The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a novel steganography scheme based on Integer Wavelet Transform and Genetic Algorithm. The novel scheme embeds data in integer wavelet transform coefficients by using a mapping function based on Genetic Algorithm in an 8 × 8 block on the cover image. The optimal pixel adjustment process is applied after embedding the message. We employed frequency domain to increase the robustness...
This paper introduces a new method of adaptive blind digital image watermarking in spatial domain. Watermarking is a way to hide secret information in a cover image or host medium. Amount of information to hide in the cover image is limited because there is a trade-off between imperceptibility and payload of the data to hide. So increasing the payload in the cover image while watermark remain imperceptible...
Embedding of the digital watermark in an electronic document proves to be a viable solution for the protection of copyright and for authentication. In this paper we proposed a watermarking scheme based on wavelet transform, genetic programming (GP) and Watson distortion control model for JPEG2000. To select the coefficients for watermark embedding image is first divided into 32×32 blocks. Discrete...
Digital watermarking techniques are used for the digital right managements and copyright protection. As known, it is a big deal in watermarking systems to make a good trade of between the robustness and imperceptibility. This paper presents a watermarking algorithm in the DCT domain using an evolutionary algorithm to satisfy both of robustness and imperceptibility. We employ a genetic-based algorithm...
A novel methodology that deals with the optimum watermarking of image media by using Krawtchouk moments, in terms of locality, is presented in this paper. The proposed technique uses a simple genetic algorithm as optimization procedure, in order to find the best parameters set (p1, p2) defining the local behaviour of the Krawtchouk polynomials. The resulted near optimum parameters are used to construct...
This paper reviews the current soft computing (SC) techniques employed in image steganography as well as proposes a new hybrid approach of these SC techniques to exploit their complementary strengths. Four main SC techniques in image steganography - neural network (NN), genetic algorithm (GA), support vector machines (SVM) and fuzzy logic (FL) are assessed based on the three main measurements of steganography...
A novel scheme combining Sobel technology with genetic algorithm is proposed in this paper to protect image copyright. For the Sobel-based copyright protection schemes in the literatures, they use Sobel technology to detect the edge of the cover image, i.e. the copyright image. By using the kernels to calculate the edge directions of the cover image, the gradients of the cover image pixels can be...
Digital Watermarking and data hiding has become an important tool for protecting digital images from theft, illegal copying and unlawful reproduction. Some digital watermarking algorithms were proposed using spatial domain and transform domain. The transform domain could be DFT, DCT, DWT or SVD. Several digital watermarking algorithms using Genetic Algorithms are available in the literature. In this...
As information technology and multimedia products become more and more readily available, copyright and other related legal topics become more and more significant. Embedding copyright information as hidden data into the multimedia product-named watermarking- is one of the methods to protect owner rights. Two main concepts in watermarking are imperceptibility and robustness of the watermark. A tradeoff...
Digital watermarking and data hiding have gained popularity in recent years as a means of protecting digital images from theft, illegal copying and unlawful reproduction. Some digital watermarking algorithms were proposed using spatial domain and transform domain techniques. The transform domain could be DFT, DCT, DWT or SVD. Several digital watermarking algorithms using genetic algorithms are available...
Take advantage of the feature that the energy of the image would gather and spread on four components in the subimage after first-order GHM multi-wavelet transform. Propose an information hiding algorithm based on modifying the direction of color mod vector structure (CMVS) of four GHM first-order sub-images (LL2, LH2, HL2 and HH2). The direction of CMVS represents the information. The maximum change...
In this paper we present the application of a recently developed benchmarking tool to the comparison of watermarking algorithms. We carry out an extensive analysis to assess and compare robustness of digital image watermarking techniques by considering the perceptual quality of un-marked images in terms of Weighted PSNR. Such a benchmarking tool employs genetic algorithms, introduces a novel metric...
Take advantage of the feature that the energy distribution ratio is approximately 4.5:2.2:2.2:1.1 in the four LL1 sub-images (LL2, LH2, HL2 and HH2) after first-order GHM multi-wavelet transform. Use the feather of image bit plane embedded strategy. Propose an information hiding scheme based on GHM and combination bit plane (CBP). LL2 is embedded module of robust parameters. Embed hiding Information...
A novel optimal color image watermarking scheme in DWT domain is proposed in this paper to meet the watermarking properties: security, imperceptibility and robustness. In the scheme, watermark comes from a meaningful gray image encrypted by two-dimensional chaotic stream encryption. In the procedure of watermark embedding, the watermark is embedded into host color image through selecting and modifying...
The classical approach to depth from defocus uses two images taken with circular apertures of different sizes. We show in this paper that the use of a circular aperture severely restricts the accuracy of depth from defocus. We derive a criterion for evaluating a pair of apertures with respect to the precision of depth recovery. This criterion is optimized using a genetic algorithm and gradient descent...
Wavelet packet transform can be viewed as a generalization of the discrete wavelet transform and a best wavelet basis in the sense of some cost metric can be found within a large library of permissible bases. In this paper, we proposed a genetic watermarking scheme based on the wavelet packet transform. Genetic algorithm is used to select an appropriate basis from permissible bases of wavelet packet...
A geometrically robust image watermarking scheme based on perceptual hashes and genetic algorithm is proposed. The synchronization information, which is generated by perceptual image hashes and pseudo-random number (PRN), and the watermark are embedded into the image based on the human visual system (HVS). In watermark extracting, the geometric transformation parameters are computed from perceptual...
In this paper, a novel robust watermarking technique based on discrete cosine transform using genetic algorithm (GA) is presented. To obtain highest possible robustness without losing transparency, GA is used for adjustment of mid-band coefficients. Significant improvements in robustness under attacks and also in transparency are obtained from experimental results.
In this paper, we present an optimal Discrete Wavelet Transform-Singular Value Decomposition (DWT-SVD) based image watermarking scheme using Pareto-based Multi-Objective Evolutionary Algorithm (MOEA). After decomposing the cover image into four bands, we apply the SVD to each band, and the singular values of each sub-band of the host image are modified by different scaling factors to embed the watermark...
Based on multiple description coding, the robust multiple description scalar quantizer (RMDSQ) was introduced to combat both packet losses and bit errors over heterogeneous networks. In the RMDSQ, the residual information in the description with bit errors is utilized to achieve graceful performance degradation with the help of the correct description. Exhaustive search and the genetic algorithm were...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.