Enhanced Secret Hiding Mechanism Based on Genetic Algorithm
Many industrial production processes, transactions, and multimedia communications are generated in daily life. Digital watermarking technology plays a vital role in the field of multimedia information security. Information security has got many remarkable achievements. However, a contradiction between the robustness of the watermark and the quality of the cover multimedia has not been paid attention by scholars. This paper proposes an algorithm to improve the cover image quality of QIM-based watermarking algorithm based on genetic algorithm. The experimental results demonstrate that the proposed algorithm is effective.
KeywordsQuantization index Modulation Watermarking Genetic algorithm
This work was supported by the Natural Science Foundation of Fujian Province Grant 2018Y3001, Project of Fujian Education Department Funds Grant JK2017029, and the Scientific Research Project of Fujian University of Technology Grant GY-Z160130.
- 1.Shiu, P.-F., Lin, C.-C., Jan, J.-K., Chang, Y.-F.: A DCT-based robust watermarking scheme surviving JPEG compression with voting strategy. J. Netw. Intell. 3, 259–277 (2018)Google Scholar
- 2.Wu, T.-Y., Chen, C.-M., Wang, K.-H., Pan, J.-S., Zheng, W., Chu, S.-C., Roddick, J.F.: Security analysis of Rhee et al.’s public encryption with keyword search schemes: a review. J. Netw. Intell. 3, 16–25 (2018)Google Scholar
- 3.Nguyen, T.-T., Pan, J.-S., Chu, S.-C., Roddick, J.F., Dao, T.-K.: Optimization localization in wireless sensor network based on multi-objective firefly algorithm. J. Netw. Intell. 1, 130–138 (2016)Google Scholar
- 5.Chen, S.-H., Ko, S.-Y., Chen, S.-H.: Robust music genre classification based on sparse representation and wavelet packet transform with discrete trigonometric transform. J. Netw. Intell. 1, 67–82 (2016)Google Scholar
- 6.Tirkel, A.Z., Rankin, G.A., Van Schyndel, R.M., Ho, W.J., Mee, N.R.A., Osborne, C.F.: Electronic watermark. Digit. Image Comput. Technol. Appl., 666–673 (1993)Google Scholar
- 8.Kuang, F.-J., Zhang, S.-Y.: A novel network intrusion detection based on support vector machine and tent chaos artificial bee colony algorithm. J. Netw. Intell. 2, 195–204 (2017)Google Scholar
- 9.Lyu, W.-L., Chang, C.-C., Chou, Y.-C., Lin, C.-C.: Hybrid color image steganography method used for copyright protection and content authenticationGoogle Scholar
- 11.Weng, C.-J., Pan, J.-S., Liu, S.-J., Wang, M.-J.: A Watermarking method for printed QR code based on module expansion. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 124–133. Springer (2018)Google Scholar
- 12.Abdulrahman, A.K., Ozturk, S.: A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimed. Tools Appl., 1–23 (2019)Google Scholar
- 13.Pan, J.-S., Huang, H.-C., Jain, L.C.: Intelligent Watermarking Techniques. World Scientific (2004)Google Scholar