Skip navigation

Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm

Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm

Zhou, Xiaoyi, Cao, Chunjie, Ma, Jixin and Wang, Longjuan (2018) Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm. Mathematical Problems in Engineering, 2018:2685739. pp. 1-9. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2018/2685739)

[img]
Preview
PDF (Publisher's PDF - Open Access)
20345 MA_Adaptive_Digital_Watermarking_Scheme_(OA)_2018.pdf - Published Version
Available under License Creative Commons Attribution.

Download (2MB) | Preview

Abstract

Digital watermarking is an effective solution to the problem of copyright protection, thus maintaining the security of digital products in the network. An improved scheme to increase the robustness of embedded information on the basis of discrete cosine transform (DCT) domain is proposed in this study. The embedding process consisted of two main procedures. Firstly, the embedding intensity with support vector machines (SVMs) was adaptively strengthened by training 1600 image blocks which are of different texture and luminance. Secondly, the embedding position with the optimized genetic algorithm (GA) was selected. To optimize GA, the best individual in the first place of each generation directly went into the next generation, and the best individual in the second position participated in the crossover and the mutation process. The transparency reaches 40.5 when GA’s generation number is 200. A case study was conducted on a 256 × 256 standard Lena image with the proposed method. After various attacks (such as cropping, JPEG compression, Gaussian low-pass filtering (3, 0. 5), histogram equalization, and contrast increasing (0.5, 0.6)) on the watermarked image, the extracted watermark was compared with the original one. Results demonstrate that the watermark can be effectively recovered after these attacks. Even though the algorithm is weak against rotation attacks, it provides high quality in imperceptibility and robustness and hence it is a successful candidate for implementing novel image watermarking scheme meeting real timelines.

Item Type: Article
Additional Information: Copyright © 2018 Xiaoyi Zhou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Uncontrolled Keywords: information hiding technology, copyright enforcement scheme
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / Department / Research Group: Faculty of Liberal Arts & Sciences
Faculty of Liberal Arts & Sciences > Department of Computing & Information Systems
SWORD Depositor: Publications Router
Last Modified: 23 Nov 2018 17:35
Selected for GREAT 2016: None
Selected for GREAT 2017: None
Selected for GREAT 2018: None
Selected for GREAT 2019: None
Selected for REF2021: None
URI: http://gala.gre.ac.uk/id/eprint/20345

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics