Optimizing Discrete Wavelet Transform Watermarking with Genetic Algorithms for Resilient Digital Asset Protection Against Diverse Attacks †
Abstract
1. Introduction
- To develop a novel digital watermarking scheme based on the DWT that exhibits enhanced robustness against a combination of scaling, translation, and rotation attacks, relevant to the digital marketing and trading of high-value assets.
- To devise and implement improved watermark embedding and extraction strategies that enhance the resilience of the embedded watermark against geometric distortions commonly applied to digital images.
- To investigate and apply GA [3] to optimize the watermark embedding strength (α) to achieve a superior balance between the imperceptibility of the embedded watermark and its robustness against geometric transformations.
- To evaluate the efficacy of the proposed watermarking scheme in the context of anti-counterfeiting for digital game card assets, while also exploring its potential applicability to the broader domain of digital asset copyright protection.
2. Related Work
2.1. Digital Watermarking Techniques: Spatial vs. Frequency Domain
2.1.1. Spatial Domain Watermarking
2.1.2. Frequency Domain Watermarking
2.2. Frequency Domain Techniques: DWT vs. DCT
2.2.1. DCT
2.2.2. DWT
- LL (approximation): Contains low-frequency components, encompassing most of the energy and overall image structure.
- HL (horizontal detail): Represents horizontal high-frequency details.
- LH (vertical detail): Represents vertical high-frequency details.
- HH (diagonal detail): Represents diagonal high-frequency details.
- Multi-resolution analysis: Enables embedding in high-frequency components to maintain imperceptibility while retaining structural integrity in lower frequencies, aiding robustness.
- Resilience to geometric distortions: Exhibits strong resistance to transformations such as scaling and translation due to global coefficient properties and multi-resolution representation.
- Spatial-frequency localization: Facilitates precise embedding control, balancing frequency modifications and spatial effects.
2.2.3. Justification for DWT
2.3. Robustness Against Geometric Attacks in DWT Watermarking
2.3.1. Robustness to Geometric Transformations
- Low-frequency embedding: Embedding in the LL sub-band provides robustness to global transformations but may reduce imperceptibility.
- Template-based synchronization: Embedded templates aid distortion correction, enhancing watermark recovery.
- Invariant frequency domain properties: Exploitation of intrinsic characteristics improves resilience against spatial alterations.
2.3.2. Robustness to Combined Attacks
2.4. Optimization Algorithm in Watermarking
- Population initialization: Candidate solutions are generated within the defined search space, each of which represents parameters such as embedding strength or DWT coefficient selection.
- Fitness evaluation: Individuals are assessed based on a fitness function, often combining metrics such as peak signal-to-noise ratio (PSNR) for imperceptibility and robustness measures (e.g., structural similarity index (SSIM) or correlation) under simulated attacks.
- Selection: Higher fitness candidates are prioritized for reproduction through methods like roulette wheel or tournament selection.
- Crossover: Promising solutions are combined to create offspring, exploring the solution space using operators like single-point or simulated binary crossover (SBX) for real-valued parameters.
- Mutation: Small random variations introduce diversity, preventing premature convergence to local optima.
- Termination: The Iteration ends upon reaching a predefined number of generations or an optimal solution.
- Embedding strength optimization: GAs determine optimal embedding strength to balance visual quality and resilience against attacks.
- Selection of embedding locations: Suitable DWT coefficients or sub-bands are identified to maximize robustness without compromising quality.
- Watermark design: Patterns are optimized to enhance robustness and security properties.
3. Method
3.1. Watermarking Scheme
- Watermark embedding phase: The original image undergoes DWT to decompose it into multiple sub-bands. The watermark logo is preprocessed and normalized before embedding into specific high-frequency sub-bands (HL, LH, and HH) using the embedding strength factor (α). An inverse DWT is applied to reconstruct the watermarked image.
- Optimization of embedding strength phase: GA determines the optimal embedding strength (α) to balance imperceptibility and robustness. The process involves generating a population of candidate α values, embedding the watermark, simulating geometric attacks, extracting the watermark, and evaluating fitness through metrics such as PSNR for imperceptibility and SSIM for robustness. GA evolves the population using selection, crossover, and mutation operations until convergence on an optimal value.
- Watermark extraction phase: The extraction phase targets attacked watermarked images. DWT is applied to the received image, and geometric transformations, such as scaling, translation, and rotation, are mitigated using techniques like center cropping or multi-angle and multi-scale search. The extracted watermark is compared to the original to assess the scheme’s robustness.
3.2. Watermark Embedding Process
3.2.1. DWT Decomposition of Host Image
3.2.2. Preprocessing of Watermark Logo
- Resizing: The watermark is resized to match the dimensions of the chosen DWT sub-band (e.g., HL3, LH3, HH3) using algorithms like bilinear interpolation. If the watermark dimensions are M × N and the selected sub-band dimensions are M′ × N′, the resized dimensions are adjusted accordingly.
- Normalization: The pixel values of the watermark are normalized to the range [−1, 1]. For grayscale images, normalization is achieved using Equation (4). For binary watermarks, pixel values 0 and 255 are normalized to −1 and 1, respectively.
3.2.3. Watermark Embedding in DWT Sub-Bands
3.2.4. Inverse DWT to Obtain Watermarked Image
3.2.5. Key Motivations for High-Frequency Sub-Band Embedding
3.3. Optimization of Embedding Strength Using GA
3.3.1. Population Initialization
3.3.2. Fitness Function
- : Peak Signal-to-Noise Ratio between the host and watermarked images, indicating imperceptibility.
- : Average Structural Similarity Index Measure between the original and extracted watermarks after simulated geometric attacks. Values close to 1 indicate robustness.
- and : Weighting factors (0 ≤ ≤ 1, ), determining the relative importance of metrics.
3.4. Watermark Extraction Process Robust to Geometric Transformations
3.4.1. DWT Decomposition of Potentially Attacked Image
3.4.2. Geometric Transformations
- Center cropping: A central region of high-frequency sub-bands (HL3, LH3, and HH3) is extracted, reducing the impact of boundary artifacts caused by transformations. The cropped region size typically ranges between 60 and 80% of the original dimensions.
- Multi-angle search: Cropped regions are rotated iteratively within a range of angles (e.g., −15° to +15°, in 5° steps). Each rotation generates potential watermark candidates.
- Multi-scale search: Watermark candidates from rotated sub-bands are resized across scales (e.g., 80% to 120% of the original size) for robustness against scaling.
3.4.3. Watermark Extraction from DWT Coefficients
3.4.4. Combining and Post-Processing Extracted Watermarks
3.4.5. Watermark Similarity Evaluation
3.5. Performance Evaluation Metrics
4. Implementation and Results
4.1. Implementation Details
4.1.1. DWT
4.1.2. Watermark Embedding
4.1.3. GA for α Optimization
4.1.4. Watermark Extraction
4.2. Results and Discussion
4.2.1. Optimal Embedding Strength (α)
4.2.2. Imperceptibility
4.2.3. Discussion
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Appendix A.1
References
- Hung, T.-Y. A Study on the Business Ecosystem of Trading Card Games and Consumer Participation Motivations. Master’s Thesis, Takming University of Science and Technology, Taipei, Taiwan, 20 June 2024. [Google Scholar]
- Oppenheim, A.V.; Schafer, R.W. Discrete-Time Signal Processing, 3rd ed.; Pearson Education: London, UK, 2010. [Google Scholar]
- Haupt, R.L.; Haupt, S.E. A Genetic Algorithm for Function Optimization: A MATLAB Implementation; Wiley-Interscience: Hoboken, NJ, USA, 2004. [Google Scholar]
- Lowe, D.G. Distinctive Image Features from Scale-Invariant Keypoints. Int. J. Comput. Vis. 2004, 60, 91–110. [Google Scholar] [CrossRef]
- Bay, H.; Tuytelaars, T.; Van Gool, L. SURF: Speeded Up Robust Features. In Proceedings of the European Conference on Computer Vision, Graz, Austria, 7–13 May 2006. [Google Scholar]
- Lewis, J.P. Fast Normalized Cross-Correlation. Available online: https://www.researchgate.net/publication/2378357_Fast_Normalized_Cross-Correlation (accessed on 29 January 2026).




Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Lai, C.-H.; Lin, Y.; Hwang, Y.-S.; Hung, T.-Y. Optimizing Discrete Wavelet Transform Watermarking with Genetic Algorithms for Resilient Digital Asset Protection Against Diverse Attacks. Eng. Proc. 2025, 120, 13. https://doi.org/10.3390/engproc2025120013
Lai C-H, Lin Y, Hwang Y-S, Hung T-Y. Optimizing Discrete Wavelet Transform Watermarking with Genetic Algorithms for Resilient Digital Asset Protection Against Diverse Attacks. Engineering Proceedings. 2025; 120(1):13. https://doi.org/10.3390/engproc2025120013
Chicago/Turabian StyleLai, Chien-Hung, Yi Lin, Yuh-Shyan Hwang, and Tzu-Yu Hung. 2025. "Optimizing Discrete Wavelet Transform Watermarking with Genetic Algorithms for Resilient Digital Asset Protection Against Diverse Attacks" Engineering Proceedings 120, no. 1: 13. https://doi.org/10.3390/engproc2025120013
APA StyleLai, C.-H., Lin, Y., Hwang, Y.-S., & Hung, T.-Y. (2025). Optimizing Discrete Wavelet Transform Watermarking with Genetic Algorithms for Resilient Digital Asset Protection Against Diverse Attacks. Engineering Proceedings, 120(1), 13. https://doi.org/10.3390/engproc2025120013

