Professional Documents
Culture Documents
ABSTRACT
In order to improve the robustness and imperceptibleness of
the image spread spectrum watermark algorithm, a new
approach for optimization in 88 DCT domain using
genetic algorithm (GA) was proposed. GA was used to
choose the AC coefficients, which were modified to embed
the spread spectrum watermark. The bands were varied to
find the most suitable for image with different
characteristics. Performance improvement with respect to
existing algorithm is obtained by GA adaptive global
search. The experimental results show that the proposed
algorithm yields a watermark that is invisible to human
eyes and robust to various image manipulation, and show
that some special positions are the best choices for
embedding the watermark. The authors also compare their
experimental results with the results of the previous work of
others.
1. INTRODUCTION
With the widespread use of the Internet, a lot of digital
media, including audio, video and image, have been
duplicated, modified by anyone easily and unlimitedly. The
copyright protection of the intellectual property of the
sensitive or critical digital information is an important legal
issue globally. Recently, we have seen the trend of the
studies in digital watermarking [1] since the techniques
provide the essential mechanism for the ownership
authentication.
Digital image watermarking provides copyright
protection of image data by hiding appropriate information
in the original image. There are a variety of schemes for
embedding the watermark. Typical methods of
watermarking were based on DCT[2], DWT[3], DFT[4],
spatial-domain schemes[5], and vector quantization (VQ)
domain methods[6]. One major disadvantage for these
methods is if the attackers dissolve the relationships
between the original image and the pre-determined set for
watermark embedding, the watermarking capability for
copyright protection no longer exists. Another disadvantage
for typical schemes is how to decide and choose the predetermined set. Therefore, genetic algorithm (GA) is
1424403677/06/$20.002006IEEE
Yi ' = Yi + xi
(1)
1117
ICME2006
Fig.2.
PcInitial PcFinal
g
(2)
GenerationMax
PmFinal PmInitial
Pm = PmInitial +
g (3)
GenerationMax
Pc = PcInitial
S im ( X , X * ) =
Fitness =
X*X
X X
*
approach. PSNR=51, =5
X ~ N (0,1)
n
X * X ~ N (0, X * X *T )
*
*
X X = xi xi
i =1
X* X
~ N (0,1)
X * X ~ N (0, X * X * )
X* X*
(4)
Pe =
Sim
(6)
(5)
1 x2
1
e dx =
2
2
2
2
1
1
6
erfc ( ) = erfc( )
2
2
2
2
10
= 9.8659 10
e t dt
i =1
1118
(7)
Images
Boat
Boy
Zelda
Baboon
Mary
Girl
Goldhill
Lena
Pepper
PSNR
51.68
51.82
51.93
51.87
51.92
51.84
51.65
51.55
51.86
Sim1
8.588
7.008
6.546
7.121
6.938
7.454
8.488
7.579
7.936
Sim2
7.626
6.793
7.174
7.191
6.859
6.197
7.877
7.289
7.158
Sim3
6.672
6.209
8.017
6.192
7.764
7.799
8.284
7.715
7.726
Sim4
7.281
8.384
7.813
8.565
7.264
7.546
7.392
8.247
7.403
3. EXPERIMENTAL RESULTS
1119
4. CONCLUSIONS
Fig.4. Performance comparison between the present approach and Coxs approach.(Top left)
Similarity against lowpass filter, (top right) Image Scaling, (bottom left) gaussian noise and
(bottom right) JPEG coding distortion. The sim = 6 threshold is included in all plots.
include not only the low frequency components but also
high frequency coefficients. Y(2) is found to be the most
popular band for robust watermarking. In comparison with
the Coxs method, watermark embedding with our scheme
can get better-watermarked image qualities and more robust
to the attacks.
REFERENCES
[1] F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information
hiding-a survey, Proc. IEEE 87(7) (1999) 1062--1078
[2] W.C Chu, DCT-based image watermarking using
subsampling, IEEE Trans. Multimedia 5(1) (2003) 34-38
[3] M. Barni, F. Bartolini, A. Piva, Improved wavelet-based
watermarking through pixel-wise masking, Image Process. IEEE
Trans. Image Process. 10(5) (2001) 783-791
[4] J.J.K. ORuanaidh, W.J. Dowling, F.M. Boland, Phase
watermarking of digital image, Proceedings of the IEEE
International Conference on Image, Processing, Vol.3, Lausanne,
Switzerland, 1996, 239-242
1120