Coyote Optimization Algorithm with Hybrid SVD-EVD Approach for Digital Image Watermarking
International Journal of Electronics and Communication Engineering |
© 2023 by SSRG - IJECE Journal |
Volume 10 Issue 5 |
Year of Publication : 2023 |
Authors : R. Parthiban, S. Manikandan |
How to Cite?
R. Parthiban, S. Manikandan, "Coyote Optimization Algorithm with Hybrid SVD-EVD Approach for Digital Image Watermarking," SSRG International Journal of Electronics and Communication Engineering, vol. 10, no. 5, pp. 49-61, 2023. Crossref, https://doi.org/10.14445/23488549/IJECE-V10I5P105
Abstract:
The proliferation of digitalized media on the Internet has assisted in enhancing digitalization, which has increased copyright issues. To solve these copyright issues, digital watermarking methods were used. Digital image watermarking refers to a method in which watermark data is embedded into multimedia products and can be detected or extracted from the watermarked product later. Such techniques ensure content verification, tamper-resistance, integration, and image authentication. Therefore, this study develops a coyote optimization algorithm-based hybrid (COA-hybrid) model for digital Image watermarking. The presented COA-hybrid technique focuses on designing an effective image watermarking approach to fulfil the requirements of imperceptibility and robustness. In addition, the COA-hybrid model integrates the concepts of Singular Value Decomposition (SVD) and Eigen Value Decomposition (EVD). Here, the COA-hybrid technique embeds the watermarking on the DWT sub-band of the cover image. In addition, the watermarking’s placed on the particular value components of the DWT sub-band of the cover imaging. Finally, the COA is utilized to adjust the parameters related to the hybrid model to increase fitness function. The simulation results of the COA-hybrid model are tested on different images, and the results reported the improvements of the COA-hybrid model over other models.
Keywords:
Digital image watermarking, Image protection, Coyote optimization algorithm, Hybrid model, EVD, SVD.
References:
[1] ErtugrulGul, and AhmetNusretToprak, “Contourlet and Discrete Cosine Transform-Based Quality Guaranteed Robust Image Watermarking Method Using Artificial Bee Colony Algorithm,” Expert Systems with Applications, vol. 212, p. 118730, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] NkwachukwuChukwuchekwa, BukolaAkinwola, and James Onojo, “Improved DCT Based Digital Image Watermarking Technique Using Particle Swarm Optimization Algorithm,” International Research Journal of Engineering and Technology (IRJET), vol. 6, no. 1, pp. 2395-0056, 2019.
[Google Scholar] [Publisher Link]
[3] Lei Wang,and HuichaoJi, “A Watermarking Optimization Method Based on Matrix Decomposition and DWT for Multi-Size Images,” Electronics, vol. 11, no. 13, p. 2027, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Zaid Bin Faheem et al., “Image Watermarking Using Least Significant Bit and Canny Edge Detection,” Sensors, vol. 23, no. 3, p. 1210, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Jae-Eun Lee et al., “Digital Image Watermarking Processor Based on Deep Learning,” Electronics, vol. 10, no. 10, p. 1183, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Parmalik Kumar, and A. K. Sharma, “A Robust Image Watermarking Technique Using Feature Optimization and Cascaded Neural Network,” International Journal of Computer Science and Information Security (IJCSIS), vol. 18, no. 8, pp. 36-45, 2019.
[Google Scholar] [Publisher Link]
[7] Vipul Sharma, and Roohie Naaz Mir, “An Enhanced Time Efficient Technique for Image Watermarking Using Ant Colony Optimization And Light Gradient Boosting Algorithm,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 3, pp. 615-626, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] TaybehSalehnia, and AbdolhosseinFathi, “Fault Tolerance in LWT-SVD Based Image Watermarking Systems Using Three Module Redundancy Technique,” Expert Systems with Applications, vol. 179, p. 115058, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Osama R. Shahin, Zeinab M. Abdel Azim, and Ahmed I Taloba, “Maneuvering Digital Watermarking in Face Recognition,” International Journal of Engineering Trends and Technology, vol. 69, no. 11, pp. 104-112, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Tushar Debnath, Surajit Paul, and Kumar Amitabh, “Image Restoration Quality Measurement using Noise Filters,” SSRG International Journal of Electronics and Communication Engineering, vol. 10, no. 2, pp. 1-5, 2023.
[CrossRef] [Publisher Link]
[11] Venkat P. Patil, and C. Ram Singla, “Performance Enhancement of Image Stitching Process Under Bound Energy Aided feature Matching and Varying Illumination Environments,” SSRG International Journal of Electronics and Communication Engineering, vol. 6, no. 9, pp. 1-6, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[12] KarimanMamdouh, Noura A. Semary, and Hatem Ahmed, “A Blind Fragile Watermarking for a 3D Triangular Model Based on Curvature Features and Chaos Sequence,” IJCI International Journal of Computers and Information, vol. 9, no. 2, pp. 14-24, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Mourad R. Mouhamedet al., “Watermarking 3DPrinting Data Based on Coyote Optimization Algorithm,” Machine Learning and Big Data Analytics Paradigms: Analysis, Applications and Challenges, vol. 77, pp. 603-624, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Rayappa David Amar Raj, and Kanasottu Anil Naik, “Optimal Reconfiguration of PV Array Based on Digital Image Encryption Algorithm: A Comprehensive Simulation and Experimental Investigation,” Energy Conversion and Management, vol. 261, p. 115666, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[15] M. Sajeer, and Ashutosh Mishra, “A Robust and Secured Fusion Based Hybrid Medical Image Watermarking Approach Using RDWT-DWT-MSVD with Hyperchaotic System-Fibonacci Q Matrix Encryption,” Multimedia Tools and Applications, pp. 1-23, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Junxiu Liu et al., “An Optimized Image Watermarking Method Based on HD and SVD in DWT Domain,” IEEE Access, vol. 7, pp. 80849-80860, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Manuel Cedillo-Hernandez, Antonio Cedillo-Hernandez, and Francisco J. Garcia-Ugalde, “Improving DFT-Based Image watermarking Using Particle Swarm Optimization Algorithm,” Mathematics, vol. 9, no. 15, p. 1795, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] KilariJyothsna Devi et al., “A New Robust and Secure 3-Level Digital Image Watermarking Method Based on G-BAT Hybrid Optimization,” Mathematics, vol. 10, no. 16, p. 3015, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[19] K. Jyothsna Devi et al., “Robust and Secured Watermarking Using Ja-Fi Optimization For Digital Image Transmission in Social Media,” Applied Soft Computing, vol. 131, p. 109781, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Vijay Krishna Pallaw et al., “A Robust Medical Image Watermarking Scheme Based on Nature-Inspired Optimization for Telemedicine Applications,” Electronics, vol. 12, no. 2, p. 334, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[21] El-Sayed M. El-Kenawy et al., “Advanced Dipper-Throated Meta-Heuristic Optimization Algorithm for Digital Image Watermarking,” Applied Sciences, vol. 12, no. 20, p. 10642, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Yifei Wang et al., “A DTCWT-SVD Based Video Watermarking Resistant to Frame Rate Conversion,” In 2022 International Conference on Culture-Oriented Science and Technology (CoST), pp. 36-40, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Dinesh P S et al., “Digital Fragile Watermarking Video Based on Discrete Wavelet Transformation,” SSRG International Journal of Computer Science and Engineering, vol. 6, no. 11, pp. 5-9, 2019.
[CrossRef] [Publisher Link]
[24] Mokhtar Hussein, and B. Manjula, “A Hybrid Approach for SVD and Neural Networks Based Robust Image Watermarking,” International Journal of P2P Network Trends and Technology, vol. 61, no. 2, pp. 117-121, 2018.
[CrossRef] [Publisher Link]
[25] R. Iniyavan, and B. Vijayalakshmi, “Design and Development of Improved Coyote Optimization-Based Adaptive Equalization Technique for ECG Signal Transmission,” ECTI Transactions on Electrical Engineering, Electronics, and Communications, vol. 21, no. 1, pp. 248608-248608, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Snehlata Maloo, Mahendra Kumar, and N. Lakshmi, “A Modified Whale Optimization Algorithm Based Digital Image Watermarking Approach,” Sensing and Imaging, vol. 21, no. 26, pp. 1-22, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[27] SonileKatungulaMusonda, and John Soraghan, “Digital Image Watermarking in the Discrete Wavelet Domain and Analysis of the Effects of Compression on Watermarked Images,” SSRG International Journal of Electrical and Electronics Engineering, vol. 2, no. 12, pp. 1-14, 2015.
[CrossRef] [Publisher Link]
[28] S.Jagadeesan, and P.Jaisankar, “Fused Distortion Measurement For Securing Rgb Steganography,” International Journal of Engineering Trends and Technology, vol. 68, no. 3, pp. 64-68, 2020.
[CrossRef] [Google Scholar] [Publisher Link]