<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Politeknik Dergisi</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2147-9429</issn>
                                                                                            <publisher>
                    <publisher-name>Gazi Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.2339/politeknik.1192824</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Mühendislik</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Digital Image Watermarking with Hybrid Structure of DWT, DCT, SVD Techniques and The Optimization with BFO Algorithm</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="tr">
                                    <trans-title>DWT, DCT, SVD Tekniklerinden oluşan Hibrid Yapı ile Dijital Görüntü Filigran Ekleme ve BFO Algoritması ile Optimizasyonu</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-4733-4684</contrib-id>
                                                                <name>
                                    <surname>Yıldız</surname>
                                    <given-names>Sadık</given-names>
                                </name>
                                                                    <aff>GAZI UNIVERSITY, INSTITUTE OF SCIENCE, NATURAL AND APPLIED SCIENCES TEACHING (DR)</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-3087-895X</contrib-id>
                                                                <name>
                                    <surname>Üstünsoy</surname>
                                    <given-names>Furkan</given-names>
                                </name>
                                                                    <aff>GAZI UNIVERSITY, INSTITUTE OF SCIENCE, NATURAL AND APPLIED SCIENCES TEACHING (DR)</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-0692-172X</contrib-id>
                                                                <name>
                                    <surname>Sayan</surname>
                                    <given-names>Hasan Hüseyin</given-names>
                                </name>
                                                                    <aff>GAZI UNIVERSITY, FACULTY OF TECHNOLOGY, DEPARTMENT OF ELECTRICAL AND ELECTRONICS ENGINEERING</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20240725">
                    <day>07</day>
                    <month>25</month>
                    <year>2024</year>
                </pub-date>
                                        <volume>27</volume>
                                        <issue>3</issue>
                                        <fpage>857</fpage>
                                        <lpage>871</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20221021">
                        <day>10</day>
                        <month>21</month>
                        <year>2022</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20221218">
                        <day>12</day>
                        <month>18</month>
                        <year>2022</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 1998, Politeknik Dergisi</copyright-statement>
                    <copyright-year>1998</copyright-year>
                    <copyright-holder>Politeknik Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>The copyright violations in digital images and the violations of the privacy of personal data are happened with the development of technology and the widespread use of the internet. The usage of watermarks in digital images provides high protection to image owners in copyright protection and in protection of personal data. In this paper, watermarks have been added to digital images by using discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) methods, respectively. “Gaussian”, “shot”, “salt &amp;amp; pepper” and “speckle” noises are added to watermarked images, respectively. The original image and the watermark have been extracted from the watermarked image after adding noise. The original image and watermark have been re-extracted from the optimized watermarked image by using the bacterial foraging optimization (BFO) technique. In this step, the particle swarm optimization (PSO) algorithm has been used to set the best position of the chemotactic parameters of the BFO algorithm. The peak signal to noise ratio (PSNR), normalized cross correlation (NCC) and image fidelity (IF) values have been calculated and compared to see the success performance of watermarking techniques and optimization techniques.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="tr">
                            <p>Teknolojinin gelişmesi ve internet kullanımının yaygınlaşması ile sayısal görüntülerde telif hakkı ihlalleri ve kişisel verilerin gizliliğinde ihlaller yaşanmaktadır. Dijital görüntülerde filigran kullanmak telif haklarının korunmasında ve kişisel verilerin korunmasında görüntü sahiplerine yüksek koruma sağlamaktadır. Bu makale çalışmasında sayısal görüntülere sırasıyla ayrık dalgacık dönüşümü (DWT), ayrık kosinüs dönüşümü (DCT) ve tekil değer ayrıştırma (SVD) yöntemleri kullanılarak filigran eklendi. Filigran eklenen görüntülere sırasıyla “Gauss”, “Atış”, “tuz-biber” ve “benek” gürültüleri eklenmiştir. Gürültü ekleme işlemlerinin ardından filigran uygulanan görüntüden orijinal görüntü ve filigran çıkarılmıştır. Bakteri arama optimizasyonu (BFO) tekniği kullanılarak optimize edilen filigranlı görüntüden orijinal görüntü ve filigran tekrar çıkarılmıştır. Bu adımda BFO algoritmasının kemotaktik parametrelerinin en iyi pozisyonunu belirlemek için parçacık sürüsü optimizasyonu (PSO) algoritması kullanılmıştır. Filigran teknikleri ve optimizasyon tekniklerinin başarı performanslarını göstermek için tepe sinyal-gürültü oranı (PSNR), Normalleştirilmiş çapraz korelasyon (NCC) ve görüntü uygunluk (IF) değerleri hesaplanarak karşılaştırılmıştır.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Watermarking</kwd>
                                                    <kwd>  image cryptography</kwd>
                                                    <kwd>  metaheuristic optimization</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="tr">
                                                    <kwd>Filigran Ekleme</kwd>
                                                    <kwd>  görüntü şifreleme</kwd>
                                                    <kwd>  meta-sezgisel optimizasyon</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1] 	Al-maweri, N. A. S., Wan Adnan, W. A., Ramli, A. R., Samsudin, K., and Syed Ahmad, S., M., “A hybrid digital image watermarking algorithm based on DCT-DWT and auto-thresholding.”, Security Comm. Networks, 8: 4373– 4395, (2015).</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	 K.A. Al-Afandy, E.M. EL-Rabaie, F.E.A. El-Samie, O.S. Faragallah, A. ELmhalaway, A.M. Shehata,&quot;A Comparative Study For Color Systems Used In The DCT-DWT Watermarking Algorithm&quot;, Advances in 
Science, Technology and Engineering Systems Journal, vol. 1, no. 5, pp. 42-49 (2016).</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	Mishra A., Agarwal C., Sharma A., Bedi P., &quot;Optimized gray-scale image watermarking using DWT–SVD and Firefly Algorithm&quot;, Expert Systems with Applications, Volume 41, Issue 17, Pages 7858-
7867, (2014).</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	Golshan F., Mohammadi K., “A hybrid intelligent SVD-based perceptual shaping of a digital image watermark in DCT and DWT domain”, The Imaging Science Journal, 61:1, 35-46, (2013).</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	Mehto A., Mehra N., &quot;Adaptive Lossless Medical Image Watermarking Algorithm Based on DCT &amp; DWT&quot;, Procedia Computer Science, Volume 78, Pages 88-94, (2016).</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	Sharma S., Chauhan U., Khanam R., Singh K., &quot;Digital Watermarking using Grasshopper Optimization Algorithm&quot;, Open Computer Science, vol. 11, no. 1, pp. 330-336, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	Bose A., Maity S. P., &quot;Secure sparse watermarking on DWT-SVD for digital images&quot;, Journal of Information Security and Applications, Volume 68, 103255, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	Abdulrahman A. K., Öztürk S., &quot;Çoklu Görüntü Damgalama Yönteminde Farklı Frekans Bölgelerinin Değerlendirilmesi&quot;, Bilişim Teknolojileri Dergisi, c. 11, sayı. 1, ss. 75-88, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	Bakwad K. M., Pattnaik S.S., Sohi B. S., Devi S., Panigrahi B. K. , Gollapudi S. V. R. S., “Bacterial Foraging Optimization Technique Cascaded with Adaptive Filter to Enhance Peak Signal to Noise Ratio 
from Single Image”, IETE Journal of Research, 55:4, 173-179,(2009).</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	Liu J., Huang J., Luo Y., Cao L., Yang S., Wei D., Zhou R., &quot;An Optimized Image Watermarking Method Based on HD and SVD in DWT Domain&quot;, IEEE Access, vol. 7, pp. 80849-80860, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	Kadian P., Arora N., Arora S. M., &quot;Performance Evaluation of Robust Watermarking Using DWT-SVD and RDWT-SVD,&quot; 6th International Conference on Signal Processing and Integrated Networks 
(SPIN), pp. 987-991, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	E. Elbaşı, &quot; Two Bands Wavelet Based Robust Semi-Blind Image Watermarking&quot;, Politeknik Dergisi, 11(4): 329-337, (2008).</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	Vishwakarma V. P., Dalal S., Sisaudia V., &quot;Efficient Feature Extraction using DWT-DCT for Robust Face Recognition under varying Illuminations,&quot; 2nd IEEE International Conference on Power 
Electronics, Intelligent Control and Energy Systems (ICPEICES), pp. 982-987, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	Wang M.,  Jiang H., Li Y., &quot;Face recognition based on DWT/DCT and SVM&quot;, International Conference on Computer Application and System Modeling (ICCASM), pp. V3-507-V3-510, (2010).</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	S. R. Sheriff, &quot;Digital Image Watermarking using Singular Value Decomposition&quot;, AL-Rafidain Journal of Computer Sciences and Mathematics, 7, 3, p-p 187-200, (2010).</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	Dirckx S., Huybrechs D., Ongenae R., “On the computation of the SVD of
Fourier submatrices”, arXiv:2208.12583v1 (math.NA), (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	Ahmadi S.B.B., Zhang G., Wei S., “Robust and hybrid SVD-based image watermarking schemes:” Multimed Tools Appl 79, 1075–1117, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	Mathew K D., “SVD based Image Watermarking Scheme”, IJCA Special Issue on Evolutionary Computation for Optimization Techniques-ECOT, pp. 21-24, (2010).</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19]	Akyol S., Alataş B., &quot;Güncel Sürü Zekası Optamizasyon Algoritmaları&quot;, Nevşehir Üniversitesi Fen Bilimleri Enstitüsü Dergisi, c. 1, sayı. 1, ss. 0-0, (2012).</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	Das, S., Biswas, A., Dasgupta, S., Abraham, A., “Bacterial Foraging Optimization Algorithm: Theoretical Foundations, Analysis, and Applications”, Foundations of Computational Intelligence, 
Volume 3, pp 23–55, (2009).</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21]	Zhang Q., Chen, H., Luo J., Xu Y., Wu C., Li C., &quot;Chaos Enhanced Bacterial Foraging Optimization for Global Optimization&quot;, in IEEE Access, vol. 6, pp. 64905-64919, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22]	Bolat B., Altun O., Cortes P., Yıldız Y. E., Topal A. O., “A Comparison of Metaheuristics for the Allocation of Elevators to Calls in Buildings”, Politeknik Dergisi, 20(3): 519-52, (2017).</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23]	Wang, D., Tan, D., Liu, L., “Particle swarm optimization algorithm: an overview”, Soft Comput 22, 387–408 (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24]	Akyol K., Feneaker S. O. F., “Kaynaklı Kiriş Tasarımı Mühendislik Problemi İçin Kaotik Çoklu-sürü Parçacık Sürü Optimizasyonu”, Politeknik Dergisi, 1-1, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25]	Donuk K., Arı A., Özdemir M. F., “Hanbay D. Deep Feature Selection for Facial Emotion Recognition Based on BPSO and SVM”, Politeknik Dergisi, 1-1, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">[26]	Bharati S., Rahman M. A., Mandal S., Podder P., &quot;Analysis of DWT, DCT, BFO &amp; PBFO Algorithm for the Purpose of Medical Image Watermarking&quot;, International Conference on Innovation in 
Engineering and Technology (ICIET), pp. 1-6, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">[27]	Yousefi M., Omid M., Rafiee Sh., Ghaderi S.F., “Strategic planning for minimizing CO2 emissions using LP model based on forecasted energy demand by PSO Algorithm and ANN”, Internatıonal 
Journal Of Energy And Envıronment, Volume 4, Issue 6, pp.1041-1052,(2013).</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">[28]	Aliwa M. B., El-Tobely T. A., Fahmy M. M., Nasr M. S., Aziz M. H., “Fidelity and Robust Digital Watermarking Adaptively Pixel based on Medial Pyramid of Embedding Error Gray Scale Images”, 
IJCSNS International Journal of Computer Science and Network Security, Vol. 10  No. 6,  pp. 284-314, (2010).</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">[29]	Singh P., Devi K. J., Thakkar H. K., Kotecha K., &quot;Region-Based Hybrid Medical Image Watermarking Scheme for Robust and Secured Transmission in IoMT,&quot;, IEEE Access, vol. 10, pp. 8974-8993, 
(2022).</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">[30]	Thakkar, F.N., Srivastava, V.K., “A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications”. Multimed Tools Appl, 76, 3669–3697, (2017).</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">[31]	Rajan B. K., Harshan H. M., Venugopal G., &quot;Veterinary Image Enhancement using DWTDCT and Singular Value Decomposition,&quot; 2020 International Conference on Communication and Signal 
Processing (ICCSP), pp. 0920-0924, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">[32]	Alzahrani A., Memon N. A., &quot;Blind and Robust Watermarking Scheme in Hybrid Domain for Copyright Protection of Medical Images,&quot;, IEEE Access, vol. 9, pp. 113714-113734, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">[33]	Ma J., ChenJ., Wu G., &quot;Robust Watermarking via Multidomain Transform Over Wireless Channel: Design and Experimental Validation,&quot;, IEEE Access, vol. 10, pp. 92284-92293, (2022).</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
