Abstract

In the recent past, a different set of algorithms for watermarking and securing the color images have been developed by using transformation, decomposition, and optimization techniques for watermark embedding and extraction. In this paper, we propose an optimized and robust watermarking algorithm coupled with a 4D hyperchaotic system, and its performance is analyzed by extending and differentiating the existing work. Our contribution in the presented work is watermarking and securing the color images by an optimized algorithm that uses transformation technique such as Discrete Wavelet Transformation (DWT) and decomposition techniques such as Hessenberg decomposition (HbD) and singular value decomposition (SVD) coupled with the 4D hyperchaotic system, while the optimization is carried out by improved evolution fruit fly optimization algorithm (IEFOA). The experimental results based on different types of attacks (filter attacks, noise attacks, cropping attack, JPEG compression, motion blur, sharpening, and rotation), key sensitivity, normalized correlation, peak signal-to-noise ratio, and structural similarity index measure are done for measuring the algorithm’s performance regarding invisibility and robustness. The experimental results show that the proposed scheme has excellent invisibility and keeps a good trade-off between invisibility and robustness. The experiment results show that the proposed approach outperforms the previous approaches.

Highlights

  • In the age of cloud computing and for computing, the security of data whether the sensor’s data or cloud’s data has become the dire need of today’s age to secure it from malicious attacks

  • With the advancement of computing such as DNA and quantum-based computing, the probability to breach currently highly secured watermarks may increase. e techniques such as Hessenberg decomposition (HbD), DWT, and SVD have been widely used by researchers in various watermarking methods to watermark the grayscale and color images. e trade-off between invisibility and robustness has always been a challenging issue in watermarking methods and it needs optimization

  • Directions is paper is an attempt toward developing an imperceptible, secure, and robust watermarking framework with the procedure of scaling factor optimization based on improved evolution fruit fly optimization algorithm (IEFOA) to solve the issues of authentication, integrity, and FPP

Read more

Summary

Introduction

In the age of cloud computing and for computing, the security of data whether the sensor’s data or cloud’s data has become the dire need of today’s age to secure it from malicious attacks. E use of redundant-DWT gives higher embedding capacity while adaptive multiscaling factor improves robustness, security, and visual transparency Another scheme based on wavelet transformation followed by best-fit equation and Cuckoo Search (CS) algorithm is robust to common attacks, and the watermark is imperceptible to human eyes [26]. Several variants of Fourier transforms are applied to R, G, and B components of an image separately, the watermark is embedded in medium frequency band based on the combined parity of coefficients, and the obtained results are satisfactory in terms of average PSNR greater than 40 decibels for integration into a variant of Fourier transform coefficients Another blind image watermarking scheme in the transform domain, where there is no need for a watermark and host image for extracting the watermark, gives good imperceptibility and robustness with less computational cost [33]. The host image is split into nonoverlapping blocks each of size 8 × 8, and DCT coefficients of each block are computed; two datasets (d1 and d2) are created from the selected blocks, and DCT coefficients of d1 and d2 are compared with the prefixed threshold values (k1 and k2) as follows: if the watermark bit value is 1, corresponding d1 and d2 coefficient values are modified with set α value; else, the corresponding d1 and d2 coefficient values are set to zero

Preliminaries
10: Inv-SVD
Conclusions and Future
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call