{"title":"遗传算法的渐进式水印技术","authors":"H.-C. Huang, J. Pan, C. Shieh, Feng-Hsing Wang","doi":"10.1109/CCST.2003.1297536","DOIUrl":null,"url":null,"abstract":"An innovative watermarking scheme based on progressive transmission with genetic algorithms (GA) is proposed. We implement the watermarking embedding and extraction system in the discrete cosine transform (DCT) domain, and apply the JPEG spectral selection mode for progressive transmission. By employing GA with a proper fitness function into the watermarking system, both the watermark imperceptibility and watermark robustness requirements are considered and optimized. In addition, the embedded watermark can be partly extracted in the receiver side even when the watermarked image is being transmitted. Simulation results show both the robustness and the effectiveness of progressive transmission under different attacking schemes and different bandwidth variations.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"411 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"Progressive watermarking techniques with genetic algorithms\",\"authors\":\"H.-C. Huang, J. Pan, C. Shieh, Feng-Hsing Wang\",\"doi\":\"10.1109/CCST.2003.1297536\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An innovative watermarking scheme based on progressive transmission with genetic algorithms (GA) is proposed. We implement the watermarking embedding and extraction system in the discrete cosine transform (DCT) domain, and apply the JPEG spectral selection mode for progressive transmission. By employing GA with a proper fitness function into the watermarking system, both the watermark imperceptibility and watermark robustness requirements are considered and optimized. In addition, the embedded watermark can be partly extracted in the receiver side even when the watermarked image is being transmitted. Simulation results show both the robustness and the effectiveness of progressive transmission under different attacking schemes and different bandwidth variations.\",\"PeriodicalId\":344868,\"journal\":{\"name\":\"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.\",\"volume\":\"411 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2003.1297536\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2003.1297536","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Progressive watermarking techniques with genetic algorithms
An innovative watermarking scheme based on progressive transmission with genetic algorithms (GA) is proposed. We implement the watermarking embedding and extraction system in the discrete cosine transform (DCT) domain, and apply the JPEG spectral selection mode for progressive transmission. By employing GA with a proper fitness function into the watermarking system, both the watermark imperceptibility and watermark robustness requirements are considered and optimized. In addition, the embedded watermark can be partly extracted in the receiver side even when the watermarked image is being transmitted. Simulation results show both the robustness and the effectiveness of progressive transmission under different attacking schemes and different bandwidth variations.