Improving Encryption Digital Watermark by Using Blue Monkey Algorithm

Authors

  • Omar Younis Abdulhammed

DOI:

https://doi.org/10.47839/ijc.20.1.2101

Keywords:

digital media, watermark, blue monkey, meta-heuristic, honey encryption, host image

Abstract

Watermarking enables the users to share the digital contents in public domain without any issue. In the present day, the tremendous development in the digital technologies and networks caused an increase in the threats of unauthorized copying, tampering of digital media and image theft. To face these threats, digital watermark technology can be applied. However, the current paper uses new technique with two main algorithms that are the following ones: improved honey algorithm that is used to encrypt the digital watermark and blue monkey meta-heuristic algorithm which is used to find the best location in the host image to hide the digital watermark. Furthermore, in order to check the security and the robustness of the proposed method against various common image processing attacks such as Gaussian noise, Rotation, Salt and pepper noise, Sharpen, Median filter, Average filter, compression and Cropping is computed, certain performance metrics such as Peak to Signal Noise Ratio (PSNR)and Mean Square Error (MSE) also are computed. Likewise, Normalized Correlation (NC) is used to check similarity between the original and extracted digital watermark. The results demonstrate that the proposed method is efficient, provides high security and robustness against most attacks compared to the pervious methods.

References

M. Begum and M. S. Uddin, “Digital image watermarking techniques: a review,” MDPI Information Journal, vol. 11, no. 110, pp. 2-42, 2020. https://doi.org/10.3390/info11020110.

H. Tao, L. Chongmin, J.M. Zain, A.N. Abdalla, “Robust image watermarking theories and techniques: a review,” J. Appl. Res. Technol. vol. 12, issue 1, pp. 122-138, 2014. https://doi.org/10.1016/S1665-6423(14)71612-8.

Y. Zhang, “Digital watermarking technology: a review,” Proceedings of the ETP International Conference on Future Computer and Communication, Wuhan, China, 6–7 June 2009, pp. 250–252. ISBN: 978-0-7695-3676-7, https://doi.org/10.1109/FCC.2009.76.

I. Cox, M. Miller, J. Bloom, J. Fridrich, T. Kalker, Digital Watermarking and Steganography, 2nd ed., Morgan Kaufmann Series in Multimedia Information and Systems: Burlington, Massachusetts, 2007, 624 p. eBook ISBN: 9780080555805.

T. Minamoto and K. Aoki, “A blind digital image watermarking method using interval wavelet decomposition,” International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 3, no. 2, pp. 59-72, 2010.

Q. Ying and J. Lin, “Robust digital watermarking for color images in combined DFT and DT-CWT domains,” Mathematical Biosciences and Engineering, vol. 16, issue 5, pp. 4788–4801, 2019. https://doi.org/10.3934/mbe.2019241.

M. Saqib and S. Naaz, “An improvement in digital image watermarking scheme based on singular value decomposition and wavelet transform,” Asian Journal of Computer Science and Technology, vol. 8, no.1, pp. 62-68, 2019.

S. Kaur and H. Jindal, “Enhanced image watermarking technique using wavelets and interpolation,” I.J. Image, Graphics and Signal Processing, vol. 7, pp. 23-35, 2017. [Online]. Available at: http://www.mecs-press.org/. https://doi.org/10.5815/ijigsp.2017.07.03.

T. S. Fun, A Samsudin and Z. F. Zaaba, “Enhanced security for public cloud storage with honey encryption,” American Scientific Publishers, pp. 1-5, 2015.

N. S. Noorunnisa and K. R. Afreen, “Review on honey encryption technique,” International Journal of Science and Research (IJSR), vol. 5, issue 2, pp. 1683-1686, 2016. https://doi.org/10.21275/v5i2.NOV161555.

S. Mirjalili, A. H. Gandomi, S. Z. Mirjalili, S. Saremi, H. Faris, and S. M. Mirjalili, “Salp swarm algorithm: a bio-inspired optimizer for engineering design problems,” Adv. Eng. Softw, vol. 114, pp. 163–191, 2017. https://doi.org/10.1016/j.advengsoft.2017.07.002.

M. Mahmood and B. Al-Khateeb, “The blue monkey: A new nature inspired metaheuristic optimization algorithm,” Periodicals of Engineering and Natural Sciences, vol. 7, no. 3, pp. 1054-1066, 2019. https://doi.org/10.21533/pen.v7i3.621.

S. Bekkouche & A. Chouarfia, “A new watermarking approach based on combination of reversible watermarking and CDMA in spatial and DWT domain,” International Journal of Security (IJS), vol. 5, issue 1, pp. 1-12, 2011. https://doi.org/10.1117/12.896098.

N. Jain, R. Gupta, “A novel approach for digital image watermarking using cryptography,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 2, issue 9, pp. 2908-2913, 2014.

D. G. Savakar, S. Pujar, “Digital image watermarking at different levels of DWT using RGB channels,” International Journal of Recent Technology and Engineering, vol. 8, issue 5, pp. 599-570, 2020. https://doi.org/10.35940/ijrte.D6821.018520.

A. E. El Hossaini, M. El Aroussi, K. Jamali, S. Mbarki, and M. Wahbi, “A new robust blind watermarking scheme based on steerable pyramid and DCT using Pearson product moment correlation,” Journal of Computers, vol. 9, no. 10, pp. 2315-2327, 2014. https://doi.org/10.4304/jcp.9.10.2315-2327.

M. A. Abdullah, S. S. Dlay, and W. L. Woo, “Securing iris images with a robust watermarking algorithm based on discrete cosine transform,” Proceedings of the 10th International Conference on Computer Vision Theory and Applications, Berlin, Germany, 2015, pp. 108-114. https://doi.org/10.5220/0005305701080114.

H. Prasetyo and C.-H. Hsia, “Lossless progressive secret sharing for grayscale and color images,” Multimedia Tools and Applications, vol. 78, pp. 24837–24862, 2019. https://doi.org/10.1007/s11042-019-7710-5.

S. Malik and R. K. Reddlapalli, “Histogram and entropy based digital image watermarking scheme,” International Journal of Information Technology, vol. 11, issue 2, pp. 373-379, 2019. https://doi.org/10.1007/s41870-018-0259-0.

A. Saboori and S. A. Hosseini, “A new method for digital watermarking based on combination of DCT and PCA,” Proceedings of the Conference: Telecommunications Forum Telfor (TELFOR), Belgrade, 2014, pp. 1-4. https://doi.org/10.1109/TELFOR.2014.7034461.

S. A. Ali, M. J. Jawad, and M. A. Naser, “Copyright protection for digital image by watermarking technique,” Journal of Information Processing Systems, vol. 13, no. 3, pp. 599-617, 2017. https://doi.org/10.3745/JIPS.03.0074.

Downloads

Published

2021-03-29

How to Cite

Abdulhammed, O. Y. (2021). Improving Encryption Digital Watermark by Using Blue Monkey Algorithm. International Journal of Computing, 20(1), 129-136. https://doi.org/10.47839/ijc.20.1.2101

Issue

Section

Articles