Advertisement

Enhanced Secret Hiding Mechanism Based on Genetic Algorithm

  • Cai-Jie Weng
  • Shi-Jian Liu
  • Jeng-Shyang PanEmail author
  • Lyuchao Liao
  • Trong-The Nguyen
  • Wei-Dong Zeng
  • Ping Zhang
  • Lei Huang
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 156)

Abstract

Many industrial production processes, transactions, and multimedia communications are generated in daily life. Digital watermarking technology plays a vital role in the field of multimedia information security. Information security has got many remarkable achievements. However, a contradiction between the robustness of the watermark and the quality of the cover multimedia has not been paid attention by scholars. This paper proposes an algorithm to improve the cover image quality of QIM-based watermarking algorithm based on genetic algorithm. The experimental results demonstrate that the proposed algorithm is effective.

Keywords

Quantization index Modulation Watermarking Genetic algorithm 

Notes

Acknowledgements

This work was supported by the Natural Science Foundation of Fujian Province Grant 2018Y3001, Project of Fujian Education Department Funds Grant JK2017029, and the Scientific Research Project of Fujian University of Technology Grant GY-Z160130.

References

  1. 1.
    Shiu, P.-F., Lin, C.-C., Jan, J.-K., Chang, Y.-F.: A DCT-based robust watermarking scheme surviving JPEG compression with voting strategy. J. Netw. Intell. 3, 259–277 (2018)Google Scholar
  2. 2.
    Wu, T.-Y., Chen, C.-M., Wang, K.-H., Pan, J.-S., Zheng, W., Chu, S.-C., Roddick, J.F.: Security analysis of Rhee et al.’s public encryption with keyword search schemes: a review. J. Netw. Intell. 3, 16–25 (2018)Google Scholar
  3. 3.
    Nguyen, T.-T., Pan, J.-S., Chu, S.-C., Roddick, J.F., Dao, T.-K.: Optimization localization in wireless sensor network based on multi-objective firefly algorithm. J. Netw. Intell. 1, 130–138 (2016)Google Scholar
  4. 4.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13, 890–896 (2003)CrossRefGoogle Scholar
  5. 5.
    Chen, S.-H., Ko, S.-Y., Chen, S.-H.: Robust music genre classification based on sparse representation and wavelet packet transform with discrete trigonometric transform. J. Netw. Intell. 1, 67–82 (2016)Google Scholar
  6. 6.
    Tirkel, A.Z., Rankin, G.A., Van Schyndel, R.M., Ho, W.J., Mee, N.R.A., Osborne, C.F.: Electronic watermark. Digit. Image Comput. Technol. Appl., 666–673 (1993)Google Scholar
  7. 7.
    Rosales-Roldan, L., Chao, J., Nakano-Miyatake, M., Perez-Meana, H.: Color image ownership protection based on spectral domain watermarking using QR codes and QIM. Multimed. Tools Appl. 77, 16031–16052 (2018)CrossRefGoogle Scholar
  8. 8.
    Kuang, F.-J., Zhang, S.-Y.: A novel network intrusion detection based on support vector machine and tent chaos artificial bee colony algorithm. J. Netw. Intell. 2, 195–204 (2017)Google Scholar
  9. 9.
    Lyu, W.-L., Chang, C.-C., Chou, Y.-C., Lin, C.-C.: Hybrid color image steganography method used for copyright protection and content authenticationGoogle Scholar
  10. 10.
    Xiang, S., Luo, X.: Efficient reversible data hiding in encrypted image with public key cryptosystem. EURASIP J. Adv. Signal Process. 2017, 59 (2017)CrossRefGoogle Scholar
  11. 11.
    Weng, C.-J., Pan, J.-S., Liu, S.-J., Wang, M.-J.: A Watermarking method for printed QR code based on module expansion. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 124–133. Springer (2018)Google Scholar
  12. 12.
    Abdulrahman, A.K., Ozturk, S.: A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimed. Tools Appl., 1–23 (2019)Google Scholar
  13. 13.
    Pan, J.-S., Huang, H.-C., Jain, L.C.: Intelligent Watermarking Techniques. World Scientific (2004)Google Scholar
  14. 14.
    Holland, J.H.: Genetic algorithms. Sci. Am. 267, 66–73 (1992)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Cai-Jie Weng
    • 1
  • Shi-Jian Liu
    • 1
  • Jeng-Shyang Pan
    • 1
    Email author
  • Lyuchao Liao
    • 2
  • Trong-The Nguyen
    • 1
    • 3
  • Wei-Dong Zeng
    • 4
  • Ping Zhang
    • 5
  • Lei Huang
    • 5
  1. 1.Fujian Provincial Key Lab of Big Data Mining and ApplicationsFujian University of TechnologyFuzhouChina
  2. 2.Fujian Key Laboratory for Automotive Electronics and Electric DriveFujian University of TechnologyFuzhouChina
  3. 3.Department of Information TechnologyHaiphong Private UniversityHaiphongVietnam
  4. 4.Smart Fuzhou Management Service CenterFujianChina
  5. 5.Fuzhou Investigation and Surveying InstituteFujianChina

Personalised recommendations