Skip navigation

Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm

Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm

Zhou, Xiaoyi, Cao, Chunjie, Ma, Jixin and Wang, Longjuan (2018) Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm. Mathematical Problems in Engineering, 2018:2685739. pp. 1-9. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2018/2685739)

[img]
Preview
PDF (Publisher's PDF - Open Access)
20345 MA_Adaptive_Digital_Watermarking_Scheme_(OA)_2018.pdf - Published Version
Available under License Creative Commons Attribution.

Download (2MB) | Preview

Abstract

Digital watermarking is an effective solution to the problem of copyright protection, thus maintaining the security of digital products in the network. An improved scheme to increase the robustness of embedded information on the basis of discrete cosine transform (DCT) domain is proposed in this study. The embedding process consisted of two main procedures. Firstly, the embedding intensity with support vector machines (SVMs) was adaptively strengthened by training 1600 image blocks which are of different texture and luminance. Secondly, the embedding position with the optimized genetic algorithm (GA) was selected. To optimize GA, the best individual in the first place of each generation directly went into the next generation, and the best individual in the second position participated in the crossover and the mutation process. The transparency reaches 40.5 when GA’s generation number is 200. A case study was conducted on a 256 × 256 standard Lena image with the proposed method. After various attacks (such as cropping, JPEG compression, Gaussian low-pass filtering (3, 0. 5), histogram equalization, and contrast increasing (0.5, 0.6)) on the watermarked image, the extracted watermark was compared with the original one. Results demonstrate that the watermark can be effectively recovered after these attacks. Even though the algorithm is weak against rotation attacks, it provides high quality in imperceptibility and robustness and hence it is a successful candidate for implementing novel image watermarking scheme meeting real timelines.

Item Type: Article
Additional Information: Copyright © 2018 Xiaoyi Zhou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Uncontrolled Keywords: information hiding technology, copyright enforcement scheme
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / School / Research Centre / Research Group: Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS)
Faculty of Engineering & Science
SWORD Depositor: Publications Router
Last Modified: 04 Mar 2022 13:07
URI: http://gala.gre.ac.uk/id/eprint/20345

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics