Abstract
In this paper, an Extreme Learning Machine (ELM) for semi-blind grayscale in DWT domain is proposed. Low frequency LL4 sub-band is used for watermark embedding. ELM is iteratively tuned and used for training and predicting DWT coefficients. The quantized and desired LL4 sub-band coefficients of the DWT domain are used in the input dataset to train the ELM. A random key decides the starting position of the coefficients where the watermark is embedded. Both binary and the random sequence are used as watermark. This process enhances the robustness towards common image processing attacks. Experimental results show that the extracted watermark from watermarked and attacked images are similar to the original watermark. Computed time spans for embedding and extraction are of the order of seconds which is suitable for the real time processing of signed images.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cox, I.J., Kilian, J., Leighton, T.F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)
Mishra, A., Goel, A., Singh, R., Chetty, G., Singh, L.: A novel image watermarking scheme using Extreme Learning Machine. In: International Joint Conference on Neural Networks (IJCNN), pp. 1–6 (2012)
Zhenfei, W., Guangqun, Z., Nengchao, W.: Digital watermarking algorithm based on wavelet transform and neural network. Wuhan Univ. J. Nat. Sci. 11(6), 1667–1670 (2006)
Piao, C., Beack, S., Woo, D., Han, S.: A Blind Watermarking Algorithm Using BPN Neural Network for Digital Image, pp. 285–292. Springer, Berlin, Heidellberg (2006)
Lou, D., Hu, M., Liu, J.: Healthcare image watermarking scheme based on human visual model and back-propagation network. J. C.C.I.T. 37(1), 151–162 (2008)
Yang, Q., Gao, T., Fan, L.: A novel robust watermarking scheme based on neural network. In: International Conference on Intelligent Computing and Integrated Systems (ICISS), pp. 71–75 (2010)
Agarwal, C., Mishra, A., Sharma, A.: Digital image watermarking in DCT domain using Fuzzy Inference System. In: 24th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 822–825 (2011)
Agarwal, C., Mishra, A.: A novel image watermarking technique using fuzzy-BP network. In: Proceedings of 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 102–105 (2010)
Dey, N., Samanta, S., Yang, X., Das, A., Chaudhuri, S.: Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. 2013 Int. J. Bio-Inspired Comput. 5(5), 315–326 (2013)
Huang, G.: The Matlab code for ELM (2004). http://www.ntu.edu.sg/home/egbhuang
Huang, G., Zhu, Q., Siew, C.: Extreme learning machine: theory and applications. Neurocomputing 70, 489–501 (2006)
Lin, M., Huang, G., Saratchandran, P., Sudararajan, N.: Fully complex extreme learning machine. Neurocomputing 68, 306–314 (2005)
Serre, D.: Matrices: Theory and Applications. Springer, New York (2002)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Liu, Q., Jiang, X.: Design and realization of a meaningful digital watermarking algorithm based on RBF neural network. In: 2005 International Conference on Neural Networks and Brain, Beijing, pp. 214–218 (2005)
Huang, S., Zhang, W., Feng, W., Yang, H.: Blind watermarking scheme based on neural network. In: 7th World Congress on Intelligent Control and Automation 2008 (WCICA 2008), Chongqing, pp. 5985–5989 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rajpal, A., Mishra, A., Bala, R. (2016). Extreme Learning Machine for Semi-blind Grayscale Image Watermarking in DWT Domain. In: Mueller, P., Thampi, S., Alam Bhuiyan, M., Ko, R., Doss, R., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-2738-3_26
Download citation
DOI: https://doi.org/10.1007/978-981-10-2738-3_26
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2737-6
Online ISBN: 978-981-10-2738-3
eBook Packages: Computer ScienceComputer Science (R0)