Summary
Applications for robust watermarking is one of the major branches in digital rights management (DRM) systems. Based on existing experiences to assess how good one robust watermarking is, it is generally agreed that three parameters or requirements, including the quality of watermarked contents, the survivability of extracted watermark after deliberate or unintentional attacks, and the number of bits embedded, need to be considered. However, performances relating to these three parameters conflict with each other, and the trade off must be searched for. In this chapter, we take these requirements into consideration, and we can find the optimized combination among the three parameters. With the aid of genetic algorithm, we design an applicable system that would obtain the good quality, acceptable survivability, and reasonable capacity after watermarking. Simulation results present the effectiveness in practical implementation and possible application of the proposed algorithm.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Gen, M., Cheng, R.: Genetic Algorithms and Engineering Design. Wiley, New York (1997)
Huang, H.C., Pan, J.S., Huang, Y.H., Wang, F.H., Huang, K.C.: Progressive watermarking techniques using genetic algorithms. Circuits, Systems, and Signal Processing 26, 671–687 (2007)
Koenen, R.H., Lacy, J., Mackay, M., Mitchell, S.: The long march to interoperable digital rights management. Proc. of the IEEE 92, 883–897 (2004)
Macq, B., Dittmann, J., Delp, E.J.: Benchmarking of image watermarking algorithms for digital rights management. Proc. of the IEEE 92, 971–984 (2004)
Morelos-Zaragoza, R.H.: The Art of Error Correcting Coding, 2nd edn. Wiley, New York (2006)
Pan, J.S., Huang, H.C., Jain, L.C. (eds.): Intelligent Watermarking Techniques, pp. 3–38. World Scientific Publishing Company, Singapore (2004)
Pan, J.S., Huang, H.C., Jain, L.C., Fang, W.C. (eds.): Intelligent Multimedia Data Hiding. Springer, Heidelberg (2007)
Petitcolas, F.A.P.: Stirmark benchmark 4.0 (2004), http://www.petitcolas.net/fabien/watermarking/stirmark/
Piva, A., Bartolini, F., Barni, M.: Managing copyright in open networks. IEEE Internet Comput. 6, 18–26 (2002)
Shehab, M., Bertino, E., Ghafoor, A.: Watermarking relational databases using optimization-based techniques. IEEE Trans. on Knowledge and Data Engineering 20, 116–129 (2008)
Shieh, C.S., Huang, H.C., Wang, F.H., Pan, J.S.: An embedding algorithm for multiple watermarks. Journal of Information Science and Engineering 19, 381–395 (2003)
Shieh, C.S., Huang, H.C., Wang, F.H., Pan, J.S.: Genetic watermarking based on transform domain techniques. Patt. Recog. 37, 555–565 (2004)
Wang, S., Zheng, D., Zhao, J., Tam, W.J., Speranza, F.: An image quality evaluation method based on digital watermarking. IEEE Trans. Circuits and Systems for Video Technology 17, 98–105 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Huang, HC., Chu, CM., Pan, JS. (2009). Genetic Watermarking for Copyright Protection. In: Pan, JS., Huang, HC., Jain, L.C. (eds) Information Hiding and Applications. Studies in Computational Intelligence, vol 227. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02335-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-02335-4_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02334-7
Online ISBN: 978-3-642-02335-4
eBook Packages: EngineeringEngineering (R0)