High capacity SMVQ-based hiding scheme using adaptive index
Signal Processing
Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector
Digital Signal Processing
Data hiding based on the similarity between neighboring pixels with reversibility
Digital Signal Processing
Geometric distortion insensitive image watermarking in affine covariant regions
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Minority codes with improved embedding efficiency for large payloads
Multimedia Tools and Applications
Tabu search based multi-watermarks embedding algorithm with multiple description coding
Information Sciences: an International Journal
A review on the design and optimization of interval type-2 fuzzy controllers
Applied Soft Computing
Ant colony based feedback controller design for soft-starter fed induction motor drive
Applied Soft Computing
Image security and biometrics: a review
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Gases Brownian Motion Optimization: an Algorithm for Optimization (GBMO)
Applied Soft Computing
Hi-index | 0.00 |
Applications for robust watermarking is one of the major branches in digital rights management (DRM) systems and related researches. Based on existing experiences to evaluate the applicability of robust watermarking, it is generally agreed that three parameters or requirements, including the quality of watermarked contents, the survivability of extracted watermark after deliberate or unintentional attacks, and the number of bits embedded, need to be considered. However, performances relating to these three parameters conflict with each other, and the trade off must be searched for. In this paper, we take all the three requirements into consideration, and add the flexibility to meet the specific design in implementation. With the aid of genetic algorithm, we design an applicable system that would obtain the good quality, acceptable survivability, and reasonable capacity after watermarking. Simulation results present the effectiveness in practical implementation and possible application of the proposed algorithm.