Robust Watermarking using Genetic Algorithm in DCT Domain
DOI:
https://doi.org/10.14419/ijet.v7i3.12.17837Published:
2018-07-20Keywords:
Least Significant Bit (LSB), 5th Significant Bit, Discrete Cosine Transform (DCT), Digital WatermarkingAbstract
In this paper, a novel and efficient data hiding using Genetic Algorithm in DCT Domain implemented. Watermarking is an essential zone of research as of late including various applications. It is the investigation of inserting data into the cover picture viz., content, video, and picture (payload) without making measurably huge change the cover picture.
References
[1] R. Anderson, “Information Hiding,†Proceedings of the First International Workshop on Information Hiding, LNCS, vol. 1174, pp. 137-150, Cambridge, U.K., May 1996.
[2] A. Shizaki, J. Tanimoto, and M. Iwata, “A Digital Image Watermarking Scheme Withstanding Malicious Attacks,†IEICE Transaction on Fundamentals of Electronics, Communications and Computers, pp. 2015-2022, October, 2000.
[3] F. Hartung and M. Kutter, “Multimedia Watermarking Techniques,†Proceedings of IEEE, vol. 86, no. 6, pp. 1079-1107, June, 1998.
[4] M. D. Swanson, B. Zu, and A. H. Tewfik, “Robust Data Hiding for Images,†7th IEEE Digital Signal Processing Workshop (DSP 96), pp. 37-40, Loen, Norway, September, 1996.
[5] N.J. Hopper, J. Langford, and L. Ahn, “Provably Secure Steganography,†Proc. of the 22nd Annual International Cryptography Conference, vol. 2442, pp. 77-92, California, U.S.A., August, 2002.
[6] E.J. Delp and R.B. Wolfgang, “A Watermark for Digital Images,†Proc. of International Conference on Image Processing, pp. 219-222, 1996.
[7] W Bender et al, “Techniques for data hiding,†IBM Systems Journal, vol. 35, pp. 313-336, 1996.
[8] R.B. Wolfgang, and E.J. Delp, “A Watermarking Technique for Digital Imagery: Further Studies,†Proc. of the International Conference on Imaging, Systems and Technology, pp. 279-287, USA, 1997.
[9] A. Westfeld and A. Pfitzmann, “Attacks on Steganographic Systems,†Proc. of the 3rd International Workshop on Information Hiding, LNCS, vol. 1768, pp. 61-76, Germany, 1999.
[10] M.S. Hsieh D.C. Tseng, and Y.H. Huang “Hiding Digital Watermarks Using Multiresolution Wavelet Transform,†IEEE Transactions on Industrial Electronics, vol. 48, pp.875-882, 2001.
[11] S. Bhama, H. Singh, and N.D. Phadte, “Parallelism for Faster Implementation of the K-L Transform for Image Compression,†Pattern Recognition Letters, vol. 14, no. 8, pp. 651-659, 1993.
[12] Y.L. Guan and J. Jin, “An Objective Comparison Between Spatial and DCT Watermarking Schemes for MPEG,†Proc. of the International Conference on Information Technology: Coding and Computing, pp. 207- 211, Las Vegas, U.SA.
[13] A.G. Tescher, Transform Image Coding, Academic Press, New York, 1979.
[14] J.R. Hernandez, M. Amado, and F. Perez Gonzalez, “DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and A New Structure,†IEEE Transactions on Image Processing, vol. 9, pp. 55-68, 2000.
[15] P.K. Amin, N. Liu, and. K.P. Subbalakshmi, “Statistically Secure Digital Image Data Hiding,†Proc. of the IEEE 7th Workshop on Multimedia Signal Processing, Shanghai, pp. 1- 4, 2005.
[16] S.A. Khayam, “The Discrete Cosine Transform (DCT): Theory and Application,†ECE 802 – 602: Information Theory and Coding, Michigan State University, March, 2003.
[17] J. Wang and L. Ji, “A Region and Data Hiding Based Error Concealment Scheme for Images,†IEEE Transactions on Consumer Electronics, vol. 47, no. 2, pp. 257-262, 2001.
[18] R.C. Gonzalez and R.E. Woods, Digital Image Processing, Pearson Education, 2004.
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2018-08-18
Published 2018-07-20