Image Watermarking using Singular Value Decomposition with integration of Particle Swarm Optimization in Discrete wavelet transform
Abstract
Keywords
Full Text:
PDFReferences
M. Arnold, M. Schmucker and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection. ARTECH HOUSE Publications, 2003.
D. C. Lou, H.K. Tso and J.L. Liu, "A copyright protection scheme for digital images using visual cryptography technique,"Journal of Computer Standards and Interfaces, vol. 29, pp. 125-131, 2007.
Anuradha and Rudresh Pratap Sing, “DWT Based Watermarking Algorithm using Haar Wavelet,” International Journal of Electronics and Computer Science Engineering, ISSN 2277-1956/V1N1-01-06.
Lin, W. H., Wang, Y. R., & Horng, S.J., Kao, T. W., & Pan, Y., “A blind watermarking method using maximum wavelet coefficient quantization,” Expert Systems with Applications, 36(9), 11509–11516, 2009.
Yuh-Rau Wang, Wei-Hung Lin and Ling Yang, “An intelligent watermarking method based on particle swarm optimization,” Expert Systems with Applications 38 (2011), 8024–8029.
J. Kennedy, and R. Eberhart, “Particle swarm optimization,” in Proc. IEEE Int. Conf. Neural Networks, Perth, WA, 1995, pp. 1942-1948.
K. Hameed, A. Mumtaz, S. A. M. Gilani, Digital Image Watermarking in the Wavelet Transform Domain, World Academy of Science Engineering and Technology 13, 2006.
P. Meerwald, A. Uhl, A Survey of Wavelet-Domain Watermarking Algorithms. In Proc. of SPIE, Electronics Imaging, Security and Watermarking of Multimedia Contents III, CA, USA 4314, (2001), pp. 505-516.
O. M. Al-Qershi, K. B. Ee, A Comparison Between Block-Based and Non Block-Based Watermarking Schemes based on DWT,Second International Symposium on Electronic Commerce and Security, 2009.
M. Arnold, M. Schmucker and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection. ARTECH HOUSE Publications, 2003.
B. A. Thomas and J. J. Rodriguez, "Wavelet-based color image denoising," in Proc. of International Conference on Image Processing, vol. 2, pp. 804-807, 2000.
E. Vahedi, A. Zoroofi, and M. Shiva, “A new approach for image watermarking by using particle swarm optimization,” vol. 00, no .November, pp. 24–27, 2007.
W. Liao, J. Wang, X. Wang, and J. Wang, “Improved Particle Swarm Optimization Algorithms,” pp. 77–80, 2011.
J. Kennedy, and R. Eberhart, “Particle swarm optimization,” in Proc. IEEE Int. Conf. Neural Networks, Perth, WA, 2008, pp. 1942-1948.
Kaveh Ahmadi, Ahmad Y.Javaid, “An efficient compression based on adaptive thresholding in wavelet domain using particle swarm optimization”, science direct. Image communication, (2015),(33-39).
M. Al-khassaweneh, H. Al-zoubi and S. Aviyente, The multibit watermarking method for speech signals in the time frequency domain, Integrated Computer-Aided Engineering17(1) (2010), 59–67
V. Aslantas, An optimal robust digital image watermarking based on SVD using differential evolution algorithm, Optics Communications 282 2009), 769–77]
L. Jing, F. Liu and B. Liu, Robust Image Watermarking Scheme with General Regression Neural Network and FCM Algorithm, Lecture Notes in Computer Science (2008), 243–250
H. Tao, J.M. Zain and A.N. Abdalla, Particle Swarm Optimization for Digital Image Watermarking, Communications in Computer and Information Science (2010), 1–8
Lien, B. K., & Lin, W. H. (2006). A watermarking method based on maximum distance wavelet tree quantization. In Proceedings of 19th conference computer vision, graphics and image processing (pp. 269–276).
J. Sun, B. Feng, W. Xu, Particle swarm optimization with particles having quantum behavior, in Proceedings of the IEEE Congress on Evolutionary Computation, Portland, Oregon USA, pp. 325-331, 2004.
Ali, Musrrat, and Chang Wook Ahn. “Comments on “Optimized gray-scale image watermarking using DWT-SVD and Firefly Algorithm”." Expert Systems with Applications 42.5 (2015): 2392-2394.
Gokhale, U. M., and Y. V. Joshi. " A semi fragile watermarking algorithm based on SVD-IWT for image authentication." Int. J. Adv. Res. Comput. Commun. Eng 1.4 (2012).
Gupta, Akshya Kumar, and Mehul S. Raval. "A robust and secure watermarking scheme based on singular values replacement." Sadhana 37.4 (2012): 425-440.
Tian, Yuan, et al. "Do singular values contain adequate information for face recognition?." Pattern recognition 36.3 (2003): 649-655.
Ganic, Emir, and Ahmet M. Eskicioglu. "Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition." Journal of electronic imaging 14.4 (2005): 043004-043004.
Liu, Shao-Hui, et al. "An image fragile watermark scheme based on chaotic image pattern and pixel-pairs." Applied Mathematics and Computation 185.2 (2007): 869-882.
Bhatnagar, Gaurav, and Balasubramanian Raman. "A new robust reference watermarking scheme based on DWT-SVD." Computer Standards & Interfaces 31.5 (2009): 1002-1013.
] Lagzian, Samira, Mohsen Soryani, and Mahmood Fathy. "A new robust watermarking scheme based on RDWT-SVD." International Journal of Intelligent Information Processing 2.1 (2011): 22-29.
Haouzia, Adil, and Rita Noumeir. "Methods for image authentication: a survey." Multimedia tools and applications 39.1 (2008): 1-46.
Yadav, Upasana, et al. "Different Watermarking Techniques & its Applications: A Review." International Journal Of Scientific And Engineering Research 5.4 (2014).
DOI: https://doi.org/10.26483/ijarcs.v8i5.3897
Refbacks
- There are currently no refbacks.
Copyright (c) 2017 International Journal of Advanced Research in Computer Science

