Work place: Department of Computer Engineering, Rajasthan College of Engineering for Women, Jaipur, Rajasthan, India
E-mail: shikha.chaudhary18@gmail.com
Website:
Research Interests: Models of Computation, Theory of Computation, Image Processing, Computational Learning Theory
Biography
Shikha Choudhary is Research Scholar at RIET, Rajasthan, She received her M. Tech degree in Computer Science and Engineering from Banasthali Vidhyapeeth, Niwai, Rajasthan, in 2006, and B.E. degree in Computer Engineering from Mody College of Engineering, Sikar, Rajasthan in 2002. Her professional activities have been focused in Image Processing, Cloud Computing, and Theory of Computation.
By Sachin Sharma Shikha Choudhary Vijay Kumar Sharma Ankur Goyal Meena Malik Balihar
DOI: https://doi.org/10.5815/ijigsp.2022.02.01, Pub. Date: 8 Apr. 2022
Preventing the digital content from being copied, manipulated and illegal ownership claims is one of the biggest challenges that appeared with the widespread usage of computing facilities. Watermarking is one way to tag a digital document with a watermark, perceptible or imperceptible, so as to later prove the ownership or authenticity of the document, in case the need arises. Robust and Fragile watermarking is used in case of proving ownership and authenticity, respectively. This paper proposes a watermarking approach based on Discrete Wavelet Transform (DWT), Hessenberg Decomposition (HD) and Singular Value Decomposition (SVD) approach, augmented with Firefly Algorithm (FA). To make the approach blind, the proposed technique uses Hu’s invariant moments which are invariant against rotation, scaling and translation (RST) attack over the image. In the resulting watermarked image, the watermark is imperceptible, which make it suitable for a large class of watermarking applications. In the proposed approach, a given colour image is subjected to 2 Level DWT for decomposing into sub-bands, namely LL, LH, HL and HH bands. These coefficients of HH band are fed as input for HD. The output is operated for SVD for obtain U, S and V matrices. The Hu’s invariant moments are scaled and mapped to binary string using logarithm scaling. The binary matrix, corresponding to binary watermark, is XoRed with the invariant moments, in a repeated manner, to obtain a new binary matrix, of the same dimension as count of 2X2 partitions of S. The watermark is embedded by changing the orthogonal V matrices. The magnitude of the change is computed with Firefly algorithm considering the robustness and imperceptibility as the trade-off parameters. The firefly algorithm is one of the nature inspired optimization algorithm. The proposed watermarking approach is capable of withstanding JPEG compression attack, filtering attacks and noise. PSNR and SSIM are used as the quality metric for accessing the watermarked image quality. It turns out that the proposed watermarking technique gives a considerable improvement over robustness and imperceptibility as compared to the benchmark approaches. The performance of the proposed approach as compared to the benchmark approach, increases in linear manner with the dimension of the image under consideration, reaching from 1 percent to 4 percent for image dimensions ranging from 400X400 to 1200X1200 pixels.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals