77
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Optimal sub-band and strength selection for blind watermarking in wavelet domain

, &
Pages 171-177 | Received 27 Oct 2011, Accepted 07 Jul 2012, Published online: 06 Dec 2013

References

  • Barni M., Bartolini F., Cappellini V. and Piva A. A DCT-domain system for robust image watermarking. Signal Process., 1998, 66, 357–372.
  • Lou D.-C., Liu J.-L. and Chang M.-C. ‘Combined private and public watermarking in wavelet transform domain’, Technical report, Feng Chia University, Taichung, Taiwan, 2006.
  • Farid A. A dual fourier-wavelet domain authentication-identification watermark. Opt. Express, 2007, 15, 4804–4813.
  • Goldberg D. E. Genetic Algorithms in Search, Optimization and Machine Learning, 1989 (Addison-Wesley Longman Publishing Co., Inc., Boston, MA).
  • Holland J. H. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence, 1992 (MIT Press, Cambridge, MA).
  • Ishtiaq M., Jaffar M. A., Khan M. A., Jan Z. and Mirza A. M. Signal Processing, Image Processing and Pattern Recognition, Vol. 61, Robust and Imperceptible Watermarking of Video Streams for Low Power Devices, 2009, pp. 177–184 (Springer, Berlin/Heidelberg).
  • Ishtiaq M., Sikander B., Jaffar M. A. and Khan A. Adaptive watermark strength selection using particle swarm optimization. ICIC Express Lett., 2010, 4, 1–6.
  • Stephan J. J. and Baker E. J. Image watermarking using wavelet transform, Proc. 4th Int. Muliconf. on Computer science and information technology: CSIT 2006, Amman, Jordan, April 2006, IEEE, pp. 157–162.
  • Kennedy J. and Eberhart R. Particle swarm optimization, Proc. IEEE Int. Conf. on Neural networks: ICNN ’95, Perth, WA, Australia, November 1995, IEEE, pp. 1942–1948,.
  • Khan A., Mirza A. M. and Majid A. Intelligent perceptual shaping of a digital watermark: exploiting characteristics of human visual system. Int. J. Knowl.-Based Intell. Eng. Syst., 2006, 10, 213–223.
  • Lai C.-C., Huang H.-C. and Tsai C.-C. A digital watermarking scheme based on singular value decomposition and micro-genetic algorithm. Int. J. Innov. Comput. Inf. Control, 2009, 5, 1867–1873.
  • Piva A., Barni M., Bartolini F. and Cappellini V. DCT-based watermark recovering without resorting to the uncorrupted original image, Proc. 1997 Int. Conf. on Image processing: ICIP ’97, Washington, DC, USA, October 1997. IEEE Computer Society, Vol. 1, p. 520.
  • Sikander B., Ishtiaq M., Jaffar M. A., Tariq M. and Mirza A. M. Adaptive digital watermarking of images using genetic algorithm, Proc. 2010 Int. Conf. on Information science and applications: ICISA 2010, Seoul, Korea, April 2010, IEEE Computer Society, pp. 512–519.
  • Usman I., Ali A. and Choi T.-S. Reversible watermarking based on intelligent coefficient selection and integer wavelet transform. Int. J. Innov. Comput. Inf. Control, 2009, 5, 4675–4682.
  • Usman I. and Khan A. BCH coding and intelligent watermark embedding: employing both frequency and strength selection. Appl. Soft Comput., 2010, 10, 332–343.
  • Wang H.-X., Lu Z.-M., Pan J.-S. and Sun S-H. Robust blind video watermarking with adaptive embedding mechanism. Int. J. Innov. Comput. Inf. Control, 2005, 1, 247–259.
  • Wang W.-B., Zheng G.-Q., Yong J.-H. and Gu H.-J. A numerically stable fragile watermarking scheme for authenticating 3D models. Comput. Aided Des., 2008, 40, 634–645.
  • Wang X.-Y., Niu P.-P. and Qi W. A new adaptive digital audio watermarking based on support vector machine. J. Netwon Comput. Appl., 2008, 31, 735–749.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.