Details



DATA HIDING IN IMAGES BY NEW HYBRID METHOD

Dadmehr Rahbari

15-28

Vol. 1, Jan-Jun, 2015

Date of Submission: 2015-01-10 Date of Acceptance: 2015-02-02 Date of Publication: 2015-02-15

Abstract

Image watermarking based applications have been developed. Some examples of applications of digital watermarking is to protect property rights, verify content, copy control and usage control, describes the content of the secret data from the possibility of tracking, covert communications and data encryption. Wavelet analysis is a relatively new and exciting achievement of pure mathematics is based on decades of research in harmonic analysis. In addition to facilitating properties of the wavelet transform may vary depending upon the application of orthogonal basis functions are not available. In these cases you can use the two orthogonal. Genetic algorithm to simultaneously consider multiple points of the search space and thus increases the chances that converge to a local maximum, decreases. In Particle Swarm Optimization, Randomly in space group of birds are looking for food. There is only one piece of food in space are discussed. Birds do not know any of the food. One of these strategies can better track the bird is the minimum distance to be food. This strategy is the element algorithm. In This paper is introduced optimization method by Read the input image and its possible conversion to gray levels, the wavelet decomposition of the input image, smoked illustrations of effective bits. In Result section is showed the performance of proposed method by PSNR parameters and the error rate measures the amount of data hidden in the picture.

References

  1. N.Bisla, P.Chaudhary, “Comparative Study of DWT and DWT-SVD Image Watermarking Techniques”, Ijarcsse - Volume 3, Issue 6, 2013.
  2. P. Singh, S.Agarwal, 'A Hybrid DCT - SVD Based Robust Watermarking Scheme for Copyright Protection' . ICETET Dec. 7-8, 2013
  3. P.M. Naini, 'Digital Watermarking Using MATLAB', University of Tehran- Iran, 2011
  4. P.M.Pithiya, H.L.Desai, 'DCT Based Digital Image Watermarking, Dewatermarking & Authentication', IJLTET Vol. 2 Issue 3, 2013.
  5. P.Saxena, Sh.Garg, A. Srivastava, 'DWT-SVD Semi-Blind Image Watermarking Using High Frequency Band', ICCSIT Singapore April 28-29, 2012
  6. P.Cika, 'Watermarking method based on Discrete Wavelet Transform and Singular Value Decomposition', Electrorevue VOL 3, NO 1, 2012.
  7. S. Murty, M.U. Bhaskar, P.R. Kumar, 'A Semi-Blind Reference Watermarking Scheme Using DWTDCT-SVD for Copyright Protection'. IJCSIT Vol 4, No 2, 2012
  8. S.Dogan, T.Tuncer, E.Avc, A.Gulten, 'A robust color image watermarking with Singular Value Decomposition method', IJASCSE Volume 3, Issue 4, 2014
  9. Abu-Errub, Ali Al-Haj and Aymen, “Performance Optimization of Discrete Wavelets Transform Based Image Watermarking Using Genetic Algorithms”, Journal of Computer Science, pp. 834-841, 2008.
  10. D.Rahbari, “High Performance Data mining by Genetic Neural Network”, International Journal of Computer Science and Business Informatics, Volume 5, Issue 1, 2013.
  11. D.Rahbari, “Digital handwritten recognition by optimized neural networks”, Integrated Journal of British, http://www.ijbritish.com, Volume 1, Issue 1, Pages 9, 2014
  12. C.-S. Shieh, H.-C. Huang, F.-H. Wang and J.-S. Pan, “Genetic watermarking based on transform domain techniques”, Pattern Recognition, Vol. 37, No. 3, pp. 555-565, 2004
  13. C-C.Chen and C-S.Lin, “ A Genetic algorithm based nearly optimal image authentication approach”. International Journal of Innovative computing, Information and Control, Volume 3, No. 3, pp 631-640, June 2007.
  14. A.I. Hammouri1, B.Alrifai and H.Al-Hiary, “An Intelligent Watermarking Approach Based Particle Swarm Optimization in Discrete Wavelet Domain”, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 1, March 2013 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784.
  15. P. Meerwald and A. Uhl, “Watermarking of raw digital images in camera firmware: embedding and detection,” in Proceedings of the 3rd Pacific Rim Symposium on Image and Video Technology, PSIVT ’09, vol. 5414 of Lecture Notes in Computer Science, (Tokyo, Japan), pp. 340–348. Springer, Jan. 2009.
  16. A. Khan and A. M. Mirza, “Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding,” Information Fusion, vol. 8, pp. 354–365, October 2007.
  17. Y. Q. Shi, “Reversible data hiding,” Proceedings of International Workshop on Digital Watermarking, Seoul, Korea, Oct. 1 to Nov. 2, 2004
  18. Z. Ni, Y. Q. Shi, N. Ansari and W. Su, “Reversible data hiding,” Proceedings of IEEE International Symposium on Circuits and Systems, vol. 2, pp. 912-915, Bangkok, Thailand, May 2003.
  19. A. Leest, M. Veen, and F. Bruekers, “Reversible image watermarking,” Proc. of IEEE ICIP, vol.2, pp.731-734, Sept.2003.
  20. J. . Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, pp. 890-896, Aug. 2003
  21. G. Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni and W. Su, “Distortionless data hiding based on integer wavelet transform,” IEE Electronics Letters, Dec. 2002, pp. 1646-1648.
  22. G. Xuan, Y. Q. Shi, Z. Ni, “Lossless data hiding using integer wavelet transform and spread spectrum,” IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, September 2004
Download PDF
Back