Hessenberg factorization and firework algorithms for optimized data hiding in digital images

Journal of Intelligent Systems 31 (1):440-453 (2022)
  Copy   BIBTEX

Abstract

Data hiding and watermarking are considered one of the most important topics in cyber security. This article proposes an optimized method for embedding a watermark image in a cover medium (color image). First, the color of the image is separated into three components (RGB). Consequently, the discrete wavelet transform is applied to each component to obtain four bands (high–high, high–low, low–high, and low–low), resulting in 12 bands in total. By omitting the low–low band from each component, a new square matrix is formed from the rest bands to be used for the hiding process after adding keys to it. These keys are generated using a hybrid approach, combining two chaotic functions, namely Gaussian and exponential maps. The embedding matrix is divided into square blocks with a specific length, each of which is converted using Hessenberg transform into two matrices, P and H. For each block, a certain location within the H-matrix is used for embedding a secret value; the updated blocks are assembled, and the reverse process is performed. An optimization method is applied, through the application of the firework algorithm, on the set of the initial values that generate keys. Using an optimization procedure to obtain keys requires performing lowest possible change rate in an image and maintain the quality of the image. To analyze and test the efficiency of the proposed method, mean-square error (MSE) and peak signal-to-noise ratio (PSNR) measurements are calculated. Furthermore, the robustness of the watermark is computed by applying several attacks. The experimental results show that the value of the MSE is reduced by about 0.01 while the value of the PSNR is increased by about 1.25 on average. Moreover, the proposed method achieved a high-retrieval rate in comparison with the non-optimization approach.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,709

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Digital Images: Content and Compositionality.Alistair M. C. Isaac - 2017 - Journal of the American Philosophical Association 3 (1):106-126.
Hiding Quantum Data.David P. DiVincenzo, Patrick Hayden & Barbara M. Terhal - 2003 - Foundations of Physics 33 (11):1629-1647.
Factorization of residuated lattices.Michal Krupka - 2009 - Logic Journal of the IGPL 17 (2):205-223.
Enculturating Algorithms.Rafael Capurro - 2019 - NanoEthics 13 (2):131-137.
Factorization of Sparse Bayesian Networks.Julio Michael Stern & Ernesto Coutinho Colla - 2009 - Studies in Computational Intelligence 199:275-285.

Analytics

Added to PP
2022-04-08

Downloads
7 (#1,382,898)

6 months
3 (#965,065)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations