Skip to main content

Advertisement

Log in

High security self-encoded spread spectrum watermarking using genetic algorithms

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Spread spectrum modulation based watermarking has proved to be effective, robust and cryptographically secure. It hides watermark by spreading its spectrum with a pseudo-noise (PN) sequence and then adding them to a host image as a watermarked image. In regular approaches, to achieve PN sequence at the transmitter, receiver must use a separate channel for detecting hidden information. The unique PN sequence must have a low cross correlation and thereby can be duplicated easily by hostile attackers. In this paper a novel approach based on the Self-Encoded Spread Spectrum (SESS) is proposed. PN code is derived from the original image signal itself and the spreading sequence of watermark signal is recovered without any information from the transmitter. It is contributed a higher secure feature by using of the time-varying SESS. Genetic algorithm is applied to achieve best BER and PAD by optimizing Spreading Length, Quantization Length, payload capacity and Signal to interference ratio.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Ghosh, S., Ray, P., Maity, S. P., & Rahaman, H. (2009). Spread spectrum image watermarking with digital deisign. IEEE International Advance Computing Conference 2009, Patiala, India.

  2. Asghari, V. R., & Ardebilipour, M. (2004). Spread spectrum code estimation by genetic algorithm. International Journal of signal processing, 1(4).

  3. Yen, K., & Hanzo, L. (2001). Genetic algorithm assisted joint multiuser symbol detection and fading channel estimation for synchronous CDMA systems. IEEE Transaction on Selected Areas in Communication, 19(6).

  4. Asghari, V. R., & Ardebilipour, M. (2005). Spread spectrum code estimation by particle swarm algorithm. International Journal of Signal Processing, 2(4), 268–272.

    Google Scholar 

  5. Hua, K., Jang, W. M., & Nguyen, L. (2009). Cooperative self encoded spread spectrum in fading channels. International Journal of Communication, Network and system, 2, 91–96.

    Google Scholar 

  6. Maity, S., Maity, S. P., & Sil, J. (2009). Spread spectrum watermark embedder optimization using genetic algorithms, advances in pattern recognition 2009. Kolkata, India.

  7. Sedghi, S., Mashhadi, H. R., & Khademi, M. (2006). Detecting hidden information from a spread spectrum watermarked signal by genetic algorithm 2006 IEEE congress on evolutionary computation Sheraton Vancouver Wall Centre Hotel. Vancouver, BC, Canada.

  8. Gao, Q., Li, R., Wang, H., Dang, H., & Liu, L. (2004). Spread spectrum digital watermarking algorithm using gold codes. Journal of Xi’an Jiaotong University, 28(2).

  9. Marvel, L. M., Retter, C. T., & Boncelet, C. G. J. (1998). Hiding information in images 1998 international conference on image processing, Chicago, USA.

  10. Ruanaidh, J. J. K. O., & Csurka, G. (1999). A Bayesian approach to spread spectrum watermark detection and secure copyright protection for digital image libraries. IEEE computer society conference on computer vison and pattern recognition, Fort Collins, USA.

  11. Shi, Z., & Schlegel, C. (2001). Joint iterative decoding of serially concatenated error control coded CDMA. IEEE JSAC, 19(8), 1646–1653.

    Google Scholar 

  12. Vassaux, B., Bas, P., & Chassery, J. M. (2001). A new CDMA technique for digital image watermarking, enhancing capacity of insertion and robustness 2001 International Corrence on Image Processing. Thessaloniki, Greece.

  13. Konorski, J. (2011). Wireless and mobile networking (Foreword). Telecommunication Systems, 48(3–4), 233–236.

    Article  Google Scholar 

  14. Dixon, R. C. (1984). Spread spectrum system. New York, NY: Wiley.

    Google Scholar 

  15. Sarwate, D. V., & Pursley, M. B. (1980). Crosscorrelation properties of pseudorandom and related sequences. Proceedings of IEEE, 68, 593–619.

    Article  Google Scholar 

  16. Duel-Hallen, A. (1995). Multi-user detection for CDMA systems. IEEE Personal Communications, 2(2), 46–58.

    Article  Google Scholar 

  17. Verdu, S. (1998). Multiuser detection. Cambridge: Cambridge University Press.

    Google Scholar 

  18. Gray, S. D., Kocic, M., & Brady, D. (1995). Multi-user detection in mismatched multiple access channel. IEEE Transactions on Communications, 43(12), 3080–3099.

    Article  Google Scholar 

  19. Holtzman, J. M. (1992). A simple, accurate method to calculate spread-spectrum multuple access error probabilities. IEEE Transactions on Communications, 40(4).

  20. Zhou, L., Wang, X., Tu, W., Mutean, G., & Geller, B. (2010). Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks. IEEE Journal on Selected Areas in Communications, 28(3), 409–419.

    Article  Google Scholar 

  21. Zhou, L., Chao, H.-C., & Vasilakos, A. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358–1367.

    Article  Google Scholar 

  22. Zhou, L., & Chen, H.-H. (2011). On multimedia scheduling with constrained control channels. IEEE Transactions on Multimedia, 13(5), 1040–1051.

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported in part by DUE S-STEM Grant-1154490 from the US Natural Science Foundation and seed grant in Dept. of Electrical and Computer Engineering at Lawrence Technological University

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kun Hua.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hua, K., Wang, W. High security self-encoded spread spectrum watermarking using genetic algorithms. Telecommun Syst 60, 143–148 (2015). https://doi.org/10.1007/s11235-014-9928-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-014-9928-x

Keywords

Navigation