Title: Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications

Authors: Aditi Zear; Amit Kumar Singh; Pardeep Kumar

Addresses: Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, Solan, Himachal Pradesh, 173234, India ' Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, Solan, Himachal Pradesh, 173234, India ' Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, Solan, Himachal Pradesh, 173234, India

Abstract: In this paper, an algorithm for digital watermarking based on discrete wavelet transforms (DWTs) and singular value decomposition (SVD) has been proposed. In the embedding process, the host colour image is decomposed into third-level DWT. Low frequency band (LL3) is transformed by SVD. The watermark image is also transformed by SVD. The S vector of watermark information is embedded in the S component of the host image. Watermarked image is generated by inverse SVD on modified S vector and original U, V vectors followed by inverse DWT. Watermark is extracted using an extraction algorithm. In order to enhance the robustness performance of the image watermark, back propagation neural network (BPNN) is applied to the extracted watermark to reduce the effects of different noise applied on the watermarked image. Results are obtained by varying the gain factor and size of the cover and watermark image, experimental results are provided to illustrate that the proposed method is able to withstand a variety of signal processing attacks and has been found to be giving superior performance for robustness and imperceptibility compared to existing methods suggested by other authors.

Keywords: image watermarking; discrete wavelet transform; DWT; singular value decomposition; SVD; back propagation neural networks; BPNN; normalised correlation; social applications; security protection; colour images; signal processing attacks.

DOI: 10.1504/IJICS.2017.082837

International Journal of Information and Computer Security, 2017 Vol.9 No.1/2, pp.20 - 35

Received: 09 Jan 2016
Accepted: 09 May 2016

Published online: 13 Mar 2017 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article