literature survey on multiple image watermarking ... 2/237-257.pdf · watermarking domains: ......

21
ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BYAENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/ANAS 2017 Special 11(6): pages 237-257 Open Access Journal ToCite ThisArticle: Ananth C, Karthikeyan M and Mohananthini N., Literature Survey on multiple image watermarking Techniques with Genetic Algorithm. Advances in Natural and Applied Sciences. 11(6); Pages: 237-257 Literature Survey on multiple image watermarking Techniques with Genetic Algorithm 1 Ananth C, 2 Karthikeyan M and 3 Mohananthini N 1 Assistant Professor / Programmer, Department of computer and Information Science, Annamalai University, Annamalainagar, India. 2 Assistant Professor / Programmer, Department of computer and Information Science, Annamalai University, Annamalainagar, India. 3 Assistant Professor, Department of Electrical and Electronics Engineering, Muthayammal Engineering College, India. Received 28 January 2017; Accepted 22 March 2017; Available online 28 April 2017 Address For Correspondence: Ananth C, Assistant Professor / Programmer, Department of computer and Information Science, Annamalai University, Annamalainagar, India. E-mail: [email protected] Copyright © 2017 by authors and American-Eurasian Network for ScientificInformation (AENSI Publication). This work is licensed under the Creative Commons Attribution International License (CC BY). http://creativecommons.org/licenses/by/4.0/ ABSTRACT Digital image watermarking is an important and useful technology for protecting the copyright of the content. Digital watermarking has been widely applied to solve copyright protection of digital media relating to illegal use of distributions. Multiple watermarks can be used to address multiple applications or one application may be addressed several times. Based on the watermark embedding, the multiple watermarking techniques can be classified into three techniques such as successive, segmented and composite watermarking. It also provides a comprehensive review of the existing literature available on image watermarking methods using optimization techniques. The genetic algorithm is relatively a new optimization technique to improve the performance of imperceptibility on the watermarked image in terms of peak signal to noise ratio and robustness of extracting watermark in terms of normalized correlation. This paper, discusses the theories and survey on multiple watermarking techniques for images using genetic algorithms. KEYWORDS: Composite Watermarking, Genetic algorithm, Multiple Image Watermarking, Segmented Watermarking, Successive Watermarking. INTRODUCTION Watermarks are identifying marks produced during the handmade paper making process and the watermarks first appeared in Fabriano (Italy) during the 13th century. In 1992, Andrew Tirkel and Charles Osborne first coined the term of digital watermark [1]. Mintzer et al. [2] discussed “If one watermark is good, or more better?”. In this converse, the multiple watermarks are employed to convey multiple sets of information into image. Multiple watermarks can be used to address multiple applications or one application may be addressed several times. Digital watermarking is to embed a message into cover media to prove ownership. In 1975, Holland developed a methodology for studying natural adaptive systems and designing artificial adaptive systems [3]. Genetic Algorithm (GA) is based on the concept of natural genetics and random search technique. Genetic algorithm is one of the optimization techniques for improving the performance of watermarking.

Upload: trinhdang

Post on 23-May-2018

216 views

Category:

Documents


1 download

TRANSCRIPT

ADVANCES in NATURAL and APPLIED SCIENCES

ISSN: 1995-0772 Published BYAENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/ANAS

2017 Special 11(6): pages 237-257 Open Access Journal

ToCite ThisArticle: Ananth C, Karthikeyan M and Mohananthini N., Literature Survey on multiple image watermarking Techniques with Genetic Algorithm. Advances in Natural and Applied Sciences. 11(6); Pages: 237-257

Literature Survey on multiple image watermarking Techniques with Genetic Algorithm

1Ananth C, 2Karthikeyan M and 3Mohananthini N 1Assistant Professor / Programmer, Department of computer and Information Science, Annamalai University, Annamalainagar, India. 2Assistant Professor / Programmer, Department of computer and Information Science, Annamalai University, Annamalainagar, India. 3Assistant Professor, Department of Electrical and Electronics Engineering, Muthayammal Engineering College, India. Received 28 January 2017; Accepted 22 March 2017; Available online 28 April 2017

Address For Correspondence: Ananth C, Assistant Professor / Programmer, Department of computer and Information Science, Annamalai University, Annamalainagar, India. E-mail: [email protected]

Copyright © 2017 by authors and American-Eurasian Network for ScientificInformation (AENSI Publication). This work is licensed under the Creative Commons Attribution International License (CC BY). http://creativecommons.org/licenses/by/4.0/

ABSTRACT Digital image watermarking is an important and useful technology for protecting the copyright of the content. Digital watermarking has been widely applied to solve copyright protection of digital media relating to illegal use of distributions. Multiple watermarks can be used to address multiple applications or one application may be addressed several times. Based on the watermark embedding, the multiple watermarking techniques can be classified into three techniques such as successive, segmented and composite watermarking. It also provides a comprehensive review of the existing literature available on image watermarking methods using optimization techniques. The genetic algorithm is relatively a new optimization technique to improve the performance of imperceptibility on the watermarked image in terms of peak signal to noise ratio and robustness of extracting watermark in terms of normalized correlation. This paper, discusses the theories and survey on multiple watermarking techniques for images using genetic algorithms.

KEYWORDS: Composite Watermarking, Genetic algorithm, Multiple Image Watermarking, Segmented Watermarking,

Successive Watermarking.

INTRODUCTION

Watermarks are identifying marks produced during the handmade paper making process and the

watermarks first appeared in Fabriano (Italy) during the 13th century. In 1992, Andrew Tirkel and Charles

Osborne first coined the term of digital watermark [1].

Mintzer et al. [2] discussed “If one watermark is good, or more better?”. In this converse, the multiple

watermarks are employed to convey multiple sets of information into image. Multiple watermarks can be used

to address multiple applications or one application may be addressed several times.

Digital watermarking is to embed a message into cover media to prove ownership. In 1975, Holland

developed a methodology for studying natural adaptive systems and designing artificial adaptive systems [3].

Genetic Algorithm (GA) is based on the concept of natural genetics and random search technique. Genetic

algorithm is one of the optimization techniques for improving the performance of watermarking.

238 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

Watermarking:

Watermarking is the process of embedding watermark into a multimedia object (audio, image, video and

text) such that watermark can be detected or extracted later to make an assertion about the multimedia object

[4].

The classification of watermarking is shown in Figure 1.

Watermarking Types:

According to human perception, the digital watermarks can be divided into visible and invisible

types as follows,

1.1.1 Visible Watermark:

Invisible watermark the watermark appears, information is visible to a viewer in video or

documents only on careful inspection. The logo displayed in one corner of different television channels

is an example of visible watermarking. Braudaway et al. [5] described the technical goals for

watermarking include applying a readily visible mark to the image that clearly identifies its ownership,

permitting all image detail to be visible through the watermark, and making the watermark difficult to

remove.

1.1.2 Invisible Watermark:

The invisible watermark is completely imperceptible and the advantage of such type of

watermarking includes high perceptual quality and a large number of application areas.

1.1.2.1 Invisible-Robust:

The invisible-robust watermark is embedded in such a way that alterations made to the pixel value

are perceptually not noticeable and can be recovered only with the appropriate decoding mechanism

(including image compression, linear or nonlinear filtering, cropping, resampling, rotation and printing).

Resolving rightful ownerships with invisible robust watermarking techniques are implicated in [6].

1.1.2.2 Invisible-Fragile:

The invisible-fragile watermark is embedded in such a way that any manipulation or modification of the

image would alter or destroy the watermark. Chen et al. [7] presented a new fragile watermarking scheme based

on integral wavelet transform. The preliminary experimental results indicate that their proposed method

conforms to the human perception characteristics and provides a perceptually invisible fragile watermark with

fewer image data modified.

1.1.3 Dual Watermark:

The dual watermark is a combination of a visible and an invisible watermark. Sutharet al. [8] Combined

visible and invisible, secure digital image. Their proposed method improves the robustness using turbo coding

algorithm.

Watermarking Domains:

Spatial Domain:

The spatial-domain techniques directly modify the intensity values of some selected pixels in an image to

hide the watermark image. Robust spatial-domain watermarking algorithms for image copyright protection are

described in [9]. Their proposed algorithm is robust against compression, filtering, cropping and scaling.

Frequency Domain:

The watermarking systems modify the frequency transforms of data elements to hide the watermark data

and finally the inverse transform is applied to obtain the marked image. The frequency domain based

watermarking techniques are more robust as compared to simple spatial domain watermarking techniques. The

classifications of frequency domain techniques [10] as follows,

Discrete Cosine Transform:

A discrete cosine transform (DCT) expresses a finite sequence of data points in terms of a sum of cosine

functions oscillating at different frequencies. DCT coefficients are real-valued. DCT domain watermarking can

be classified into Global DCT watermarking and Block based DCT watermarking. The block based DCT, the

image is first partitioned into a number of blocks and DCT transform is applied to each block before watermark

embedding. Jialing Han et al. [11] presented a new watermarking algorithm of DCT domain based on host

image analysis. The watermark is embedded in the insensitive areas of human eyes, which are selected by host

239 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

image analysis. It has greatly improved the invisibility of watermarking system, or has improved the amount of

embedded watermark with the same visual effect.

Discrete Fourier Transform:

The discrete Fourier transform (DFT) converts a finite list of equally spaced samples of a function into the

list of coefficients of a finite combination of complexsinusoids, ordered by their frequencies, that has those same

sample values. A novel design of a DFT-based digital watermarking system for images is proposed in [12].

Experimental results show that their proposed method is robust against the common image processing

operations.

Discrete Wavelet Transform:

The transformation product is set of coefficients organized in the way that enables not only spectrum

analyses of the signal, but also spectral behaviour of the signal in time. This is achieved by decomposing signal,

breaking it into two components, each caring information about source signal. Filters from the filter bank used

for decomposition pairs are low pass and high pass filter. The filtering is succeeded by down sampling. Low

pass filtered signal contains information about slow changing component of the signal, looking very similar to

the original signal, only two times shorter in term of number of samples. High pass filtered signal contains

information about fast changing component of the signal. Filters from the filter bank are called "wavelets".

Watermarks can be embedded in a file using wavelet domain as it improves robustness and also watermark

remains imperceptible [13]. A multiple watermarking scheme based on discrete wavelet transform is

presented for the analysis of imperceptibility and robustness [14]. The watermarks are embedded into the

detail sub-bands using genetic algorithms for the optimisation to improve the performance of

imperceptibility on the watermarked image in terms of peak signal to noise ratio and robustness of

extracting watermark in term normalised correlation.

Hybrid Domain:

The Hybrid domain technique is intermediate between spatial and transform domain techniques, it is a

combination of both spatial and frequency domain techniques. David Asatryan et al. [15] proposed a novel

watermarking algorithm, based on combining of spatial domain watermarking approach and an embedding

procedure, which uses the DCT pattern instead of required original watermark. The proposed algorithm is

robustness under JPEG attacks and also useful for image tamper detection.

Watermarking Applications:

Copy Protection:

Copy protection mechanism disallows unauthorized copying of the media. Copy protection is very difficult

to achieve in open systems, it is feasible to achieve closed or proprietary systems. DolleyShukla et al. [16]

reviewed various copy protection literatures for digital image and video watermarking.

Copyright Protection:

Copyright protection objective is to embed information about the source and thus typically the copyright

owner of the data in order to prevent other parties for claiming the copyright on the data. The application

requires a very high level of robustness and the watermarks are used to resolve rightful ownership. Shankar

Thawkar [17] presented an invisible image watermarking scheme for copyright protection. Their technique

provides high capacity and minimum computations.

Fingerprinting:

An impression on a surface is formed by the ridges on a fingertip, especially such an impression made in

ink and used for identification. The recovery of fingerprints from a crime scene is an important method of

forensic science. Fingerprints are easily deposited on suitable surfaces (such as glass or metal or polished stone).

Yiwei Wang et al. [18] discussed the requirements for a fingerprinting system for intelligence images. Their

experimental results demonstrate the effectiveness of the algorithm.

Authentication:

With the advance of computer tools available for digital signal processing, modifying a digital

document is becoming easier while detecting that the content is modified becomes harder. The authorized

source knows the valid key for encryption, an adversary who tries to change the message cannot create

a corresponding valid signature for the modified message. Christian Rey et al. [19] introduced the notion of

image content authentication and the features required to design an effective authentication scheme. A brief

survey of the main watermarking based authentication techniques is presented and the requirements that an

authentication algorithm should satisfy for video surveillance application are discussed in [20].

240 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

Data Hiding:

Data hiding is a method of hiding the existence of a message and this allows communication using often

enciphered messages without attracting the attention of a third party. Minya Chen et al. [21] discussed important

issues such as robustness and data hiding of the different techniques.

Broadcast Monitoring:

Broadcast monitoring is the process of receiving and reviewing media that is transmitted on a broadcast

channel to determine if a particular media item has or has not been broadcasted. Broadcast monitoring may be

performed to ensure an advertisement has been inserted on a broadcast television system as defined in an

advertising agreement or broadcast monitoring may be used to ensure some media is not broadcast (e.g. licensed

content). In [22] to automate broadcast monitoring, which is typified by the verification of the transmission of

the material ID code of a commercial message (CM) or program, the authors propose a watermarking scheme

without reference images, which does not require a reference image when the watermark sequence is extracted.

Medical Safety:

Embedding the date and the patient’s name in medical images could be a useful safety measure. This is very

important these days when telemedicine is getting wider application. Claims made by bodies on serious health

condition of a personality must be authenticated with the usage of watermarking protecting the person imputed.

Comparison of multiple-watermarking techniques based on Discrete Wavelet Transform and Singular

Value Decomposition using Genetic algorithm for medical images in [23]. Their research elaborates the

three main categories of multiple watermarking techniques such as successive, segmented and composite

watermarking. The optimization is to maximize the performance of peak signal to noise ratio and

normalized correlation in multiple watermarking techniques using genetic algorithms.

Covert Communication:

The watermark can be embedded imperceptibly to the digital image to communicate information from the

sender to the intended receiver while maintaining low probability of intercept by other unintended receivers.

Now a day, covert communication is one of the most important aspects of internet. When you want to hide the

data from intruders, you can use different methods for covert communication [24].

Watermarking Requirements:

An image watermarking process needs to satisfy the following requirements [25, 26].

Imperceptibility:

A digital watermark is called imperceptible if the original cover signal and the marked signal are

perceptually indistinguishable.

Security:

Watermarks should survive deliberate attempts to remove them. Ideally, a watermark should remain

readable up to the point where the content becomes modified enough to be of low value.

Robustness:

The watermark should be reliably detectable after alterations to the marked document. It must be difficult

(ideally impossible) to defeat a watermark without degrading the marked document.

Capacity:

Image watermarking capacity is an evaluation of how much information can be hidden within a digital

image.

Unambiguous:

The extracted watermark should be clear enough to determine the ownership problem.

Multiple Watermarks:

It may also be desirable to embed multiple watermarks in a document.

Multiple Watermarking Techniques:

In multiple watermarking techniques more than one watermarks are embedded into the original image. The

classification of multiple watermarking techniques is shown in figure 2.

241 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

Table 1 shows the multiple watermarking techniques in different domains. There has been many works in

the literature related to multiple image watermarking techniques using different transform and some of them are

discussed below.

Giakuomaki et al. [27] proposed a wavelet-based watermarking scheme to embed multiple

watermarks in medical images. Although the scheme offers medical confidentiality and record integrity,

the visual quality of watermarked images can be improved to achieve higher PSNR values. Peter et al.

[28] has proposed three novel blind watermarking schemes (single, multiple and iterative watermark

embedding) to embed watermarks into digital images. Experimental results show that their watermarking

algorithms give watermarked images with good visual quality. An optimal wavelet based watermarking

algorithm the watermarks are embedded with variable scaling factor in different sub-bands. The scaling factor is

high for the LL sub-band and it is low for other three sub-bands [29].

Yuan Yuan et al. [30] proposed a multiple watermarking technique by adopting integer wavelet transform.

Their method is robust to a wide variety of attacks. A novel image watermarking technique in the wavelet

domain is suggested and tested in [31]. Their method to achieve more security and robustness, their techniques

relies on using two nested watermarks that are embedded into the image to be watermarked. A novel robust

multiple watermarking techniques for color images in spatial domain are proposed in [32]. Their method the

host image is divided into four different regions. Yuancheng Li et al. [33] proposed a novel multiple

watermarking algorithm which embedded two watermarks into original image in different frequency by using

bandelet transform. Experimental results demonstrate that their watermarking algorithm based on bandelet has a

good performance both in invisibility and robustness. An invisible watermarking technique is proposed in [34],

to embed multiple binary watermarks into digital images based on the concept of Visual Cryptography (VC).

Effective multiple image watermarking based on dither quantization is presented in [35]. Their method is

superior in terms of embedding capacity, PSNR and survival to number of image attacks. Sergey Anfinogenov

et al. [36] proposed a multiple robust digital watermarking system for still images. Their method shows the

results is resistant to cyclic shifts, cropping, row and column removal, addition of noise and JPEG transforms. A

review of multiple watermarking for text documents is presented [37]. Their multiple watermarking approach

increase the watermarking capacity and tamperproof performance and also increases the security,

robustness and invisibleness. A new image watermarking algorithm that is robust against various attacks is

presented in [38]. Discrete Wavelet Transform and Singular Value Decomposition have been used to

embed two watermarks in the HL and LH bands of the host image. Simulation evaluation demonstrates

that their technique withstand various attacks.

Mohananthini and Yamuna [39] proposed the multiple watermarking scheme based on discrete wavelet

transform for color images. The multiple watermarks are embedded in original image, to achieve better visual

quality on watermarked image. The advantage of their proposed method has preferable performance of

imperceptibility and used as the various color images. Yuanning Liu et al. [40] presented a novel robust multiple

watermarking methods for regional attacks of digital images. Experimental results demonstrated good visual

imperceptibility and robustness of their proposed method against traditional regional attacks, accidental attacks

and joint attacks, which are performed by Stirmark or Adobe Photoshop CS5. Exploring DWT–SVD–DCT

feature parameters for robust multiple watermarking is presented in [41]. Their proposed method is robust

against JPEG and JPEG2000 compression.

The three main categories of multiple watermarking techniques are successive, segmented and composite

watermarking.

Successive watermarking:

In successive watermarking technique, the watermarks are embedded one after the other, from the

watermarked images the watermarks are extracted from one after another. This approach is also denoted Re-

watermarking in literature. Fig. 3 shows the block diagram of multiple successive watermarking by using two

watermarks.

The first watermark is embedded into the original image by the following equation

),(),(),( 11 jiwjiIjiWI (1)

Where, WI1 = Watermarked Image1

W1 = First Watermark

I = Original Image and

= Scaling factor which determine the strength of

Watermark

Similarly, the second watermark is embedded into the watermarked image by the following equation

),(),(),( 212 jiwjiWIjiWI (2)

Where, WI1 = Watermarked Image1

WI2 = Watermarked Image2

242 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

W2 = Second Watermark

Review of multiple successive watermarking techniques is presented below.

Sheppard et al. [42] distinguished the three main categories of multiple watermarking techniques such as

composite watermarking, segmented watermarking and successive watermarking. The use of classical single

watermarking scheme in a multiple re-watermarking scenario is discussed in [43]. Their method focused on a

comparison of blind and non-blind algorithms. Shieh et al. [44] proposed a new algorithm for embedding

several watermarks into the same original source. Simulation results show that their method robustness for

surviving intentional attacks and their effectiveness in protecting copyrights. Daniel Mark et al. [45]

demonstrated that watermark interference in multiple re-watermarking applications. Their method is to embed

several watermarks as compared with different embedding domains. Jutta Hammerle – Uhl et al. [46]

demonstrated that watermark interference in wavelet based multiple re-watermarking algorithms can be

controlled in principle by using wavelet packet sub-band structures exhibiting a certain amount of dissimilarity.

Segmented watermarking:

In the segmented watermarking method, the original image is partitioned into disjoint segments a priory and

each watermark is embedded into its specific share. Fig. 4 shows the block diagram of multiple segmented

watermarking by using line and points. Fig. 4 (a) shows one watermark is embedded into odd-numbered rows

noticeable in straight lines and another watermark is embedded into even-numbered rows noticeable in dot lines.

Fig. 4 (b) shows one watermark is embedded into odd-numbered columns noticeable in straight lines and

another watermark is embedded into even-numbered columns noticeable in dot lines. The Fig. 4 (a) and (b) line

segmented watermarking by using two watermarks. The Fig. 4 (c) shows point segmented watermarking by

using two watermarks. One watermark is embedded into plaque shape and another watermark is embedded into

circle shape.

The first watermark is embedded into odd-numbered rows image and the second watermark is embedded

into even-numbered rows image, by the following equation

),(),(),( 11jiWjiIjiI oddW

(3)

),(),(),( 22jiWjiIjiI evenW

(4)

Where,

1WI= Odd watermarked Image

2WI = Even watermarked Image

W1 = Watermark1

W2 = Watermark2

I odd = Odd-numbered rows image

I even = Even-numbered rows image

= Scaling factor which determine the Strength of

Watermark.

Review of multiple segmented watermarking techniques is presented below.

Glen E. Wheeler et al. [47] proposed weighted segmented watermarking of still images in which segments

are formed by dividing the image into square blocks, each of which contains one contributor’s watermark. If a

watermark is present in one or more segments of the work, the owner of that watermark is reported to be an

owner of the work as a whole by an arbiter. Hamed Dehghan et al. [48] presented a new wavelet-based image

watermarking technique which is suitable for image copyright protection. Their method the host image was

segmented into small blocks and the watermark data were embedded in the low pass wavelet coefficients of

each block. Their simulation results show that the imperceptibility of the watermarked image and the robustness

of watermark against several attacks. Nantha Priya et al. [49] proposed the segmented image is modeled as

mixture generalized Gaussian distribution and their model is the basis of mathematical analysis of

various aspects of the watermarking process such as probability of error and embedding strength

adjustment. The experimental results show that their algorithm performed well against rotation, scaling, and

other attacks. A set of schemes and their analysis for multiple watermark placements that maximizes resilience

to the above mentioned cropping attack proposed in [50].

Composite watermarking:

In composite watermarking, all watermarks are combined into a single watermark which is subsequently

embedded in one single embedding step. For example the two watermarks are combined into composite

watermark is given below

),(),(),( 21 jiwjiwjiw (5)

The composite watermark is embedded into the original image by the following equation

243 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

),(),(),( jiwjiIjiWI (6)

Where,

WI= Watermarked Image

W1 = First Watermark

W2 = Second Watermark

W = Composite Watermark

I = Original Image and

= Scaling factor which determine the strength of Watermark

Review of multiple composite watermarking techniques is presented below.

Mina Deng et al [51] proposed an efficient buyer seller watermarking protocol based on homomorphic public-

key cryptosystem and composite signal representation in the encrypted domain. The proposed composite

embedding can be performed in the encrypted domain by simply using an additively homomorphic

cryptosystem. Farid Ahmed et al. [52] proposed composite signature based watermarking for fingerprint

authentication. A new singular value decomposition-discrete wavelet transform (SVD-DWT) composite image

watermarking algorithm that is robust against affine transformation and ordinary image processing is presented

in [53].

Applications of Multiple Watermarking:

The multiple watermarks are intended to satisfy the different applications, the order in which the

watermarks are applied is very important. The applications are discussed below,

Ownership information:

In this application two ownership watermarks are used to identify both the owner and the recipient. A new

color image watermarking scheme for copyright protection is proposed [54]. Multiple watermark bits are

embedded into the luminance component or the blue component of a color image using discrete wavelet domain.

Experimental results show that their proposed scheme successfully makes the watermark perceptually invisible

as well as robust to common signal processing and some geometric attacks.

Integrity verification:

In this application multiple verification watermarks are used in image to increase verification security. The

multiple persons have the own key, if any one of the person forged a watermark on a fake image using his own

key, the remaining persons would still be able to detect the alteration using his own key.

Captioning:

The object specific information is called captions. The multiple captioning watermarks are used to apply

multiple captions a recipient wants to add supplemental captioning to an object. The recipient extract the

original caption with attach an additional caption, to get the expanded caption. Mintzer et al. [55] discussed

three types of watermarking applications in the context of multiple watermarking and identify different ways

how to employ and to interpret multiple watermarking. Multiple watermarks can be used to address multiple

applications or one application may be addressed several times. For example, a first watermark can be used to

embed ownership information, a second one for integrity verification, and a third one for captioning. On the

other hand, there can be multiple copyright watermarks, multiple verification watermarks, or multiple

watermarks for multiple captions.

Document tracing:

The insertion of multiple watermarks to trace a document is the possibility of directly detecting from the

document who was the creator, who had access to the data after its creation, how the property of the document is

shared among different users, allowing not only the document tracing also connected to a legal prosecution.

Boato et al. [56] presented a novel watermarking scheme, which allows inserting and reliably detecting multiple

watermarks sequentially embedded into a digital image, as it is required by challenging the applications are

confidential data tracing and shared property handling. Radharani and Valarmathi [57] have proposed a multiple

watermarking technique which has been combined wavelets based on texture properties to watermark

copyright and authentication information inside a cover image. Experimental results proved that their

proposed algorithm is efficient in terms of quality and storing watermarks using texture properties provides

more robustness.

Medical safeties:

The medical safety application of the multiple watermarking techniques ensures that each doctor inserts his

diagnosis in the medical image without degrading it. With any new diagnosis insertion, the image must always

keep its clarity and its characteristics. Giakoumaki et al. [58] applied multiple watermarking in medical images

244 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

the physician's digital signature, patient's personal and examination data, keywords for image retrieval, and a

reference watermark for the purpose of data integrity control. Their experimental results demonstrate the

efficiency and transparency of the watermarking scheme, which conforms to the strict limitations that apply to

regions of diagnostic significance.

Genetic Algorithm:

Genetic Algorithms is one of the best optimization tools and the process can be described on five functional

units such as random number generation, fitness function, selection (reproduction), crossover and mutation

operators. In genetic algorithms each individuals are linked with chromosomes, then a set of chromosomes form

a population. Genetic algorithms starts with some randomly selected population are called the first generation

and then each individual in the population corresponding with a solution is to the problem domain.

Fitness Function:

The fitness function is formed by combining two metrics are peak signal to noise ratio (PSNR) and

normalized correlation (NC) [59]. The fitness function is also known as objective function is used to evaluate all

the individuals in the population and the best individual along with the corresponding fitness value are

evaluated. The selection of fitness function is based on the imperceptibility and robustness as follows,

Fitness Function = PSNR + (100 * NC) (7)

The robustness value increases as the fitness value also increases, so optimization of robustness takes place

for a given value of imperceptibility.

Fitness Function = NC + (100 * PSNR) (8)

The imperceptibility value increases as the fitness value also increases, so optimization of imperceptibility

takes place for a given value of robustness.

Selection Operator:

The selection operator works for a genetic algorithm which maximizes its objective function. The selection

process is defined as the best individuals are favoured. The selection process is high; the genetic algorithms

should be able to identify optimal or nearly optimal solutions. The selection process is low, the genetic

algorithms to take a longer time to find the optimal solution. The selection schemes are proportionate-based

selection and ordinal-based selection described as follows,

Roulette Wheel Selection:

The roulette wheel selection scheme as described by Goldberg [60] for different outcome can occur with

different probabilities. The roulette wheel selection is a proportionate-based selection. Each member of the pool

is assigned space on a roulette wheel proportional to the individual fitness. The maximum fitness of the

members has the higher probabilities of selection. A new Genetic Algorithm based on center of mass selection

operator has been proposed in [61]. The experimental results show that their algorithm performs better solutions

than the standard roulette wheel based genetic algorithm. The comparison between the hybrid watermarking

using genetic algorithm and the pure hybrid DCT-SVD is presented in [62]. Their experimental results show that

the extracted watermark quality of the hybrid using genetic algorithm is better than the pure hybrid DCT-SVD

by using the roulette-wheel method. A robust digital image watermarking scheme based on singular value

decomposition (SVD) and a tiny genetic algorithm is proposed in [63]. Their method used the tiny genetic

algorithm to search the proper values in order to improve the visual quality of the watermarked image and the

robustness of the watermark.

Linear Rank Selection:

In 1989, Baker [64] first suggested a ranking selection is to eliminate the serious disadvantages of

proportionate selection. The individuals in the population are ranked according to their fitness values and a new

fitness score is calculated from the rank of an individual. The rank based selection scheme behaves in a more

robust manner than proportional based selection and to prevent too quick convergence. Tsai et al. [65] proposed

a robust watermarking in wavelet domain using rank order and genetic algorithm for image authorization.

Experimental results illustrate that their performances of the robust watermarking and the genetic robust

watermarking techniques. Tsai et al. [66] presented wavelet based image watermarking using rank order and

genetic algorithm. The experimental results show that their techniques to achieve better performance.

Tournament Selection:

The tournament selection is similar to rank selection, but computationally more efficient. In tournament

selection scheme, a small group of individuals is sampled from the population and the individual with best

fitness is select for reproduction. The tournament selection is applicable when the fitness function is in implicit

form that is a comparison of two individuals finds out which one is better. Sachin Goyal et al. [67] proposed

245 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

sliding window used for robustness and fidelity optimization by using genetic algorithm with tournament

selection. Sachin Goyal et al. [68] proposed optimization of fidelity with adaptive genetic watermarking

algorithm using tournament selection. Sachin Goyal et al. [69] proposed comparison of genetic algorithm based

watermarking techniques using tournament selection approach and roulette wheel approach for fidelity

optimization.

Crossover:

Crossover is a genetic operator that combines two chromosomes (parents) to produce a new chromosome

(offspring). Crossover occurs during evolution according to a user-definable crossover probability. The

crossover methods as follows,

N-point crossover:

A single point crossover operator that randomly selects a crossover point within a chromosome then

interchanges the two parent chromosomes at this point to produce two new offspring. A two point crossover

operator that randomly selects two crossover points within a chromosome then interchanges the two parent

chromosomes between these points to produce two new offspring.

Segmented crossover:

The segmented crossover is similar to N-point crossover with the difference being that the number of

breaking points can varied.

Uniform crossover:

In the uniform crossover operator individual bits in the string are compared between two parents and the

bits are swapped with a fixed probability of 0.5.

Shuffle crossover:

In shuffle crossover first a randomly variation is applied to the two parents and then N-point crossover is

applied to the shuffle parents. Finally the shuffle children are transformed back with the inverse variation.

Mutation:

Mutation operator occurs during evolution according to a user-definable mutation probability. Mutation

functions make small random changes in the individuals in the population, which provide genetic diversity and

enable the genetic algorithm to search a broader space. The probability should usually be set fairly low;

otherwise the search will turn into a primitive random search.

Genetic Algorithm based Image Watermarking:

The block diagram of image watermarking by using genetic algorithm is shown in Figure 5. Watermark

embedding and extraction is the image watermarking process and optimization is the genetic algorithm process.

The image watermarking and genetic algorithm process is discussed bellows,

Image watermarking process:

The image watermarking process is based embedding and extraction. The watermark used for embedding

logo image, which is small compared with the size of the original image. The watermark extraction processes

are the inverse process of watermark embedding. The steps for watermark embedding and extraction process are

briefly listed as follows,

The watermark is embedded to the original image to get the watermarked image. The watermarked image

can be obtained by different embedding methods (additive, multiplicative and quantization).

The performance of watermarking technique can be evaluated by peak signal to noise Ratio (PSNR). The

PSNR is used to measure the imperceptibility of watermarked image, which is given by

MSEdBPSNR

2

10

255log10)( (9)

The watermark can be extracted from the watermarked image and original image.

Normalized Correlation (NC) is used to measure the robustness of watermark after extraction. The NC

between the extracted watermark W’(I, j) and the embedded watermark W(I, j) is defined as

H

i

L

j

H

i

L

j

jiW

jiWjiW

NC

1 1

2

1 1

)],([

),('),( (10)

246 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

Genetic algorithm process:

The genetic algorithm process is the optimization of imperceptibility and robustness are briefly listed as

follows,

Initialize the parameters are crossover rate, number of variables, mutation rate, initial population size and

number of iterations.

Generate the initial population randomly specified by performing the image watermarking process, as the

watermarked image is generated for each individual.

The selection of fitness function is based on the imperceptibility and robustness as in equation (7) and (8).

Evaluate the best fitness value and the best individuals.

Generate the new population randomly specified by performing the crossover, mutation functions on the

selected individuals.

Repeat the steps 2-5 until a predefined iteration is reached.

A handful of watermarking method, which use Genetic algorithm for improved performance, have been

presented in the literature for protecting the copyrights of digital images. Recently, incorporating Genetic

algorithm into watermarking method to improve its performance and effectiveness has received a great deal of

attention among watermarking researchers. A brief literature survey of some recent researches is presented here.

Survey of image watermarking technique in spatial domain using genetic algorithm is given in Table 2.

Ran-Zan Wang et al. [70] proposed image hiding by optimal LSB substitution and genetic algorithm. Their

improved hiding technique is developed to obtain a high-quality embedding result. A real-coded generic

algorithm for optimized digital watermarking embedding in time-domain technique is proposed in [71]. Their

algorithm improved the invisibility and the operating precision of images and reduces the operating complexity.

Anwar et al. [72] introduced a new method of adaptive blind digital image watermarking in spatial domain.

Their method proposed increasing the payload two times, to achieve better imperceptibility. Masoumehkhodaei

et al. [73] proposed a new image hiding by using genetic algorithm and LSB substitution. The experimental

results show that their method has enhanced both the quality and the security of stego-image by using LSB

substitution. Cauvery et al. [74] presented a secure algorithm for watermarking images, and a methodology for

digital watermarking that may be generalized to video data. Their method demonstrated the utility of genetic

algorithm in the area of improving the fidelity and robustness of digital watermarking. Marghny Mohamed et al.

[75] proposed a data hiding by LSB substitution using genetic optimal key-permutation. Their experimental

results show that their method provides good image quality and large message capacity as well as

increase in the system immunity.

Survey of image watermarking technique in discrete cosine transform domain using genetic algorithm is

given in Table 3. Watermark optimization technique based on genetic algorithms is proposed in [76]. The

experimental result shows that their proposed approach can effectively improve the quality of the watermarked

image and the robustness of the embedded watermark against various attacks. Chin-Shiuhshieh et al. [77]

proposed genetic watermarking based on transform-domain techniques. Their results show the robustness under

attacks and the improvement in watermarked image quality with genetic algorithm.

A robust algorithm for DCT-based GA spread spectrum watermarking has been presented in [78]. Their

scheme got better-watermarked image qualities and more robust to the attacks. Promcharoen et al. [79] proposed

a new approach for digital image watermarking in DCT domain. The genetic algorithms (GAs) are performed to

find out the optimal parameters for watermark embedding, independently for each region type. The

experimental results show that their approach yields a watermark that is invisible to human eyes and robust to

various image manipulations. The comparison between the hybrid watermarking using genetic algorithm

and the pure hybrid DCT-SVD (Discrete Cosine Transform-Singular Value Decomposition) is presented in

[80].

Their results show that the extracted watermark quality of the hybrid using genetic algorithm is better than

the extracted watermark quality of pure hybrid DCT-SVD. The watermarking robust against the cropping attack

and with good imperceptibility is introduced in [81]. After sorting the cover image blocks, the multi-objective

genetic algorithm is used for finding the best coefficients in each sorted blocks. Their results show improvement

in the watermarking robustness and imperceptibility.

Survey of image watermarking technique in discrete wavelet transform using genetic algorithm is given in

Table 4. Prayothkumsawat et al. [82] developed a technique for optimizing the image watermarking using

genetic algorithm. Their method genetic algorithm is applied to the wavelet domain to improve the quality of the

watermarked image and the robustness of the watermark. Prayothkumsawat et al. [83] proposed the spread

spectrum image watermarking algorithm using the discrete multi wavelet transform. The experimental result

shows that their proposed algorithm yields a watermark that is invisible to human eyes and robust to various

image manipulations. Ali al-haj and Aymenabu-errub [84] optimized DWT based image watermarking that

can simultaneously provide perceptual transparency and robustness. These two watermarking requirements

are conflicting, they applied genetic algorithms in order to reach the optimal performance. Masayoshi nakamoto

et al. [85] proposed using genetic algorithm for optimization of key sequence. The robustness of the watermark

247 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

is strong. Hamid amiri and Mansour jamzad [86] determined the variation of coefficients using Multi Objective

Genetic Algorithm (MOGA). The MOGA provided a good balance between the robustness and the fidelity

requirements.

Chen yongqianget al. [87] proposed to select the fit wavelet coefficients by using genetic algorithm to

embed the watermarking bit into the host gray image and the extracted watermark can be identified expediently

through the synergetic neural network (SNN). The experimental result shows these schemes have preferable

performance of security, imperceptibility and robustness. Surekha and Sumathi [88] proposed a new

optimization method for digital images the genetic algorithm is used to optimize the watermark amplification

factor in DWT sub-band. Their approach proved to be secure and robust. The genetic algorithm is used for

parameter optimization in [89]. Their optimization is to maximize the values of Peak Signal to Noise Ratio

(PSNR) of the watermarked image and Normalized Cross correlation (NCC) of the extracted watermark.

The digital image watermarking in DWT domain based on genetic algorithm proposed in [90]. The

watermark amplification factor is calculated based on the HVS properties of the image. The values PSNR and

NC are increased as the number of iterations increased showing that genetic algorithms improves the image

imperceptibility and robustness of watermarked images even after performing attacks.

A novel invisible robust watermarking scheme for embedding and extracting a digital watermark in an

image is presented [91]. The novelty lies in determining perceptually important coefficients of transform in the

host image using simple Haar Wavelet Transform (HWT) and Genetic Algorithm (GA)-Particle Swarm

Optimization(PSO) based hybrid optimization. Their proposed method is highly imperceptible and robust

against different attacks like gaussian filter, median filters, blurring, contrast, JPEG compression and SPHIT

compression. Abduljabbarshaamala et al. [92] proposed watermarking based on genetic algorithm and

studied the effect of DWT and DCT embedding domain on robustness of watermarking. Attacks based on

numerical correlation (NC) is analysed through the DWT results showed more robustness than DCT in

watermarking based on genetic algorithm.

Singular value decomposition (SVD) is an effective numerical analysis tool and mathematical technique

used to extract algebraic features from an image. The SVD-based approaches is to apply the SVD to the whole

cover image or, alternatively, to small blocks of cover image, and then modify the singular values to embed the

watermark. Survey of singular value decomposition based image watermarking technique using genetic

algorithm is given in Table 5. An image watermarking scheme based on singular-value decomposition (SVD)

using genetic algorithm (GA) is presented in [93]. Their experimental result shows both the significant

improvement in transparency and the robustness under attacks. Chih-Chin Lai et al. [94] introduced a novel

image watermarking scheme using singular value decomposition (SVD) and micro-genetic algorithm (micro-

GA). Their method proper values of scaling factors are optimized and obtained efficiently by means of the

micro-GA. A digital watermarking scheme based on singular value decomposition and micro-genetic algorithm

is proposed in [95]. Experimental results show that their approach has good performance against several attacks.

Heechul Jung et al. [96] proposed an enhanced SVD based watermarking with genetic algorithm.

Their method to found optimal scaling factors in their algorithm satisfies both robustness and high quality

of the watermarked image.

Jagadeeshet al. [97] proposed a genetic algorithm based oblivious image watermarking scheme using

singular value decomposition. Their algorithm is more secure and robust to various attacks, such as low pass

filtering, median filtering, JPEG compression, resizing, row-column blanking, row-column copying. A robust

digital image watermarking scheme based on singular value decomposition (SVD) and a tiny genetic algorithm

is proposed in [98]. They used the tiny genetic algorithm to search the proper values in order to improve the

visual quality of the watermarked image and the robustness of the watermark. Poonam et al. [99] proposed

image watermarking based genetic algorithm using DWT-SVD techniques. They found the transparency and

robustness of watermark under various attacks.

Genetic algorithm approach for singular value decomposition and quantization based digital image

watermarking is presented in [100]. Their scheme is based on quantization step size optimization using the

Genetic Algorithm to improve the quality of watermarked image and robustness of the watermark.

Khaled Loukhaoukha et al. [101] proposed the security of digital watermarking scheme based on SVD and

Tiny-GA. They demonstrated that their watermarking algorithm is fundamentally flawed and has a very high

probability of false positive detection of watermarks. Roshan Jahan [102] proposed a new digital image security

scheme is applied which incorporates watermarking algorithm using DWT-SVD and optimized chaotic based

image encryption obtained through genetic algorithm with high level of robustness and security.

Attacks:

Every attack that aims at removing the embedded watermark by modifying the pixel values of the

watermarked image; should make it difficult to detect the presence of the watermark. Fig. 6 shows the block

diagram of multiple watermarks embedding and extraction with attacks. The four classes of attacks are removal,

cryptographic, geometric and protocol attacks [103-106]. Table 6 lists their performance of image watermarking

248 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

technique using genetic algorithm against these attacks such as Salt & Pepper Noise, Gaussian Noise, Low pass

Filtering, Average filtering, Median Filtering, Wiener Filtering, Gaussian Filtering, Scaling, Cropping, Rotation,

JPEG Compression, Sharpening, Histogram Equalization, Resizing, Gamma correction, Row-Column blanking

and Row-Column copying.

Salt & Pepper Noise:

To test the robustness against adding noise, the watermarked image is degraded by adding salt and pepper

noise randomly. Here, the noise is caused by errors in the data transmission. The watermarked image is

corrupted with salt and pepper noise at the density ranging from 0.01 to 0.1. Unaffected pixels always remain

unchanged. The noise is usually quantified by the percentage of pixels which are corrupted.

Gaussian Noise:

The watermarked image corrupted with Gaussian noise of zero mean and varying the variance of the noise

ranging from 0.01 to 0.1. In telecommunications and computer networking, communication channels can be

affected by wideband Gaussian noise coming from many natural sources, such as the thermal vibrations of

atoms in conductors, shot noise, black body radiation from the earth and other warm objects and from celestial

sources such as the Sun.

Low pass Filtering:

Low pass Filtering includes linear and non-linear filters. To perform the image filtering to watermarked

image as low-pass filtering. The watermarked images are attacked by low-pass filtering. Low-pass filters exist in

many different forms, including electronic circuits, anti-aliasing filters for conditioning signals prior to analog-

to-digital conversion, digital filters for smoothing sets of data, acoustic barriers, blurring of images, and so on.

Low-pass filters provide a smoother form of a signal, removing the short-term fluctuations and leaving the

longer-term trend.

Average filtering:

The average filtering techniques with varying mask sizes are applied to analyse the performance of

the watermarked image during the optimization process of genetic algorithm to evaluate the robustness

measure. Average filtering removes the high frequency components present in the image acting like a low pass

filter.

Median Filtering:

Median filtering is a nonlinear operation often used in image processing to reduce high frequency

noise in an image. Each output pixel contains the median value in the m-by-n neighbourhood around

the corresponding pixel in the input image. The watermarked image is passed through median filter. Median

filtering is very widely used in digital image processing because, under certain conditions, it preserves edges

while removing noise.

Wiener Filtering:

Wiener method based on statistics estimated from a local neighbourhood of each pixel. To perform the

image filtering to watermarked image as wiener filtering. This filter is used to produce an estimate of a desired

or target random process by linear time-invariant filtering an observed noisy process, assuming known

stationary signal and noise spectra and additive noise. The Wiener filter minimizes the mean square error

between the estimated random process and the desired process.

Gaussian Filtering:

The use of linear filtering to remove certain types of noise as Gaussian filters. The Gaussian filter attack

with varying a window size is applied with zero mean and unit variance. Gaussian filters have no overshoot to a

step function input while minimizing the rise and fall time. This behaviour is closely connected to the fact that

the Gaussian filter has the minimum possible group delay. These properties are important in areas such as

oscilloscopes and digital telecommunication systems.

Scaling:

The scaling factors are selected the robustness of the extracted watermark is invisibility and quality,

usually higher in the low frequency band and lower in the high frequency band. The watermarked image is

scaled by varying a factor and rescaled back to its original size of image using bilinear interpolation before

watermark detection.

249 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

Cropping:

The cropping is a geometrical attack where a small portion of the watermarked image is cut or

removed as an attempt to remove the significant portion of the image to remove the watermark.

Depending on the application, this may be performed on a physical photograph, artwork or film footage or

achieved digitally using image editing software. The term is common to the film, broadcasting, photographic,

graphic design and printing industries.

Rotation:

The rotation is used to realign horizontal features of an image. Rotation is tested by rotating the image in

counter-clockwise direction and then back to the original position through bilinear interpolation before

watermark detection.

JPEG Compression:

The JPEG is one of the most used image compression technique, and is often an unintentional attack. The

watermarked images are compressed using different quality factor ranging from 0 to 100. JPEG compression is

used in a number of image file formats.

Sharpening:

Sharpening operations are used to enhance the subjective quality. A sharp image includes small

components, the fine detail, down to the limit of vision. Thus, it is the size of the finest details that also

contributes to our perception of sharpness. An image that contains both high acutance (edge contrast) and small

details is considered sharp. A high acutance image that does not contain fine details might be considered sharp

by some viewers but the image will pale in comparison to the same scene that also contains the fine details.

Histogram Equalization:

The Histogram Equalization block enhances the contrast of images by transforming the values in an

intensity image so that the histogram of the output image approximately matches a specified histogram. The

method is useful in images with backgrounds and foregrounds that are both bright or both dark. In particular, the

method can lead to better views of bone structure in x-ray images and to better detail in photographs that are

over or under-exposed.

Resizing:

Resizing operation first reduces or increases the size of the image and then generates the original image by

using an interpolation technique. This operation is a lossy operation and hence the watermarked image also loses

some watermark information.

Gamma correction:

The gamma correction is very frequently used operation to enhance images or adapt images for display.

Row-Column blanking:

In row-column blanking attack, a set of rows and columns are deleted.

Row-Column copying:

In row-column copy attack, a set of rows and columns are copied to the adjacent or random locations.

Fig. 1: Classification of Watermarking

250 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

Fig. 2: Multiple Watermarking Techniques

Fig. 3: Multiple successive watermarking technique.

(a) (b) (c)

Fig. 4: Multiple segmented watermarking technique

Fig. 5: Block diagram of image watermarking by using genetic algorithm

I

IW1

IW1W2

W1

W2

Watermarking

Single Multiple

Successive

Segment

Composite

251 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

Fig. 6: Block diagram of embedding and extraction with attacks

Table 1: Multiple watermarking techniques in different domains

Authors Year Transform Performance

Giakuomaki et al. [24] 2003 Discrete Wavelet Transform Quality

Peter et al. [25] 2003 Discrete Cosine Transform Good image quality and robust

Tao et al. [26] 2004 Discrete Wavelet Transform Robust and Good visual quality

Yuan Yuan et al. [27] 2006 Integer Wavelet Transform Robust

Maha Sharkas et al. [28] 2006 Discrete Wavelet Transform Security and robustness

Ibrahim Nasir et al. [29] 2008 Spatial Transform Robust

Yuancheng Li et al. [30] 2009 Bandelet Transform Invisibility and robustness

Surekha et al. [31] 2010 - Robust

Vijendra Rai et al. [32] 2011 Discrete Cosine Transform Embedding capacity, quality and robust

Sergey Anfinogenov et al. [33] 2012 Discrete Fourier Transform Robust

Jaiswal et al. [34] 2012 Review -

Anumol Joseph et al. [35] 2013 Discrete Wavelet Transform Robust

Mohananthini and Yamuna [36] 2013 Discrete Wavelet Transform Imperceptibility

Yuanning Liu et al. [37] 2014 Arnold Transform Imperceptibility and robustness

Hwai-Tsu Hu and Ling-Yuan Hsu

[38] 2014

Discrete Wavelet Transform and Discrete Cosine

Transform Robust

Table 2: Image watermarking technique in spatial domain using genetic algorithm

Authors Year Achievements

Ran-Zan Wang et al. [37] 2001 Quality

Li Xiaoni et al. [38] 2009 Invisibility

Anwar et al. [39] 2010 Imperceptibility

Masoumehkhodaei et al. [40] 2010 Quality and the security

Cauvery et al. [41] 2011 Fidelity and Robustness

Marghny Mohamed et al. [42] 2011 Quality and capacity

Table 3: Image watermarking techniques in discrete cosine transform using genetic algorithm

Authors Year Achievements

Huang et al. [43] 2000 Quality and Robustness

Shiuhshieh et al. [44] 2004 Quality and Robustness

Zhicheng Wei et al. [45] 2006 Quality and Robustness

Promcharoen et al. [46] 2008 Invisible and Robust

DidiRosiyadi et al. [47] 2012 Quality

SeyedSahandMohammadiZiabari [48] 2014 Robustness and Imperceptibility

Table 4: Image watermarking techniques in discrete wavelet transform using genetic algorithm

Authors Year Achievements

Prayothkumsawat et al [49] 2004 Quality and Robustness

Prayothkumsawat et al [50] 2005 Invisible and Robust

Ali al-haj and Aymenabu-errub [51] 2008 Perceptual transparency and Robustness

Masayoshi nakamoto et al. [52] 2008 Robustness

Hamid amiri and Mansour jamzad [53] 2009 Robustness and Fidelity

Chen yongqiang et al. [54] 2009 Security, Imperceptibility and Robustness

Surekha and Sumathi [55] 2011 Secure and Robust

C.C.Lai et al. [56] 2011 Quality and Robustness

Sridevi et al. [57] 2013 Imperceptibility and Robustness

Puja Agrawal and Khurshid [58] 2013 Imperceptible and Robust

Abduljabbarshaamala et al. [59] 2013 Robustness

W1, W2,…Wn

W1, W2,…Wn

WM I

Multiple

Watermark

Embedding

Attacks WM’

Multiple

Watermark

Extraction

Original Image

Original

Image

252 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

Table 5: Singular value decomposition based image watermarking technique using genetic algorithm

Authors Year Achievements

VeyselAslantas [60] 2008 Transparency and Robustness

Chih-Chin Lai et al. [61] 2008 -

Chih-Chin Lai et al. [62] 2009 Robustness

Heechul Jung et al. [63] 2009 Robustness and Quality

Jagadeesh et al. [64] 2009 Secure and Robust

Chih-Chin Lai [65] 2011 Quality and Robustness

Poonam et al. [66] 2012 Transparency and Robustness

Jagadeesh et al. [67] 2012 Quality and Robustness

KhaledLoukhaoukha et al. [68] 2012 Probability

RoshanJahan [69] 2013 Robustness and Security

Table 6: Image watermarking technique using genetic algorithm with attacks

Attacks References

Salt and pepper noise [54, 56, and 67]

Gaussian noise [45, 47, 49, 50, 51, 54, 55, 56, 59 and 65]

Low pass filtering [44, 45, 49, 50, 59 and 67]

Average filtering [55, 56 and 65]

Median filtering [44, 47, 49, 53, 55, 56, 59 and 67]

Wiener filtering [50 and 54]

Gaussian filtering [55 and 56]

Scaling [45 and 55]

Cropping [47, 50, 56, 59 and 65]

Rotation [47, 50, 51, 55, 65 and 67]

JPEG compression [44, 47, 50, 51, 54, 55, 56, 59, 65 and 67]

Sharpening [56 and 59]

Histogram equalization [56 and 65]

Resizing [67]

Gamma correction [56]

Row-column blanking [56 and 67]

Row-column copying [56 and 67]

Discussion:

The discussion of multiple watermarking techniques, composite watermarking technique as having good

imperceptibility and segmented watermarking technique as achieving more robustness. The selection of multiple

watermarking techniques can be preferred depending on the applications for superior result. The medical safety

needs more imperceptibility, since the information is essential. However, for the best visual quality the

composite watermarking technique can be preferred. The watermarking application of rightful ownership

requires a very high level of robustness. Segmented watermarking is used for finger printing application which

requires a high robustness against standard data processing attacks.

Conclusion:

The various researchers from different fields are focusing multiple watermarking techniques to develop

imperceptibility and robust watermarking. This paper emphasizes multiple watermarking for various domains,

techniques, application and analysis for the various attacks. During the embedding and extraction process, the

image watermarking technique simultaneously provides perceptual transparency and robustness. Since these two

watermarking requirements are conflicting, this can be solved by optimization techniques. This paper presents a

literature survey on multiple image watermarking using genetic algorithm for various domains which will be

useful for researchers to implement the effective image watermarking using genetic algorithm.

REFERENCES

1. Tirkel, A.Z., G.A. Rankin, R.M. Van Schyndel, W.J. Ho, N.R.A. Mee and C.F. Osborne, “Electronic Water

Mark”, DICTA 93, Macquarie University, pp: 666-673.

2. Mintzer, F. and G.W. Braudaway, 1999. “If one watermark is good, are more better?”, Proceedings of the

International Conference on Accoustics, Speech, and Signal Processing, pp: 2067-2070.

3. Holland, J., 1975.“Adaptation in Natural and Artificial Systems”, University of Michigan Press, Ann Arbor.

4. Elias Kougianos, Saraju P. Mohanty and Rabi N. Mahapatra, “Hardware Assisted Watermarking for

Multimedia”, Computers & Electrical Engineering, 35(2): 339-358.

5. Braudaway, G.W., Gordon W. Braudaway, Karen A. Magerlein and Frederick C. Mintzer, 1996.

“Protecting Publicly Available Images with a Visible Image Watermark”, Proc. SPIE Conf. Optical

Security and Counterfiet Deterrence Technique, Vol. SPIE- 2659, pp: 126-132.

253 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

6. Craver, S., N. Memon, Boon-Lock Yeo and M.M. Yeung, 1998. “Resolving Rightful Ownerships with

Invisible Watermarking Techniques: Limitations, Attacks and Implications”, IEEE Journal on Selected

Areas in Communications, 16(4): 573-586.

7. Chen, L., Q. Feng, F. Yang and W. Chen, 2005. “A noval fragile watermarking method for medical images

using quadtree structure”, Conf. Proc IEEE Eng Med Biol Soc., pp: 6258-6264.

8. Suthar, A.C., K.M. Pattani and G.R. Kulkarni, 2010. “Combine Visible and Invisible Secure Digital

Message”, International Journal of Engineering Science and Technology, 2(7): 2890-2894.

9. Francesc Sebe, Josep Domingo-Ferrer and Jordi Herrera, 2000. “Spatial-Domain Image Watermarking

Robust against Compression, Filtering, Cropping and Scaling”, Springer, pp: 44-53.

10. Potdar, V.M. Song Han and E. Chang, 2005. “A survey of digital image watermarking techniques”, Proc.

3rd IEEE Int. Conf. on Industrial Informatics, Frontier Technologies for the Future of Industry and

Business, pp: 709-716.

11. Jialing Han, Xiaohui Zhao and Chunyan Qiu, 2016. “A digital image watermarking method based on host

image analysis and genetic algorithm” J Ambient Intell Human Computer, 7: 37-45.

12. Chi-Man Pun, 2006. “A Novel DFT-based Digital Watermarking System for Images”, 8th International

Conference on Signal Processing.

13. Suryavanshi, H.E., Amit Mishra and Shiv Kumar, 2013. “Digital Image Watermarking in Wavelet

Domain”, International Journal of Electricaland Computer Engineering, 3(1): 1-6.

14. Mohananthini, N. and G. Yamuna, 2016. “Performance Optimization of Multiple Watermarking Using

Genetic Algorithms”, International Journal of Enterprise Network Management, Inderscience, 7(3): 237-

249.

15. David Asatryan and Naira Asatryan, 2007. “Combined Spatial and Frequency Domain Watermarking”,

Proceedings of International Conference on Computer Science and Information Technologies.

16. Dolley Shukla and Manisha Sharma, 2012. “Watermarking schemes for copy protection: a survey”,

International Journal of Computer Science & Engineering Survey, 3(1): 65-71.

17. Shankar Thawkar, 2012. “Digital Image Watermarking for Copyright Protection”, International Journal of

Computer Science and Information Technologies, 3(2): 3757-3760.

18. Yiwei Wang, John F. Doherty and Robert E. Van Dyck, 2001. “A Watermarking Algorithm for

Fingerprinting Intelligence Images”, Conference on Information Sciences and Systems.

19. Christian, R. and J.L. Dugelay, 2002. “A Survey of Watermarking Algorithms for Image Authentication”,

EURASIP Journal on Applied Signal Processing, 6: 613-621.

20. Bartolini, F., A. Tefas, M. Barni and I. Pitas, 2001. “Image authentication techniques for surveillance

applications”, Proc. IEEE, 89(10): 1403-1418.

21. Minya Chen, Edward K. Wong, NasirMemon and Scott Adams, 2001. “Recent Developments in Document

Image Watermarking and Data Hiding”, Proc. SPIE Conf on Multimedia Systems and Applications IV.

22. Takashi Tachibana, Masaaki Fujiyoshi and Hitoshi Kiya, 2004. “A watermarking scheme without reference

images for broadcast monitoring”, Electronics and Communications in Japan, pp: 22-32.

23. Mohananthini, N. and G. Yamuna, 2016. “Comparison of Multiple Watermarking Techniques”, Journal of

Electrical Systems and Information Technology, Elsevier, 3: 68-80.

24. Divyakant, T. Meva and Amit D. Kothari, 2011. “Adoption of neural network approach in

steganography and digital watermarking for covert communication and copyright protection”,

International Journal of Information Technology and Knowledge Management, 4(2): 527-529.

25. Cox, I.J., M.L. Miller and J.A. Bloom, 2000. “Watermarking applications and their properties, Proceddings

of International Confonference on Information Technology”, Las Vegas, pp: 6-10.

26. Mohamed-Salim Bouhlel, Hanène Trlchili, Nabil Derbel and Lotji Eamoun, “On the Image Watermarking

Techniques Applications, Properties and fields”, African Journals Online, 12(2): 39-46.

27. Giakoumaki, A., S. Pavlopoulos, D. Koutouris, 2003. “A medical image watermarking scheme based on

wavelet transform”, Proceedings of the 25th Annual International Conference of the Engineering in

Medicine and Biology Society IEEE, 1: 856-859.

28. Peter, H.W., Wong., Oscar C. Au and Y.M. Yeung, 2003. “A Novel Blind Multiple Watermarking

Technique for Images”, IEEE Transactions on Circuits and Systems for Video Technology, 13(8): 813-

830.

29. Tao, P. and A.M. Eskicioglu, 2004. “A robust multiple watermarking scheme in the discrete wavelet

transform domain”, Quality of Service and Control of Next-Generation Communication Networks II,

Proceedings of the SPIE, 5601, pp: 133-144.

30. Yuan Yuan, Decai Huang and Duanyang Liu, 2006. “An Integer Wavelet Based Multiple Logo-

watermarking Scheme”, IEEE Proceedings of the First International Multi-Symposiums on Computer and

Computational Sciences, 2: 175-179.

31. Maha Sharkas, Dahlia R. ElShafie, and Nadder Hamdy, 2006.“A Novel Dual-Purpose Image Watermarking

Technique”, International Journal of Signal Processing, 3(4): 2026-2030.

254 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

32. Ibrahim Nasir, Ying Weng, and Jianmin Jiang, 2008. “Novel Multiple Spatial Watermarking Technique in

Color Images”, IEEE Fifth International Conference on Information Technology: New Generations, pp:

777-782.

33. Yuancheng Li, and Xiaolei Wang, 2009. “A Novel Multiple Watermarking Algorithm Based on Bandelet

Transform”, IEEE, Global Congress on Intelligent Systems.

34. Surekha, B., G.N. Swamy and K. Srinivasa Rao, 2010.“A Multiple Watermarking Technique for Images

based on Visual Cryptography”, International Journal of Computer Applications, 1(11): 66-71.

35. Vijendra Rai, Jaishree Rai, and Manoj Rana, 2011. “Effective Multiple Image Watermarking based on

Dither Quantization”, Proceedings of the 5th National Conference (INDIACom) Computing for Nation

Development.

36. Sergey Anfinogenov, Valery Korzhik, and Guillermo Morales-Luna, 2012. “A Multiple Robust Digital

Watermarking System for Still Images”, International Journal of Computer Science and Applications, 9(3):

37-46.

37. Jaiswal, R.J. and N.N. Patil, 2012. “Multiple watermarking for text documents: a review”, World Journal of

Science and Technology, 2(3): 176-179.

38. Anumol Joseph, and K. Anusudha, 2013.“Robust watermarking based on DWT-SVD”, International

Journal on Signal and Image Security, 1: 1.

39. Mohananthini, N. and G. Yamuna, 2013. “Color Image Multiple Watermarking Scheme based on Discrete

Wavelet Transform”, International Conference on Science Engineering and Management (ICSEM ’13), pp:

783-787.

40. Yuanning Liu, Youwei Wang and Xiaodong Zhu, 2014. “Novel robust multiple watermarking against

regional attacks of digital images”, Springer.

41. Hwai-Tsu Hu, and Ling-Yuan Hsu, 2014. “Exploring DWT–SVD–DCT feature parameters for robust

multiple watermarking against JPEG and JPEG2000 compression”, Elsevier-Computer and Electrical

Engineering.

42. Sheppard, N.P., R. Shafavi-Naini and P. Ogunbona, 2001. “On multiple watermarking”, Proceedings of the

ACM Multimedia and Security Workshop (MMSW), pp: 3-6.

43. Mascher - Kampfer, A., H. Stogner and A. Uhl, 2006. “Multiple re-watermarking scenarios”, Proceedings

of the 13th International Conference on Systems, Signals, and Image Processing (IWSSIP), pp: 53-56.

44. Shieh, C.S., H.C. Huang, F.H. Wang and J.S. Pan, 2003. “An embedding algorithm for multiple

watermarks”, Journal of Information Science and Engineering, 19(2): 381-395.

45. Daniel Mark, Andreas Uhl, and Hartmut Wernisch, 2007. “Experimental Study on Watermark Interference

in Multiple Re-Watermarking”, Proceedings of the SPIE Security, Steganography, and Watermarking of

Multimedia Contents, 6505.

46. Jutta Hammerle-Uhl., Michael Liedlgruber, Andreas and Hartmut Wernisch, 2008. “Multiple re-

watermarking using varying wavelet packets, IEEE International Conference on Multimedia and Expo, pp:

213-216.

47. Wheeler, G.E., N.P. Sheppard and R. Safavi-Naini, 2004. “Weighted Segmented Digital Watermarking”,

Third International Workshop on Digital Watermarking, (IWDW 2004), pp: 89-100.

48. Hamed Dehghan and S. Ebrahim Safavi, 2010. “Robust Image Watermarking in the Wavelet Domain for

Copyright Protection”, Submitted to ICEE.

49. Nantha Priya, N.R. and S. Lenty Stuwart, 2010. “Robust Feature Based Image Watermarking Process”,

International Journal of Computer Applications, 4(5): 13-16.

50. Keith Frikken and Mikhail Atallah, 2003. “Cropping-Resilient Segmented Multiple Watermarking,

Algorithms and Data Structures”, Lecture Notes in Computer Science, 2748, pp: 231-242.

51. Mina Deng, Tiziano Bianchi, Alessandro Piva and Bart Preneel, 2009. “An Efficient Buyer-Seller

Watermarking Protocol Based on Composite Signal Representation”, MM & Sec’09, September 7–8,

Princeton, New Jersey, USA.

52. Farid Ahmed and Ira S. Moskowitz, 2005. “Composite Signature Based Watermarking for Fingerprint

Authentication”, ACM Multimedia and Security Workshop, pp: 1-7.

53. Liang and Liu, 2006. “A new SVD-DWT composite watermarking”, 8th International Conference on Signal

Processing, 4.

54. Ibrahim Alsonosi Nasir and Ahmed b. Abdurrman, 2013. “A Robust Color Image Watermarking Scheme

Based on Image Normalization”, Proceedings of the World Congress on Engineering.

55. Mintzer, F. and G.W. Braudaway, 1999. “If one watermark is good, are more better?”, Proceedings of the

International Conference on Accoustics, Speech, and Signal Processing, pp: 2067-2070.

56. Boato, F.G.B. De Natale and C. Fontanari, 2007. “Digital Image Tracing by Sequential Multiple

Watermarking”, IEEE Transactions on Multimedia, 9(4): 677-686.

255 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

57. Radharani, S. and M.L. Valarmathi, 2011. “Multiple Watermarking Scheme for Image Authentication and

Copyright Protection using Wavelet based Texture Properties and Visual Cryptography”, International

Journal of Computer Applications, 23(3): 29-36.

58. Giakoumaki, A., S. Pavlopoulos and D. Koutsouris, 2004. “A Multiple Watermarking Scheme Applied to

Medical Image Management”, Annual International Conference of the IEEE, 2: 3241-3244.

59. Sachin Goyal, Roopam Gupta and Ashish Bansal, 2009. “Application of Genetic Algorithm to Optimize

Robustness and Fidelity of Watermarked Images (A conceptual approach)”, International Journal on

Computer Science and Engineering, 1(3): 239-242.

60. Goldberg, D.E., 1989. “Genetic algorithms in search, optimisation, and machine learning”, Addison Wesley

Longman, Inc., ISBN 0-201-15767-5.

61. Venkatesan, D., K. Kannan and S. Raja Balachandar, 2012. “Optimization of Fidelity in Digital Image

Watermarking Using a New Genetic Algorithm”, Applied Mathematical Sciences, 6(73): 3607-3614.

62. Didi Rosiyadi, Shi-Jinn Horng, Nana Suryana and Nurhayati Masthurah, 2012. “A Comparison between the

Hybrid Using Genetic Algorithm and the Pure Hybrid Watermarking Scheme”, International Journal of

Computer Theory and Engineering, 4: 3.

63. Chih-Chin Lai, 2011. “A Digital Watermarking Scheme based on Singular Value Decomposition and Tiny

Genetic Algorithm”, Elsevier - Digital Signal Processing, 21: 522-527.

64. Baker, J.E., 1989. “An Analysis of the Effects of Selection in Genetic Algorithms”, Ph.D. thesis, Graduate

School of Vanderbilt University, Nashville, Tennessee.

65. Tsai, H.H., K.C. Wang, and C.C. Liu, 2006. “Robust Watermarking in Wavelet Domain Using Rank Order

and Genetic Algorithm for Image Authorization”, International Joint Conference on Neural Networks,

IJCNN '06, pp: 2031-2038.

66. Tsai, H.H. and K.C. Wang, 2008. “Wavelet based image watermarking using rank order and genetic

algorithm”, Imaging Science Journal, 56(4): 201-216.

67. Sachin Goyal and Roopam Gupta, 2011. “Sliding Window used for Robustness and Fidelity Optimization

Employing Neighborhood Concept and Genetic Algorithm with Tournament Selection”, International

Journal of Computer Applications, 20(8): 36-41.

68. Sachin Goyal and Roopam Gupta, 2011. “Optimization of Fidelity with Adaptive Genetic Watermarking

Algorithm using Tournament Selection”, International Journal of Advanced Science and Technology, 30:

55-66.

69. Sachin Goyal and Roopam Gupta, “Comparison of Genetic Algorithm based Watermarking Techniques

using Tournament Selection Approach and Roulette Wheel Approach for Fidelity Optimization”,

International Journal of Computer Science and Network, 1(2): 74-79.

70. Ran-Zan Wang, Chi-Fang Lin and Ja-Chen Lin, 2011. “Image hiding by optimal LSB substitution and

genetic algorithm”, Elsevier Pattern Recognition, 34(3): 671-683.

71. Li Xiaoni, Sun Xiaoying and Wang Dazhong, 2006. “Real-coded generic algorithm for optimized digital

watermarking embedding in time-domain”, 9th International Conference on Electronic Measurement &

Instruments, ICEMI '09, 16-19 Aug. 2009, Beijing, pp: 144-148.

72. Anwar, M.J., M. Ishtiaq, M.A. Iqbal and M.A. Jaffar, 2010. “Block-based digital image watermarking using

Genetic Algorithm”, 6th International Conference on Emerging Technologies (ICET), Islamabad, pp: 204-

209.

73. Masoumehkhodaei and KarimFaez, 2010. “Image hiding by using genetic algorithm and LSB substitution”,

Springer, pp: 404-411.

74. Cauvery, N.K., 2011. “Water Marking on Digital Image using Genetic Algorithm”, International Journal of

Computer Science Issues, 8(6): 323-331.

75. Marghny Mohamed, Fadwa Al-Afari and Mohamed Bamatraf, 2011. “Data Hiding by LSB Substitution

Using Genetic Optimal Key-Permutation”, International Arab Journal of e-Technology, 2(1): 11-17.

76. Chun-Hsiang Huang and Ja-Ling Wu, 2000. “Watermark optimization technique based on genetic

algorithms”, Proc. SPIE 3971, Security and Watermarking of Multimedia Contents II, 516.

77. Chin-ShiuhShieh, Hsiang-Cheh Huang, Feng-Hsing Wang and Jeng-Shyang Pan, “Genetic watermarking

based on transform-domain techniques”, Elsevier, Pattern Recognition, 37: 555-565.

78. Zhicheng Wei, Hao Li, Jufeng Dai and Sashuang Wang, 2006. “Image Watermarking Based On Genetic

Algorithm”, IEEE – ICME, pp: 1117-1120.

79. Promcharoen, S. and Y. Rangsanseri, 2008. “Genetic watermarking based on texture analysis in DCT

domain”, SICE Annual Conference, Tokyo, pp: 25-28.

80. DidiRosiyadi, Nana Suryana and NurhayatiMasthurah, 2012. “A Comparison between the Hybrid Using

Genetic Algorithm and the Pure Hybrid Watermarking Scheme”, International Journal of Computer Theory

and Engineering, 4(3): 329-331.

256 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

81. SeyedSah and Mohammadi Ziabari, 2014. “Enhancement of genetic image watermarking robust against

cropping attack”, International Journal in Foundations of Computer Science and Technology (IJFCST), 4:

2.

82. Prayoth Kumsawat and Kitti Attakitmongcol, 2004. “Wavelet Based Image Watermarking using Genetic

Algorithm”, International Conference on Knowledge – Based Intelligent Information and Engineering

Systems, Wellington, pp: 40-46.

83. Prayoth Kumsawat, Kitti Attakitmongcol and Arthit Srikaew, 2005. “A New Approach for Optimization in

Image Watermarking by Using Genetic Algorithms”, IEEE transactions on Signal processing, 53(12): 4707-

4719.

84. Ali Al-Haj and Aymen Abu-Errub, 2008. “Performance Optimization of Discrete Wavelets Transform

Based Image Watermarking Using Genetic Algorithms”, Journal of Computer Science, 4(10): 834-841.

85. Nakamoto, M., S. Fujimoto, A. Doi and T. Hinamoto, 2008. “Genetic algorithm approach for wavelet-based

image watermarking”, 9th International Conference on Signal Processing, ICSP 2008, Beijing, pp: 5-8.

86. Amiri, S.H. and M. Jamzad, 2009. “A Robust Image Watermarking Method in Wavelet Domain using

Genetic Algorithm”, International Conference on Availability, Reliability and Security, ARES '09.

Fukuoka, pp: 612-617.

87. Chen Yongqiang, Zhang Yanqing and PengLihua, 2009. “A DWT Domain Image Watermarking Scheme

Using Genetic Algorithm and Synergetic Neural Network”, International Symposium on Information

Processing (ISIP’09), Huangshan, P. R. China, pp: 298-301.

88. Surekha, P. and S. Sumathi, 2011. “Implementation of Genetic Algorithm for a DWT Based Image

Watermarking Scheme”, Journal on Soft Computing: Special Issue on Fuzzy in Industrial and Process

Automation, 02(01): 244-252.

89. Ramanjaneyulu, K. and K. Rajarajeswari, 2011. “Robust and oblivious image watermarking scheme in the

dwt domain using genetic algorithm”, International Journal of Advanced Engineering Technology, 2(3): 85

-92.

90. Sridevi, T. and S Sameen Fatima, 2013. “Watermarking Algorithm using Genetic Algorithm and HVS”,

International Journal of Computer Applications, 74: 13.

91. Puja Agrawal and A.A. Khurshid, 2013. “Novel invisible watermarking for various images using HWT-

GA-PSO based hybrid optimization”, International Journal of Advanced Research in Computer Science and

Software Engineering, 3(8): 1093-1101.

92. Abduljabbar Shaamala and A. Azizah Manaf, 2013. “Study of the effected genetic watermarking

robustness under dct and dwt domains”, International Journal on New Computer Architectures and their

Applications, 2(2): 353-360.

93. Veysel Aslantas, 2008. “A singular-value decomposition-based image watermarking using genetic

algorithm”, International Journal of Electronics and Communications, 62(5): 386-394.

94. Chih-Chin Lai, Hsiang-Cheh Huang and Cheng-Chih Tsai, 2008. “Image Watermarking Scheme Using

Singular Value Decomposition and Micro-genetic Algorithm”, International Conference on Intelligent

Information Hiding and Multimedia Signal Processing, Harbin, pp: 469-472.

95. Chih-Chin Lai, Hsiang-Cheh Huang and Cheng-Chih Tsai, 2009. “A Digital Watermarking Scheme Based

on Singular Value Decomposition and Micro-Genetic Algorithm”, International Journal of Innovative

Computing, Information and Control, 5(7): 1867-1873.

96. Heechul Jung and MoonguJeon, 2009. “Enhanced SVD based watermarking with Genetic Algorithm”,

Springer, pp: 586-593.

97. Jagadeesh, B., S.S. Kumar and K.R. Rajeswari, 2009. “A Genetic Algorithm Based Oblivious Image

Watermarking Scheme Using Singular Value Decomposition (SVD)”, First International Conference on

Networks and Communications, NETCOM '09, Chennai, pp: 224-229.

98. Chih-Chin Lai, 2011. “A digital watermarking scheme based on singular value decomposition and tiny

genetic algorithm”, Elsevier – Digital Signal Processing, 21: 522-527.

99. Poonam, P., S. Kundu, S. Kumar and K. Chander, 2012. “Efficient Genetic Algorithm Based Image

Watermarking Using DWT-SVD Technique”, International Conference on Computing Sciences

(ICCS),Phagwara, pp: 82-87.

100. Jagadeesh, B., P. Rajesh Kumar and P. Chenna Reddy, 2012. “Genetic Algorithm approach for Singular

Value Decomposition and Quantization based Digital Image Watermarking”, International Journal of

Engineering Research and Applications, 2(2): 1229-1235.

101. Khaled Loukhaoukha, 2012. “On the Security of Digital Watermarking Scheme Based on SVD and Tiny-

GA”, Journal of Information Hiding and Multimedia Signal Processing, 3(2): 135-141.

102. RoshanJahan, 2013. “Efficient and Secure Digital Image Watermarking Scheme using DWT-SVD and

Optimized Genetic Algorithm based Chaotic Encryption”, International Journal of Science, Engineering

and Technology Research (IJSETR), 2(10): 1943-1946.

257 Ananth C et al., 2017/Advances in Natural and Applied Sciences. 11(6) Special 2017, Pages: 237-257

103. Voloshynovskiy, S., S. Pereira, A. Herrigel, N. Baumgärtner and T. Pun, 2000. “Generalized watermark

attack based on watermark estimation and perceptual remodulation”, 12th Annual Symposium, Electronic

Imaging 2000: Security and Watermarking of Multimediaof SPIE Proceedings, San Jose, California USA,

23-28.

104. Nikolaidis, A., S. Tsekeridou, A. Tefas and V. Solachidis, 2001. “A survey on watermarking application

scenarios and related attacks”, Proceedings of the IEEE International Conference on Image Processing.

105. Elias Kougianos, Saraju P. MohantyRabi and N. Mahapatra, 2009. “Hardware assisted watermarking for

multimedia”, Elsevier, 35(2): 339-358.

106. Voloshynovskiy, S., S. Pereira, T. Pun, J.J. Eggers and J.K. Su, 2011. “Attacks on Digital Watermarks:

Classification, Estimation-based Attacks and Benchmarks”, IEEE, Communications Magazine, 39: 118-

126.