Digital watermarking
Genetic Algorithms in Search, Optimization and Machine Learning
Genetic Algorithms in Search, Optimization and Machine Learning
Attack modelling: towards a second generation watermarking benchmark
Signal Processing - Special section on information theoretic aspects of digital watermarking
Informed Watermarking
A Stochastic Approach to Content Adaptive Digital Image Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Second Generation Benchmarking and Application Oriented Evaluation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
ART2-Based Genetic Watermarking
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
Watermarking Systems Engineering (Signal Processing and Communications, 21)
Watermarking Systems Engineering (Signal Processing and Communications, 21)
A new approach for optimization in image watermarking by using genetic algorithms
IEEE Transactions on Signal Processing
An asymmetric subspace watermarking method for copyright protection
IEEE Transactions on Signal Processing
An improved asymmetric watermarking scheme suitable for copy protection
IEEE Transactions on Signal Processing
Digital Image Tracing by Sequential Multiple Watermarking
IEEE Transactions on Multimedia
Genetic algorithm based methodology for breaking the steganalytic systems
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Improved wavelet-based watermarking through pixel-wise masking
IEEE Transactions on Image Processing
Hi-index | 0.00 |
The present paper proposes a new flexible and effective evaluation tool based on genetic algorithms to test the robustness of digital image watermarking techniques. Given a set of possible attacks, the method finds the best possible un-watermarked image in terms of Weighted Peak Signal to Noise Ratio (WPSNR). In fact, it implements a stochastic search of the optimal parameters to be assigned to each processing operation in order to find the combined attack that removes the watermark while producing the smallest possible degradation of the image in terms of human perception. As a result, the proposed method makes it possible to assess the overall performance of a watermarking scheme, and to have an immediate feedback on its robustness to different attacks. A set of tests is presented, referring to the application of the tool to two known watermarking approaches.