| Literature DB >> 29782490 |
Xinchun Cui1, Yuying Niu2, Xiangwei Zheng3, Yingshuai Han1.
Abstract
In this paper, a new color watermarking algorithm based on differential evolution is proposed. A color host image is first converted from RGB space to YIQ space, which is more suitable for the human visual system. Then, apply three-level discrete wavelet transformation to luminance component Y and generate four different frequency sub-bands. After that, perform singular value decomposition on these sub-bands. In the watermark embedding process, apply discrete wavelet transformation to a watermark image after the scrambling encryption processing. Our new algorithm uses differential evolution algorithm with adaptive optimization to choose the right scaling factors. Experimental results show that the proposed algorithm has a better performance in terms of invisibility and robustness.Entities:
Mesh:
Year: 2018 PMID: 29782490 PMCID: PMC5962058 DOI: 10.1371/journal.pone.0196306
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Impression drawing after different Arnold transform times.
Fig 2Schematic pictures of three-level discrete wavelet decomposition.
Fig 3Execute process of differential evolution algorithm.
Fig 4Flowchart of watermark embedding and extraction processes.
Fig 5Images of watermarking embedding and extraction.
List of various attacking operations and their parameter values.
| No. | Attack Index | Parameter | Parameter Values |
|---|---|---|---|
| a | GN | Mean | 0.01, 0.02, 0.03, 0.05, 0.07, 0.1, 0.2, 0.3 |
| b | SPN | Mean | 0.01, 0.02, 0.03, 0.05, 0.07, 0.1, 0.2, 0.3 |
| c | RT | Angle | −45, −30, −15, −5, 5, 15, 30, 45 |
| d | CR | Proportion | LU1/8, RU1/8, LM1/8, RM1/8, LU1/4, RD1/4, LD1/4, RU1/4 |
| e | TS | Displacement | -(80×80), -(50×50), -(20×20), -(10×10), 10×10, 20×20, 50×50, 80×80 |
| f | JPEG | Proportion | 30%, 40%, 50%, 60%, 70%, 80%, 90%, 100% |
PSNR values of the original image and the watermarked image.
| No. | Attack index | PSNR value(Lena) | PSNR value(Baboon) |
|---|---|---|---|
| 1 | GN(0.02) | 50.2849 | 53.7963 |
| 2 | SPN(0.05) | 44.1288 | 56.5509 |
| 3 | CR1(LU1/4) | 68.9824 | 51.3377 |
| 4 | CR2(RD1/4) | 46.6858 | 53.3866 |
| 5 | RT1(150) | 47.6478 | 50.9938 |
| 6 | RT2(450) | 51.2513 | 57.8768 |
| 7 | JPEG1(10%) | 46.6858 | 54.6147 |
| 8 | JPEG2(15%) | 58.2483 | 51.3849 |
| 9 | JPEG3(75%) | 50.4360 | 55.3521 |
| 10 | JPEG4(80%) | 46.9279 | 51.0517 |
| 11 | TS1(80×80) | 50.7108 | 65.5389 |
| 12 | TS2(-(80×80)) | 63.5818 | 59.1615 |
Fig 6Watermarked images under various attacks.
Fig 7Extracted watermark images from distorted watermarked images.
Fig 8Comparison of algorithm in term of NC values.
Fig 9NC Values of watermark image under different attack operations.