Cart (Loading....) | Create Account
Close category search window

Wavelet-based oblivious image watermarking scheme using genetic algorithm

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Ramanjaneyulu, K. ; Dept. of Electron. & Commun. Eng., Acharya Nagarjuna Univ., Bapatla, India ; Rajarajeswari, K.

In this work, a robust and oblivious image watermarking scheme based on discrete wavelet transform (DWT) for copyright protection is presented. The original unmarked image is not required for watermark extraction. Third-level DWT is applied to the original cover image. Third- and second-level horizontal detail sub-band (LH2 and LH3) coefficients are grouped into different blocks. Grouping of the coefficients is done in such a way that each block should contain one coefficient from LH3 sub-band and four coefficients from LH2 sub-band. In each block, the first minimum and the second minimum are identified and modified according to the watermark bit. After watermark insertion, inverse DWT is applied to the sub-bands with modified coefficients to obtain the watermarked image. For watermark extraction, a threshold-based decoder is designed. Embedding and extraction process are characterised with parameters and genetic algorithm is used for parameter optimisation. Optimisation is to maximise the values of peak signal-to-noise ratio of the watermarked image and normalised cross correlation of the extracted watermark. The performance of the proposed scheme is compared with the existing schemes and significant improvement is observed. Experimental results show that, this algorithm is highly robust for many image attacks on the watermarked image.

Published in:

Image Processing, IET  (Volume:6 ,  Issue: 4 )

Date of Publication:

June 2012

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.