Robust Watermarking using Genetic Algorithm in DCT Domain

  • Authors

    • Raj Vikram Singh
    • Subodh Waria
    • Rajiv Kumar Singh
    • Harsh Vikram Singh
    2018-07-20
    https://doi.org/10.14419/ijet.v7i3.12.17837
  • Least Significant Bit (LSB), 5th Significant Bit, Discrete Cosine Transform (DCT), Digital Watermarking
  • In this paper, a novel and efficient data hiding using Genetic Algorithm in DCT Domain implemented. Watermarking is an essential zone of research as of late including various applications. It is the investigation of inserting data into the cover picture viz., content, video, and picture (payload) without making measurably huge change the cover picture.

     

     

  • References

    1. [1] R. Anderson, “Information Hiding,†Proceedings of the First International Workshop on Information Hiding, LNCS, vol. 1174, pp. 137-150, Cambridge, U.K., May 1996.

      [2] A. Shizaki, J. Tanimoto, and M. Iwata, “A Digital Image Watermarking Scheme Withstanding Malicious Attacks,†IEICE Transaction on Fundamentals of Electronics, Communications and Computers, pp. 2015-2022, October, 2000.

      [3] F. Hartung and M. Kutter, “Multimedia Watermarking Techniques,†Proceedings of IEEE, vol. 86, no. 6, pp. 1079-1107, June, 1998.

      [4] M. D. Swanson, B. Zu, and A. H. Tewfik, “Robust Data Hiding for Images,†7th IEEE Digital Signal Processing Workshop (DSP 96), pp. 37-40, Loen, Norway, September, 1996.

      [5] N.J. Hopper, J. Langford, and L. Ahn, “Provably Secure Steganography,†Proc. of the 22nd Annual International Cryptography Conference, vol. 2442, pp. 77-92, California, U.S.A., August, 2002.

      [6] E.J. Delp and R.B. Wolfgang, “A Watermark for Digital Images,†Proc. of International Conference on Image Processing, pp. 219-222, 1996.

      [7] W Bender et al, “Techniques for data hiding,†IBM Systems Journal, vol. 35, pp. 313-336, 1996.

      [8] R.B. Wolfgang, and E.J. Delp, “A Watermarking Technique for Digital Imagery: Further Studies,†Proc. of the International Conference on Imaging, Systems and Technology, pp. 279-287, USA, 1997.

      [9] A. Westfeld and A. Pfitzmann, “Attacks on Steganographic Systems,†Proc. of the 3rd International Workshop on Information Hiding, LNCS, vol. 1768, pp. 61-76, Germany, 1999.

      [10] M.S. Hsieh D.C. Tseng, and Y.H. Huang “Hiding Digital Watermarks Using Multiresolution Wavelet Transform,†IEEE Transactions on Industrial Electronics, vol. 48, pp.875-882, 2001.

      [11] S. Bhama, H. Singh, and N.D. Phadte, “Parallelism for Faster Implementation of the K-L Transform for Image Compression,†Pattern Recognition Letters, vol. 14, no. 8, pp. 651-659, 1993.

      [12] Y.L. Guan and J. Jin, “An Objective Comparison Between Spatial and DCT Watermarking Schemes for MPEG,†Proc. of the International Conference on Information Technology: Coding and Computing, pp. 207- 211, Las Vegas, U.SA.

      [13] A.G. Tescher, Transform Image Coding, Academic Press, New York, 1979.

      [14] J.R. Hernandez, M. Amado, and F. Perez Gonzalez, “DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and A New Structure,†IEEE Transactions on Image Processing, vol. 9, pp. 55-68, 2000.

      [15] P.K. Amin, N. Liu, and. K.P. Subbalakshmi, “Statistically Secure Digital Image Data Hiding,†Proc. of the IEEE 7th Workshop on Multimedia Signal Processing, Shanghai, pp. 1- 4, 2005.

      [16] S.A. Khayam, “The Discrete Cosine Transform (DCT): Theory and Application,†ECE 802 – 602: Information Theory and Coding, Michigan State University, March, 2003.

      [17] J. Wang and L. Ji, “A Region and Data Hiding Based Error Concealment Scheme for Images,†IEEE Transactions on Consumer Electronics, vol. 47, no. 2, pp. 257-262, 2001.

      [18] R.C. Gonzalez and R.E. Woods, Digital Image Processing, Pearson Education, 2004.

  • Downloads

  • How to Cite

    Vikram Singh, R., Waria, S., Kumar Singh, R., & Vikram Singh, H. (2018). Robust Watermarking using Genetic Algorithm in DCT Domain. International Journal of Engineering & Technology, 7(3.12), 1202-1204. https://doi.org/10.14419/ijet.v7i3.12.17837