
-
Previous Article
An algorithm for reversible information hiding of encrypted medical images in homomorphic encrypted domain
- DCDS-S Home
- This Issue
-
Next Article
Multi-objective optimization algorithm based on improved particle swarm in cloud computing environment
Research on image digital watermarking optimization algorithm under virtual reality technology
1. | Language Laboratory, Department of Foreign Languages, Anhui Jianzhu University, Hefei, China |
2. | Department of Foreign Languages, Anhui Jianzhu University, Hefei, China |
Aiming at the shortcomings of current algorithms due to the fixed steps, which is easy to fall into local optimum, with robustness and poor transparency, and cannot be balanced against various common attacks, an optimization algorithm of digital image watermarking algorithm based on Drosophila was proposed. In the support of the virtual reality technology, the original color host image was transformed from the RGB space to YCrCb space, and the pixel block of the Y component was divided into a certain size; according to the principle of forming DC coefficients in the DCT domain, the DC coefficient of each block is calculated directly in the airspace, and the amount of modification for each DC coefficient is determined based on the watermark information and the quantization step size; according to the distribution characteristics of DC coefficient, watermarks are embedded directly in the airspace; the type of digital watermarking and digital watermarking pretreatment methods were determined by using Drosophila optimization algorithm. At the same time, digital watermark embedding, extraction rules and initial steps were selected and identified. The Drosophila optimization algorithm with step size reduces the balance between global and local search ability, which makes up for the shortcomings of traditional algorithm. The experimental results showed that the proposed algorithm can effectively balance the invisibility and robustness of the watermark, and can resist all kinds of common attacks, which with a better visual extraction effect.
References:
[1] |
A. A., M. A. and A. A., Crypto-watermarking of transmitted medical images, Journal of Digital Imaging, 26-38. Google Scholar |
[2] |
A. M. Abbas, Block-based svd image watermarking in spatial and transform domains, International Journal of Electronics, 102 (2015), 1091-1113. Google Scholar |
[3] |
A. M. Abdelhakim, H. I. Saleh and A. M. Nassar, Quality metric-based fitness function for robust watermarking optimisation with bees algorithm, Iet Image Processing, 10 (2016), 247-252. Google Scholar |
[4] |
M. Andalibi and D. M. Chandler, Digital image watermarking via adaptive logo texturization, IEEE Transactions on Image Processing, 24 (2015), 5060-5073. Google Scholar |
[5] |
X. D., C. H. K. and Z. H. Y., A joint image encryption and watermarking algorithm based on compressive sensing and chaotic map, Chinese Physics B, 24 (2015), 198-206. Google Scholar |
[6] |
Y. Guo, B. Z. Li and N. Goel, Optimised blind image watermarking method based on firefly algorithm in dwt-qr transform domain, Iet Image Processing, 11 (2017), 406-415. Google Scholar |
[7] |
W. H. D., L. Y. F. and S. T., An image quality assessment method using human visual characteristics, 567-573. Google Scholar |
[8] |
C. J., Research on digital watermarking algorithm based on compressed sensing, in Bulletin of Science and Technology, 11 (2016), 137-141. Google Scholar |
[9] |
S. Liu, Z. Pan and H. Song, Digital image watermarking method based on dct and fractal encoding, Iet Image Processing, 11 (2017), 815-821. Google Scholar |
[10] |
R. R. A. Lubis, Analisis kombinasi algoritma watermarking modified least significant bit dengan least significant bit +1, Critical Care, 14 (2015), 1-1. Google Scholar |
[11] |
L. Mao, W. Guiwu, F. Alsaadi, T. Hayat and A. Alsaedi, Bipolar 2-tuple linguistic aggregation operators in multiple attribute decision making, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 33 (2017), 1197-1207. Google Scholar |
[12] |
L. Narkedamilly, V. P. Evani and S. K. Samayamantula, Discrete multiwavelet--based video watermarking scheme using surf, Etri Journal, 37 (2015), 595-605. Google Scholar |
[13] |
K. Praveen, M. Sethumadhavan and R. Krishnan,
Visual cryptographic schemes using combined boolean operations, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 413-437.
doi: 10.1080/09720529.2015.1086067. |
[14] |
Z. Qu, Z. Cheng, M. Luo and W. Liu,
A robust quantum watermark algorithm based on quantum log-polar images, International Journal of Theoretical Physics, 56 (2017), 3460-3476.
doi: 10.1007/s10773-017-3512-6. |
[15] |
K. S. E., Science teachers' conceptualizations and implications for the development of the professional development programs, Eurasia Journal of Mathematics Science and Technology Education, 13 (2017), 3301-3314. Google Scholar |
[16] |
L. B. Si, Regional cooperation efficiency evaluation of equipment manufacturing industry based on dea method: Empirical analysis of beijing-tianjin-hebei region and yangtze river delta region, Journal of Interdisciplinary Mathematics, 20 (2017), 281-293. Google Scholar |
[17] |
B. Tenner, Discrete mathematics and theoretical computer science, Discrete Mathematics and Theoretical Computer Science, 369-382. Google Scholar |
[18] |
M. A. Ting, D. P. Gao and N. T. Chen, Optimization and simulation of anti-attack method for composite color digital watermark image, Computer Simulation, 418-422. Google Scholar |
[19] |
D. C. Wang, C. C. Tian, B. J. Chen and Y. H. Tian, Dual watermarking for color images based on 4d quaternion frequency domain, Journal of Jilin University, 45 (2015), 1336-1346. Google Scholar |
[20] |
Y. Wang, J. Liu, Y. Yang, D. Ma and R. Liu, 3d model watermarking algorithm robust to geometric attacks, Iet Image Processing, 11 (2017), 822-832. Google Scholar |
show all references
References:
[1] |
A. A., M. A. and A. A., Crypto-watermarking of transmitted medical images, Journal of Digital Imaging, 26-38. Google Scholar |
[2] |
A. M. Abbas, Block-based svd image watermarking in spatial and transform domains, International Journal of Electronics, 102 (2015), 1091-1113. Google Scholar |
[3] |
A. M. Abdelhakim, H. I. Saleh and A. M. Nassar, Quality metric-based fitness function for robust watermarking optimisation with bees algorithm, Iet Image Processing, 10 (2016), 247-252. Google Scholar |
[4] |
M. Andalibi and D. M. Chandler, Digital image watermarking via adaptive logo texturization, IEEE Transactions on Image Processing, 24 (2015), 5060-5073. Google Scholar |
[5] |
X. D., C. H. K. and Z. H. Y., A joint image encryption and watermarking algorithm based on compressive sensing and chaotic map, Chinese Physics B, 24 (2015), 198-206. Google Scholar |
[6] |
Y. Guo, B. Z. Li and N. Goel, Optimised blind image watermarking method based on firefly algorithm in dwt-qr transform domain, Iet Image Processing, 11 (2017), 406-415. Google Scholar |
[7] |
W. H. D., L. Y. F. and S. T., An image quality assessment method using human visual characteristics, 567-573. Google Scholar |
[8] |
C. J., Research on digital watermarking algorithm based on compressed sensing, in Bulletin of Science and Technology, 11 (2016), 137-141. Google Scholar |
[9] |
S. Liu, Z. Pan and H. Song, Digital image watermarking method based on dct and fractal encoding, Iet Image Processing, 11 (2017), 815-821. Google Scholar |
[10] |
R. R. A. Lubis, Analisis kombinasi algoritma watermarking modified least significant bit dengan least significant bit +1, Critical Care, 14 (2015), 1-1. Google Scholar |
[11] |
L. Mao, W. Guiwu, F. Alsaadi, T. Hayat and A. Alsaedi, Bipolar 2-tuple linguistic aggregation operators in multiple attribute decision making, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 33 (2017), 1197-1207. Google Scholar |
[12] |
L. Narkedamilly, V. P. Evani and S. K. Samayamantula, Discrete multiwavelet--based video watermarking scheme using surf, Etri Journal, 37 (2015), 595-605. Google Scholar |
[13] |
K. Praveen, M. Sethumadhavan and R. Krishnan,
Visual cryptographic schemes using combined boolean operations, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 413-437.
doi: 10.1080/09720529.2015.1086067. |
[14] |
Z. Qu, Z. Cheng, M. Luo and W. Liu,
A robust quantum watermark algorithm based on quantum log-polar images, International Journal of Theoretical Physics, 56 (2017), 3460-3476.
doi: 10.1007/s10773-017-3512-6. |
[15] |
K. S. E., Science teachers' conceptualizations and implications for the development of the professional development programs, Eurasia Journal of Mathematics Science and Technology Education, 13 (2017), 3301-3314. Google Scholar |
[16] |
L. B. Si, Regional cooperation efficiency evaluation of equipment manufacturing industry based on dea method: Empirical analysis of beijing-tianjin-hebei region and yangtze river delta region, Journal of Interdisciplinary Mathematics, 20 (2017), 281-293. Google Scholar |
[17] |
B. Tenner, Discrete mathematics and theoretical computer science, Discrete Mathematics and Theoretical Computer Science, 369-382. Google Scholar |
[18] |
M. A. Ting, D. P. Gao and N. T. Chen, Optimization and simulation of anti-attack method for composite color digital watermark image, Computer Simulation, 418-422. Google Scholar |
[19] |
D. C. Wang, C. C. Tian, B. J. Chen and Y. H. Tian, Dual watermarking for color images based on 4d quaternion frequency domain, Journal of Jilin University, 45 (2015), 1336-1346. Google Scholar |
[20] |
Y. Wang, J. Liu, Y. Yang, D. Ma and R. Liu, 3d model watermarking algorithm robust to geometric attacks, Iet Image Processing, 11 (2017), 822-832. Google Scholar |





Attack mode | Figure 4 (a) | Figure 4 (b) |
No attack | 86.4859 | 87.0142 |
Rotation (5 degrees) | 72.6435 | 73.8816 |
Image scaling (1/2) | 77.5878 | 75.3243 |
JPEG compression (90) | 83.6266 | 84.1118 |
Cropping | 62.5677 | 64.2054 |
Attack mode | Figure 4 (a) | Figure 4 (b) |
No attack | 86.4859 | 87.0142 |
Rotation (5 degrees) | 72.6435 | 73.8816 |
Image scaling (1/2) | 77.5878 | 75.3243 |
JPEG compression (90) | 83.6266 | 84.1118 |
Cropping | 62.5677 | 64.2054 |
Attack mode | Figure 4 (a) | Figure 4 (b) |
No attack | 1.0000 | 1.0000 |
Salt and pepper noise (0.05) | 0.9987 | 0.9887 |
Median filter ( |
0.9654 | 0.9574 |
Rotation (5 degrees) | 0.9613 | 0.9788 |
Image scaling (1/2) | 0.9527 | 0.9755 |
JPEG compression (90) | 0.9774 | 0.9802 |
Cropping | 0.9997 | 1.0000 |
Attack mode | Figure 4 (a) | Figure 4 (b) |
No attack | 1.0000 | 1.0000 |
Salt and pepper noise (0.05) | 0.9987 | 0.9887 |
Median filter ( |
0.9654 | 0.9574 |
Rotation (5 degrees) | 0.9613 | 0.9788 |
Image scaling (1/2) | 0.9527 | 0.9755 |
JPEG compression (90) | 0.9774 | 0.9802 |
Cropping | 0.9997 | 1.0000 |
Attack mode Vector image | Figure 2 (a) NC value | Figure 2 (b) NC value | |
JPEG compression (quality factor) | 90 | 0.9778 | 0.9805 |
70 | 0.9594 | 0.9698 | |
50 | 0.9473 | 0.9587 | |
30 | 0.9372 | 0.9583 | |
Salt and pepper noise (intensity) | 0.05 | 0.9877 | 0.9886 |
0.10 | 0.9602 | 0.9734 | |
0.15 | 0.9571 | 0.9722 | |
0.20 | 0.9501 | 0.9579 |
Attack mode Vector image | Figure 2 (a) NC value | Figure 2 (b) NC value | |
JPEG compression (quality factor) | 90 | 0.9778 | 0.9805 |
70 | 0.9594 | 0.9698 | |
50 | 0.9473 | 0.9587 | |
30 | 0.9372 | 0.9583 | |
Salt and pepper noise (intensity) | 0.05 | 0.9877 | 0.9886 |
0.10 | 0.9602 | 0.9734 | |
0.15 | 0.9571 | 0.9722 | |
0.20 | 0.9501 | 0.9579 |
[1] |
Lekbir Afraites, Abdelghafour Atlas, Fahd Karami, Driss Meskine. Some class of parabolic systems applied to image processing. Discrete & Continuous Dynamical Systems - B, 2016, 21 (6) : 1671-1687. doi: 10.3934/dcdsb.2016017 |
[2] |
Gaurav Nagpal, Udayan Chanda, Nitant Upasani. Inventory replenishment policies for two successive generations price-sensitive technology products. Journal of Industrial & Management Optimization, 2021 doi: 10.3934/jimo.2021036 |
[3] |
Zhihua Zhang, Naoki Saito. PHLST with adaptive tiling and its application to antarctic remote sensing image approximation. Inverse Problems & Imaging, 2014, 8 (1) : 321-337. doi: 10.3934/ipi.2014.8.321 |
[4] |
Israa Mohammed Khudher, Yahya Ismail Ibrahim, Suhaib Abduljabbar Altamir. Individual biometrics pattern based artificial image analysis techniques. Numerical Algebra, Control & Optimization, 2021 doi: 10.3934/naco.2020056 |
[5] |
Eduardo Casas, Christian Clason, Arnd Rösch. Preface special issue on system modeling and optimization. Mathematical Control & Related Fields, 2021 doi: 10.3934/mcrf.2021008 |
[6] |
Ardeshir Ahmadi, Hamed Davari-Ardakani. A multistage stochastic programming framework for cardinality constrained portfolio optimization. Numerical Algebra, Control & Optimization, 2017, 7 (3) : 359-377. doi: 10.3934/naco.2017023 |
[7] |
Luke Finlay, Vladimir Gaitsgory, Ivan Lebedev. Linear programming solutions of periodic optimization problems: approximation of the optimal control. Journal of Industrial & Management Optimization, 2007, 3 (2) : 399-413. doi: 10.3934/jimo.2007.3.399 |
[8] |
Jia Cai, Guanglong Xu, Zhensheng Hu. Sketch-based image retrieval via CAT loss with elastic net regularization. Mathematical Foundations of Computing, 2020, 3 (4) : 219-227. doi: 10.3934/mfc.2020013 |
[9] |
Hong Seng Sim, Wah June Leong, Chuei Yee Chen, Siti Nur Iqmal Ibrahim. Multi-step spectral gradient methods with modified weak secant relation for large scale unconstrained optimization. Numerical Algebra, Control & Optimization, 2018, 8 (3) : 377-387. doi: 10.3934/naco.2018024 |
[10] |
Abdulrazzaq T. Abed, Azzam S. Y. Aladool. Applying particle swarm optimization based on Padé approximant to solve ordinary differential equation. Numerical Algebra, Control & Optimization, 2021 doi: 10.3934/naco.2021008 |
[11] |
Mohsen Abdolhosseinzadeh, Mir Mohammad Alipour. Design of experiment for tuning parameters of an ant colony optimization method for the constrained shortest Hamiltonian path problem in the grid networks. Numerical Algebra, Control & Optimization, 2021, 11 (2) : 321-332. doi: 10.3934/naco.2020028 |
[12] |
Reza Lotfi, Yahia Zare Mehrjerdi, Mir Saman Pishvaee, Ahmad Sadeghieh, Gerhard-Wilhelm Weber. A robust optimization model for sustainable and resilient closed-loop supply chain network design considering conditional value at risk. Numerical Algebra, Control & Optimization, 2021, 11 (2) : 221-253. doi: 10.3934/naco.2020023 |
2019 Impact Factor: 1.233
Tools
Article outline
Figures and Tables
[Back to Top]