Professional Documents
Culture Documents
Research Article
ISSN 1751-9659
Quality metric-based fitness function for Received on 7th January 2015
Revised on 17th August 2015
robust watermarking optimisation with Bees Accepted on 12th September 2015
doi: 10.1049/iet-ipr.2015.0379
algorithm www.ietdl.org
Abstract: The design of a robust watermarking technique has been always suffering from the conflict between the
watermark robustness and the quality of the watermarked image. In this study, the embedding strength parameters for
per-block image watermarking in the discrete cosine transform (DCT) domain are optimised. A fitness function is
proposed to best suit the optimisation problem. The optimum solution is selected based on the quality and the
robustness achieved using that solution. For a given image block, the peak-signal-to-noise ratio (PSNR) is used as a
quality metric to measure the imperceptibility for the watermarked block. However, the robustness cannot be
measured for a single watermark bit using traditional metrics. The proposed method uses the PSNR quality metric to
indicate the degree of robustness. Hence, optimum embedding in terms of quality and robustness can be achieved. To
demonstrate the effectiveness of the proposed approach, a recent watermarking technique is modified, and then used
as the embedding method to be optimised. The Bees algorithm is selected as the optimisation method and the
proposed fitness function is applied. Experimental results show that the proposed method provides enhanced
imperceptibility and robustness under different attacks.
1 if embedded bit = extracted bit
BM = (1)
0 Otherwise
Na
Nrobust = BMi (2)
i=1
2552
PSNR = 10 log N M (3)
(1/(N × M )) i=1 j=1 (I(i, j) − IW (i, j))2
Fig. 8 Watermark used for multiple watermarking attack
Robustness against various attacks is measured by the Bit Correct
attacks, and is hence selected. The performance of the proposed Ratio (BCR) shown in (4). Where W and W′ are the embedded
approach is demonstrated in the following section. and the extracted watermark of size Nw × Mw, respectively.
NW MW
i=1 j=1 (W (i, j) ⊕ W ′ (j, j))
BCR = (4)
4 Experimental results NW × MW
In this section, simulation experiments are carried out in order to The watermark logo used in the embedding process is shown in
evaluate the performance of the proposed scheme. Eight standard Fig. 5. The host images and their corresponding watermarked
greyscale images of size 512 × 512 are selected as host images. A images, using the proposed approach, are shown in Fig. 6. As can
fixed watermark logo of size 32 × 32 bits is used for embedding. be seen, the differences between the hosts and their watermarked
The proposed technique can insert 63 × 64 bits inside a 512 × 512 versions are not noticeable.
host. Thus, the logo is duplicated three times for redundancy. The The commonly used fitness function [17] can be defined as
optimisation parameters of the Bees algorithm are shown in follows
Table 1. The optimisation target is to maximise the robustness
against two attacks (Na = 2). The first attack is the JPEG
Na
compression with a quality factor 20, while the second attack is a F = PSNR + ln BCRn (5)
Gaussian low-pass filter with variance of 0.4. n=1
The PSNR is the most commonly used metric for evaluating the
quality of the watermarked images. It compares the similarity In order to demonstrate the effectiveness of our defined fitness
Table 3 Robustness comparison between the proposed method and the methods in [17] and [19] in terms of average BCR over all the selected host
images for different attacks
Attack type Attack degree Das et al. Wang et al. Proposed method using
[19] [17]
Conventional fitness Proposed fitness
function l1 = l2 = 20 function