factors such as optical transfer function, distor-
tion and various noise models into account with-
out constructing a simulation model.
In future, we plan to apply multi-objective opti-
mization (Ono et al., 2014) to make watermarking
schemes robust against mobile phone screen types.
ACKNOWLEDGEMENTS
Part of this work was supported by SCOPE
(142110001) of Ministry of Internal Affairs and Com-
munications (MIC), Japan, The authors also would
like to thank A-T Communications, Co.,LTD., and
DENSO WAVE Inc.
REFERENCES
Chu, S.-C., Huang, H.-C., Shi, Y., Wu, S.-Y., and Shieh, C.-
S. (2008). Genetic watermarking for zerotree-based
applications. Circuits, Systems & Signal Processing,
27(2):171–182.
Eshelman, L. J. and Schaffer, J. D. (1993). Real-coded
genetic algorithms and interval-schemata. In Foun-
dations of Genetic Algorithms, volume 2, pages 187–
202.
Goldberg, D. E. (1989). Genetic Algorithms in Search, Op-
timization, and Machine Learning. Addison Wesley,
Reading.
Ho, A. T. S., Shen, J., Tan, H. P., and Woon, J.
(2003). Security-printing authentication using digital
watermarking. SPIE International Technical Group
Newsletter on Electronic Imaging, 13.
Huang, H.-C., Chu, S.-C., Pan, J.-S., Huang, C.-Y.,
and Liao, B.-Y. (2011). Tabu search based multi-
watermarks embedding algorithm with multiple de-
scription coding. Information Sciences, 181(16):3379
– 3396.
Kundur, D. and Hatzinakos, D. (1997). A robust digital
image watermarking method using wavelet-based fu-
sion. In 4th IEEE Int’l Conf. Image Processing, pages
544–547.
Kundur, D. and Hatzinakos, D. (1998). Digital watermark-
ing using multiresolution wavelet decomposition. In
Acoustics, Speech and Signal Processing, 1998. Pro-
ceedings of the 1998 IEEE International Conference
on, volume 5, pages 2969 –2972 vol.5.
Loukhaoukha, K., Nabti, M., and Zebbiche, K. (2014).
A robust svd-based image watermarking using a
multi-objective particle swarm optimization. Opto-
Electronics Review, 22(1):45–54.
Mingzhi, C., Yan, L., Yajian, Z., and Min, L. (2013). A
combined dwt and dct watermarking scheme opti-
mized using genetic algorithm. Journal of Multime-
dia, 8(3).
Ono, S., Maehara, T., Nakai, K., Ikeda, R., and Taniguchi,
K. (2014). Semi-fragile watermark design for de-
tecting illegal two-dimensional barcodes by evolution-
ary multi-objective optimization. In Proceedings of
Genetic and Evolutionary Computation Conference
(GECCO) (Companion), pages 175–176.
Ono, S., Maehara, T., Sakaguchi, H., Taniyama, D., Ikeda,
R., and Nakayama, S. (2013). Self-adaptive nich-
ing differential evolution and its application to semi-
fragile watermarking for two-dimensional barcodes
on mobile phone screen. In Proceedings of Genetic
and Evolutionary Computation Conference (GECCO)
(Companion), pages 189–190.
Ono, S., Tsutsumi, M., and Nakayama, S. (2011). A
copy detection method for colored two-dimensional
code using digital watermarking. The IEICE transac-
tions on information and systems (Japanese edetion),
94(12):1971–1974.
Rao, K. R. and Yip, P. (1990). Discrete Cosine Trans-
form: Algorithms, Advantages, Applications. Aca-
demic Press Professional, Inc., San Diego, CA, USA.
Rey, C. and Dugelay, J.-L. (2002). A survey of watermark-
ing algorithms for image authentication. EURASIP
Journal on Applied Signal Processing, 6:613–621.
Song, Y., Liu, R., and Tan, T. (2001). Digital Watermark-
ing for Forgery Detetion in Printed Materials, volume
2195/2001, pages 403–410. Springer Verlag.
Vahedi, E., Zoroofi, R. A., and Shiva, M. (2012). To-
ward a new wavelet-based watermarking approach for
color images using bio-inspired optimization princi-
ples. Digital Signal Processing, 22(1):153 – 162.
VISAPP2015-InternationalConferenceonComputerVisionTheoryandApplications
208