全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform

DOI: 10.4236/jis.2023.144023, PP. 422-436

Keywords: Discrete Wavelet Transform (DWT), Digital Watermarking, Encryption, Genetic Algorithm (GA), Residue Number System (RNS), GARN

Full-Text   Cite this paper   Add to My Lib

Abstract:

Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes.

References

[1]  Yu, X.Y., Wang, C.Y. and Zhou, X. (2018) A Survey on Robust Video Watermarking Algorithms for Copyright Protection. Applied Sciences, 8, Article 1891.
https://doi.org/10.3390/app8101891
[2]  Bertini, F., Rizzo, S.G. and Montesi, D. (2019) Can Information Hiding in Social Media Posts Represent a Threat? IEEE Computer, 52, 52-60.
https://doi.org/10.1109/MC.2019.2917199
[3]  Khanzadi, H., Eshghi, M. and Borujeni, S.E. (2014) Image Encryption Using Random Bit Sequence Based on Chaotic Maps. Arabian Journal for Science and Engineering, 39, 1039-1047.
https://doi.org/10.1007/s13369-013-0713-z
[4]  Verma, V.S. and Jha, R.K. (2015) An Overview of Robust Digital Image Watermarking. IETE Technical Review, 32, 479-496.
https://doi.org/10.1080/02564602.2015.1042927
[5]  Mohanarathinam, A., Kamalraj, S., Prasanna Venkatesan, G.K.D., Ravi, R.V. and Manikandababu, C.S. (2020) Digital Watermarking Techniques for Image Security: A Review. Journal of Ambient Intelligence and Humanized Computing, 11, 3221-3229.
https://doi.org/10.1007/s12652-019-01500-1
[6]  Averkiou, M. (2015) Digital Watermarking. Department of Computer Science University of Cyprus.
https://api.semanticscholar.org/CorpusID:5553428
[7]  Al Embaby, A., Wahby Shalaby, M.A. and Elsayed, K.M. (2020) Digital Watermarking Properties, Classification and Techniques. International Journal of Engineering and Advanced Technology, 9, 2742-2750.
https://doi.org/10.35940/ijeat.C5773.029320
[8]  Baagyere, E.Y., Agbedemnab, P.A., Qin, Z., Daabo, M.I. and Qin, Z.G. (2020) A Multi-Layered Data Encryption and Decryption Scheme Based on Genetic Algorithm and Residual Numbers. IEEE Access, 8, 100438-100447.
https://doi.org/10.1109/ACCESS.2020.2997838
[9]  Yang, J.H., Chang, C.C. and Chen, C.Y. (2004) A High-Speed Division Algorithm in Residue Number System Using Parity-Checking Technique. International Journal of Computer Mathematics, 81, 775-780.
https://doi.org/10.1080/00207160410001708805
[10]  Agbedemnab, P.A.N., Baagyere, E.Y. and Daabo, M.I. (2019) A Novel Text Encryption and Decryption Scheme Using the Genetic Algorithm and Residual Numbers. Kalpa Publications in Computing, 12, 20-31.
[11]  Ram, B. (2013) Digital Image Watermarking Technique Using Discrete Wavelet Transform and Discrete Cosine Transform. International Journal of Science and Research, 10, 1257-1264.
[12]  Debnath, L. and Shah, F.A. (2017) Lecture Notes on Wavelet Transforms. Birkhäuser, Cham.
https://doi.org/10.1007/978-3-319-59433-0
[13]  El Houby, E.M.F. and Yassin, N.I.R. (2020) Wavelet-Hadamard Based Blind Image Watermarking Using Genetic Algorithm and Decision Tree. Multimedia Tools and Applications, 79, 28453-28474.
https://doi.org/10.1007/s11042-020-09333-3
[14]  Mood, N.N. and Konkula, V.S. (2018) A Novel Image Watermarking Scheme Based on Wavelet Transform and Genetic Algorithm. International Journal of Intelligent Engineering and Systems, 11, 251-260.
https://doi.org/10.22266/ijies2018.0630.27
[15]  Prakasa Rao, R.S. and Kumar, P.R. (2017) Digital Signature Based Image Watermarking Using GA and PSO. International Journal of Engineering Research & Technology, 6, 373-380.
https://doi.org/10.17577/IJERTV6IS060208
[16]  Singh, M. and Saxena, A. (2017) Image Watermarking Using Discrete Cosine Transform [DCT] and Genetic Algorithm [GA]. International Journal of Innovation in Engineering Research & Management, 4, 1-13.
[17]  Singh, S.K., Gopi, V.P. and Palanisamy, P. (2014) Image Security Using DES and RNS with Reversible Watermarking. 2014 International Conference on Electronics and Communication Systems (ICECS), Coimbatore, 13-14 February 2014, 1-5.
[18]  Banerjee, S., Chakraborty, S., Dey, N., Pal, A.K. and Ray, R. (2015) High Payload Watermarking Using Residue Number System. International Journal of Image, Graphics and Signal Processing, 7, 1-8.
https://doi.org/10.5815/ijigsp.2015.03.01
[19]  Bhangale, P.P., Gawad, A., Maurya, J. and Raje, R.S. (2017) Image Security Using AES and RNS with Reversible Watermarking. International Journal of Innovation Science, Engineering & Technology, 4, 350-355.
[20]  Maji, S. and Nath, A. (2016) Scope and Issues in α Compositing Technology. International and Issues in Alpha Compositing Technology, 2, 38-43.
[21]  Özkaynak, F. (2017) Role of NPCR and UACI Tests in Security Problems of Chaos Based Image Encryption Algorithms and Possible Solution Proposals. 2017 International Conference on Computer Science and Engineering (UBMK), Antalya, 5-8 October 2017, 621-624.
https://doi.org/10.1109/UBMK.2017.8093481
[22]  Jolfaei, A. and Mirghadri, A. (2010) An Image Encryption Approach Using Chaos and Stream Cipher. Journal of Theoretical and Applied Information Technology, 19, 117-125.
[23]  Loukhaoukha, K., Chouinard, J.Y. and Berdai, A. (2012) A Secure Image Encryption Algorithm Based on Rubik’s Cube Principle. Journal of Electrical and Computer Engineering, 2012, Article ID: 173931.
https://doi.org/10.1155/2012/173931
[24]  Sharma, P. and Swami, S. (2013) Digital Image Watermarking Using 3 Level Discrete Wavelet Transform. Conference on Advances in Communication and Control Systems (CAC2S 2013), 129-133.
https://www.atlantis-press.com/article/6291
[25]  Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S. and Mosavi, M.R. (2014) A Novel Image Encryption Based on Hash Function with Only Two-Round Diffusion Process. Multimedia Systems, 20, 45-64.
https://doi.org/10.1007/s00530-013-0314-4
[26]  Thakur, S., Singh, A.K., Ghrera, S.P. and Mohan, A. (2020) Chaotic Based Secure Watermarking Approach for Medical Images. Multimedia Tools and Applications, 79, 4263-4276.
https://doi.org/10.1007/s11042-018-6691-0

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413