Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php on line 451
Warning: Cannot modify header information - headers already sent by (output started at /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php:451) in /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php on line 654
Warning: Cannot modify header information - headers already sent by (output started at /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php:451) in /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php on line 655
TY - JOUR
TI - Proposed Watermarking Technique to Protect Image Using Genetic Algorithm
PY - %2022/%10/%04
Y2 - %2025/%12/%22
JF - Al-Mansour Journal
JA - مجلة المنصور
VL - 28
IS - 1
LA - en
KW - Image watermarking
KW - genetic algorithm
KW - primary pattern
KW - secondary pattern
KW - watermark embedding
KW - watermarking extracting
UR - https://journal.muc.edu.iq/journal/article/view/96
SP - 23-41
AB - This paper presents a proposed watermarking technique used forprotecting images from tampering by the attackers and other third parties.This technique is consisting of three stages: pattern generation, watermarkembedding and watermarking extracting. In proposed work, two patterns(primary and secondary) are generated from some features of the imagethat used as a watermark, then applying a genetic algorithm to getrandom, unique and robust patterns, the primary pattern will be embeddedin the main diagonal of the cover image. In addition to generate andembed the secondary pattern in the secondary diagonal of the coverimage, the purpose of secondary pattern is to ensure a secure connectionbetween the sender and the receiver. When the sender sends the image,the recipient at first extract the secondary pattern, if this pattern is matched with original embedded one, this mean the image are kept from attackers and the receiver can extract the primary pattern, and, if the secondary pattern not matched, the recipient tells the sender to resend the image again. As a result the proposed technique gives good results when applied on different cover images, since the embedded watermark is imperceptible and unique enough to detect the tamper.
ER -