Multimedia Tools and Applications

, Volume 77, Issue 19, pp 26083–26105 | Cite as

Robust watermarking in DWT domain using SVD and opposition and dimensional based modified firefly algorithm

  • Elham Moeinaddini
  • Fatemeh Afsari


The process of authenticating a digital image by embedding a watermark into it is called digital image watermarking, which protects the image from copyright infringement. This paper proposes an optimized watermarking scheme in the discrete wavelet transform (DWT) domain based on the singular value decomposition (SVD) using opposition and dimensional based modified firefly algorithm (ODFA).The host image is segmented into 8 × 8 non-overlapping blocks and the most suitable embedding blocks are selected for embedding. The selected blocks are then transformed into DWT domain and SVD is applied on LL1 sub-bands. Finally, the process of embedding the watermarked bits is optimized using ODFA, which applies the combination of imperceptibility and robustness as the objective function. The embedding algorithm possesses good similarity between the host and the watermarked images as well as the strong robustness against various image processing operations and attacks. Experimental results reveal that the proposed scheme has a higher degree of imperceptibility and robustness compare to related existing schemes.


Blind watermarking Discrete wavelet transform Opposition and dimensional based modified firefly algorithm Robustness Imperceptible 


  1. 1.
  2. 2.
    Ali M, Ahn CW, Pant M, Siarry P (2015) An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony. Inf Sci 301:44–60Google Scholar
  3. 3.
    Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU-Int J Electron C 68(3):244–253Google Scholar
  4. 4.
    Dong H, He M,Qiu M (2015) Optimized Gray-Scale Image Watermarking Algorithm Based on DWT-DCT-SVD and Chaotic Firefly Algorithm. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), p 310–313Google Scholar
  5. 5.
    Elshazly EH, Faragallah OS, Abbas AM, Ashour MA, El-Rabaie ESM, Kazemian H, ..., Elsayed HS (2015) Robust and secure fractional wavelet image watermarking. Signal, Image and Video Processing 9(1):89–98Google Scholar
  6. 6.
    Fan MQ, Wang HX, Li SK (2008) Restudy on SVD-based watermarking scheme. Appl Math Comput 203(2):926–930Google Scholar
  7. 7.
    Horng M-H, Jiang T-W (2010) Multilevel image thresholding selection based on the firefly algorithm. In: Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2010 7th International Conference on, p 58–63Google Scholar
  8. 8.
    Ishtiaq M, Sikandar B, Jaffar MA, Khan A (2010) Adaptive watermark strength selection using particle swarm optimization. ICIC Express Letters 4(5):1–6Google Scholar
  9. 9.
    Kazemivash B, Moghaddam ME (2017) A robust digital image watermarking technique using lifting wavelet transform and firefly algorithm. Multimed Tools Appl 76(20):20499–20524Google Scholar
  10. 10.
    Kazemivash B, Moghaddam ME (2017) A predictive model-based image watermarking scheme using Regression Tree and Firefly algorithm. Springer, Berlin, Heidelberg, pp 1–16Google Scholar
  11. 11.
    Lai CC (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284(4):938–944Google Scholar
  12. 12.
    Lai CC (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digital Signal Processing 21(4):522–527Google Scholar
  13. 13.
    Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063Google Scholar
  14. 14.
    Lewis J (1995) Fast normalized cross-correlation. In: Vision interface, p 120–123Google Scholar
  15. 15.
    Li Q, Yuan C, Zhong YZ (2007) Adaptive DWT-SVD Domain Image Watermarking Using Human Visual Model. In: The 9th International Conference on Advanced Communication Technology, p 1947–1951Google Scholar
  16. 16.
    Lin TC, Lin CM (2009) Wavelet-based copyright-protection scheme for digital images based on local features. Information Sciences 179(19):3349–3358Google Scholar
  17. 17.
    Loukhaoukha K, Chouinard JY, Taieb MH (2011) Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization. J Inf Hiding Multimed Signal Process 2(4):303–319Google Scholar
  18. 18.
    Maity SP, Maity S (2009) Multistage spread spectrum watermark detection technique using fuzzy logic. IEEE signal processing letters 16(4):245–248Google Scholar
  19. 19.
    O'Ruanaidh JJ, Pun T (1997) Rotation, scale and translation invariant digital image watermarking. In Proceedings International Conference on Image Proceesing 1:536–539Google Scholar
  20. 20.
    O'Ruanaidh J, Pun T (1997) Rotation, translation and scale invariant digital image watermarking. In: International Conference on Image Processing. Santa Barbara, p 536–536Google Scholar
  21. 21.
    Pal NR, Pal SK (1989) Object-background segmentation using new definitions of entropy. IEE Proceedings E (Computers and Digital Techniques) 136(4):284–295Google Scholar
  22. 22.
    Ramkumar M, Akansu N, Alatan A (1999) A Robust Data Hiding Scheme forImages using DFT. In: International Conference on ImageProcessing. Japan, p 211–215Google Scholar
  23. 23.
    Rivest RL (1992) The MD5 message-digest algorithm. Request for comments (RFC) 1321. Available:
  24. 24.
    Santhi V, Thangavelu A (2009) DWT-SVD combined full band robust watermarking technique for color images in YUV color space. Int J Comput Theory Eng 1(4):424Google Scholar
  25. 25.
    Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379–423Google Scholar
  26. 26.
    Verma OP, Aggarwal D, Patodi T (2016) Opposition and dimensional based modified firefly algorithm. Expert Syst Appl 44:168–1Google Scholar
  27. 27.
    Wang YR, Lin WH, Yang L (2011) An intelligent watermarking method based on particle swarm optimization. Expert Syst Appl 38(7):8024–8029Google Scholar
  28. 28.
    Wu HT, Huang J (2012) Reversible image watermarking on prediction errors by efficient histogram modification. Signal Process 92(12):3000–3009Google Scholar
  29. 29.
    Yang X-S (2008) Nature-inspired metaheuristic algorithms. Luniver Press, Beckington, pp 242–246Google Scholar
  30. 30.
    Yang XS (2010) Firefly algorithm, stochastic test functions and design optimisation. Int J Bio Inspir Com 2(2):78–84Google Scholar
  31. 31.
    Zhang Y, Wu L (2012) A novel method for rigid image registration based on firefly algorithm. International Journal of Research and Reviews in Soft and Intelligent Computing (IJRRSIC) 2(2):141–146Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Electrical EngineeringUniversity of JiroftJiroftIran
  2. 2.Department of Computer EngineeringShahid Bahonar University of KermanKermanIran

Personalised recommendations