Journal of Machine and Computing


PSO-Optimized Watermarking Using Lifting Wavelet Transform and SVD for Enhanced Image Security



Journal of Machine and Computing

Received On : 18 May 2024

Revised On : 02 September 2024

Accepted On : 16 October 2024

Volume 05, Issue 01


Article Views

Abstract


A significant data protection technique for a number of problems, the most prominent being identity authentication and copyright protection, is digital image watermarking. The rapid digital transformation of the world has given rise to a variety of vision modification techniques, which have significant consequences for picture data security. As a result, maintaining the validity and integrity of digital images is crucial, which is why researchers are focusing on creating effective watermarking techniques. This study proposes an optimized robust watermarking technique based on lifting wavelet transform (LWT) with singular value decomposition (SVD) using the particle swarm optimization (PSO) algorithm for achieving multiple scaling factors (MSF). To increase security and durability, cover images are exposed to numerous attacks. The evaluation criteria, which encompass normalized cross-correlation (NCC) and peak signal-to-noise ratio (PSNR), were used to compare our outcomes with those of leading watermarking methods. The comparison reveals that our proposed strategy surpasses existing methods in terms of both robustness and imperceptibility. The results suggest that this technique is suitable for tamper detection in various domains, including cryptography, medical imaging and multimedia transmission.


Keywords


Watermarking, Singular Value Decomposition, Lifting Wavelet Transform, Peak Signal-To-Noise Ratio and Particle Swarm Optimization.


  1. Voyatzis. G, Nikolaidis. N and Pitas. I, “Digital watermarking: An overview,” 9th European Signal Processing Conference (EUSIPCO 1998), pp. 1-4, 1998.
  2. H. Prasetyo, C.-H. Hsia, and C.-H. Liu, “Vulnerability Attacks of SVD-Based Video Watermarking Scheme in an IoT Environment,” IEEE Access, vol. 8, pp. 69919–69936, 2020, doi: 10.1109/access.2020.2984180.
  3. W. H. Alshoura, Z. Zainol, J. S. Teh, M. Alawida, and A. Alabdulatif, “Hybrid SVD-Based Image Watermarking Schemes: A Review,” IEEE Access, vol. 9, pp. 32931–32968, 2021, doi: 10.1109/access.2021.3060861.
  4. M. Du, T. Luo, L. Li, H. Xu, and Y. Song, “T-SVD-Based Robust Color Image Watermarking,” IEEE Access, vol. 7, pp. 168655–168668, 2019, doi: 10.1109/access.2019.2953878.
  5. T. T. Takore, P. R. Kumar, and G. L. Devi, “A New Robust and Imperceptible Image Watermarking Scheme Based on Hybrid Transform and PSO,” International Journal of IFntelligent Systems and Applications, vol. 10, no. 11, pp. 50–63, Nov. 2018, doi: 10.5815/ijisa.2018.11.06.
  6. D. Awasthi and V. K. Srivastava, “LWT-DCT-SVD and DWT-DCT-SVD based watermarking schemes with their performance enhancement using Jaya and Particle swarm optimization and comparison of results under various attacks,” Multimedia Tools and Applications, vol. 81, no. 18, pp. 25075–25099, Mar. 2022, doi: 10.1007/s11042-022-12456-4.
  7. Ruizhen Liu and Tieniu Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121–128, Mar. 2002, doi: 10.1109/6046.985560.
  8. O. Jane, E. Elbaşi, and H. G. İlk, “Hybrid Non-Blind Watermarking Based on DWT and SVD,” Journal of Applied Research and Technology, vol. 12, no. 4, pp. 750–761, Aug. 2014, doi: 10.1016/s1665-6423(14)70091-4.
  9. Md. Asikuzzaman, H. Mareen, N. Moustafa, K.-K. R. Choo, and M. R. Pickering, “Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain,” IEEE Access, vol. 10, pp. 15681–15698, 2022, doi: 10.1109/access.2022.3146723.
  10. J. Liu et al., “An Optimized Image Watermarking Method Based on HD and SVD in DWT Domain,” IEEE Access, vol. 7, pp. 80849–80860, 2019, doi: 10.1109/access.2019.2915596.
  11. B. P. Kulkarni, S. Sai Krishna, K. Meenakshi, P. Kora, and K. Swaraja, “Performance Analysis of Optimization Algorithms GA, PSO, and ABC based on DWT-SVD watermarking in OpenCV Python Environment,” 2020 International Conference for Emerging Technology (INCET), vol. 6, pp. 1–5, Jun. 2020, doi: 10.1109/incet49848.2020.9154134.
  12. N. Yadav, D. Rajpoot, and S. K. Dhakad, “Optimization of Watermarking in Image by Using Particle Swarm Optimization Algorithm,” 2020 6th International Conference on Signal Processing and Communication (ICSC), vol. 66, pp. 85–90, Mar. 2020, doi: 10.1109/icsc48311.2020.9182716.
  13. A. Anand and A. K. Singh, "Hybrid Nature-Inspired Optimization and Encryption-Based Watermarking for e-Healthcare," in IEEE Transactions on Computational Social Systems, doi: 10.1109/TCSS.2022.3140862.
  14. A. Mishra, C. Agarwal, A. Sharma, and P. Bedi, “Optimized gray-scale image watermarking using DWT–SVD and Firefly Algorithm,” Expert Systems with Applications, vol. 41, no. 17, pp. 7858–7867, Dec. 2014, doi: 10.1016/j.eswa.2014.06.011.
  15. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, Dec. 1997, doi: 10.1109/83.650120.
  16. Zhou. B and Chen. J, “A geometric distortion resilient image watermarking algorithm based on SVD,” J. Image Graph., vol. 4, pp. 506-512, Apr. 2004.
  17. N. M. Makbol, B. E. Khoo, and T. H. Rassem, “Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain,” Multimedia Tools and Applications, vol. 77, no. 20, pp. 26845–26879, Mar. 2018, doi: 10.1007/s11042-018-5891-y.
  18. S. B. B. Ahmadi, G. Zhang, and S. Wei, “Robust and hybrid SVD-based image watermarking schemes:,” Multimedia Tools and Applications, vol. 79, no. 1–2, pp. 1075–1117, Oct. 2019, doi: 10.1007/s11042-019-08197-6.
  19. C. Kumar, A. K. Singh, and P. Kumar, “A recent survey on image watermarking techniques and its application in e-governance,” Multimedia Tools and Applications, vol. 77, no. 3, pp. 3597–3622, Sep. 2017, doi: 10.1007/s11042-017-5222-8.
  20. Li. J, Du. W, Huang. M and Chen. Y, "Multiple watermarks for medical image based on DWT-DFT," 2012 7th International Conference on Computing and Convergence Technology (ICCCT), pp. 257-260, 2012.
  21. H.-T. Hu and L.-Y. Hsu, “Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics,” Multimedia Tools and Applications, vol. 76, no. 5, pp. 6575–6594, Feb. 2016, doi: 10.1007/s11042-016-3332-3.
  22. B. Kazemivash and M. E. Moghaddam, “A robust digital image watermarking technique using lifting wavelet transform and firefly algorithm,” Multimedia Tools and Applications, vol. 76, no. 20, pp. 20499–20524, Sep. 2016, doi: 10.1007/s11042-016-3962-5.
  23. Z. Liu, M. A. Ahmad, and S. Liu, “A discrete fractional angular transform,” Optics Communications, vol. 281, no. 6, pp. 1424–1429, Mar. 2008, doi: 10.1016/j.optcom.2007.11.012.
  24. K. Loukhaoukha, “Comments on ‘A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm,’” Digital Signal Processing, vol. 23, no. 4, p. 1334, Jul. 2013, doi: 10.1016/j.dsp.2013.02.006.
  25. M. R. Mitashe, A. R. B. Habib, A. Razzaque, I. A. Tanima, and J. Uddin, “An adaptive digital image watermarking scheme with PSO, DWT and XFCM,” 2017 IEEE International Conference on Imaging, Vision & Pattern Recognition (icIVPR), vol. 6, pp. 1–5, 2017, doi: 10.1109/icivpr.2017.7890868.
  26. S. Das, A. Abraham, and A. Konar, “Spatial Information Based Image Segmentation Using a Modified Particle Swarm Optimization Algorithm,” Sixth International Conference on Intelligent Systems Design and Applications, vol. 2, pp. 438–444, Oct. 2006, doi: 10.1109/isda.2006.253877.
  27. Huang, H.-C, Chen, Y.-H, & Abraham, “A. Optimized watermarking using swarm-based bacterial foraging,” Journal of Information Hiding and Multimedia Signal Processing, vol.1, no.1, pp.51–58, (2010).
  28. P. P. Nerurkar and A. C. Phadke, “Digital Image Watermarking Using Firefly Algorithm,” 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), vol. 2, pp. 1–5, Aug. 2018, doi: 10.1109/iccubea.2018.8697666.
  29. N. M. Makbol, B. E. Khoo, T. H. Rassem, and K. Loukhaoukha, “A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection,” Information Sciences, vol. 417, pp. 381–400, Nov. 2017, doi: 10.1016/j.ins.2017.07.026.
  30. W. Sweldens, “The Lifting Scheme: A Construction of Second Generation Wavelets,” SIAM Journal on Mathematical Analysis, vol. 29, no. 2, pp. 511–546, Mar. 1998, doi: 10.1137/s0036141095289051.
  31. J. Kennedy and R. Eberhart, “Particle swarm optimization,” Proceedings of ICNN’95 - International Conference on Neural Networks, vol. 4, pp. 1942–1948, doi: 10.1109/icnn.1995.488968.
  32. T. Tagesse Takore, P. Rajesh Kumar, and G. Lavanya Devi, “Robust Image Watermarking Scheme Using Population-Based Stochastic Optimization Technique,” International Journal of Image, Graphics and Signal Processing, vol. 9, no. 7, pp. 55–65, Jul. 2017, doi: 10.5815/ijigsp.2017.07.06.
  33. V. S. Verma, R. K. Jha, and A. Ojha, “Significant region based robust watermarking scheme in lifting wavelet transform domain,” Expert Systems with Applications, vol. 42, no. 21, pp. 8184–8197, Nov. 2015, doi: 10.1016/j.eswa.2015.06.041.

Acknowledgements


We would like to thank Reviewers for taking the time and effort necessary to review the manuscript. We sincerely appreciate all valuable comments and suggestions, which helped us to improve the quality of the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Praveenkumar Babu, Supraja G, Gopi Kasinathan, Kavitha Devi K, and Yogapriya J, “PSO-Optimized Watermarking Using Lifting Wavelet Transform and SVD for Enhanced Image Security”, Journal of Machine and Computing. doi: 10.53759/7669/jmc202505010.


Copyright


© 2025 Praveenkumar Babu, Supraja G, Gopi Kasinathan, Kavitha Devi K, and Yogapriya J. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.