scispace - formally typeset
Book ChapterDOI

VQ-Based gray watermark hiding scheme and genetic index assignment

Reads0
Chats0
TLDR
Experimental results show that the proposed vector quantisation (VQ) based watermarking scheme for hiding the gray watermark possesses advantages over other related methods in literature.
Abstract
A vector quantisation (VQ) based watermarking scheme for hiding the gray watermark is presented. It expands the watermark size, and employs VQ index assignment procedure with genetic algorithm, called genetic index assignment (GIA), for watermarking. The gray watermark is coded by VQ, and obtained indices are translated into a binary bitstream with a much smaller size. We partition the codebook into two sub-codebooks, and use either one of them based on the value of the bit for embedding. Next, GIA is employed to find better imperceptibility of watermarked image. Experimental results show that the proposed method possesses advantages over other related methods in literature.

read more

Citations
More filters
Book ChapterDOI

A novel clonal selection algorithm based fragile watermarking method

TL;DR: A novel fragile watermarking method based on clonal selection algorithm (CSA), CLONALG, is presented and simulation results show that extracted watermark is obtained exactly the same as embedded watermark and optimum watermarked image transparency is achieved.

Survey of Bio-inspired Computing for Information Hiding.

TL;DR: Survey of bio-inspired techniques for information hiding aims at providing the background knowledge for further researches in this field and comparing schemes from different papers in literature are extensively surveyed.
Book ChapterDOI

Watermarking Using Intelligent Methods: Survey

TL;DR: The intelligent techniques like genetic algorithms (GA) and soft computing are having number of applications in digital watermarking.
Journal ArticleDOI

Intelligent Machine Learning in Image Authentication

TL;DR: The aim of this paper is to present a review on different Machine learning techniques as Fuzzy Set theory, Rough Set Theory, Rough K-means clustering, Near Sets and Nearness Approximation Spaces, Vector quantization, Genetic Algorithm, Particle Swarm Optimization, Support Vec- tor Machine and applying them in image authentication.
Book ChapterDOI

Digital Watermarking Techniques for Images: Survey

TL;DR: The main characteristics of Digital watermark are robustness, imperceptible and security, which depending on the ability of the watermark to withstand normal signal processing operations, can be categorized as robust, fragile and semi-fragile watermarking.
References
More filters
Book

Genetic algorithms in search, optimization, and machine learning

TL;DR: In this article, the authors present the computer techniques, mathematical tools, and research results that will enable both students and practitioners to apply genetic algorithms to problems in many fields, including computer programming and mathematics.

Genetic algorithms in search, optimization and machine learning

TL;DR: This book brings together the computer techniques, mathematical tools, and research results that will enable both students and practitioners to apply genetic algorithms to problems in many fields.
Book

Vector Quantization and Signal Compression

TL;DR: The author explains the design and implementation of the Levinson-Durbin Algorithm, which automates the very labor-intensive and therefore time-heavy and expensive process of designing and implementing a Quantizer.
Book

Digital Watermarking

TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Book

Information Hiding Techniques for Steganography and Digital Watermarking

TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Related Papers (5)