Loading…

Tunable Q-Factor Wavelet Transform-Based Robust Image Watermarking Scheme Using Logistic Mapping and Antlion Optimization

In recent times, data security is an emerging and highly challenging issue due to the rapid growth of digital technologies and their uses. Copyright protection can be considered as one of the major security concerns for digital data (e.g., images), and efficient security techniques are needed to pro...

Full description

Saved in:
Bibliographic Details
Published in:Circuits, systems, and signal processing systems, and signal processing, 2022-11, Vol.41 (11), p.6370-6410
Main Authors: Sinhal, Rishi, Ansari, Irshad Ahmad
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In recent times, data security is an emerging and highly challenging issue due to the rapid growth of digital technologies and their uses. Copyright protection can be considered as one of the major security concerns for digital data (e.g., images), and efficient security techniques are needed to provide effective solutions. Digital watermarking is extensively used for protection of copyrights and ownership. This work proposes a transform domain-based robust image watermarking scheme for color and gray images. The watermarking scheme uses the concept of tunable Q-factor wavelet transform (TQWT), discrete cosine transform (DCT), logistic mapping and antlion optimization (ALO). The host image (Y channel of YCbCr color space in case of a color image) is first transformed using TQWT transform, and the low frequency subband is selected. DCT transform is applied on each elected block, and the selected DCT coefficient is modified based on the watermark bit. The logistic mapping-based approach is employed to encrypt the watermark information before embedding. The ALO optimization is used on a large data set (including different types of images) to get optimize parametric values (Q-factor, redundancy and embedding strength). Experimental results show that the scheme has significant imperceptibility, high robustness, high security, low processing time and acceptable embedding capacity. Investigational results and relative comparisons confirm that the proposed scheme has superior performance as compared to other recently proposed schemes.
ISSN:0278-081X
1531-5878
DOI:10.1007/s00034-022-02090-8