Robust Watermarking using Genetic Algorithm in DCT Domain
Keywords:Least Significant Bit (LSB), 5th Significant Bit, Discrete Cosine Transform (DCT), Digital Watermarking
In this paper, a novel and efficient data hiding using Genetic Algorithm in DCT Domain implemented. Watermarking is an essential zone of research as of late including various applications. It is the investigation of inserting data into the cover picture viz., content, video, and picture (payload) without making measurably huge change the cover picture.
 R. Anderson, â€œInformation Hiding,â€ Proceedings of the First International Workshop on Information Hiding, LNCS, vol. 1174, pp. 137-150, Cambridge, U.K., May 1996.
 A. Shizaki, J. Tanimoto, and M. Iwata, â€œA Digital Image Watermarking Scheme Withstanding Malicious Attacks,â€ IEICE Transaction on Fundamentals of Electronics, Communications and Computers, pp. 2015-2022, October, 2000.
 F. Hartung and M. Kutter, â€œMultimedia Watermarking Techniques,â€ Proceedings of IEEE, vol. 86, no. 6, pp. 1079-1107, June, 1998.
 M. D. Swanson, B. Zu, and A. H. Tewfik, â€œRobust Data Hiding for Images,â€ 7th IEEE Digital Signal Processing Workshop (DSP 96), pp. 37-40, Loen, Norway, September, 1996.
 N.J. Hopper, J. Langford, and L. Ahn, â€œProvably Secure Steganography,â€ Proc. of the 22nd Annual International Cryptography Conference, vol. 2442, pp. 77-92, California, U.S.A., August, 2002.
 E.J. Delp and R.B. Wolfgang, â€œA Watermark for Digital Images,â€ Proc. of International Conference on Image Processing, pp. 219-222, 1996.
 W Bender et al, â€œTechniques for data hiding,â€ IBM Systems Journal, vol. 35, pp. 313-336, 1996.
 R.B. Wolfgang, and E.J. Delp, â€œA Watermarking Technique for Digital Imagery: Further Studies,â€ Proc. of the International Conference on Imaging, Systems and Technology, pp. 279-287, USA, 1997.
 A. Westfeld and A. Pfitzmann, â€œAttacks on Steganographic Systems,â€ Proc. of the 3rd International Workshop on Information Hiding, LNCS, vol. 1768, pp. 61-76, Germany, 1999.
 M.S. Hsieh D.C. Tseng, and Y.H. Huang â€œHiding Digital Watermarks Using Multiresolution Wavelet Transform,â€ IEEE Transactions on Industrial Electronics, vol. 48, pp.875-882, 2001.
 S. Bhama, H. Singh, and N.D. Phadte, â€œParallelism for Faster Implementation of the K-L Transform for Image Compression,â€ Pattern Recognition Letters, vol. 14, no. 8, pp. 651-659, 1993.
 Y.L. Guan and J. Jin, â€œAn Objective Comparison Between Spatial and DCT Watermarking Schemes for MPEG,â€ Proc. of the International Conference on Information Technology: Coding and Computing, pp. 207- 211, Las Vegas, U.SA.
 A.G. Tescher, Transform Image Coding, Academic Press, New York, 1979.
 J.R. Hernandez, M. Amado, and F. Perez Gonzalez, â€œDCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and A New Structure,â€ IEEE Transactions on Image Processing, vol. 9, pp. 55-68, 2000.
 P.K. Amin, N. Liu, and. K.P. Subbalakshmi, â€œStatistically Secure Digital Image Data Hiding,â€ Proc. of the IEEE 7th Workshop on Multimedia Signal Processing, Shanghai, pp. 1- 4, 2005.
 S.A. Khayam, â€œThe Discrete Cosine Transform (DCT): Theory and Application,â€ ECE 802 â€“ 602: Information Theory and Coding, Michigan State University, March, 2003.
 J. Wang and L. Ji, â€œA Region and Data Hiding Based Error Concealment Scheme for Images,â€ IEEE Transactions on Consumer Electronics, vol. 47, no. 2, pp. 257-262, 2001.
 R.C. Gonzalez and R.E. Woods, Digital Image Processing, Pearson Education, 2004.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).