Reference Hub6
Performance of Secured and Robust Watermarking Using Evolutionary Computing Technique

Performance of Secured and Robust Watermarking Using Evolutionary Computing Technique

B.V.D. S. Sekhar, P.V.G.D. Prasad Reddy, G.P.S. Varma
Copyright: © 2017 |Volume: 25 |Issue: 4 |Pages: 19
ISSN: 1062-7375|EISSN: 1533-7995|EISBN13: 9781522510802|DOI: 10.4018/JGIM.2017100105
Cite Article Cite Article

MLA

Sekhar, B.V.D. S., et al. "Performance of Secured and Robust Watermarking Using Evolutionary Computing Technique." JGIM vol.25, no.4 2017: pp.61-79. http://doi.org/10.4018/JGIM.2017100105

APA

Sekhar, B. S., Reddy, P. P., & Varma, G. (2017). Performance of Secured and Robust Watermarking Using Evolutionary Computing Technique. Journal of Global Information Management (JGIM), 25(4), 61-79. http://doi.org/10.4018/JGIM.2017100105

Chicago

Sekhar, B.V.D. S., P.V.G.D. Prasad Reddy, and G.P.S. Varma. "Performance of Secured and Robust Watermarking Using Evolutionary Computing Technique," Journal of Global Information Management (JGIM) 25, no.4: 61-79. http://doi.org/10.4018/JGIM.2017100105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Watermarking emerged as versatile technique of hiding confidential or copy right protect information. The image embedded with watermark is often prone to several security vulnerabilities due to several attacks. It is desired to secure the information in the form of watermark by making it immune to these attacks. Several techniques are prevailing which use image transform techniques for efficient watermark de-noising and extraction. However, in the recent past the evolutionary computing techniques evolved as promising methods. In this paper, one such attempt of integrating the popular image transform techniques with PSO for developing efficient watermarking scheme. Embedding and extraction of the watermark are demonstrated and finally the efficiency of the technique is evaluated in terms of calculated PNSR. Gray scale image is used as WM image and a color image is considered for hosting the WM image. The technique utilises only one frame of the color image for hiding securely the WM image instead of conventional method of using all the three frames.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.