standards & Interfaces 31.5 (2009): 1002-1013.

] Lagzian, Samira, Mohsen Soryani, and Mahmood Fathy. "A new robust watermarking scheme based on RDWT-SVD." International Journal of Intelligent Information Processing 2.1 (2011): 22-29.

Haouzia, Adil, and Rita Noumeir. "Methods for image authentication: a survey." Multimedia tools and applications 39.1 (2008): 1-46.

Yadav, Upasana, et al. "Different Watermarking Techniques & its Applications: A Review." International Journal Of Scientific And Engineering Research 5.4 (2014).



  • There are currently no refbacks.

Copyright (c) 2017 International Journal of Advanced Research in Computer Science