{"title":"基于DWT-SVD和萤火虫算法优化的EEG数据安全水印","authors":"A. Gupta, Chinmay Chakraborty, B. Gupta","doi":"10.4018/ijdst.307902","DOIUrl":null,"url":null,"abstract":"A watermark embedding into digital media or signal is called digital watermarking for the purpose of enhancing security from copyright encroachment. In this paper, an optimized and advanced watermarking technique has been proposed, which is based on singular value decomposition (SVD) in the discrete wavelet transform (DWT) domain using the firefly algorithm (FA). In this, a watermark logo is embedded into electroencephalogram (EEG) data. To optimize the scaling factor, robustness and imperceptibility have been considered. Further, the performance of the proposed algorithm is also analyzed against various attacks. The results show the adequacy of the proposed algorithm and indicate a higher value of NCC of 0.95 as robustness and PSNR 51.83 as imperceptibility in contrast with the related existing method.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Watermarking of EEG Data to Provide Security Based on DWT-SVD and Optimized by Firefly Algorithm\",\"authors\":\"A. Gupta, Chinmay Chakraborty, B. Gupta\",\"doi\":\"10.4018/ijdst.307902\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A watermark embedding into digital media or signal is called digital watermarking for the purpose of enhancing security from copyright encroachment. In this paper, an optimized and advanced watermarking technique has been proposed, which is based on singular value decomposition (SVD) in the discrete wavelet transform (DWT) domain using the firefly algorithm (FA). In this, a watermark logo is embedded into electroencephalogram (EEG) data. To optimize the scaling factor, robustness and imperceptibility have been considered. Further, the performance of the proposed algorithm is also analyzed against various attacks. The results show the adequacy of the proposed algorithm and indicate a higher value of NCC of 0.95 as robustness and PSNR 51.83 as imperceptibility in contrast with the related existing method.\",\"PeriodicalId\":118536,\"journal\":{\"name\":\"Int. J. Distributed Syst. Technol.\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Distributed Syst. Technol.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijdst.307902\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Distributed Syst. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijdst.307902","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Watermarking of EEG Data to Provide Security Based on DWT-SVD and Optimized by Firefly Algorithm
A watermark embedding into digital media or signal is called digital watermarking for the purpose of enhancing security from copyright encroachment. In this paper, an optimized and advanced watermarking technique has been proposed, which is based on singular value decomposition (SVD) in the discrete wavelet transform (DWT) domain using the firefly algorithm (FA). In this, a watermark logo is embedded into electroencephalogram (EEG) data. To optimize the scaling factor, robustness and imperceptibility have been considered. Further, the performance of the proposed algorithm is also analyzed against various attacks. The results show the adequacy of the proposed algorithm and indicate a higher value of NCC of 0.95 as robustness and PSNR 51.83 as imperceptibility in contrast with the related existing method.