SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.2, March 2014
DOI:10.5121/ijfcst.2014.4203 21
Enhancement of Genetic Image Watermarking
Robust Against Cropping Attack
Seyed Sahand Mohammadi Ziabari
Department of Information, Communication and Technology, Malek Ashtar University of
Technology, Tehran, Iran
ABSTRACT
The enhancement of image watermarking algorithm robust against particular attack by using genetic
algorithm is presented here. There is a trade-off between imperceptibility and robustness in image
watermarking. To preserve both of these characteristics in digital image watermarking in a logical value,
the genetic algorithm is used. Some factors were introduced for providing robustness of image
watermarking against cropping attack such as the Centre of Interest Proximity Factor (CIPF), the
Complexity Factor (CF) and the Priority Coefficient (PC).
KEYWORDS
Cropping, Genetic algorithm, Image, Region of Interest, Watermarking.
1. INTRODUCTION
Nowadays, digital data are increased in digital media and protecting these data against abusing is
an important issue. There are three main categories in protecting these data against misuses and
attacks for removing or damaging embedded data known as cryptology, steganography and
watermarking [2]. The latter is used mostly in digital communication. Watermarking is the
science of hiding trademark, logo or copyright into the digital data.
Watermarking is divided into two main categories which are known as spatial domain and
transform domain. Each of these categories has their advantages and disadvantages. However the
spatial domain has low complexity implementation, due to better robustness and fidelity the latter
mostly is used rather than the spatial domain.
The transform domain based on its transform function is divided into many subdivisions. The
mostly used transform domains are Discrete Wavelet Transform (DWT) and Discrete Cosine
Transform (DCT). Watermarking in the DWT domain allows localization in both time and spatial
frequency domain and it has higher compression ratio which is relevant to human perception
[2].Whereas it has high complexity and time consumption and it has noise near the edges of the
image after transform. Watermarking in the DCT domain has a good invisibility and it will not
get influenced by embedding and in extracting of the watermarks they will not removed, if they
embedded into the best coefficients. This will be done with genetic algorithm here.
This paper is organised as follows. Firstly, the regions of interest factors in digital image
watermarking are introduced. Secondly, the embedding algorithm is proposed and at the end the
experimental results are shown.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.2, March 2014
22
2. REGIONS OF INTEREST
Finding the best regions or some coefficients for embedding the watermarks into the cover image
is a hard decision. There are some algorithms for finding these regions which are known as
regions of interest (ROI); the regions which are known as the texture areas that have more
information than the other areas in images. The simplest way of dividing idea to images into
textured and non-textured can be separated manually. But, deciding whether the selected areas are
textured or not is another problem that should be done precisely. Due to doing this division
manually it can also have much more time consumption rather than dividing automatically. Also
the textured areas of different images are different and when there are a lot of different images for
embedding this division may be selected wrongly.
2.1. THE CENTRE OF INTEREST PROXIMITY FACTOR
The idea of The Centre of Interest Proximity Factor (CIPF) is introduced by [5] and it is as
follows. For each 8*8 blocks of cover image the Euclidean distance r(m,n) between the centre of
the block with coordinates (m,n) and the centre of interest (with coordinates (M/2,N/2) if the
centre of interest is as the same of the centre of image) is determined and this distance then
normalized over the diagonal [5]. Corresponding to the other factors which are introduced later
this normalized distance value should be in the range of the others and because of that this value
processed through a transfer function as (1).
(1)
Where (r norm) is the normalized distance value and k is selected in [10-25].
2.2. The Complexity Factor
In [5] it is shown that it is not a good idea to use variance values of the images to realize how
much watermarks can be embedded into the cover image without any major perceptual distortion
in cover image. It is claimed that for two similar images the variance values are equal whereas it
can be embedded more information to one of those images rather than the other one. It is
measured as (2).
(2)
Where Di is a vector (1*63) including the DCT coefficients of the ith
block of the image according
to the standard zigzag scan.
2.2. The Priority Coefficient
Each of the aforementioned factors has its ability to whether robust against some particular
attacks or imperceptibility after watermarking. According to what the application of
watermarking is, the owner of digital media can use one of those factors. If both robustness and
imperceptibility are important for the user, he can join the aforementioned factors together as
(2)(3).
(3).K KPC CIPF CF=
Where PC is the Priority Coefficient that sorts the blocks of the cover image.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.2, March 2014
23
3. EMBEDDING ALGORITHM WITHOUT GENETIC ALGORITHM
At first the embedding algorithm which has been used in the DCT domain by [7,8] is introduced
then the embedding algorithm by using genetic algorithm (GA) will be introduced in the next
section in a row.
Let I be an image with M1*M2 pixels that M1 and M2 are the number of rows and columns in the
cover image, respectively. In the DCT domain the image is divided into 8*8 blocks, so there are
(M1*M2/8*8) blocks in the cover image. We represent the number of row and column blocks by
U and V, respectively. After implementing DCT domain on the cover image, the correlation
values of blocks are computed by (3)(4).
(4)
1 1
1
( , ) ( , ) / (0,0)
*
U V
uv uvu v
R i j C i j C
U V = =
= ∑ ∑
Where R(i,j) is the correlation value, Cuv(i,j) is the AC coefficient and Cuv(0,0) is the DC in each
blocks.
As the [7] embedding algorithm, for embedding the uv should be computed which is shown in
(3). The new coefficients in transformed blocks after embedding are calculated as (5).
(5)^
(0,0) ( , )uv uvC C R i j=
(6)^ ^
' ^ ^
( , ) , ( , ) ( , ) & 0
( , ) , ( , ) ( , ) & 1
( , ),
uv uv uv
uv uv uv uv
uv
C i j if C i j C i j w
C C i j if C i j C i j w
C i j else
α α
α α
 − − < =

= + − < =


Where હ is selected manually and with experience the best value can be chosen. W is the
watermark value in the binary watermark image.
4. EXTRACTING ALGORITHM
For extracting watermark bits in the watermarked image the cover image is not needed. In other
words, the blind watermarking is presented here.
Let I'
be the watermarked image. At first, it is transformed by DCT. Secondly, the correlation
values for all blocks are calculated as (6).
(7)' '
1 1
1
( , ) ( , ) / (0,0)
*
U V
uv uvu v
R i j C i j C
U V = =
= ∑ ∑
Where is the ith
row and jth
column of the transformed block. The extracting algorithm
is as (7).
(8)' ' '
^ 1, ( , ) (0,0) ( , )
0,
uv uvif C i j C R i j
W
if else
 ≥
= 

Where is the extracted bit in the watermarked image.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.2, March 2014
24
5. EMBEDDING WITH GENETIC ALGORITHM
In this section, the use of GA [1, 3-12] in the watermarking algorithm is illustrated. The main
algorithm was used in [6] and it is as follows;
• The multi-objective genetic algorithm is used, means the fitness function in GA is
included robustness and perceptibility factors.
• The value of α is considered as embedding strength coefficient and the best value is
calculated by trial and error.
• The chromosome representation is 32bit chromosome which can be decreased to 16 bits.
Table 1 shows this chromosome representation.
Table 1. Chromosome representation.
8 bit4 bit4 bit8 bit8 bit
α
value
Column
Coefficient
Number
Of
Blocks
(J)
Row
Coefficient
Number
Of
Blocks
(I)
Column
Number
Of
Blocks
(V)
Row
Number
Of
Blocks
(U)
Chromosome
Representation
In GA
6. EVALUATION OF EMBEDDING ALGORITHM
The multi-objective genetic algorithm (MOGA) is used here. The Peak Signal to Noise Ratio
(PSNR) and Bit Error Rate (BER) are considered as fitness function for MOGA. The PSNR and
BER calculations are as (8)(1) and (9), respectively.
(1)2
1 2
1 2 2
1 2
255 * *
( ( , ) ( , ))
1010.log
M M
i i
M M
y i j y i j
PSNR = =
−∑ ∑=
(2)'
1
N
ii
w w
BER
N
=
⊕
=
∑
Where M1 and M2 are the numbers of rows and columns of cover image. y(i,j) and ) are the
cover image and watermarked image pixels, respectively. N is the total number of watermark
image, W and W'
are the watermark image bits and the extracted watermark bits.
7. EXPERIMENTAL RESULT
In this paper, the Cameraman with 256*256 and Flower with 32*32 pixels are considered as
cover and watermarked images, respectively. Firstly, the regions of interest of the cover image is
extracted and the best blocks for embedding robust against cropping attack and with the best
imperceptibility are selected by pre-processing factors. The part of the sorted blocks of
Cameraman is shown in Table2.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.2, March 2014
25
Table 2. Original and Sorted image blocks of Cameraman.
1024..............4321Original
image
blocks
567..............308274910367Sorted
image
blocks
The first column in Table 2 shows the original image blocks, whereas the second column shows
the sorted blocks based on the region of interest criterion. After selecting the best blocks, the GA
is used to find the best coefficients of the sorted blocks for embedding. For embedding using GA,
the number of watermark bits in each block can be chosen 2, 4 or 8. In this paper this number is
equal to 2 bits per block. So, the number of bits per block for watermarking can be changed
according to its size of the cover image and the operator. The more the number of bits for
embedding in each blocks, the more the degradation in imperceptibility and robustness will be
occurred. The experimental results are shown in Table 3. The results of watermarked image after
some attacks are shown in Figure 1.
(a) (b)
(c) (d)
Figure1. The watermarked image and extracted watermark after (a) Median filter, (b) Histogram
equalization, (c) Scaling (30%), (d) Cropping attacks.
Table 3. Comparison of Wang & Presented algorithm.
ALGORITHMWANGALGORITHMPRESENTEDCOMPARISON
1-BERPSNR1-BERPSNRWang &
Presented
Algorithms
0.6826.570.58229.89Salt & Pepper
0.5421.130.54327.34Median filter
0.4320.530.43726.42Sharpening
0.4125.720.56127.65Motioning
0.4625.810.52925.72Blurring
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.2, March 2014
26
0.2220.110.41828.32Histogram
Equalization
0.2334.510.32435.14Scaling (30%)
0.3915.310.66318.29Cropping
8. CONCLUSION
The watermarking robust against the cropping attack and with good imperceptibility is introduced
here by using some pre-processing factors which are known as region of interest factors. After
sorting the cover image blocks, the multi-objective genetic algorithm is used for finding the best
coefficients in each sorted blocks. The results show improvement in the watermarking robustness
and imperceptibility criteria comparison to the conventional watermarking algorithms.
REFERENCES
[1] M. Lee, S Chen," Image copyright protection scheme using sobel technology and genetic algorithm",
International symposium on computer, communication, control and automation (3CA), Tainan,
pp.201-204, 2010.
[2] A. Singh, N. Sharma, M. Dave, A. Mohan, "A novel technique for digital image watermarking in
spatial domain", 2nd
IEE international conference on parallel, distributed and grid computing, Solan,
pp.497-501, 2012.
[3] B. Sikandar, M. Ishtiaq, M.A. Jaffar,M. Tariq, "Adaptive digital watermarking of images using
genetic algorithm" , International conference on information science and applications (ICISA), Seoul,
pp.1-8, 2010.
[4] C.H. Huang, J.L. Wu, "A watermark optimization technique based on genetic algorithms",
Proc.SPIE3971, Security and watermarking of multimedia contents II, 516, 2000.
[5] R. Ioannis,"A DCT-based image watermarking algorithm robust to cropping and compression", Naval
Postgraduate school, Monterey, California 2003.
[6] J. Wang, H. Peng, P. Shi, "An optimal image watermarking approach based on a multi-objective
genetic algorithm", Information science, New York, vol.18, pp.5501-5514, 2011.
[7] F.M. Meng, H. Peng, Z. Pei, J. Wang, "A novel blind image watermarking scheme based on support
vector machine in DCT domain ", In proceeding of international conference on computational
intelligence and security, Suzhou, vol.2, pp.16-20, 2008.
[8] C.S. Shieh, H.C. Huang, F.H. Wang, J.S. Pan, "Genetic watermarking based on transform domain
techniques", Pattern recognition, vol.37, pp.555-565, 2004.
[9] S.S.M. Ziabari, R.E. Atani, K. Keyghobad, A. Riazi, "The optimized image watermarking using
genetic algorithm", Current trends in technology and science, vol.2, Issue 6, pp.359-363, 2013.
[10] S.S.M. Ziabari, R.E. Atani, K. Keyghobad, A. Riazi, "Digital image watermarking using edge
detection and genetic algorithm", International Journal of Scientific Engineering and Technology
(IJSET), vol.3, Issue.1 , 2014.
[11] S.S.M. Ziabari, " Intelligent image watermarking using new Anti-Arnold transform", International
Journal in Foundation of Computer Science & Technology (IFCST), vol.4, Issue.1 , 2014.
[12] J.S. Pan, H.C. Huang, L.C. Jain, "Intelligent watermarking techniques", Series on innovative
intelligence ,World scientific, Vol.7, 2004.
Author
Seyed Sahand Mohammadi Ziabari
Seyed Sahand Mohammadi Ziabari was born in Rasht, Iran. He got his B.Sc degree in Electronics
engineering in 2011 and at the same year he was accepted to follow his master study at Malek Ashtar
University of Technology in Tehran, Iran. He received the M.sc degree in Cryptology in 2013. His research
interests include Cryptology, Image and Speech Processing and watermarking, Fingerprint recognition.

Weitere ähnliche Inhalte

Was ist angesagt?

Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
 
Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images  Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images ijcga
 
Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression IJECEIAES
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsCSCJournals
 
A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014SondosFadl
 
Shot Boundary Detection In Videos Sequences Using Motion Activities
Shot Boundary Detection In Videos Sequences Using Motion ActivitiesShot Boundary Detection In Videos Sequences Using Motion Activities
Shot Boundary Detection In Videos Sequences Using Motion ActivitiesCSCJournals
 
Low complexity features for jpeg steganalysis using undecimated dct
Low complexity features for jpeg steganalysis using undecimated dctLow complexity features for jpeg steganalysis using undecimated dct
Low complexity features for jpeg steganalysis using undecimated dctPvrtechnologies Nellore
 
FUAT – A Fuzzy Clustering Analysis Tool
FUAT – A Fuzzy Clustering Analysis ToolFUAT – A Fuzzy Clustering Analysis Tool
FUAT – A Fuzzy Clustering Analysis ToolSelman Bozkır
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014SondosFadl
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
 
Performance Analysis of CRT for Image Encryption
Performance Analysis of CRT for Image Encryption Performance Analysis of CRT for Image Encryption
Performance Analysis of CRT for Image Encryption ijcisjournal
 
An efficient color image compression technique
An efficient color image compression techniqueAn efficient color image compression technique
An efficient color image compression techniqueTELKOMNIKA JOURNAL
 
Adaptive lifting based image compression scheme using interactive artificial ...
Adaptive lifting based image compression scheme using interactive artificial ...Adaptive lifting based image compression scheme using interactive artificial ...
Adaptive lifting based image compression scheme using interactive artificial ...csandit
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
Development of stereo matching algorithm based on sum of absolute RGB color d...
Development of stereo matching algorithm based on sum of absolute RGB color d...Development of stereo matching algorithm based on sum of absolute RGB color d...
Development of stereo matching algorithm based on sum of absolute RGB color d...IJECEIAES
 

Was ist angesagt? (20)

Video Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical FlowVideo Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical Flow
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
 
Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images  Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images
 
Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...
 
Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression
 
538 207-219
538 207-219538 207-219
538 207-219
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image Cryptosystems
 
A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014
 
Shot Boundary Detection In Videos Sequences Using Motion Activities
Shot Boundary Detection In Videos Sequences Using Motion ActivitiesShot Boundary Detection In Videos Sequences Using Motion Activities
Shot Boundary Detection In Videos Sequences Using Motion Activities
 
Low complexity features for jpeg steganalysis using undecimated dct
Low complexity features for jpeg steganalysis using undecimated dctLow complexity features for jpeg steganalysis using undecimated dct
Low complexity features for jpeg steganalysis using undecimated dct
 
FUAT – A Fuzzy Clustering Analysis Tool
FUAT – A Fuzzy Clustering Analysis ToolFUAT – A Fuzzy Clustering Analysis Tool
FUAT – A Fuzzy Clustering Analysis Tool
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
 
G1802053147
G1802053147G1802053147
G1802053147
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
Performance Analysis of CRT for Image Encryption
Performance Analysis of CRT for Image Encryption Performance Analysis of CRT for Image Encryption
Performance Analysis of CRT for Image Encryption
 
An efficient color image compression technique
An efficient color image compression techniqueAn efficient color image compression technique
An efficient color image compression technique
 
Adaptive lifting based image compression scheme using interactive artificial ...
Adaptive lifting based image compression scheme using interactive artificial ...Adaptive lifting based image compression scheme using interactive artificial ...
Adaptive lifting based image compression scheme using interactive artificial ...
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
H1802054851
H1802054851H1802054851
H1802054851
 
Development of stereo matching algorithm based on sum of absolute RGB color d...
Development of stereo matching algorithm based on sum of absolute RGB color d...Development of stereo matching algorithm based on sum of absolute RGB color d...
Development of stereo matching algorithm based on sum of absolute RGB color d...
 

Andere mochten auch

A statistical comparative study of
A statistical comparative study ofA statistical comparative study of
A statistical comparative study ofijfcstjournal
 
OPTIMIZATION OF CROSS DOMAIN SENTIMENT ANALYSIS USING SENTIWORDNET
OPTIMIZATION OF CROSS DOMAIN SENTIMENT ANALYSIS USING SENTIWORDNETOPTIMIZATION OF CROSS DOMAIN SENTIMENT ANALYSIS USING SENTIWORDNET
OPTIMIZATION OF CROSS DOMAIN SENTIMENT ANALYSIS USING SENTIWORDNETijfcstjournal
 
A Novel Metaheuristics To Solve Mixed Shop Scheduling Problems
A Novel Metaheuristics To Solve Mixed Shop Scheduling Problems A Novel Metaheuristics To Solve Mixed Shop Scheduling Problems
A Novel Metaheuristics To Solve Mixed Shop Scheduling Problems ijfcstjournal
 
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...ijfcstjournal
 
THE NEW HYBRID COAW METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMS
THE NEW HYBRID COAW METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMSTHE NEW HYBRID COAW METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMS
THE NEW HYBRID COAW METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMSijfcstjournal
 
Business and technical requirements of software as-a-service implications in ...
Business and technical requirements of software as-a-service implications in ...Business and technical requirements of software as-a-service implications in ...
Business and technical requirements of software as-a-service implications in ...ijfcstjournal
 
AUTOMATED WORD PREDICTION IN BANGLA LANGUAGE USING STOCHASTIC LANGUAGE MODELS
AUTOMATED WORD PREDICTION IN BANGLA LANGUAGE USING STOCHASTIC LANGUAGE MODELSAUTOMATED WORD PREDICTION IN BANGLA LANGUAGE USING STOCHASTIC LANGUAGE MODELS
AUTOMATED WORD PREDICTION IN BANGLA LANGUAGE USING STOCHASTIC LANGUAGE MODELSijfcstjournal
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
 
The definition of call
The definition of callThe definition of call
The definition of callhujanmalamitu
 
Methodological societies
Methodological societiesMethodological societies
Methodological societiesijfcstjournal
 
Real time eventual consistency
Real time eventual consistencyReal time eventual consistency
Real time eventual consistencyijfcstjournal
 
Novel analysis of transition probabilities in randomized k sat algorithm
Novel analysis of transition probabilities in randomized k sat algorithmNovel analysis of transition probabilities in randomized k sat algorithm
Novel analysis of transition probabilities in randomized k sat algorithmijfcstjournal
 
New approach for solving software project scheduling problem using differenti...
New approach for solving software project scheduling problem using differenti...New approach for solving software project scheduling problem using differenti...
New approach for solving software project scheduling problem using differenti...ijfcstjournal
 
Cloud computing technology for egovernment architecture
Cloud computing technology for egovernment architectureCloud computing technology for egovernment architecture
Cloud computing technology for egovernment architectureijfcstjournal
 
From requirements to ready to run
From requirements to ready to runFrom requirements to ready to run
From requirements to ready to runijfcstjournal
 
Psteceql a novel event query language
Psteceql a novel event query languagePsteceql a novel event query language
Psteceql a novel event query languageijfcstjournal
 
Enhancing network security and performance using optimized acls
Enhancing network security and performance using optimized aclsEnhancing network security and performance using optimized acls
Enhancing network security and performance using optimized aclsijfcstjournal
 

Andere mochten auch (20)

Vancouver Preschools
Vancouver PreschoolsVancouver Preschools
Vancouver Preschools
 
Preschools in Vancouver
Preschools in VancouverPreschools in Vancouver
Preschools in Vancouver
 
A statistical comparative study of
A statistical comparative study ofA statistical comparative study of
A statistical comparative study of
 
OPTIMIZATION OF CROSS DOMAIN SENTIMENT ANALYSIS USING SENTIWORDNET
OPTIMIZATION OF CROSS DOMAIN SENTIMENT ANALYSIS USING SENTIWORDNETOPTIMIZATION OF CROSS DOMAIN SENTIMENT ANALYSIS USING SENTIWORDNET
OPTIMIZATION OF CROSS DOMAIN SENTIMENT ANALYSIS USING SENTIWORDNET
 
A Novel Metaheuristics To Solve Mixed Shop Scheduling Problems
A Novel Metaheuristics To Solve Mixed Shop Scheduling Problems A Novel Metaheuristics To Solve Mixed Shop Scheduling Problems
A Novel Metaheuristics To Solve Mixed Shop Scheduling Problems
 
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...
 
THE NEW HYBRID COAW METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMS
THE NEW HYBRID COAW METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMSTHE NEW HYBRID COAW METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMS
THE NEW HYBRID COAW METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMS
 
Business and technical requirements of software as-a-service implications in ...
Business and technical requirements of software as-a-service implications in ...Business and technical requirements of software as-a-service implications in ...
Business and technical requirements of software as-a-service implications in ...
 
AUTOMATED WORD PREDICTION IN BANGLA LANGUAGE USING STOCHASTIC LANGUAGE MODELS
AUTOMATED WORD PREDICTION IN BANGLA LANGUAGE USING STOCHASTIC LANGUAGE MODELSAUTOMATED WORD PREDICTION IN BANGLA LANGUAGE USING STOCHASTIC LANGUAGE MODELS
AUTOMATED WORD PREDICTION IN BANGLA LANGUAGE USING STOCHASTIC LANGUAGE MODELS
 
Tom thumb preschool Vancouver BC
Tom thumb preschool Vancouver BCTom thumb preschool Vancouver BC
Tom thumb preschool Vancouver BC
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
The definition of call
The definition of callThe definition of call
The definition of call
 
Methodological societies
Methodological societiesMethodological societies
Methodological societies
 
Real time eventual consistency
Real time eventual consistencyReal time eventual consistency
Real time eventual consistency
 
Novel analysis of transition probabilities in randomized k sat algorithm
Novel analysis of transition probabilities in randomized k sat algorithmNovel analysis of transition probabilities in randomized k sat algorithm
Novel analysis of transition probabilities in randomized k sat algorithm
 
New approach for solving software project scheduling problem using differenti...
New approach for solving software project scheduling problem using differenti...New approach for solving software project scheduling problem using differenti...
New approach for solving software project scheduling problem using differenti...
 
Cloud computing technology for egovernment architecture
Cloud computing technology for egovernment architectureCloud computing technology for egovernment architecture
Cloud computing technology for egovernment architecture
 
From requirements to ready to run
From requirements to ready to runFrom requirements to ready to run
From requirements to ready to run
 
Psteceql a novel event query language
Psteceql a novel event query languagePsteceql a novel event query language
Psteceql a novel event query language
 
Enhancing network security and performance using optimized acls
Enhancing network security and performance using optimized aclsEnhancing network security and performance using optimized acls
Enhancing network security and performance using optimized acls
 

Ähnlich wie Enhancement of genetic image watermarking robust against cropping attack

Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofIAEME Publication
 
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...IJECEIAES
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVDIRJET Journal
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption usingcsandit
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERcscpconf
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey ijsc
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )ijsc
 
FUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATION
FUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATIONFUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATION
FUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATIONijcsit
 
Segmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorSegmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorIRJET Journal
 
Kassem2009
Kassem2009Kassem2009
Kassem2009lazchi
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
E0333021025
E0333021025E0333021025
E0333021025theijes
 
3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compressionAlexander Decker
 
Effect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesEffect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesDr. Michael Agbaje
 

Ähnlich wie Enhancement of genetic image watermarking robust against cropping attack (20)

Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
 
Kt3618371840
Kt3618371840Kt3618371840
Kt3618371840
 
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption using
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
 
FUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATION
FUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATIONFUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATION
FUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATION
 
Segmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorSegmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain Tumor
 
1820 1824
1820 18241820 1824
1820 1824
 
1820 1824
1820 18241820 1824
1820 1824
 
Kassem2009
Kassem2009Kassem2009
Kassem2009
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
E0333021025
E0333021025E0333021025
E0333021025
 
3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression
 
By4301435440
By4301435440By4301435440
By4301435440
 
F010232834
F010232834F010232834
F010232834
 
Effect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesEffect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital Images
 

Mehr von ijfcstjournal

A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGijfcstjournal
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSijfcstjournal
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSijfcstjournal
 

Mehr von ijfcstjournal (20)

A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
 

Kürzlich hochgeladen

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Kürzlich hochgeladen (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Enhancement of genetic image watermarking robust against cropping attack

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.2, March 2014 DOI:10.5121/ijfcst.2014.4203 21 Enhancement of Genetic Image Watermarking Robust Against Cropping Attack Seyed Sahand Mohammadi Ziabari Department of Information, Communication and Technology, Malek Ashtar University of Technology, Tehran, Iran ABSTRACT The enhancement of image watermarking algorithm robust against particular attack by using genetic algorithm is presented here. There is a trade-off between imperceptibility and robustness in image watermarking. To preserve both of these characteristics in digital image watermarking in a logical value, the genetic algorithm is used. Some factors were introduced for providing robustness of image watermarking against cropping attack such as the Centre of Interest Proximity Factor (CIPF), the Complexity Factor (CF) and the Priority Coefficient (PC). KEYWORDS Cropping, Genetic algorithm, Image, Region of Interest, Watermarking. 1. INTRODUCTION Nowadays, digital data are increased in digital media and protecting these data against abusing is an important issue. There are three main categories in protecting these data against misuses and attacks for removing or damaging embedded data known as cryptology, steganography and watermarking [2]. The latter is used mostly in digital communication. Watermarking is the science of hiding trademark, logo or copyright into the digital data. Watermarking is divided into two main categories which are known as spatial domain and transform domain. Each of these categories has their advantages and disadvantages. However the spatial domain has low complexity implementation, due to better robustness and fidelity the latter mostly is used rather than the spatial domain. The transform domain based on its transform function is divided into many subdivisions. The mostly used transform domains are Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT). Watermarking in the DWT domain allows localization in both time and spatial frequency domain and it has higher compression ratio which is relevant to human perception [2].Whereas it has high complexity and time consumption and it has noise near the edges of the image after transform. Watermarking in the DCT domain has a good invisibility and it will not get influenced by embedding and in extracting of the watermarks they will not removed, if they embedded into the best coefficients. This will be done with genetic algorithm here. This paper is organised as follows. Firstly, the regions of interest factors in digital image watermarking are introduced. Secondly, the embedding algorithm is proposed and at the end the experimental results are shown.
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.2, March 2014 22 2. REGIONS OF INTEREST Finding the best regions or some coefficients for embedding the watermarks into the cover image is a hard decision. There are some algorithms for finding these regions which are known as regions of interest (ROI); the regions which are known as the texture areas that have more information than the other areas in images. The simplest way of dividing idea to images into textured and non-textured can be separated manually. But, deciding whether the selected areas are textured or not is another problem that should be done precisely. Due to doing this division manually it can also have much more time consumption rather than dividing automatically. Also the textured areas of different images are different and when there are a lot of different images for embedding this division may be selected wrongly. 2.1. THE CENTRE OF INTEREST PROXIMITY FACTOR The idea of The Centre of Interest Proximity Factor (CIPF) is introduced by [5] and it is as follows. For each 8*8 blocks of cover image the Euclidean distance r(m,n) between the centre of the block with coordinates (m,n) and the centre of interest (with coordinates (M/2,N/2) if the centre of interest is as the same of the centre of image) is determined and this distance then normalized over the diagonal [5]. Corresponding to the other factors which are introduced later this normalized distance value should be in the range of the others and because of that this value processed through a transfer function as (1). (1) Where (r norm) is the normalized distance value and k is selected in [10-25]. 2.2. The Complexity Factor In [5] it is shown that it is not a good idea to use variance values of the images to realize how much watermarks can be embedded into the cover image without any major perceptual distortion in cover image. It is claimed that for two similar images the variance values are equal whereas it can be embedded more information to one of those images rather than the other one. It is measured as (2). (2) Where Di is a vector (1*63) including the DCT coefficients of the ith block of the image according to the standard zigzag scan. 2.2. The Priority Coefficient Each of the aforementioned factors has its ability to whether robust against some particular attacks or imperceptibility after watermarking. According to what the application of watermarking is, the owner of digital media can use one of those factors. If both robustness and imperceptibility are important for the user, he can join the aforementioned factors together as (2)(3). (3).K KPC CIPF CF= Where PC is the Priority Coefficient that sorts the blocks of the cover image.
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.2, March 2014 23 3. EMBEDDING ALGORITHM WITHOUT GENETIC ALGORITHM At first the embedding algorithm which has been used in the DCT domain by [7,8] is introduced then the embedding algorithm by using genetic algorithm (GA) will be introduced in the next section in a row. Let I be an image with M1*M2 pixels that M1 and M2 are the number of rows and columns in the cover image, respectively. In the DCT domain the image is divided into 8*8 blocks, so there are (M1*M2/8*8) blocks in the cover image. We represent the number of row and column blocks by U and V, respectively. After implementing DCT domain on the cover image, the correlation values of blocks are computed by (3)(4). (4) 1 1 1 ( , ) ( , ) / (0,0) * U V uv uvu v R i j C i j C U V = = = ∑ ∑ Where R(i,j) is the correlation value, Cuv(i,j) is the AC coefficient and Cuv(0,0) is the DC in each blocks. As the [7] embedding algorithm, for embedding the uv should be computed which is shown in (3). The new coefficients in transformed blocks after embedding are calculated as (5). (5)^ (0,0) ( , )uv uvC C R i j= (6)^ ^ ' ^ ^ ( , ) , ( , ) ( , ) & 0 ( , ) , ( , ) ( , ) & 1 ( , ), uv uv uv uv uv uv uv uv C i j if C i j C i j w C C i j if C i j C i j w C i j else α α α α  − − < =  = + − < =   Where હ is selected manually and with experience the best value can be chosen. W is the watermark value in the binary watermark image. 4. EXTRACTING ALGORITHM For extracting watermark bits in the watermarked image the cover image is not needed. In other words, the blind watermarking is presented here. Let I' be the watermarked image. At first, it is transformed by DCT. Secondly, the correlation values for all blocks are calculated as (6). (7)' ' 1 1 1 ( , ) ( , ) / (0,0) * U V uv uvu v R i j C i j C U V = = = ∑ ∑ Where is the ith row and jth column of the transformed block. The extracting algorithm is as (7). (8)' ' ' ^ 1, ( , ) (0,0) ( , ) 0, uv uvif C i j C R i j W if else  ≥ =   Where is the extracted bit in the watermarked image.
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.2, March 2014 24 5. EMBEDDING WITH GENETIC ALGORITHM In this section, the use of GA [1, 3-12] in the watermarking algorithm is illustrated. The main algorithm was used in [6] and it is as follows; • The multi-objective genetic algorithm is used, means the fitness function in GA is included robustness and perceptibility factors. • The value of α is considered as embedding strength coefficient and the best value is calculated by trial and error. • The chromosome representation is 32bit chromosome which can be decreased to 16 bits. Table 1 shows this chromosome representation. Table 1. Chromosome representation. 8 bit4 bit4 bit8 bit8 bit α value Column Coefficient Number Of Blocks (J) Row Coefficient Number Of Blocks (I) Column Number Of Blocks (V) Row Number Of Blocks (U) Chromosome Representation In GA 6. EVALUATION OF EMBEDDING ALGORITHM The multi-objective genetic algorithm (MOGA) is used here. The Peak Signal to Noise Ratio (PSNR) and Bit Error Rate (BER) are considered as fitness function for MOGA. The PSNR and BER calculations are as (8)(1) and (9), respectively. (1)2 1 2 1 2 2 1 2 255 * * ( ( , ) ( , )) 1010.log M M i i M M y i j y i j PSNR = = −∑ ∑= (2)' 1 N ii w w BER N = ⊕ = ∑ Where M1 and M2 are the numbers of rows and columns of cover image. y(i,j) and ) are the cover image and watermarked image pixels, respectively. N is the total number of watermark image, W and W' are the watermark image bits and the extracted watermark bits. 7. EXPERIMENTAL RESULT In this paper, the Cameraman with 256*256 and Flower with 32*32 pixels are considered as cover and watermarked images, respectively. Firstly, the regions of interest of the cover image is extracted and the best blocks for embedding robust against cropping attack and with the best imperceptibility are selected by pre-processing factors. The part of the sorted blocks of Cameraman is shown in Table2.
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.2, March 2014 25 Table 2. Original and Sorted image blocks of Cameraman. 1024..............4321Original image blocks 567..............308274910367Sorted image blocks The first column in Table 2 shows the original image blocks, whereas the second column shows the sorted blocks based on the region of interest criterion. After selecting the best blocks, the GA is used to find the best coefficients of the sorted blocks for embedding. For embedding using GA, the number of watermark bits in each block can be chosen 2, 4 or 8. In this paper this number is equal to 2 bits per block. So, the number of bits per block for watermarking can be changed according to its size of the cover image and the operator. The more the number of bits for embedding in each blocks, the more the degradation in imperceptibility and robustness will be occurred. The experimental results are shown in Table 3. The results of watermarked image after some attacks are shown in Figure 1. (a) (b) (c) (d) Figure1. The watermarked image and extracted watermark after (a) Median filter, (b) Histogram equalization, (c) Scaling (30%), (d) Cropping attacks. Table 3. Comparison of Wang & Presented algorithm. ALGORITHMWANGALGORITHMPRESENTEDCOMPARISON 1-BERPSNR1-BERPSNRWang & Presented Algorithms 0.6826.570.58229.89Salt & Pepper 0.5421.130.54327.34Median filter 0.4320.530.43726.42Sharpening 0.4125.720.56127.65Motioning 0.4625.810.52925.72Blurring
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.2, March 2014 26 0.2220.110.41828.32Histogram Equalization 0.2334.510.32435.14Scaling (30%) 0.3915.310.66318.29Cropping 8. CONCLUSION The watermarking robust against the cropping attack and with good imperceptibility is introduced here by using some pre-processing factors which are known as region of interest factors. After sorting the cover image blocks, the multi-objective genetic algorithm is used for finding the best coefficients in each sorted blocks. The results show improvement in the watermarking robustness and imperceptibility criteria comparison to the conventional watermarking algorithms. REFERENCES [1] M. Lee, S Chen," Image copyright protection scheme using sobel technology and genetic algorithm", International symposium on computer, communication, control and automation (3CA), Tainan, pp.201-204, 2010. [2] A. Singh, N. Sharma, M. Dave, A. Mohan, "A novel technique for digital image watermarking in spatial domain", 2nd IEE international conference on parallel, distributed and grid computing, Solan, pp.497-501, 2012. [3] B. Sikandar, M. Ishtiaq, M.A. Jaffar,M. Tariq, "Adaptive digital watermarking of images using genetic algorithm" , International conference on information science and applications (ICISA), Seoul, pp.1-8, 2010. [4] C.H. Huang, J.L. Wu, "A watermark optimization technique based on genetic algorithms", Proc.SPIE3971, Security and watermarking of multimedia contents II, 516, 2000. [5] R. Ioannis,"A DCT-based image watermarking algorithm robust to cropping and compression", Naval Postgraduate school, Monterey, California 2003. [6] J. Wang, H. Peng, P. Shi, "An optimal image watermarking approach based on a multi-objective genetic algorithm", Information science, New York, vol.18, pp.5501-5514, 2011. [7] F.M. Meng, H. Peng, Z. Pei, J. Wang, "A novel blind image watermarking scheme based on support vector machine in DCT domain ", In proceeding of international conference on computational intelligence and security, Suzhou, vol.2, pp.16-20, 2008. [8] C.S. Shieh, H.C. Huang, F.H. Wang, J.S. Pan, "Genetic watermarking based on transform domain techniques", Pattern recognition, vol.37, pp.555-565, 2004. [9] S.S.M. Ziabari, R.E. Atani, K. Keyghobad, A. Riazi, "The optimized image watermarking using genetic algorithm", Current trends in technology and science, vol.2, Issue 6, pp.359-363, 2013. [10] S.S.M. Ziabari, R.E. Atani, K. Keyghobad, A. Riazi, "Digital image watermarking using edge detection and genetic algorithm", International Journal of Scientific Engineering and Technology (IJSET), vol.3, Issue.1 , 2014. [11] S.S.M. Ziabari, " Intelligent image watermarking using new Anti-Arnold transform", International Journal in Foundation of Computer Science & Technology (IFCST), vol.4, Issue.1 , 2014. [12] J.S. Pan, H.C. Huang, L.C. Jain, "Intelligent watermarking techniques", Series on innovative intelligence ,World scientific, Vol.7, 2004. Author Seyed Sahand Mohammadi Ziabari Seyed Sahand Mohammadi Ziabari was born in Rasht, Iran. He got his B.Sc degree in Electronics engineering in 2011 and at the same year he was accepted to follow his master study at Malek Ashtar University of Technology in Tehran, Iran. He received the M.sc degree in Cryptology in 2013. His research interests include Cryptology, Image and Speech Processing and watermarking, Fingerprint recognition.