Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 533))

Abstract

Computational intelligent techniques can be useful in developing efficient watermarking approaches that are able to maintain and reduce risks to integrity, confidentiality, and availability of information and resources in computer and network systems. This paper aims to develop a new spatial domain-based watermarking approach that uses the fuzzy rough set to select well thought out blocks to embed secret data with acceptable rate of imperceptibility and robustness against different scenarios of attacks. The proposed model focuses on analyzing the host image to discover specified features in some blocks that in turn will be considered in the watermarking process. These features include the characteristics of the Human Visual System (HVS) regarding the color sensitivity and the textured/semi-smooth regions, where embedding the watermark in low color sensitivity to the human eye and more textured regions gains high imperceptibility and robustness. The experiment results show that the proposed approach gives interesting and remarkable results to preserve the image authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sun, Q., et al.: A blind color image watermarking based on DC component in the spatial domain. Optics 124(23), 6255–6260 (2013). Elsevier

    Google Scholar 

  2. Laouamer, L., et al.: Improving authenticity and robustness of medical images watermarking schemes based on multi-resolution decomposition. In: International Conference on Imaging Systems and Techniques, pp. 331–336. IEEE (2015)

    Google Scholar 

  3. Ouyang, L., et al.: A blind robust color image watermarking method using quaternion fourier transform. In: Congress on Image and Signal Processing, vol. 1, pp. 485–489. IEEE (2013)

    Google Scholar 

  4. Laouamer, L., Tayan, O.: A semi-blind robust DCT watermarking approach for sensitive text images. Arabian J. Sci. Eng. 40(4), 1097–1109 (2015)

    Article  Google Scholar 

  5. Benhocine, A., et al.: New images watermarking scheme based on singular value decomposition. J. Inf. Hiding Multimed. Sig. Process. 4(1), 9–18 (2013)

    Google Scholar 

  6. Findik, O., et al.: Implementation of BCH coding on artificial neural network-based color image watermarking. Int. J. Innov. Comput. Inf. Control 7(8), 4905–4914 (2011)

    Google Scholar 

  7. Bhattacharya, S.: Watermarking digital image using fuzzy matrix compositions and rough set. Int. J. Adv. Comput. Sci. Appl. 5(6), 135–140 (2014)

    Google Scholar 

  8. Albakrawy, L., et al.:A rough k-means fragile water-marking approach for image authentication. In: Proceedings of the Federated Conference on Computer Science and Information Systems, pp. 19–23. IEEE (2011)

    Google Scholar 

  9. Alnabhani, Y.: Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. J. King Saud Univ. Comput. Inf. Sci. 27(4), 1–9 (2015). Elsevier

    Google Scholar 

  10. Aslantas, V.: A singular-value decomposition-based image watermarking using genetic algorithm. J. Electron. Commun. 62(5), 386–394 (2008). Elsevier

    Google Scholar 

  11. Han, J.: A digital image watermarking method based on host image analysis and genetic algorithm. J. Ambient Intell. Humanized Comput. 7(1), 37–45 (2016)

    Article  Google Scholar 

  12. Cong, J., et al.: Robust digital image watermark scheme on wavelet domain using fuzzy rough sets. J. Int. Fuzzy Sys. 30(1), 1–12 (2015). IOS

    Google Scholar 

  13. Swiniarski, R., Skowron, A.: Rough set methods in feature selection and recognition. Pattern Recogn. Lett. 24, 833–849 (2003)

    Article  MATH  Google Scholar 

  14. Rissino, S., Lambert-Torres, G.: Rough set theory-fundamental concepts, principals, data extraction, and applications, data mining and knowledge discovery in real life applications. In: Data Mining and Knowledge Discovery in Real Life Applications, pp. 35–58, Chap. 3. InTech (2009)

    Google Scholar 

  15. Ghadi, M., et al.: JPEG bitstream based integrity with lightweight complexity of medical image in WMSNS environment. MEDES, pp. 53–58. ACM (2015)

    Google Scholar 

  16. Ghadi, M., et al.: Enhancing digital image integrity by exploiting JPEG bitstream attributes. JIDES 2(1–2), 20–31 (2015). Elsevier

    Google Scholar 

  17. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–238. Springer, Heidelberg (1998). doi:10.1007/3-540-49380-8_16

    Chapter  Google Scholar 

  18. Lu, Y., et al.: A novel color image watermarking method based on genetic algorithm. In: International Conference on Intelligent Computing, vol. 345, pp. 72–80 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Musab Ghadi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Ghadi, M., Laouamer, L., Nana, L., Pascu, A. (2017). Fuzzy Rough Set Based Image Watermarking Approach. In: Hassanien, A., Shaalan, K., Gaber, T., Azar, A., Tolba, M. (eds) Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2016. AISI 2016. Advances in Intelligent Systems and Computing, vol 533. Springer, Cham. https://doi.org/10.1007/978-3-319-48308-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48308-5_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48307-8

  • Online ISBN: 978-3-319-48308-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics