Abstract
In this paper, an optimized and robust digital image watermarking technique based on lifting wavelet transform (LWT) and firefly algorithm is proposed. LWT is newer and faster generation of former wavelet transforms and firefly algorithm is an efficient optimizing algorithms. In current technique, base image decomposed by LWT into 4 sub bands then the first sub band separated into non overlapping blocks. After that blocks are sorted in order of descending based on standard derivation of each block. Selecting suitable blocks for special embedding process seems to be an optimization problem due to existence of a trade-off between imperceptibility and robustness. Firefly algorithm used to solve this trade-off while selecting primary blocks causes high robustness and low imperceptibility and vice versa. For improving security, Arnold transform applied to watermark and achieved scrambled image bits used as condition for embedding process. The proposed technique evaluated by variety of attacks like additive noise, average filter, median filter, sharpening filter and some other geometric and non-geometric attacks and experimental results showed its good imperceptibility and high robustness.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
In the last few years, with outspread of cyber technologies, multimedia copy rights become unavoidable domain in business dealings [1, 23, 34]. Therefore, watermarking techniques which are the methods of embedding data into image, audio, and video to prevent illegal use of copy files [1, 30] got great attention. It is clear-cut that security and efficiency have the main role in evaluating a watermarking method. On the whole, watermarking techniques are discussed in two different domains:
-
1 -
Spatial Domain which concentrates on applying algorithm to pixels directly. It is easy in implementation but decrease of efficiency caused by complex calculus must be considered [8, 32].
-
2 -
Transform Domain that provides high flexibility and efficiency with low overhead of calculus. However, it must be noticed that locating watermark values into low-frequency ratio may cause huge alternation in base image which is not acceptable. On the other side, embedding that into high frequency ratio steers to a weak point because applying some filters(Attacks) such as low pass filter causes watermark looseness [8, 32]. So as a factor in watermarking process, using transform domain could have lots of effects on results. Many of recent papers, have focused on wavelet based transforms, because it is fast and efficient regarding to other techniques. One of the known wavelet based transforms is DWT (Discrete Wavelet Transform) which is suitable transform domain for watermarking because preferred sub-band can be chosen which causes slight changes in watermarked image [1, 17, 19, 35]. Agoy et al. [1] introduced a novel combination of DWT via chirp z-transform and SVD for image watermarking which shows medium imperceptibility and robustness. As another work, Amiri et al. [3] proposed new visual cryptography based watermarking scheme using DWT and SIFT which shows good imperceptibility and high values for robustness. Also Hu et al. [16] introduced novel scheme based on combination of DWT-DCT for blind image watermarking which shows good capabilities according to metrics. As another wavelet based transforms, the newer version of DWT called LWT became more famous because of fastness and efficiency via other wavelet based transforms [23]. Mehta et al. [24] proposed novel image watermarking scheme based on LWT and GA-LSVR which shows high values in both metrics. As another research, Mehta et al. [25] worked on combination of LWT, QR decomposition and LSVR for image watermarking and results shows high robustness against different kinds of attacks. As another approach, using lossless data hiding technique for reversible watermarking became popular. An et al. [4] proposed a watermarking method using Enhanced Pixel-Wise Masking and Clustering which showed good robustness. Also An et al. [6] presented Content-adaptive reliable method for robust lossless data embedding. In another paper, An et al. [5] developed a statistical quantity histogram Shifting and clustering-based method which shows same good results due to experiments. Furthermore, Gao et al. [12] proposed a novel method for improving reversibility in lossless data hiding with two technique of block skipping scheme and modifying embedding level by a parameter model. Also, Gao et al. [13] developed a framework based on generalized statistical quantity histogram that show same good results.
Up to above discussion, watermarking technique metrics include: imperceptibility that concerns low difference between original and watermarked image and good robustness that points to successful watermark detection even after applying some attacks to watermarked image. These metrics seems to be Consolidation inevitable since you need to use large amount of data to improve robustness that conflicts with imperceptibility [8, 10, 24]. It seems that we need such a trade-off between these two parameters that is reminiscent of optimization problems. Thus as an optimization technique such as genetic algorithms (GA), particle swarm optimization (PSO), differential evolution (DE) may be employed in watermarking applications. There are some strategies numerated to face this kind of issue but in this paper we focus on Firefly algorithm. The main role of optimization phase takes place in choosing suitable blocks for embedding watermark.
Choosing the best blocks in transform domain for embedding process derived to ignore specific percentage of blocks that this percentage named as Ignoring Factor in following. In this case, the Firefly algorithm applied to optimize Ignoring Factor (IF) for embedding the watermark into base medium via lifting wavelet transform.
In this paper, we scrutinize novel method and combination of Lifting Wavelet Transform and Firefly optimization algorithm for digital image watermarking which produces significant results in robustness. Embedding and extracting phase implemented in LWT domain for specific characteristics stated before and firefly algorithm used for optimizing block ignoring factor which balances trade of between imperceptibility and robustness. Remain parts structured as follows. In Section 2, Overview of Lifting Wavelet Transform, Firefly Algorithm, Arnold Transform and evaluation metrics are discussed. The usage of proposed algorithm is introduced in Section 3. Then, experimental results and discussion are presented in Section 4 followed by conclusion and future work in Section 5.
2 Overview of LWT, firefly algorithm, Arnold transformation and evaluation metrics
2.1 Lifting wavelet transform
In recent decade, LWT mentioned by Sweldens [9], becomes a powerful scheme for various applications in the field of image processing such as watermarking [21], image compression [11], pattern recognition [39]. LWT overcomes the defects and limitations of former wavelet transform [23]. On the whole, this strategy contains three fundamental section:
-
Splitting: This points to dividing primary signal Z(x) into even and odd non-overlapping items of Z e (x) and Z o (x).
$$ {Z}_e(x)=Z(2x),{Z}_o(x)=Z\left(2x+1\right) $$(1) -
Prediction: After applying correlation between even and odd item, the one can be predictable by other one. It can be considered as high-pass filter operation. For prediction of Z o (x) we brought Z e (x) item by:
$$ h(x)={Z}_o(x)-P\left({Z}_e(x)\right) $$(2)Where h(x) shows subtraction between primary signal and predicted rate and P(.) is prediction operator.
-
Updating: It can be considered as low-pass filter operation which depict coarse figure of primary signal. For updating even items, we hired h(x) and operator of updating U(.) as follow:
$$ l(x)={Z}_e(x)+U\left(h(x)\right) $$(3)
2.2 Firefly algorithm
Lately, meta-heuristic algorithms has been the focus of academic communities. This kind of algorithms are suitable for conquering optimization problems. FA is one of the meta-heuristic algorithms which proposed by Yang in 2007 [36] for solving optimization problems specially those of multimodal and nonlinear ones. Firefly algorithm inspired from instinctive behavior pattern of fireflies on communicating to each other or finding the mates by bioluminescence process of illustrating natural light [18, 27, 33]. Simplicity, easy implementation, flexibility are strength points of this algorithm [2]. There are some rules we consider for ease of perception [38]:
-
1.
Fireflies attract to each other regardless of sexuality.
-
2.
Attraction depends on brightness. Thus, it can be said, the less bright firefly move to brighter one (In max condition). We’ll see random moves in the case of no light or no brighter firefly can be found.
-
3.
Firefly light intensity is specified by optimized objective function value.
In firefly algorithm, we face two essential factors: light intensity alteration and formulizing attraction rate. The attraction rate β is obtained by light intensity I. The alternation of attraction rate between firefly i and j in distance of d ij , occurs on decrease of light intensity caused by distance. Following equation denotes calculus of intensity for a firefly in the simplest form [8].
Where γ is the light absorption coefficient and I 0 is the base intensity. Since attraction rate of a firefly depends on received intensity in adjacent fireflies, the attraction rate β can be specified by
Where β 0 is attraction rate at d = 0. We can use Cartesian or Euclidean distance for calculating the distance between a pair of fireflies at position of x i and x j as follows:
Where dim shows spatial coordinate dimensions. The fireflies movement are consequence of interactions in such a way that low brighter firefly attracted by high brighter one in maximization condition and vice versa in minimization condition. This process continues until the best result achieved. This process formulated by following equation:
Where the current location of firefly is shown in the primary term and second one indicates attraction while third one depicted randomization by ε as the vector of random values drawn from a Gaussian distribution and α as randomization parameter. In this case, we assume γ = 1 for faster convergence of algorithm to optimal result, β 0 = 0.1 and α in desired range of [0, 1]. It should be noticed that β 0 ranges between [0, 1] where lower bound eventuate to random, distributed and non-cooperative search and on the other side, the upper bound tantamount to cooperation on local domain search. γ represents attractiveness variation which theoretically, ranges in [0, ∞] but practically it must be selected according to the optimization issue. In general, choosing zero value for that shows constant attractiveness and letting it to infinity causes near to zero values for attractiveness which means random search. On the whole, values of these parameters are very significant with regard to impact on algorithm behaviors [7, 28, 37]. The pseudo code for firefly algorithm in finding Min condition is shown in Fig. 1.
2.3 Arnold transformation
For security reasons, applying image scrambling methods are recommended and Arnold transform is one of the powerful and popular one proposed by V.I. Arnold. For a square image, common 2D form of that specialized by equation:
Where N indicates the height of processing image, a and b positive integer values and x k , y k are scrambled image peculiarities in accordance with kth iteration of x k-1 and y k-1. According to special property of Arnold transform, after T n (image period) iteration position of pixel changes to primary position as depicted in Fig. 2. Mentioned figure shows an instance of applying Arnold transform to image with size of 32 × 32. It is clear cut that for k iteration scrambled image, we need T n - k iteration to achieve original image.
2.4 Evaluation metrics
As stated in Section 1, we have two aimed metrics to evaluate our technique. These two metrics are imperceptibility which is measured by peak signal to noise ratio (PSNR) specified by equation:
Where I max is maximum intensity level and MSE is mean square error specified by equation:
Where I and I′ denotes intensity of pixel(x, y) before and after watermarking and robustness which is measured by normalized correlation (NC) specified by Eq. (11) and Bit error rate (BER) specified by Eq. (12).
Where W(i, j) and W′(i, j) represent embedded watermark and extracted watermarked.
Also, for checking visibility and quality of watermarked image there is a subjective method which works with human visual system (HVS) but Sheikh et al. [29] proposed new objective metric named Visual Information Fidelity (VIF) that shows better efficiency and accuracy.
3 Proposed watermarking technique
In current section, we explain proposed watermarking technique in which include Firefly algorithm implementation details for optimizing ignoring factor, embedding and extracting process of watermarking.
3.1 Watermark embedding process
-
Step1:
Watermark safety via Arnold Transform
Watermark image is converted to binary image which size is \( {N_w}^2 \) as a square image. We robust safety of our watermark by applying Arnold transform using k iteration (here k = 16) and this process results to scrambled image. After that, scrambled image formed as a row matrix with length of L swi. Matrix elements are binary values which must be used in embedding process. General form of this matrix is shown in following equations:
$$ SWI=\left[b{e}_1,b{e}_2, \dots,\ b{e}_{L_{swi}}\right],\ b{e}_i\in \left\{0,1\right\} $$(13) -
Step2:
Applying LWT into base image
Apply one level LWT with db2 filter to base image with size of M × N for decomposing it into four sub-bands LL, LH, HL and HH. The size of each sub-band can be calculated by following equations:
$$ SS={M}_L\times {N}_L $$(14)$$ {M}_L = M/{2}^k,\ {N}_L=N/{2}^k $$(15)Where k refers to decomposition level (Here, k = 1).
After that, rip LL matrix coefficients of LWT transform into 3 × 3 non-overlapping blocks as shown in Fig. 3.
-
Step3:
Choosing suitable blocks
Standard deviation (SD) of each block must be calculated and sorted in descending order. If we start embedding from first block with most deviation according to embedding technique, results in high robustness but low imperceptibility and vice versa. So in the following, some percentage of primary blocks (achieved by Firefly Algorithm) ignored for balancing trade-off between our two metrics. After applying Ignoring Factor, select \( \left({L}_{swi}\right) \) number of first blocks for embedding process. For extracting phase, position of these block are needed, so we save index of used blocks in a key_vector array. It should be passed to extracting function as an input parameter.
-
Step4:
Watermark embedding
Afterward, for each block we use coefficients of that block to find min/max values. Then we use min and max values to embed watermark data by instruction depicted in Fig. 4. According to value of each scrambled watermark bit, we change central coefficient to min or max value. In the following, we reconstruct LL sub-band by merging changed blocks and applying inverse LWT to get watermarked Image.
3.2 Watermark extracting process
-
Step1:
Applying LWT into base image
Apply one level LWT and make 3 × 3 non-overlapping blocks as mentioned in step 2 from Section 3.1.
-
Step2:
Extracting scrambled watermark data from watermarked image
Select blocks due to key_vector values, then use instruction shown in Fig. 5 to extract hidden values of scrambled watermark. We find max and min coefficient for each block. After that we compare destination of these two values with central coefficient. Lower value of destination shows tendency to min or max. Then we use it as a condition to get scrambled watermark. Main reason for this comparison refers to probability of distortion occurrence for coefficients by attacks.
-
Step3:
Applying Arnold Transform
Reshape resulted row matrix into two dimensional form and apply (T n – k) time Arnold transform to get watermark.
3.3 Implementation of firefly algorithm to achieve ignoring factor
-
Step 1:
Define n fireflies which each one contains decimal random values.
-
Step 2:
Perform watermark embedding process for each firefly.
-
Step 3:
Obtain M + 1 different watermarked image include one attack free and M attacked ones and compute PSNR and BER for attack free watermarked image.
-
Step 4:
Produce M watermark from attacked watermarked image using extraction process and compute NC and BER for each one.
-
Step 5:
Compute objective function depicted in Eq. 16 for current firefly.
$$ \mathrm{OF} = \left[\upomega \times \left(BER + \frac{1}{PSNR}\right)\right]+\left[\left(\frac{1}{M}\times {\displaystyle {\sum}_{k=1}^M\frac{1}{NC{\left(W,W\prime \right)}_k}}\right) + \left(\frac{1}{M}\times {\displaystyle {\sum}_{k=1}^M BE{R}_k}\right)\right] $$(16)Where first bracket is for attack free phase and second one for attacked phase. Our main aim is minimizing objective function so, as is obvious in formula, lower value of BER along with higher values of PSNR and NC (Bigger values in denominator makes two fraction smaller) makes it possible for us. Second bracket contains average values of BER and 1/NC for attack phase. Also ω (Here ω = 10) used for balancing effect of PSNR, BER and NC for two phase.
-
Step 6:
Move fireflies as for explained in Section 2.2.
-
Step 7:
Iterate step 2 to 6 until max generation reached.
4 Experimental results and comparison
4.1 Experiment description
Our experiments implemented using Intel(R) Core™2 Due 2.53 GHz, windows7 with 4GB RAM in platform of MATLAB R2014b(8.4.0). The performance of our technique evaluated by utilizing standard grayscale images of “Lena”, “Boat”, “Mandrill”, “Barbara”, “Cameraman”, “Pepper”, “Pirate”, “Jet Plane” and “Lake” with size of 512 × 512 and two binary image of CS as WM1 and test logo as WM2 with size of 32 × 32 which are depicted in Fig. 6a–k.
For optimizing process performed by FA we use 10 fireflies with max generation of 50 and \( \gamma =1.0,\;{\beta}_0=1.0 \) and α = 0.1. Convergence of this algorithm with given parameters studied on “Lena” image with watermark WM2 and gained results showed in Fig. 12. On the whole, all images investigated from two aspect of attack and attack free. For the aspect of attack, we applied 8 kind of image processing functions like Center Cropping (size of 100 × 100), JPEG compression (Q = 70), Average filter, Gaussian filter, Sharpening filter, Gaussian noise, Speckle noise and Salt and Pepper noise as attack process. According to above data, for attack free phase acceptable imperceptibility and high robustness achieved. Good value of PSNR shows good quality of watermarked image so that it is hard to recognize base image from watermarked one. For extracted watermark, significant values of NC and BER indicates accuracy of our technique in extracting watermark. Table 1 shows gained results while Fig. 7 indicates watermarked image and extracted watermark for attack free phase.
For the phase of attack, NC and BER for each attack extracted watermark were computed and results shown in Tables 2, 3, and 4. The description of each attack used in firefly implementation and evaluating current technique are explained as:
-
Filtering Attack: Mean filter and Gaussian filter with mask size of 3 × 3 along with Unsharp Masking as sharpening filter applied to watermarked image and BER and NC of extracted watermark used in objective function of FA.
-
Noise Attack: Salt and Pepper noise with density of 0.01, Gaussian noise and Speckle noise with variance of 0.05 added to image. All results with combination of other densities and variances depicted in Tables 2, 3, and 4.
-
Cropping Attack: Watermarked image cropped by center like a square with size of 100 × 100 and filling it by zero. Achieved results with various positions shown in Tables 2, 3, and 4.
-
JPEG Compression: Watermarked image compressed with quality factor of 70 % for FA phase and other QF hired to evaluate proposed method. All outcomes brought in Tables 2, 3, and 4.
There are some other attacks like median filter, scaling, rotation and Gamma correction applied to watermarked image for boosting evaluation and results shown in Tables 2, 3, and 4.
4.1.1 Study of operational time
For studying operational status of our scheme, we concentrate on that part which has main share in whole time which is optimization code, so proposed scheme was checked in two phase: First phase include Firefly optimization algorithm to get ignoring factor and second phase checked that without optimization by applying random value as ignoring factor. Comparison of operational time, Average BER of attacks and BER for attack free phase showed in Figs. 8, 9 and 10.
4.1.2 Performance evaluation of proposed technique on a dataset
As an extra study, behavior of our technique investigated on 30 images of Pasadena-Houses-2000 dataset [15]. To have fair comparison, all images resized to 512 × 512 and grayscale mode. Experimental results gathered in Table 5 and average values of BER for each attack on all sample images depicted in Figs. 11 and 12.
4.2 Comparison and discussion
In case of investigating operational time, according to our experiment between two schemes of using Firefly optimization algorithm and using random value instead of that, FF shows long runtime (More than 2500 s) for achieving ignoring factor rather than using random number but in case of investigating extracted watermark, significant values of BER and NC indicates undeniable robustness of first scheme. As shown in Fig. 9, upper bound of average BER in optimized phase is less than 0.05 that shows good robustness rather than second scheme with lower bound of 0.19. Interesting point is zero values of BER for optimized scheme in attack free phase against unacceptable values (More than 0.12 except for Lena which is 0.06) of that for second scheme which shows efficiency of firefly algorithm in proposed scheme. So it seems to be worthwhile to spend that much time to achieve this amount of robustness.
Due to main results, our technique shows good robustness about different kinds of additive noise like Salt & Pepper, Poison, Speckle, Gaussian noise with different variances. Low value of BER and on the other side high value of NC shows superiority of our technique. In case of geometric attacks like scaling and rotation inconsistent results achieved. For scaling in both side, down scaling and upper scaling, significant values for BER and NC achieved but rotation demonstrate as a weak point. Main reason for that clearly goes back to block indexes passed from embedding phase. After rotation, position of each block will be changed. So retrieved blocks differs from those of embedding phase. For filtering attacks like Gaussian filter, Average filter, Median filter, Sharpening and wiener filter considerable values obtained. Our scheme was checked with some other kind of attacks like JPEG compression, Gama correction, histogram equalization that led to similar results. On evaluating imperceptibility values bounded between 35 and 39 dB which shows slight distortion in watermarked image but high values of VIF range (more than 0.97) represents good visibility of watermarked image. Visibility of proposed scheme checked on both primary and dataset images with WM2 watermark shown in Fig. 13. In following, an extra study on 30 images done that shows similar results to primary ones, Achieved PSNR of watermarked image and BER, NC values of extracted watermark in attack free phase are in same range of primary results which shows superiority of our scheme. According to Table 5 and Fig. 11, average value of NC and BER of each sample image shows robustness of technique against various kinds of attacks.
In following, our method compared with methods based on discrete wavelet transform and singular value decomposition [20], wavelet coefficient quantization based watermarking [22], dirty paper trellis codes [26], SWT-SVD based watermarking scheme [31] and non-blind watermarking method based on Integer Wavelet Transform [14]. Considering to provide comprehensive comparison to methods, compared papers implemented with grayscale sample image of Lena (Size is [512,512]) on the same platform as ours. As a point, intensity of sample image normalized before operation. Lai’s method [20], concentrate on combination DWT and SVD. We used strength parameter value of 0.01 as scaling factor in implementation. On the other side, Lin’s method [22], focus on difference of wavelet coefficient quantization. We used blocks with size of 7 as mentioned in paper with thresholds of T = 0.04 and y = 0.02. For implementing Miller’s method [26], which is based on dirty paper trellis codes, we used trellis with 64 state and 64 arc per state as mentioned in paper. In other work, Soniwal’s method [31] concentrates on combination of Stationary Wavelet Transform (SWT) with Singular Value Decomposition (SVD). We used k = 0.03 as scaling factor along with mentioned parameters in paper. The last paper, we compare with is Hajiramezan’s non-blind watermarking scheme [14] which focused on Integer Wavelet Transform (IWT) and we implemented that by applying M = 0.1 as strength factor. Details of comparison gathered in Table 6. As stated our method shows better robustness against various attacks rather than other methods except in rotation which discussed before. In following, quality of watermarked image and payload of each technique gathered in Table 7. Situation of these two items shows acceptable quality of proposed scheme. Notice that bold values shows progress in robustness of our technique.
5 Conclusion
In this paper, a novel digital image watermarking technique using combination of Lifting Wavelet Transform and Firefly Algorithm presented. According to standard deviation, non-overlapping blocks sorted and optimization algorithm used for specifying best block for starting embedding process. Our experimental results compared with known other schemes for various image processing attacks like adding noise, smooth filtering, sharpening, gamma correction, cropping and scaling depicted high robustness and acceptable imperceptibility.
Our future work will concentrate on using other kind of optimization algorithm and transform domain. Also working on such a features that is more resistance of geometrical transform to use in embedding process.
References
Agoyi M, Çelebi E, Anbarjafari G (2015) A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition. SIViP 9:735–745. doi:10.1007/s11760-014-0624-9
Ali ES (2015) Speed control of DC series motor supplied by photovoltaic system via firefly algorithm. Neural Comput & Applic 26:1321–1322. doi:10.1007/s00521-014-1796-5
Amiri T, Moghadam ME (2015) A new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover images. Multimedia Tools Appl. doi:10.1007/s11042-015-2770-7
An L, Gao X, Li X, Tao D, Deng C, Li J (2012) Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans Image Process. doi:10.1109/TIP.2012.2191564
An L, Gao X, Yuan Y, Tao D (2012) Robust lossless data hiding using clustering and statistical quantity histogram. Neurocomputing 77(1):1–11. doi:10.1016/j.neucom.2011.06.012
Ana L, Gao X, Yuanc Y, Taod D, Denga C, Jia F (2012) Content-adaptive reliable robust lossless data embedding. Neurocomputing 79:1–11. doi:10.1016/j.neucom.2011.08.019
Arora S, Singh S (2013) The firefly optimization algorithm: convergence analysis and parameter selection. Int J Comput Appl. doi:10.5120/11826-7528
Chen YH, Huang HC (2015) Coevolutionary genetic watermarking for owner identification. Neural Comput & Applic 26:291–298. doi:10.1007/s00521-014-1615-z
Daubeches I, Sweldens W (1998) Factoring wavelet transform into lifting steps. J Fourier Anal Appl 4(3):247–269. doi:10.1007/BF02476026
Elshazly EH, Faragallah OS, Abbas AM, Ashour MA, El-Rabaie EM, Kazemian H et al (2014) Robust and secure fractional wavelet image watermarking. SIViP. doi:10.1007/s11760-014-0684-x
Fan W, Chen J, Zhen J (2005) SPIHT algorithm based on fast lifting wavelet transform in image compression. In: Hao Y et al. (eds) CIS 2005, Part II, LNAI 3802, pp 838–844. doi:10.1007/11596981_122.
Gao X, An L, Li X, Tao D (2009) Reversibility improved lossless data hiding. Signal Process 89(10):2053–2065. doi:10.1016/j.sigpro.2009.04.015
Gao X, An L, Yuan Y, Tao D, Li X (2011) Lossless data embedding using generalized statistical quantity histogram. IEEE Trans Circuits Syst Video Technol 21(8):1061–1070. doi:10.1109/TCSVT.2011.2130410
Hajiramezan S, Hasanzadeh M, Mirghadri A (2015) A new robust and non-blind digital image watermarking scheme based on integer wavelet transform. Knowledge-Based Engineering and Innovation (KBEI), 2015 2nd International Conference on. doi:10.1109/KBEI.2015.7436044
Helle C, Perona P Pasadena Houses 2000. © California Institute of Technology. Available: http://vision.caltech.edu/archive.html.
Hu HT, Hsu LY (2016) Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics. Multimedia Tools Appl. doi:10.1007/s11042-016-3332-3
Huang HN, Chen ST, Lin MS, Kung WM, Hsu CY (2015) Optimization-based embedding for wavelet-domain audio watermarking. J Signal Proc Syst 80:197–208. doi:10.1007/s11265-013-0863-y
Kaur R, Rattan M (2015) Optimization of the return loss of differentially fed microstrip patch antenna using ANN and firefly algorithm. Wirel Pers Commun 80:1547–1556. doi:10.1007/s11277-014-2099-y
Khan M, Shah T (2015) A copyright protection using watermarking scheme based on nonlinear permutation and its quality metrics. Neural Comput & Applic 26:845–855. doi:10.1007/s00521-014-1747-1
Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas. doi:10.1109/TIM.2010.2066770
Lei B, Soon IY, Zhou F, Li Z, Lei H (2012) A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition. Signal Proc 92(9):1985–2001. doi:10.1016/j.sigpro.2011.12.021
Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimedia 10(5):746–757. doi:10.1109/TMM.2008.922795
Mehta R, Rajpal N, Vishwakarma VP (2015) A robust and efficient image watermarking scheme based on Lagrangian SVR and lifting wavelet transform. Int J Mach Learn Cybern. doi:10.1007/s13042-015-0331-z
Mehta R, Rajpal N, Vishwakarma VP (2015) Robust image watermarking scheme in lifting wavelet domain using GA-LSVR hybridization. Int J Mach Learn Cybern. doi:10.1007/s13042-015-0329-6
Mehta R, Rajpal N, Vishwakarma VP (2015) LWT- QR decomposition based robust and efficient image watermarking scheme using Lagrangian SVR. Multimedia Tools Appl. doi:10.1007/s11042-015-3084-5
Miller ML, Doerr GJ, Cox IJ (2002) Dirty-paper trellis codes for watermarking. Image Processing. Proceedings. 2002 International Conference on. doi:10.1109/ICIP.2002.1039904
Rahebi J, Hardalaç F (2015) A new approach to optic disc detection in human retinal images using the firefly algorithm. Med Biol Eng Comput. doi:10.1007/s11517-015-1330-7
Raja NSM, Manic KS, Rajinikanth V (2013) Firefly algorithm with various randomization parameters: an analysis (Eds): SEMCCO 2013, Part I, LNCS 8297, pp. 110–121. doi:10.1007/978-3-319-03753-0_11
Sheikh HR, Bovik AC (2006) Image information and visual quality. IEEE Trans Image Process. doi:10.1109/TIP.2005.859378
Soliman MM, Hassanien AE, Onsi HM (2015) An adaptive watermarking approach based on weighted quantum particle swarm optimization. Neural Comput & Applic. doi:10.1007/s00521-015-1868-1
Soniwal K, Taparia R, Parmar G (2016) Imperceptible hybrid image watermarking using SWT-SVD and their performance analysis in compressed domain. Int J Electron Electr Comput Syst 5
Su Q, Wang G, Jia S, Zhang X, Liu Q, Liu X (2015) Embedding color image watermark in color image based on two-level DCT. SIViP 9:991–1007. doi:10.1007/s11760-013-0534-2
Thafasal Ijyas VP, Sameer SM (2014) Firefly algorithm for joint estimation of frequency offsets and channel in OFDMA uplink. Wirel Pers Commun 79:565–580. doi:10.1007/s11277-014-1873-1
Walia E, Suneja A (2014) A robust watermark authentication technique based on Weber’s descriptor. SIViP 8:859–872. doi:10.1007/s11760-012-0312-6
Wang J, Lian S, Wang J (2015) Hybrid additive multi-watermarking and decoding. Multimedia Systems. doi:10.1007/s00530-013-0338-9
Yang XS (2008) Nature-inspired metaheuristic algorithms. Luniver Press, Frome, p 808, ISBN: 1-905986-10-6
Yang XS (2009) Firefly algorithms for multimodal optimization. In: Stochastic algorithms: Foundations and applications, SAGA, Lecture notes in computer sciences, 5792:169–178. doi:10.1007/978-3-642-04944-6_14
Yang XS (2010) Firefly algorithm, stochastic test functions and design optimization. Int J Bio-inspired Comput 2(2):78–84. doi:10.1504/IJBIC.2010.032124
Zhang SQ, He N, Zang HY (2006) Research of the lifting wavelet arithmetic and applied in rotary mechanic fault diagnosis. J Phys Conf Ser 48:696–700. doi:10.1088/1742-6596/48/1/131
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kazemivash, B., Moghaddam, M.E. A robust digital image watermarking technique using lifting wavelet transform and firefly algorithm. Multimed Tools Appl 76, 20499–20524 (2017). https://doi.org/10.1007/s11042-016-3962-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3962-5