A hybrid watermarking technique applied to digital images
Applied Soft Computing
Human visual system based adaptive digital image watermarking
Signal Processing
A wavelet-tree-based watermarking method using distance vector of binary cluster
Expert Systems with Applications: An International Journal
A blind watermarking method using maximum wavelet coefficient quantization
Expert Systems with Applications: An International Journal
Attack on "Watermarking method based on significant difference of wavelet coefficient quantization"
IEEE Transactions on Multimedia
A new approach for optimization in image watermarking by using genetic algorithms
IEEE Transactions on Signal Processing
An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization
IEEE Transactions on Multimedia
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
Journal of Systems and Software
An optimized watermarking technique employing SVD in DWT domain
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Robust and secure watermarking scheme for breath sound
Journal of Systems and Software
Reversible watermarking scheme for medical image based on differential evolution
Expert Systems with Applications: An International Journal
A wavelet-based particle swarm optimization algorithm for digital image watermarking
Integrated Computer-Aided Engineering - Anniversary Volume: Celebrating 20 Years of Excellence
Hi-index | 12.06 |
Meerwald, Koidl, and Uhl (2009) pointed out that the method proposed in Lin et al. (2008) exists potential insecurity. This paper proposes an intelligent watermarking by invoking particle swarm optimization (PSO) technique in wavelet domain to overcome the revealed insecurity issue, furthermore resolve the conflict between imperceptibility and robustness of watermarking. In the proposed method, PSO is fused with the method proposed in Lin et al. (2008) (denoted SDWCQ) to avoid potentially insecurity in Lin et al. (2008). That is, the method of using the fixed block size in one subband and the permutation is unable to disguise which coefficients make up a block. The attacker can utilize the insecure property and analyze the significant difference between bipolar watermarks in Lin et al. (2008) to detect the embedded blocks, furthermore modify the significant difference, and result in unable to extract the watermark. In this paper, coefficients are randomly selected from different subbands to make up a block to promote the disguise. Performance analysis shows that the proposed algorithm obviously outperforms SDWCQ which does not use PSO.