{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T10:02:52Z","timestamp":1753437772982},"reference-count":17,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The advancement in computer science technology has led to some serious concerns about the piracy and copyright of digital content. Digital watermarking technique is widely used for copyright protection and other similar applications. In this paper, a technique for digital watermarking based on Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), and Grasshopper Optimization Algorithm (GOA) is proposed. The method computes the DWT of the cover image to obtain the sub-components of the image. The subcomponent is converted to frequency domain using DCT. The challenge is to find the optimal scaling factor to be used for watermarking. The authors have designed a GOA based technique that finds the optimized scaling factor and the coefficient for embedding the watermark. GOA makes the watermark undetectable and is invisible in the cover image. The watermark image is embedded in the cover image using these coefficients. The extraction of watermark from the cover image is done by using inverse DCT and DWT. The proposed method is compared with the other state of the art methods. The effectiveness of the proposed method is computed using Peak Signal to Noise Ratio (PSNR), Normalized Cross Correlation (NCC) and Image Fidelity (IF). The proposed method outperforms the other methods and can be effectively used for practical digital watermarking.<\/jats:p>","DOI":"10.1515\/comp-2019-0023","type":"journal-article","created":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T20:44:31Z","timestamp":1619469871000},"page":"330-336","source":"Crossref","is-referenced-by-count":11,"title":["Digital Watermarking using Grasshopper Optimization Algorithm"],"prefix":"10.1515","volume":"11","author":[{"given":"Satender","family":"Sharma","sequence":"first","affiliation":[{"name":"School of Electrical & Electronics Communication Engineering , Galgotias University , Greater Noida , India"}]},{"given":"Usha","family":"Chauhan","sequence":"additional","affiliation":[{"name":"School of Electrical & Electronics Communication Engineering , Galgotias University , Greater Noida , India"}]},{"given":"Ruqaiya","family":"Khanam","sequence":"additional","affiliation":[{"name":"School of Electrical & Electronics Communication Engineering , Galgotias University , Greater Noida , India"}]},{"given":"Krishna Kant","family":"Singh","sequence":"additional","affiliation":[{"name":"Faculty of Engineering & Technology , Jain (Deemed-to-be University) , Bengaluru , India"}]}],"member":"374","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"2022020121510243544_j_comp-2019-0023_ref_001","doi-asserted-by":"crossref","unstructured":"Singh KK, Nigam MJ, Pal K. Detection of 2011 Tohoku tsunami inundated areas in Ishinomaki City using generalized improved fuzzy Kohonen clustering network. European Journal of Remote Sensing. 2014 Jan 1;47(1):461\u201375.","DOI":"10.5721\/EuJRS20144726"},{"key":"2022020121510243544_j_comp-2019-0023_ref_002","doi-asserted-by":"crossref","unstructured":"Lin, S.D., Shie, S.C., Guo, J.Y.: \u2018Improving the robustness of DCT-based image watermarking against JPEG compression\u2019, Comput. Stand. Interfaces, 2010, 32, (1), pp. 54\u201360","DOI":"10.1016\/j.csi.2009.06.004"},{"key":"2022020121510243544_j_comp-2019-0023_ref_003","doi-asserted-by":"crossref","unstructured":"Lei, B.Y., Soon, Y., Li, Z.: \u2018Blind and robust audio watermarking scheme based on SVD\u2013DCT\u2019, Signal Process., 2011, 91, (8), pp. 1973\u20131984","DOI":"10.1016\/j.sigpro.2011.03.001"},{"key":"2022020121510243544_j_comp-2019-0023_ref_004","doi-asserted-by":"crossref","unstructured":"Phadikar, A., Maity, S.P., Verma, B.: \u2018Region based QIM digital watermarking scheme for image database in DCT domain\u2019, Comput. Electr. Eng., 2011, 37, (3), pp. 339\u2013355","DOI":"10.1016\/j.compeleceng.2011.02.002"},{"key":"2022020121510243544_j_comp-2019-0023_ref_005","doi-asserted-by":"crossref","unstructured":"Deb, K., Al-Seraj, M.S., Hoque, M.M., et al.: \u2018Combined DWT-DCT based digital image watermarking technique for copyright protection\u2019. Electrical and Computer Engineering (ICECE), 2012 7th Int. Conf. on. IEEE, 2012, pp. 458\u2013461","DOI":"10.1109\/ICECE.2012.6471586"},{"key":"2022020121510243544_j_comp-2019-0023_ref_006","doi-asserted-by":"crossref","unstructured":"Golshan, F., Mohammadi, K.: \u2018A hybrid intelligent SVD-based perceptual shaping of a digital image watermark in DCT and DWT domain\u2019, Imaging Sci. J., 2013, 61, (1), pp. 35\u201346","DOI":"10.1179\/1743131X11Y.0000000049"},{"key":"2022020121510243544_j_comp-2019-0023_ref_007","doi-asserted-by":"crossref","unstructured":"Shivani, S., Singh, D., Agarwal, S.: \u2018DCT based approach for tampered image detection and recovery using block wise fragile watermarking scheme\u2019. Iberian Conf. on Pattern Recognition and Image Analysis, 2013, pp. 640\u2013647","DOI":"10.1007\/978-3-642-38628-2_76"},{"key":"2022020121510243544_j_comp-2019-0023_ref_008","doi-asserted-by":"crossref","unstructured":"Divecha, N., Jani, N.N.: \u2018Implementation and performance analysis of DCTDWT-SVD based watermarking algorithms for color images\u2019. Intelligent Systems and Signal Processing (ISSP), 2013 Int. Conf. on. IEEE, 2013, pp. 204\u2013208","DOI":"10.1109\/ISSP.2013.6526903"},{"key":"2022020121510243544_j_comp-2019-0023_ref_009","doi-asserted-by":"crossref","unstructured":"Panah, A.S., Schyndel, R.V., Sellis, T., et al.: \u2018On the properties of non-media digital watermarking: a review of state of the art techniques\u2019, IEEE Access, 2016, 4, pp. 2670\u20132704","DOI":"10.1109\/ACCESS.2016.2570812"},{"key":"2022020121510243544_j_comp-2019-0023_ref_010","doi-asserted-by":"crossref","unstructured":"Parah, S.A., Sheikh, J.A., Loan, N.A., et al.: \u2018Robust and blind watermarking technique in DCT domain using inter-block coeflcient differencing\u2019, Digit. Signal Process., 2016, 53, pp. 11\u201324","DOI":"10.1016\/j.dsp.2016.02.005"},{"key":"2022020121510243544_j_comp-2019-0023_ref_011","doi-asserted-by":"crossref","unstructured":"Yusof, Y., Khalif, O.O.: Imperceptibility and robustness analysis of DWT-based digital image watermarking. In: The Proceedings of International Conference on Computer and Communication Engineering (ICCCE), vol. 12, pp. 1325\u20131330 (2008)","DOI":"10.1109\/ICCCE.2008.4580820"},{"key":"2022020121510243544_j_comp-2019-0023_ref_012","doi-asserted-by":"crossref","unstructured":"Ansari IA, Pant M. SVD watermarking: particle swarm optimization of scaling factors to increase the quality of watermark. In Proceedings of Fourth International Conference on Soft Computing for Problem Solving 2015 (pp. 209\u2013218). Springer, New Delhi.","DOI":"10.1007\/978-81-322-2220-0_17"},{"key":"2022020121510243544_j_comp-2019-0023_ref_013","doi-asserted-by":"crossref","unstructured":"Mirjalili SZ, Mirjalili S, Saremi S, Faris H, Aljarah I. Grasshopper optimization algorithm for multi-objective optimization problems. Applied Intelligence. 2018 Apr 1;48(4):805\u201320.","DOI":"10.1007\/s10489-017-1019-8"},{"key":"2022020121510243544_j_comp-2019-0023_ref_014","doi-asserted-by":"crossref","unstructured":"Strang G. The discrete cosine transform. SIAM review. 1999;41(1):135\u201347.","DOI":"10.1137\/S0036144598336745"},{"key":"2022020121510243544_j_comp-2019-0023_ref_015","unstructured":"Gupta D, Choubey S. Discrete wavelet transform for image processing. International Journal of Emerging Technology and Advanced Engineering. 2015 Mar;4(3):598\u2013602."},{"key":"2022020121510243544_j_comp-2019-0023_ref_016","doi-asserted-by":"crossref","unstructured":"Reisenhofer R, Bosse S, Kutyniok G, Wiegand T. A Haar wavelet-based perceptual similarity index for image quality assessment. Signal Processing: Image Communication. 2018 Feb 1;61:33\u201343.","DOI":"10.1016\/j.image.2017.11.001"},{"key":"2022020121510243544_j_comp-2019-0023_ref_017","doi-asserted-by":"crossref","unstructured":"Bharati S, Rahman MA, Mandal S, Podder P. Analysis of DWT, DCT, BFO & PBFO Algorithm for the Purpose of Medical Image Watermarking. In2018 International Conference on Innovation in Engineering and Technology (ICIET) 2018 Dec 27 (pp. 1\u20136). IEEE.","DOI":"10.1109\/CIET.2018.8660796"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2019-0023\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2019-0023\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T22:16:35Z","timestamp":1643753795000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2019-0023\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,1]]},"references-count":17,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,1,13]]},"published-print":{"date-parts":[[2021,1,1]]}},"alternative-id":["10.1515\/comp-2019-0023"],"URL":"https:\/\/doi.org\/10.1515\/comp-2019-0023","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,1]]}}}