Cargando…

Robust 2D and 3D images zero - watermarking using dual Hahn moment invariants and Sine Cosine Algorithm

In this paper, we initially provide significant improvements on the computational aspects of dual Hahn moment invariants (DHMIs) in both 2D and 3D domains. These improvements ensure the numerical stability of DHMIs for large-size images. Then, we propose an efficient method for optimizing the local...

Descripción completa

Detalles Bibliográficos
Autores principales: Daoui, Achraf, Karmouni, Hicham, Sayyouri, Mhamed, Qjidaa, Hassan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer US 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8942162/
https://www.ncbi.nlm.nih.gov/pubmed/35345547
http://dx.doi.org/10.1007/s11042-022-12298-0
Descripción
Sumario:In this paper, we initially provide significant improvements on the computational aspects of dual Hahn moment invariants (DHMIs) in both 2D and 3D domains. These improvements ensure the numerical stability of DHMIs for large-size images. Then, we propose an efficient method for optimizing the local parameters of dual Hahn polynomials (DHPs) when computing DHMIs using the Sine-Cosine Algorithm (SCA). DHMIs optimized via SCA are used to propose new and robust zero-watermarking scheme applied to both 2D and 3D images. On one hand, the simulation results confirm the efficiency of the proposed computation of 2D and 3D DHMIs regarding the numerical stability and invariability. Indeed, the proposed computation method of 2D DHMIs allows to reach a relative error (RE) of the order ≈10(−10) for images of size 1024 × 1024 with an execution time improvement ratio exceeds 70% (ETIR ≥ 70%), which validates the efficiently of the proposed computation method. On the other hand, the simulation and comparison outcomes clearly demonstrate the robustness of the proposed zero-watermarking scheme against various geometric attacks (translation, rotation, scaling and combined transformations), as well as against other common 2D and 3D image processing attacks (compression, filtering, noise addition, etc.). GRAPHICAL ABSTRACT: [Image: see text]