A robust color image watermarking technique using modified Imperialist Competitive Algorithm

A robust color image watermarking technique using modified Imperialist Competitive Algorithm

Accepted Manuscript Title: A Robust Color Image Watermarking Technique Using Modified Imperialist Competitive Algorithm Author: Mohsen Ebrahimi Moghad...

685KB Sizes 11 Downloads 174 Views

Accepted Manuscript Title: A Robust Color Image Watermarking Technique Using Modified Imperialist Competitive Algorithm Author: Mohsen Ebrahimi Moghaddam Nasibeh Nemati PII: DOI: Reference:

S0379-0738(13)00413-1 http://dx.doi.org/doi:10.1016/j.forsciint.2013.09.005 FSI 7347

To appear in:

FSI

Received date: Revised date: Accepted date:

27-11-2012 21-8-2013 3-9-2013

Please cite this article as: M.E. Moghaddam, N. Nemati, A Robust Color Image Watermarking Technique Using Modified Imperialist Competitive Algorithm, Forensic Science International (2013), http://dx.doi.org/10.1016/j.forsciint.2013.09.005 This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.

Title Page (with authors and addresses)

ip t

A Robust Color Image Watermarking Technique Using Modified Imperialist Competitive Algorithm

cr

Mohsen Ebrahimi Moghaddam*, Nasibeh Nemati Electrical and Computer Engineering Department, Shahid Beheshti University G.C, Tehran, Iran

Ac ce p

te

d

M

an

us

*corresponding Author : [email protected] Tel: +989121405308 , Address: Electrical and Computer Engineering Department, Shahid Beheshti University, Evin Ave, Tehran , Iran

Page 1 of 23

*Manuscript (without author identifiers)

ip t

A Robust Color Image Watermarking Technique Using Modified Imperialist Competitive Algorithm

cr

Abstract— In this paper, a novel robust watermarking technique using Imperialistic Competition Algorithm (ICA) in the spatial domain is proposed to protect the intellectual

us

property rights of color images. The proposed method tries to insert the watermark in the blocks which are selected by Modified ICA. In this method, ICA has been customized for

an

watermarking. The color band for watermark insertion is selected based on color dynamic range in each block. Besides, in the procedure of selecting blocks for watermark insertion and

M

extraction, ensuring higher fidelity and robustness and resilience to several possible image attacks have been considered. The experimental results showed that the proposed method

ed

performance created watermarked images with better PSNRs and more robustness versus

ce pt

several attacks such as additive noise, blurring, etc in compare to related works.

Ac

Index Terms—Color image, Robust watermarking, Imperialistic Competition Algorithm (ICA).

1.

Introduction

Digital media security is a principal concern in the today technological world. Therefore, illegal distribution, duplication, and modification of the media posed as a serious problem on protecting intellectual property. Protection of digital multimedia content has been furthermore become an increasingly important issue for content owners and service providers. On the contrary, digital watermarking is one of the growing and promising technologies to protect the digital data from being tampered and also widely used for copyright protection.

Page 2 of 23

2 Watermarking is the process of embedding a watermark into the digital media to protect the intellectual property rights. The watermarking process can be performed by visible or invisible embedding [1][19]. Visible watermarking is the process of embedding the watermark into some visible parts of the digital media while invisible watermarking embeds the watermark confidentially

ip t

into the parts of the digital media known only by the owner. In the other hand, invisible watermarking process categorized as fragile, semi fragile and robust watermarking. Fragile watermarking is used to

cr

determine the slight modifications on the digital media, while semi-fragile watermarks commonly are

us

used to detect malignant transformations. Robust watermarking is used to determine the owner of the digital media even if it is modified.

an

Digital watermarking is classified according to the embedding domain into two classes namely spatial and transform domain [2]. In spatial domain embedding is done by directly manipulating the

M

pixel values of the host media. Techniques in this category are less complex but they show poor robustness against common image processing attacks. Another category is transform domain

ed

techniques [3]. Some techniques in this group transform the original media to frequency domain by using some transformations such as discrete Fourier transformation, discrete Cosine transformation and discrete Wavelet transformation [4]. Then, the watermark is embedded by modifying coefficients

ce pt

and watermarked image is obtained by inverse transformation of the modified coefficient. Some other methods in this group may apply some transforms such as SVD (Singular Value Decomposition) [20], calculating moments [23] or other processing techniques to insert the watermark.

Ac

Moreover, the extraction of the watermark [3] can be classified into the following categories: Firstly, non-blind scheme which requires the original image for the watermark extraction; is robust against various image processing attacks. Secondly, semi blind scheme which does not require the original image for the process of extraction, but it needs the watermark and additional information in this phase. And lastly the blind scheme, that does not require the original image, watermark and additional information but only secret key for the watermark extraction. The watermarking approach may be applied on gray or color images. However, there are a lot of papers in gray image watermarking in literature but it is possible to find some watermarking

Page 3 of 23

3 approaches which have been developed to embed a watermark into a color image. For example, an algorithm for still color image based on double scrambling technique and the wavelet transform has been proposed by S. Hongqin and L.V Fangliang [4]. In this method, the original color image is transformed from RGB to the YUV color space and scrambled by Fibonacci transformation. Tsui et.

ip t

al. Method [5] encodes the chromatic content of a color image as CIE a* b* chromaticity coordinates, and color watermarks (yellow and blue) are embedded in the frequency domain of the chromatic

cr

channels by using the Spatial Chromatic Discrete Fourier Transform (SCDFT). S. Das et.al proposed

us

a method that inserts the watermark in the LSB of ‗‘Blue‖ band of each pixel in individual tiles of host image in RGB color space. A robust blind method has been proposed in [20 ]. This method

an

inserts the watermark by linear interpolation in all SVD components matrixes (U, S, V) of Red channel. There is another robust SVD based method for gray images in the literature [21] which

M

modifies the singular value of cover image by multiple scale factor. However, the authors in [22] tried to show that proposed method in [ ] is not robust and has many false watermark detection.

ed

A semi-fragile watermarking approach based on fractal compression and differentials record theory which was restorable and robust against rotation was proposed by AnHu et.al [6]. In this method,

ce pt

three components (R, G, B) of a color image are processed respectively by fractal compression. A color image watermarking system of color images based on fast Quaternion Fourier Transform (QFT) has been proposed by Wei-jiang Wang et.al [7]. Quaternion is a type of hyper-complex number. Sanjay Rawat and Balasubramanian Raman worked on YCbCr color space [4]. Their proposed

Ac

method was based on discrete Cosine transform, wavelet packet transform and singular value decomposition. Qian-Chuan Zhong et.al proposed using the chaotic maps in the YCbCr color space [8]. They used Lorenz map and the Arnold cat map to encrypt the watermark signal and find embedding position of the host image. A watermarking algorithm for color image based on HSI color space and Discrete Wavelet Transform (DWT) has been addressed in [9]. In this method, sub-blocks of intensity are divided and sorted according to the human visual system (HVS) characteristic. Then, binary watermark is embedded by modifying the DWT coefficients of low frequencies in the selected sub-blocks. A spatial

Page 4 of 23

4 blind, semi-fragile method has been proposed based on totalistic cellular automata in [10]. Sujoy Roy and Ee-Clzien Chang [11] presented a method for watermarking color histograms that uses Earth Mover Distance (EMD) to modify an image to a target histogram. Recently some methods have been proposed for color image watermarking based on artificial

ip t

intelligence techniques which try to predict the relationship between the values of the pixels within the embedding watermark block and the watermark itself. For example, Pao-Ta Yu et. al. proposed a

cr

watermarking technique based on neural networks for color images [12]. This method cooperates

us

neural networks to memorize the relations between a watermark and the corresponding watermarked image. Due to neural networks possessing, the learning and adaptive capabilities, the trained neural

an

networks recover the watermark from the watermarked image against image processing attacks. A SVM-based Color Image Watermarking (SCIW) has proposed by Tsai et. al. [13] which employs a

M

classification technique based on SVMs to extract a watermark from color images. Three image features, which are different among local image statistic and the luminance value of the centre pixel in three sliding windows with distinct shapes, were used to construct the input vectors of the training

ed

patterns. Following the results produced by the classifier (the trained SVM), the SCIW method retrieves the hidden signature without the original image during watermark extraction. Oğuz Fındık et.

ce pt

al. suggested a watermarking technique that uses Artificial Immune Recognition System(AIRS) to protect color image intellectual property rights [14]. The watermark is embedded in the blue channel of a color image. m-bit binary sequence embedded into the color image is used to train AIRS.

Ac

Extracting the watermark is carried out using AIRS. Another watermarking technique has been introduced by previous writers [15] based on Particle Swarm Optimization (PSO) and k-nearest neighbour algorithm. In the embedding process, the color image is separated into non-overlapping blocks and each bit of the binary watermark is embedded into an individual block. By using the symmetric cross-shape, features are extracted from the blocks in which the watermark is embedded and the control blocks which would be used as training data in the extraction algorithm. Two centroids belonging to each of the watermark binary values are obtained by PSO utilizing the features obtained from the control blocks.

Page 5 of 23

5 A watermarking technique which uses genetic algorithm to identify locations within the cover image for watermark insertion is designed by [16] in spatial domain. Genetic search often produces same watermark locations in different populations for watermark insertion resulting in poor value of fidelity and robustness which need to be checked. Sliding window concept uses a set of

ip t

a few genes which are serially shuffled to get new set of locations for watermarking during each population generation.

cr

However, several watermarking techniques in spatial and frequency domain have been

us

proposed by various researchers in color image watermarking but most of them suffers from problems of poor robustness and fidelity.

blind watermarking technique based on Imperialist Competitive

an

In this paper, a new robust

Algorithm (ICA) for digital color images has been proposed. First of all, the proposed method

M

identifies the locations within the host image for watermark insertion in spatial domain by using modified ICA. The modified ICA has an extra step in compare to ICA which makes it more proper for

ed

watermarking. Second, a neighbourhood of 5*5 pixels is chosen surrounding the selected locations and least significant color in neighbourhood of each pixel is chosen for embedding. Selecting best

ce pt

positions using ICA and using least significant color channel in each neighbourhood are somewhat novel in this paper that increase the quality of watermarked image. Furthermore, another concept have been used in insertion and extraction for ensuring higher fidelity and robustness and resilience to several possible image attacks. The proposed method was applied on the several bench-mark images

Ac

and the experimental results showed method performance in resulted image quality together with its robustness versus different attack by check board software. The rest of this paper is organized as follows. In Section 2, Imperialist Competitive Algorithm is described. Section 3 introduces proposed algorithm for optimization of Robustness and Fidelity using Imperialist Competitive Algorithm. Section 4 shows experimental results and Conclusion is given in section5.

2. Imperialist Competitive Algorithm

Page 6 of 23

6 ICA is an algorithm for optimization inspired by the imperialistic competition [17]. The goal of optimization is to find an optimal solution in terms of the variables of the problem. This algorithm forms an array of variable values to be optimized. In GA terminology, this array is called ―chromosome‖, but here the term ―country‖ is used for this array. Like other evolutionary ones, this

ip t

algorithm starts with an initial population of size Npop. Population individuals called country are in two types: colonies and imperialists that all together form some empires. Algorithm selects Nimp of the

cr

most powerful countries to form the empires. The remaining Ncol of the population will be the colonies

us

each of which belongs to an empire. Imperialistic competition among these empires forms the basis of the proposed evolutionary algorithm. Imperialistic competition is the main part of proposed algorithm

an

and causes the colonies to converge to the global minimum of the cost function. During this competition, weak empires collapse and powerful ones take possession of their colonies. Imperialistic

M

competition converges to a state in which there exists only one empire. The Fig. 1 describes a typical imperialist competitive algorithm in its simplified form.

ce pt

1. Generating Initial Empires

ed

The core components of the ICA are as follows:

2. Moving the Colonies of an Empire toward the Imperialist 3. Exchanging Positions of the Imperialist and a Colony 4. Total Power of an Empire

Ac

5. Imperialistic Competition

6. Eliminating the Powerless Empires 7. Convergence

3.

Proposed watermarking algorithm

The proposed method is based on ICA to find the best place for watermark insertion in least significant color band. The overall structure of proposed algorithm is shown in Fig. 2. In next subsections, the steps of proposed method are described in more details.

Page 7 of 23

7 3.1

Watermark embedding

Step 1: Let the host image (h

) used to embed the watermark as:

cr

ip t

(1)

(2)

an

us

and the watermark image (wimage) is as follows:

M

Step 2:

ce pt

This produces a row vector.

entries as follows:

ed

Host image is reshaped into row vector containing

(3)

(4)

The size of the host image is given as

Ac

Step 3:

The watermark image is converted into a single dimension vector as follows: (5)

The total number of watermark locations is given by Step 4: In order to find optimal locations for insertion, apply MICA.

Page 8 of 23

8

Start

Host image

Watermark image

Initialize the impires

Convert host and watermark images into vectors

ip t

Move the colonies toward their relevant imperialist

Is there a colony in an empire which has lower cost than that of imerialist

cr

apply MICA to find best insertion location

Yes

us

No

Exchange the posotion of that imperialist and the colony

Find the color that has the least quantity in each selected location neighborhood

an

No

Is there an empire with no colonies

No

Optimal regions for embedding

No

ce pt

Yes

ed

Pick the weakest colony from the weakest empire and give it to the empire that hast the most likehood to possess it

M

Compute the total cost of an empire

Termination

Eliminate this empire

Stop condition satisfied Yes

Yes

Watermarked image

Ac

Done

Fig.

1:

Flowchart

of

typical

imperialist competitive algorithm.

Fig. 2: Steps of the proposed watermark embedding algorithm

Page 9 of 23

9 Step 4-1: The arrays

and

which contain best locations for insertion and

total insertion cost in these locations are initialized to

. (6)

cr

ip t

(7)

Step 4-2 Generating Initial Empires:

us

Step 4-2-1:

. A country is a

an

To start the optimization algorithm the initial population size is considered as

(8)

M

array. This array is defined by:

The variable values in the country show the position of corresponding index in the host image. ( values are randomly assigned).

ed

So Step 4-2-2:

ce pt

For the purpose of watermark insertion, a

mask is considered as the neighbourhood of the

selected location. In each neighbourhood, via Eucledian distance the least significant color is found by

Ac

following equations:

(9)

(10)

(11)

(12)

Page 10 of 23

10 Step 4-2-3: Afterwards, another

mask is considered as the neighbourhood of the selected location. This

process takes place on the color channels according to results of step 4-2-2 for each selected pixel. The pixel intensity value of the selected pixel is modified by

,

In this equation,

is embedding strength and neighbours.

shows watermark bit while

an

is the average of

(13)

us

cr

ip t

according to average neighbourhood pixel intensity as follows:

Step 4-2-4:

M

The cost of a country is found by evaluating the cost function at the variables

ed

so:

(14)

The similarity between the modified host image and the original host image is termed as cost

When

(15) (16)

Ac

ce pt

fitness function calculated as following equation:

is given by:

(17) Step 4-2-5: Now max cost and best individual positions are derived when:

Page 11 of 23

11 (18)

Step 4-2-6: We select Nimp of the most powerful countries to form the empires. The remaining Ncol of the

ip t

population will be the colonies each of which belongs to an empire. Then two types of countries

cr

exists; imperialist and colony. Step 4-2-7:

us

To form the initial empires, the colonies are divided among imperialists based on their power. That is the initial number of colonies of an empire should be directly proportionate to its power. To divide

an

the colonies among imperialists proportionally, the normalized cost of an imperialist is defined as:

is the cost of nth imperialist and

M

Where

(19)

is its normalized cost. Having the normalized cost of

ed

all imperialists, the normalized power of each imperialist is defined by:

ce pt

(20)

From another point of view, the normalized power of an imperialist is the portion of colonies that should be possessed by that imperialist. Then the initial number of colonies of an empire is:

is the initial number of colonies of nth empire and Ncol is the number of all colonies.

Ac

Where

(21)

To divide the colonies, for each imperialist, choose

of the colonies randomly and give them to

it. These colonies together with the imperialist form nth empire. Step 4-3 Moving the Colonies of an Empire toward the Imperialist: At this level imperialist countries start to improve their colonies. This fact has modelled by moving all the colonies toward the imperialist. In this movement, colonies moves toward the imperialist by units. The direction of the movement is a vector from colony to imperialist. with uniform (or any proper) distribution. Then for

is a random variable

we have:

Page 12 of 23

12 (22) Where U means uniform distribution, colony and imperialist.

is a number greater than

is the distance between

causes the colonies to get closer to the imperialist state from both

sides.

values of

cr

Where

is a random number with uniform (or any proper) distribution. Then:

(23)

is a parameter that adjusts the deviation from the original direction. Nevertheless the are arbitrary.

an

Step 4-4 Exchanging Positions of the Imperialist and a Colony:

us

movement.

ip t

To search different points around the imperialist add a random amount of deviation to the direction of

While moving toward the imperialist, a colony may reach to a position with higher cost than that of

M

imperialist. In such a case, the imperialist moves to the position of that colony and vise versa. Then

position. Step 4-5 Find Repetition:

ed

algorithm continues by the imperialist in a new position and then colonies start moving toward this

ce pt

During watermarking with ICA, there is always a possibility of getting the similar locations for watermark insertion. So we add a new step to this algorithm. In this step, to prevent repetition, elements are examined and their repetitive values are replaced with a new random value. To avoid

Ac

sensible variation, this new value is within the previous value scope. The repeated use of this technique ensures different watermark locations to be selected and thus avoiding the limitation and probability of finding same locations in the search space. This causes enhanced robustness and fidelity as indicated by various experiments. Step 4-6 Total Power of an Empire: Total power of an empire is mainly affected by the power of imperialist country and the colonies of an empire. This fact has modeled by defining the total cost by (24)

Page 13 of 23

13 Where

is the total cost of the nth empire and

less than 1. A little value for

is a positive number which is considered to be

causes the total power of the empire to be determined by just the

imperialist and increasing it will increase the role of the colonies in determining the total power of an empire. We have used the value of 0.1 for

in our method.

ip t

Step 4-7 Imperialistic Competition:

To start the competition, first, find the possession probability of each empire based on its total

(25)

us

Where

cr

power. The normalized total cost is obtained by:

are total cost and normalized total cost of nth empire respectively.

and

M

an

Having the normalized total cost, the possession probability of each empire is given by:

To divide colonies among empires, we form the vector

(26)

based on possession probability of

ed

mentioned colonies as: (27)

ce pt

Then we create a vector with the same size as whose elements are uniformly distributed

(28)

Ac

random numbers.

Then we form vector

by simply subtracting

from .

(29)

Page 14 of 23

14 Referring to vector

we will hand the mentioned colonies to an empire whose relevant index in

is maximum. Step 4-8 Eliminating the Powerless Empires: Powerless empires will collapse in the imperialistic competition and their colonies are assigned to

ip t

other empires.

cr

Step 4-9 Convergence:

After a while all the empires except the most powerful one will collapse and all the colonies will be

us

under the control of this unique empire. Step 4-10 one unit.

an

Increase

Repeat steps 4-3 to 4-9 until

.

M

Now the best locations in this iteration and the total cost are obtained Step 5:

ed

MakeKey function creates the key according to location of each watermark pixel in

. Also,

in each key index, the color channel which insertion taken place on that is saved.

Step 1:

ce pt

3.2. Watermark extracting

For extracting watermark by key which was made in MakeKey function we can simply extract

Ac

inserted watermark. In the first place, reshape the watermarked image(

) into row vector:

(30)

This produces a row vector: (31) Step 2: pursuing this further for each index of key, find the related position in the watermarked image:

Page 15 of 23

15

(32)

Step 3: then calculate the average pixel intensity of selected location

pixels surrounding the concerned pixel.

ip t

channel in key, by using a neighborhood of

in mentioned color

finally

compare

the

Pixel

intensity

value

of

selected

location

specified

an M

(33)

Experimental Results

ed

4.

by

us

, with selected location:

the

cr

Step 4:

In this study, the peak signal to noise ratio (PSNR) is used to qualify the watermarked image and

ce pt

the extracted watermark quality respectively. To measure the method robustness, the Mean Absolute Error (MAE) has been employed which measures the difference between an original signature

and

Ac

the corresponding extracted signature . The PSNR and MAE are calculated as follows:

(34)

(35)

(36) Where MSE stands for Mean Square Error. A lower MAE reveals that the extracted signature resembles the original signature

more closely. The robustness of a watermarking method is assessed

Page 16 of 23

16 by comparing with , where is extracted from the watermarked image

which is further degraded

by attacks. If a method has a lower MAE, it is more robust. To test the performance of proposed method, various bench-mark color images such as Lena, Baboon, and F16 with size

and watermarks with different sizes, were employed. Also, to imag which was used in

ip t

make the proposed method comparable with related ones a binary

the evaluation of related methods was employed. In the embedding process, the embedding strength and the dimension of the neighbors for insertion and extraction was a 3

cr

was used as

us

kernel.

TABLE 1 represents the various parameters setting used in the experiments for MICA. In most for

and about

for

have resulted

an

experimental results of ICA usage, a value of about

in good convergence of countries to the global maxmum, so we use the same.

M

The watermarking performance of the proposed method is compared with some related methods such as Kutter, Yu, and SCIW in TABLE 2. To investigate the robustness of these methods, several

ed

attacks were simulated using check-board software to degrade the watermarked. Besides the quantitative results in terms of the PSNR and the MAE, the experiment also provides visual

ce pt

comparison results (in Figure. 3).

By considering the results we could see that not only the watermarked images by the proposed algorithm have good PSNR, we also could observe high quality extracted watermarks. Conclusion

Ac

5.

In this paper, a new neighbourhood concept method is used for finding a suitable location in spatial domain via modified imperialistic competition algorithm (ICA) for watermark insertion. Using ICA helps us to find a more suitable location for inserting watermarks bits in different color channels. At the same time, because of using neighbourhood concept during watermark insertion and extraction, the proposed watermarking method is robust against various attacks unless jpeg compression. Moreover, this study is a novel one that uses different color channel for each neighbourhood and ICA for watermark embedding process in the watermarking concept according to

Page 17 of 23

17 the literature review. Besides, the proposed method could be explored in the frequency domain as a prospective work.

TABLE I: Proposed method Parameters Values 25

cr

5

ip t

Parameters

200

us

0.1 2

5*5 3*3 25

Baboon

Extracted watermark from Baboon

F16

Extracted watermark from F16

MAE=0.0029

PSNR=43.0466

MAE=0.0044

PSNR=44.6549

MAE=0.0061

PSNR=28.0783

MAE=0.0273

PSNR=28.3123

MAE=0.0234

PSNR=30.0847

MAE=0.0180

PSNR=24.5114

MAE=0.0446

PSNR=25.4611

MAE=0.0366

PSNR=24.5388

MAE=0.0378

Ac

PSNR=45.6295

Noise 5%

Extracted watermark from Lena

ce pt

Lena

No-attack

ed

M

an

0.1

Noise 10%

Page 18 of 23

18

Blurring (0.1)

MAE=0.0131

PSNR=29.2967

MAE=0.0148

PSNR=35.2000

MAE=0.0617

PSNR=25.9538

MAE=0.0705

PSNR=24.0699

MAE=0.0119

PSNR=16.3320

PSNR=22.6527

MAE=0.0119

PSNR=15.3903

PSNR=38.0500

MAE=0.0166

ip t

PSNR=38.4825

cr

Blurring twice

MAE=0.0178

us

PSNR=34.7079

an

Sharpening

PSNR=32.1533

MAE=0.0166

MAE=0.0043

PSNR=24.2855

MAE=0.0065

ed

M

Sharpening twice

MAE=0.0085

Fig. 3: Watermarked images Lena, Baboon and F16 and extracted waterm arks after the image processing attacks.

Attack number

1

Attacks

No-attack

Test image

Baboon F16 Lena Baboon F16 Lena Baboon F16 Lena Baboon F16 Lena Baboon F16 Lena Baboon F16

Ac

0

ce pt

TABLE II: Comparison of proposed method with some related ones

Noise 5%

2

Noise 10%

3

Blurring (0.1)

4

Blurring twice

5

Sharpening

PSNR Proposed SCIW method 42.7600 43.8422 39.6300 44.6549 41.8300 45.6295 21.1300 30.0441 18.6900 30.0847 21.2600 30.2402 18.3100 24.3124 15.6500 24.5388 18.1200 24.5114 25.5100 29.2967 30.0500 38.6626 24.4900 38.4825 25.2100 25.9538 29.2000 34.7079 28.6800 35.2000 19.5700 23.4127 25.0700 32.1533

Kutter’s [18] 0.1745 0.0830 0.0754 0.1679 0.0563 0.2119 0.1936 0.1911 0.1240 0.2312 0.1372 0.0871 0.2731 0.3020 0.1176 0.1030 0.0158

MAE Yu’s Tsai [12] [13] 0.1333 0.0964 0.0148 0.0065 0.0312 0.0219 0.1391 0.1218 0.0249 0.0131 0.0595 0.0449 0.1870 0.1616 0.0458 0.0363 0.1201 0.1125 0.1867 0.1386 0.0290 0.01391 0.0495 0.0307 0.2280 0.1679 0.0493 0.0197 0.0708 0.0354 0.1071 0.0854 0.0102 0.0041

Proposed method 0.0044 0.0061 0.0029 0.0031 0.0068 0.0046 0.0598 0.0192 0.0192 0.0627 0.0305 0.0227 0.1245 0.0839 0.0659 0.0029 0.0061

Page 19 of 23

19

6

Sharpening twice

Lena Baboon F16 Lena

25.4600 13.5700 15.7600 15.1300

5.

31.7732 15.3903 24.2855 22.6527

0.0703 0.0817 0.0039 0.0195

0.0241 0.0959 0.0139 0.0222

0.0170 0.0793 0.0036 0.0175

0.0043 0.0043 0.0065 0.0119

References

cr

networks", Journal of electronic imaging, vol.9, no. 4, pp.548–555, 2000.

ip t

[1] Hwang, M. S.; Chang, C. C.; Hwang, K. F, "Digital watermarking of images using neural

us

[2] Hwang, M.S.; Chang, C.C.; Hwang, K.F, "A watermarking technique based on one-way hash

an

functions", IEEE transactions on Consumer Electronics, vol.45 , issue 2., pp.286–294, 1999.

M

[3] Rawat, S.; Raman, B.; , "A new robust watermarking scheme for color images," IEEE 2nd

ed

International conference on Advance Computing Conference (IACC), pp.206-209, 19-20 Feb. 2010.

[4] Shi Hongqin; Lv Fangliang; , "A Blind Watermark Algorithm for Color Image Based on Dual

ce pt

Scrambling Technique," Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI),, pp.781-785, 2-4 April 2010.

Ac

[5] Tsz Kin Tsui; Xiao-Ping Zhang; Androutsos, D.; , "Color Image Watermarking Using the SpatioChromatic Fourier Transform," IEEE International Conference on Acoustics, Speech and Signal Processing, 2006, vol.2, pp.14-19 May 2006.

[6] An Hu; He Xiaolong; Zuo Yan; Cheng Sipeng; Zhang Bing; , "A Semi-fragile Watermarking algorithm against rotation based on fractal compression and differentials record theory," International Conference on Networking and Information Technology (ICNIT) , pp.153-156, 11-12 June 2010.

Page 20 of 23

20

[7] Wei-jiang Wang; Wei Zuo; Xue-mei Yan; , "New gray-scale watermarking algorithm of color images based on Quaternion Fourier Transform," Third International Workshop on

Advanced

ip t

Computational Intelligence (IWACI), pp.593-596, 25-27 Aug. 2010.

[8] Qian-Chuan Zhong; Qing-Xin Zhu; Ping-Li Zhang; , "A Spatial Domain Color Watermarking

us

Analysis, 2008. ICACIA 2008. , vol., no., pp.137-142, 13-15 Dec. 2008.

cr

Scheme based on Chaos," International Conference on Apperceiving Computing and Intelligence

an

[9] Fanzhi Kong; Yizhun Peng; , "Color image watermarking algorithm based on HSI color space," 2nd International Conference on Industrial and Information Systems (IIS) , vol.2, pp.464-467, 10-11

M

July 2010.

ed

[10] Radulescu, M.; Ionescu, F.; Dogaru, R.; , "Improving Multimedia Techniques For Watermarking Color Images Using Cellular Automata," International Symposium on Signals, Circuits and Systems,

ce pt

2007, vol.2, pp.1-4, 13-14 July 2007.

[11] Roy, S.; Chang, E.-C.; , "Watermarking color histograms,", 2004. International Conference on

Ac

Image Processing (ICIP), vol.4, pp. 2191- 2194, 24-27 Oct. 2004.

[12] Pao-Ta Yu; Hung-Hsu Tsai; Jyh-Shyan Lin; , "Digital watermarking based on neural networks for color images," Signal Processing, Vol.81, no.3, pp.V663-V671, March 2001

[13] Hung-Hsu Tsai; Duen-Wu Sun; , "Color image watermark extraction based on support vector machines ," Information Sciences, Vol.177, no.2,pp.V550-V569, 15 Jan. 2007 .

Page 21 of 23

21 [14] Oğuz Fındık; İsmail Babaoğlu; Erkan Ülker; , " A color image watermarking scheme based on artificial immune recognition system, " Expert Systems with Applications, vol.38, no.3,pp.V1942V1946, Aug. 2010.

ip t

[15] Oğuz Fındık; İsmail Babaoğlu; Erkan Ülker; , "A color image watermarking scheme based on hybrid classification method: Particle swarm optimization and k-nearest neighbor algorithm," Optics

cr

Communications, vol.283, no.24, pp.V4916-V4922, 23 Jul. 2010.

us

[16] Goyal, S.; Gupta, R.; , " Sliding Window used for Robustness and Fidelity Optimization Employing Neighborhood Concept and Genetic Algorithm with Tournament Selection," International

M

an

Journal of Computer Applications(0975 – 8887) , vol.20, no.8, pp. 36-41, 8 April. 2011.

[17] Atashpaz-Gargari, E.; Lucas, C.; "Imperialist competitive algorithm: An algorithm for in the proceeding of IEEE Congress on

ed

optimization inspired by imperialistic competition,"

ce pt

Evolutionary Computation , pp.4661-4667, 25-28 Sept. 2007.

[18] M Kutter; F Jordan; F Bossen; "Digital watermarking of color images using amplitude modulation, " J. Electron. Imaging , vol.7, no. 2, pp.326-332, April 1998.

Ac

[19] S.Kiani, M.Ebrahimi Moghaddam, ―A multi-purpose digital image watermarking using fractal block coding‖, journal of systems and software, volume 84, issue 9, pp 1550-1562, 2011.

[20] Abdelhamid Benhocine, Lamri Laouamer, Laurent Nana, and Anca Christine Pascu, "New Images Watermarking Scheme Based on Singular Value Decomposition", Journal of Information Hiding and Multimedia Signal Processing, Vol. 4, No. 1, pp. 9-18, January 2013.

[21] Chih-Chin Lai, ― A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm‖, Digital signal processing journal, vol 21, pp 522-527, 2011.

Page 22 of 23

22

[22] Khaled Loukhaoukha, "On The Security of Digital Watermarking Scheme Based on Singular Value Decomposition and Tiny Genetic Algorithm", Journal of Information Hiding and Multimedia Signal Processing, Vol. 3, No. 2, pp. 135-141, April 2012.

ip t

[23] Leida Li, Shushuan Li, Ajith Abraham and Jeng-Shyang Pan, "Geometrically invariant image

Ac

ce pt

ed

M

an

us

cr

watermarking using Polar Harmonic Transforms", Information Sciences, vol. 199, pp. 1~19, 2012.

Page 23 of 23