2022
DOI: 10.3390/math10163015
|View full text |Cite
|
Sign up to set email alerts
|

A New Robust and Secure 3-Level Digital Image Watermarking Method Based on G-BAT Hybrid Optimization

Abstract: This contribution applies tools from the information theory and soft computing (SC) paradigms to the embedding and extraction of watermarks in aerial remote sensing (RS) images to protect copyright. By the time 5G came along, Internet usage had already grown exponentially. Regarding copyright protection, the most important responsibility of the digital image watermarking (DIW) approach is to provide authentication and security for digital content. In this paper, our main goal is to provide authentication and s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Etemad et al [19] proposed a contourlet-domain multiplicative watermark detection method based on t-LS distribution, designed an optimal multiplicative watermark detector using the likelihood ratio decision rule and t position scale distribution, and derived the receiver operating characteristics. Kilari et al [36] proposed a hybrid approach using the redundant discrete wavelet transform (RDWT) and digital image watermarking singular-value decomposition (SVD) schemes to provide authentication and security for aerial remote sensing images transmitted over the Internet. Three-level symmetric encryption with a low computational cost was used to ensure the security of the watermark.…”
Section: Related Workmentioning
confidence: 99%
“…Etemad et al [19] proposed a contourlet-domain multiplicative watermark detection method based on t-LS distribution, designed an optimal multiplicative watermark detector using the likelihood ratio decision rule and t position scale distribution, and derived the receiver operating characteristics. Kilari et al [36] proposed a hybrid approach using the redundant discrete wavelet transform (RDWT) and digital image watermarking singular-value decomposition (SVD) schemes to provide authentication and security for aerial remote sensing images transmitted over the Internet. Three-level symmetric encryption with a low computational cost was used to ensure the security of the watermark.…”
Section: Related Workmentioning
confidence: 99%
“…The suitable choice of the parameters used in watermarking and location selection to embed the watermark has been a hectic task. Several researchers have used optimization techniques and machine learning for this task, such as fuzzy logic, neural networks, support vector machine, and evolutionary algorithms (EAs) [17,[32][33][34][35][36][37][38][39][40][41]. From the evolutionary algorithm family, the firefly algorithm (FA) [42], artificial bee colony (ABC) [43], particle swarm optimization (PSO) [44], genetic algorithm (GA) [41], differential evolution (DE) [17], and teaching-learning based optimization (TLBO) [45] have all made significant contributions to watermarking.…”
Section: Introductionmentioning
confidence: 99%