The use of computational intelligence in digital watermarking: review, challenges, and new trends

作者: Ashraf Darwish , Ajith Abraham , None

DOI: 10.14311/NNW.2011.21.017

关键词:

摘要: Digital Watermarking (DW) based on computational intelligence (CI) is currently attracting considerable interest from the research community. This article provides an overview of progress in applying CI methods to problem DW. The scope this review will encompass core CI, including rough sets (RS), fuzzy logic (FL), artiflcial neural networks (ANNs), ge- netic algorithms (GA), swarm (SI), and hybrid intelligent systems. contributions each fleld are systematically summarized compared highlight promising new directions. flndings should provide useful insights into current DW literature be a good source for anyone who interested application approaches systems or related flelds. In addition, growing area CI.

参考文章(59)
Ashraf Darwish, Aboul Ella Hassanien, Qing Tan, Nikhil R Pal, None, Securing Patients Medical Images and Authentication System Based on Public Key Infrastructure Soft Computing. pp. 27- 34 ,(2011) , 10.1007/978-3-642-19644-7_4
Fabien A. P. Petitcolas, Weakness of existing watermarking schemes ,(1997)
Ji-yao An, Guangxue Yue, Fei Yu, Ren-fa Li, Intrusion Detection Based on Fuzzy Neural Networks Advances in Neural Networks - ISNN 2006. pp. 231- 239 ,(2006) , 10.1007/11760191_34
M. Dorigo, Optimization, Learning and Natural Algorithms Ph.D. Thesis, Politecnico di Milano, Italy. ,(1992)
Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn, Attacks on Copyright Marking Systems information hiding. pp. 218- 238 ,(1998) , 10.1007/3-540-49380-8_16
Alan Mackworth, David Poole, Randy Goebel, Computational Intelligence: A Logical Approach ,(1998)
Max E Valentinuzzi, Handbook of bioinspired algorithms and applications Biomedical Engineering Online. ,vol. 5, pp. 47- 47 ,(2005) , 10.1186/1475-925X-5-47
Alexander Hofmann, Carsten Schmitz, Bernhard Sick, Intrusion detection in computer networks with neural and fuzzy classifiers international conference on artificial neural networks. pp. 316- 324 ,(2003) , 10.1007/3-540-44989-2_38
Harold F. Tipton, Micki Krause, Information Security Management Handbook ,(2003)