271 research outputs found

    Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm

    Get PDF
    Ease process digital data information exchange impact on the increase in cases of copyright infringement. Audio watermarking is one solution in providing protection for the owner of the work. This research aims to optimize the insertion parameters on Modified Discrete Cosine Transform (M-DCT) based audio watermarking using a genetic algorithm, to produce better audio resistance. MDCT is applied after reading host audio, then embedding in MDCT domain is applied by Quantization Index Modulation (QIM) technique. Insertion within the MDCT domain is capable of generating a high imperceptible watermarked audio due to its overlapping frame system. The system is optimized using genetic algorithms to improve the value of imperceptibility and robustness in audio watermarking. In this research, the average SNR reaches 20 dB, and ODG reaches -0.062. The subjective quality testing on the system obtains an average MOS of 4.22 out of five songs tested. In addition, the system is able to withstand several attacks. The use of M-DCT in audio watermaking is capable of producing excellent imperceptibility and better watermark robustness

    Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm

    Get PDF
    Digital watermarking is an effective solution to the problem of copyright protection, thus maintaining the security of digital products in the network. An improved scheme to increase the robustness of embedded information on the basis of discrete cosine transform (DCT) domain is proposed in this study. The embedding process consisted of two main procedures. Firstly, the embedding intensity with support vector machines (SVMs) was adaptively strengthened by training 1600 image blocks which are of different texture and luminance. Secondly, the embedding position with the optimized genetic algorithm (GA) was selected. To optimize GA, the best individual in the first place of each generation directly went into the next generation, and the best individual in the second position participated in the crossover and the mutation process. The transparency reaches 40.5 when GA’s generation number is 200. A case study was conducted on a 256 × 256 standard Lena image with the proposed method. After various attacks (such as cropping, JPEG compression, Gaussian low-pass filtering (3, 0. 5), histogram equalization, and contrast increasing (0.5, 0.6)) on the watermarked image, the extracted watermark was compared with the original one. Results demonstrate that the watermark can be effectively recovered after these attacks. Even though the algorithm is weak against rotation attacks, it provides high quality in imperceptibility and robustness and hence it is a successful candidate for implementing novel image watermarking scheme meeting real timelines

    Steganography Approach to Image Authentication Using Pulse Coupled Neural Network

    Get PDF
    This paper introduces a model for the authentication of large-scale images. The crucial element of the proposed model is the optimized Pulse Coupled Neural Network. This neural network generates position matrices based on which the embedding of authentication data into cover images is applied. Emphasis is placed on the minimalization of the stego image entropy change. Stego image entropy is consequently compared with the reference entropy of the cover image. The security of the suggested solution is granted by the neural network weights initialized with a steganographic key and by the encryption of accompanying steganographic data using the AES-256 algorithm. The integrity of the images is verified through the SHA-256 hash function. The integration of the accompanying and authentication data directly into the stego image and the authentication of the large images are the main contributions of the work

    Towards Optimal Copyright Protection Using Neural Networks Based Digital Image Watermarking

    Get PDF
    In the field of digital watermarking, digital image watermarking for copyright protection has attracted a lot of attention in the research community. Digital watermarking contains varies techniques for protecting the digital content. Among all those techniques,Discrete Wavelet Transform (DWT) provides higher image imperceptibility and robustness. Over the years, researchers have been designing watermarking techniques with robustness in mind, in order for the watermark to be resistant against any image processing techniques. Furthermore, the requirements of a good watermarking technique includes a tradeoff between robustness, image quality (imperceptibility) and capacity. In this paper, we have done an extensive literature review for the existing DWT techniques and those combined with other techniques such as Neural Networks. In addition to that, we have discuss the contribution of Neural Networks in copyright protection. Finally we reached our goal in which we identified the research gaps existed in the current watermarking schemes. So that, it will be easily to obtain an optimal techniques to make the watermark object robust to attacks while maintaining the imperceptibility to enhance the copyright protection

    A Novel DWT-CT approach in Digital Watermarking using PSO

    Get PDF
    The importance of watermarking is dramatically enhanced due to the promising technologies like Internet of Things (IoT), Data analysis, and automation of identification in many sectors. Due to these reasons, systems are inter-connected through networking and internet and huge amounts of information is generated, distributed and transmitted over the World Wide Web. Thus authentication of the information is a challenging task. The algorithm developed for the watermarking needs to be robust against various attack such as salt & peppers, filtering, compression and cropping etc. This paper focuses on the robustness of the algorithm by using a hybrid approach of two transforms such as Contourlet, Discrete Wavelet Transform (DWT). Also, the Particle Swarm Optimization (PSO) is used to optimize the embedding strength factor. The proposed digital watermarking algorithm has been tested against common types of image attacks. Experiment results for the proposed algorithm gives better performance by using similarity metrics such as NCC (Normalized Cross Correlation value) and PSNR (Peak Signal to Noise Ratio)

    Integrasi Discrete Wavelet Transform dan Singular Value Decomposition pada Watermarking Citra untuk Perlindungan Hak Cipta

    Full text link
    Tren masalah watermarking pada sekarang ini adalah bagaimana mengoptimalkan trade-off antara imperceptibility (visibilitas) citra ter-watermark terhadap pengaruh distorsi dan robustness terhadap penyisipan watermark. Masalah menggunakan kekuatan penyisipan berdasarkan Single Scaling Factor (SSF) atau Multiple Scaling Factor (MSF) juga ditemukan. Penelitian ini mengusulkan metode penyisipan watermark untuk perlindungan hak cipta pada citra dan algoritma ekstraksi citra ter-watermark yang dioptimalkan dengan penggabungan Discrete Wavelet Transform (DWT) dan Singular Value Decomposition (SVD). Nilai-nilai singular dari LL3 koefisien sub-band dari citra host dimodifikasi menggunakan nilai tunggal citra watermark biner menggunakan MSFs. Kontribusi utama dari skema yang diusulkan adalah aplikasi DWT-SVD untuk mengidentifikasi beberapa faktor skala yang optimal. Hasil penelitian menunjukkan bahwa skema yang diusulkan menghasilkan nilai Peak Signal to Noise Ratio (PSNR) yang tinggi, yang menunjukkan bahwa kualitas visual gambar yang baik pada masalah citra watermarking telah mengoptimalkan trade-off. Trade-off antara imperceptibility (visibilitas) citra ter-watermark terhadap pengaruh distorsi dan robustness citra ter-watermark terhadap operasi pengolahan citra. Nilai PSNR yang didapat pada citra yang diujikan: baboon=53,184; boat=53,328; cameraman=53,700; lena=53,668; man=53,328; dan pepper sebesar 52,662. Delapan perlakuan khusus pada hasil citra ter-watermark diujikan dan diekstraksi kembali yaitu JPEG 5%, Noise 5%, Gaussian filter 3x3, Sharpening, Histogram Equalization, Scaling 512-256, Gray Quantitation 1bit, dan Cropping 1/8. Hasil dari perlakuan khusus kemudian diukur nilai Normalized Cross-Correlation (NC) yang menghasilkan rata-rata semua citra diperoleh sebesar 0,999 dari satu. Hasil penelitian dari metode yang diusulkan lebih unggul nilai PSNR dan NC dari penelitian sebelumnya. Jadi dapat disimpulkan bahwa penerapan dengan metode DWT-SVD ini mampu menghasilkan citra yang robust namun memiliki tingkat imperceptibility yang cukup tinggi

    Design and Analysis of an Intelligent Integrity Checking Watermarking Scheme for Ubiquitous Database Access

    Get PDF
    As a result of the highly distributed nature of ubiquitous database accessing, it is essential to develop security mechanisms that lend themselves well to the delicate properties of outsourcing databases integrity and copyright protection. Researchers have begun to study how watermarking computing can make ubiquitous databases accessing more confident work environments. One area where database context may help is in supporting content integrity. Initially, most of the research effort in this field was depending on distortion based watermark while the few remaining studies concentrated on distortion-free. But there are many disadvantages in previous studies; most notably some rely on adding watermark as an extra attributes or tuples, which increase the size of the database. Other techniques such as permutation and abstract interpretation framework require much effort to verify the watermark. The idea of this research is to adapt an optimized distortion free watermarking based on fake tuples that are embedded into a separate file not within the database to validate the content integrity for ubiquitous database accessing. The proposed system utilizes the GA, which boils down its role to create the values of the fake tuples as watermark to be the closest to real values. So that it's very hard to any attacker to guess the watermark. The proposed technique achieves more imperceptibility and security. Experimental outcomes confirm that the proposed algorithm is feasible, effective and robust against a large number of attacks

    A Study of Data Security on E-Governance using Steganographic Optimization Algorithms

    Get PDF
    Steganography has been used massively in numerous fields to maintain the privacy and integrity of messages transferred via the internet. The need to secure the information has augmented with the increase in e-governance usage. The wide adoption of e-governance services also opens the doors to cybercriminals for fraudulent activities in cyberspace. To deal with these cybercrimes we need optimized and advanced steganographic techniques. Various advanced optimization techniques can be applied to steganography to obtain better results for the security of information. Various optimization techniques like particle swarm optimization and genetic algorithms with cryptography can be used to protect information for e-governance services. In this study, a comprehensive review of steganographic algorithms using optimization techniques is presented. A new perspective on using this technique to protect the information for e-governance is also presented. Deep Learning might be the area that can be used to automate the steganography process in combination with other method
    corecore