Professional Documents
Culture Documents
Abstract
1. INTRODUCTION
Digital watermarking is one of the several protection processes embed secret infor-
mation. The necessity for digital image copyright protection methods has turned into
an essential substance in multimedia applications because of the fast development of
illegal access and propagation of original digital objects like sound, video, and imag-
es. Embedding information in an agile and reliable way has lead to the application of
frequency domain techniques like discrete cosine or the discrete wavelet transforms.
Robust watermarking in spatial domain can be obtained at the cost of explicitly
demonstrating the local image characteristics. However, these highlights can be
achieved with much ease in the frequency domain.
The two main properties – robustness and imperceptibility are funda-
mental in saving the security of images from unauthorized access. The capacity to
detect the watermark of the image after use of standard signal processing distortions is
known as robustness. The decision of amplification factors can be shown as an opti-
2
mization problem and deal with using Genetic Algorithm. M. Ketcham et al., [9] have
proposed an original DWT watermarking scheme given Genetic Algorithms for audio
signs. The optimal localization and intensity were obtained using GA and the strategy
was discovered robust against editing, low pass filter and additive noise. Ali Al-Haj et
al. [11]
To illustrate an imperceptible and robust digital image watermarking
scheme based on a combination of DWT and DCT. Thus, Franco et al.[5], gave a
DWT based method for evaluation of fidelity and robustness. These algorithms were
equipped for separating the watermark. However, experienced the issues of unsuitable
values of loyalty and robustness to different attacks concentrated in these papers.
Zhicheng Wei et. al. [10] proposed an algorithm that yielded a watermark that is faint
to human eyes and robust to different image controls, and the outcomes demonstrated
that closed some particular areas were the best choice for embedding the watermark.
The authors applied GA to train the frequency set for inserting the watermark and
compared their approach and the Cox's method [8] to demonstrate robustness. The
analysis of GA was limited to JPEG compression attack in this technique. In [9], offer
a scheme that does not require the original image because the neural network memo-
rized the data from the shape particular points of the original image. This system ap-
plies the shape specific point's technique and highlights point matching method by
genetic algorithm for opposing geometric attacks. In [7] proposed another flexible and
efficient evaluation instrument based on genetic algorithms to test the robustness of
digital image watermarking techniques. Given an arrangement of possible attacks, the
method finds the ideal un-watermarked image regarding Weighted Peak Signal to
Noise Ratio (WPSNR). [11] Proposed an inventive watermarking scheme based on
genetic algorithms (GA) in the transform domain considering the watermarked image
quality.
In this paper, GWO is utilized to adaptively optimize the watermark vis-
ibility factor at each chosen DWT sub-band that will enhance the intangibility and
robustness of the watermark. The proposed technique uses the standardized correla-
tion of the cover image and the watermarked images as the reason for evaluating the
fitness function. The fitness function fills in as the objective function that will be
streamlined and looks through the population comprising of appropriate embedding
locations of the watermark within the cover image.
The innovation of the DWT algorithm lives in the manner the robustness and the im-
perceptibility is enhanced the watermark image [5]. The significant goal of the wave-
let transform is to deteriorate the input image hierarchically into a progression of suc-
cessive low-frequency sub bands and their related definite sub bands.
The low-frequency sub band and the point by point sub-bands contain
the data required to remake the low-frequency approximation at the following higher
resolution level [9]. Wavelet techniques give such sort of a superb space and frequen-
3
cy energy compaction and thus DWT has received a mind-boggling enthusiasm for a
several signal and image processing applications.
The watermark amplification factor is modulated based on the local im-
age attributes, in a pixel by pixel way. A significant portion of the DWT based wa-
termarking concepts concentrates on the sub-bands or block-based techniques, while,
here the watermark amplification factor is balanced pixel-wise. As an outcome, the
grey- level sensibility, iso-frequency masking, non-isofrequency masking, noise sen-
sibility and so on, are considered [5]. Because of the superb spatial-frequency locali-
zation property of DWT, it is easier to recognize the image areas in which, an disturb
can be hidden more probable [2]. Rather than the DFT/DCT watermarking tech-
niques, if a DWT coefficient is adjusted, only the area of the image corresponding to
that factor will be modified.
Let the image to be watermarked, initially decomposed through DWT into two levels.
Where 𝐵𝑙𝑥 denote the sub-band at level = 0,1,2,3 and the orientation x {0, 1, 2,3} as
shown in Fig.1.
The watermark is inserted into the three detail bands at level 0 by modifying the
wavelet coefficients. The choice of adding the watermark into this standard is based
on experimental tests such that the robustness and invisibility are compromised. The
result of insertion is weak, resulting in low robustness, but given the partial visibility
of disturbs added, a higher watermark amplification factor is allowed thus compensat-
ing for the high fragility.
The watermark information of dimension M x N is converted into uni-
dimensional antipodal sequenced(i,j) {+1,-1}, where M and N represent the num-
ber of rows and columns. The image is partitioned into 2-levels and all the acquired
wavelet coefficients at the chosen subband are divided into n segments such that n =
MN.
I={H,V,D}
Here H, V and D refer to the horizontal, vertical and diagonal wavelets respective-
ly[12]. The DWT of a function of size M X N is then
4
M 1 N 1
1
( j0 , m, n)
MN
f ( x, y)
x 0 y 0
j0 , m , n ( x, y )
M 1 N 1
1
i ( j, m, n)
MN
f ( x, y)
x 0 y 0
i
j ,m,n ( x, y )
(1)
W ( j0 , m, n) is the approximation in starting scale j0 . W ( j, m, n) Means
i
The
the horizontal, vertical and diagonal details at scales
j j0 . Where j0 0 ,
j 0,1, 2...... j 1 and m n 0,1, 2,...2 j 1 . By Using. Eq.(1) and (2), the
f ( x, y ) obtained by the inverse DWT
1
f ( x, y )
MN m n
W ( j0 , m, n) j0 ,m,n ( x, y)
1
MN i H ,V , D j j0 m n
Wi ( j , m, n) ij ,m ,n ( x, y )
(2)
When a 1-level DWT is applied, the image is decomposed into four parts of high,
middle and low frequencies-LL1, HL1, LH1 and HH1 subbands. The subbands la-
beled HL1, LH1 and HH1 represent the more exceptional scale wavelet coefficients.
The LL1 subband contains the approximate image.
I .I '
i 1
N N
I .2
i 1
.I '
i 1
2
5
Where I denote the original and I’ stands for the extracted water-
marks. Each computed correlation value is compared with the average correlation. If
it happens that the calculated value is more prominent than the mean, then the ex-
tracted watermark bit is considered as 0, else if the computed value is lesser than
way, it is taken as 1 [11]. In the end, the watermark image is restructured using the
extracted bits, and the likeness between the original and the watermarked image is
described. Innovative multimedia and watermark are the inputs to the algorithm.
Grey wolves can acknowledge the location of prey and encircle them. The alpha usu-
ally guides the hunt. The beta and delta might also participate in hunting occasionally.
However, in an abstract search space, we have no idea about the location of the opti-
mum (prey). To mathematically simulate the hunting behavior of grey wolves, we
6
suppose that the alpha, (best candidate solution) beta and Delta have better knowledge
about the potential location of prey. Therefore, we save the first three sound solutions
obtained so far and oblige the other search agents (including the omegas) to update
their positions according to the location of the best search operator. The undermen-
tioned formulas are given in this regard.
D C1 X X
D C 2 X X
…….(4)
D C3 X X
X 1 X A1 ( D )
X 2 X A2 ( D )
…….(5)
X 3 X A3 (D )
X1 X 2 X 3
X (t 1)
3 …….(6)
4. IMPLEMENTATION
Watermark image
5. Simulation results:
To test the watermarking method, several conventional signal processing techniques and
geometric distortions were applied to these images to evaluate if the detector can reveal the
presence of the image owner’s watermark. This way, we can measure the algorithm robust-
ness to various kinds of attacks. In this section, we are displaying experimental results ob-
tained on the “bike” and “cherry” images as in Original image is bike.jpg as shown fig. 5.
And Embedding watermark image cherry.jpg as shown fig. 6.
6. CONCLUSION
This work gives Digital image watermarking, which is based on 2 Level Discrete
Wavelet Transform (DWT) with the GWO, Table1 demonstrates the effectiveness of
proposed technique as PSNR, MSE, Fitness value at generation=10 with visibility
factor=0.2042 for watermarked image and extract the watermark.
REFERENCES
1. Sikander B., Ishtiaq M., Jaffar M.A., Tariq M., Mirza A.M(2010): Adaptive Digital Wa-
termarking of Images Using Genetic Algorithm. IEEE International Conference on Infor-
mation Science and Applications, pp. 1-8.
2. Jagadeesh, B., Kumar, S. S., & Rajeswari, K. R. (2009, December). A genetic algorithm
based oblivious image watermarking scheme using singular value decomposition (SVD).
In Networks and Communications, 2009. NETCOM'09. First International Conference
on (pp. 224-229). IEEE.
3. Tang, C. W., & Hang, H. M. (2003). A feature-based robust digital image watermarking
scheme. IEEE transactions on signal processing, 51(4), 950-959.
9