A hybrid matrix factorization technique to free the watermarking scheme from false positive and negative problems
- PDF / 5,456,336 Bytes
- 36 Pages / 439.642 x 666.49 pts Page_size
- 91 Downloads / 192 Views
A hybrid matrix factorization technique to free the watermarking scheme from false positive and negative problems K. Meenakshi1
· K. Swaraja1 · Padmavathi Kora1
Received: 26 April 2019 / Revised: 13 June 2020 / Accepted: 24 June 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Optimization techniques are used in watermarking algorithms to balance the trade-off between the two mutually conflicting parameters-imperceptibility and robustness. Differential Evolution (DE) with Rotational Cross over (RCO), namely DE-RCO, is employed in the proposed algorithm to improve the convergence of optimization. The DE-RCO provides a watermarking scheme with the highest robustness preserving the transparency. The watermark encoding and decoding carried in the transform domain with a hybrid combination of Schur Factorization (SF) and Singular Value Decomposition (SVD). Two-fold security provided with the Digital Signature (DS) generation and B-test. The DS is concealed in the watermarked image for authentication purpose of freeing the algorithm from the false-positive problem. When the signature passed through the insecure channel, it may corrupt and lead to the failure of the A-test, even the correct watermark given at the extraction leading to the false-negative problem. B-test is conducted to free the algorithm from a false negative problem. An enhanced authentication framework designed and implemented to make the algorithm free from the false-positive and false-negative issues using DS and the hash generated by Gaussian Hermite Moments (GHMs). The experimental results compared with the related existing watermarking schemes demonstrate that the proposed scheme exhibit strong robustness to attacks, invisible and highly secure against false-positive and false-negative problems. Keywords Rotation crossover · Gaussian Hermite Moments · Differential Evolution · Schur Factorization · Singular Value Decomposition
1 Introduction The widespread usage of multimedia accompanied by high-speed Internet and mobile technology has introduced new problems to content owners of multimedia documents [13, 14, 34]. Digital watermarking protects the interests of content owners by concealing the K. Meenakshi
[email protected] 1
Department of ECE, GRIET, Hyderabad, India
Multimedia Tools and Applications
owner’s information as watermark [43]. The watermark is embedded in the host media with a slight modification to obtain the watermarked image. The watermark must be decrypted at the extraction side even when different attacks distort the watermarked image. Because of these characteristics, the watermarking techniques are widely used in copyright protection, broadcast monitoring, and multimedia anti-piracy. In the literature, watermarking is performed in three types of domains, namely spatial, frequency, and hybrid domains. In the spatial domain [5, 28, 29, 44], watermark is embedded directly into the pixels of image. Examples of watermarking in pixel domain are embedding of the watermark in the Least Signif
Data Loading...