Skip to main content
Log in

Optimal Secure Information using Digital Watermarking and Fuzzy Rule base

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Digital image watermarking is one of the active area of research for data authentication and data hiding. Imperceptibility of the image is the main aspect that confines the amount of information to be embedded in a cover image. In this article, we have proposed a novel block based transform domain technique using Fuzzy Rule Based System (FRBS) that selects an image from sample images that can embed and carry our desired capacity with maximum imperceptibility and robustness. The proposed FRBS is applied in two phases. In first phase, it is used to choose the candidate image blocks and in second phase, it is used to choose the coefficients from the selected candidate blocks for embedding the desired capacity. Some specific images are chosen from the sample images whose total number of coefficients are greater than certain threshold. The selected images are then embedded with the desired capacity and are passed through multiple attacks. PSNR of the watermarked images and correlation of embedded desired capacity is extracted. Finally, the image is selected as a candidate image whose PSNR and correlation is higher than the other images embedded with the same desired capacity. Supremacy of proposed scheme is checked by using different type of images like medical and natural images and the performance is evaluated by comparing with the selected state of the art techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21

Similar content being viewed by others

References

  1. Abodena O, Agoyi M, Celebi E (2017) Hybrid Technique for Robust Image Watermarking Using Discrete Time Fourier Transform. Signal Processing and Communications Applications Conference (SIU) Antalya

  2. Aliwa MB, El-Tobely TEA, Fahmy MM, Nasr MES, El-Aziz MHA (2010) Fidelity and Robust Digital Watermarking Adaptively Pixel based on Medial Pyramid of Embedding Error Gray Scale Images. IJCSNS 10(6):284

    Google Scholar 

  3. Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791

    Article  Google Scholar 

  4. Canny J (1986). A computational approach to edge detection. Pattern Analysis and Machine Intelligence, IEEE Transactions on, (6), 679–698

    Article  Google Scholar 

  5. Chen M, Chen Z, Zeng X, Xiong Z (2009) Reversible image watermarking based on full context prediction. 16th IEEE International Conference on Image Processing (ICIP), (pp. 4253–4256)

  6. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  7. Foo SW, Dong Q (2010) A Normalization-based Robust Image Watermarking Scheme Using SVD and DCT. World Academy of Science, Engineering and Technology, International Journal of Electrical and Computer Engineering

  8. Foriš P, Levický D (2007) Implementations of HVS models in digital image watermarking. J Radio eng 16(1):45–50

    Google Scholar 

  9. Haralick RM, Shanmugam K, Dinstein IH (1973) Textural features for image classification. Systems, Man and Cybernetics, IEEE Transactions on, (6), 610–621

    Article  Google Scholar 

  10. Jamali M, Rafiee S, Soroushmehr SM, Karimi N, Shirani S, Najarian K, Samavi S (2017) Adaptive Blind Image Watermarking Using Fuzzy Inference System Based on Human Visual Perception. CoRR, abs/1709.06536

  11. Katzenbeisser S, Petitolas F (2000) Information hiding techniques for steganography and digital watermaking. Artech House Books, Norwood

    Article  Google Scholar 

  12. Lande PU, Talbar SN, Shinde GN (2010) A Fuzzy logic approach to Encrypted Watermarking for still Images in Wavelet domain on FPGA. Int J Signal Process Image Process Pattern Recogn 3(2):1–9

    Google Scholar 

  13. Latif A (2013) An adaptive digital image watermarking scheme using fuzzy logic and tabu search. J Inform Hiding Multimed Signal Process 4(4):250–271

    Google Scholar 

  14. Lee C-W, Tsai W-H (2010) A Lossless Data Hiding Method by Histogram Shifting Based on an Adaptive Block Division Scheme. Pattern Recognition and Machine Vision, River Publishers, Aalborg, pp 1–14

    Google Scholar 

  15. Miaou SG, Hsu CM, Tsai YS, Chao HM (2000) A secure data hiding technique with heterogeneous data-combining capability for electronic patient records in Engineering in Medicine and Biology Society. Proceedings of the 22nd Annual International Conference of the IEEE (Vol. 1, pp. 280–283)

  16. Mohamed Sathik M, Sujatha SS (2010) An improved invisible watermarking technique for image authentication. International Journal of Advanced Science and Technology 24:61–73

  17. Mohrekesh M, Azizi S, Shirani S, Karimi N, Samavi S (2017) Hierarchical Watermarking Framework Based on Analysis of Local Complexity Variations. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6129-8

    Article  Google Scholar 

  18. Naseem MT, Qureshi IM, Cheema TA, Rahman A-u (2013) Hash based Medical Image Authentication and Recovery Using Chaos and Residue Number System. J Basic App Sci Res. 3(6):488–495

    Google Scholar 

  19. Naseem MT, Qureshi IM, Cheema TA, Zubair M (2012) Invertible and Fragile Watermarking for Medical images Using Residue Number System and Chaos. J Basic App Sci Res 10(2):10643–10651

    Google Scholar 

  20. Naseem MT, Qureshi IM, Muzaffar MZ (2014) Novel technique for capacity maximizing in digital watermarking using fuzzy rule base. Journal of Intelligent and Fuzzy Systems

  21. Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. Pattern Anal Mach Intell, IEEE Trans 24(7):971–987

    Article  Google Scholar 

  22. Patel RR, Patel DJ (2018) Survey Paper on Digital Image Watermarking, vol. 4, issue. 1, IJARIIE

  23. Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062–1078

    Article  Google Scholar 

  24. Pietikäinen M (2005) Image Analysis with Local Binary Patterns. In: Kalviainen H., Parkkinen J., Kaarna A. (eds) Image Analysis. SCIA 2005. Lecture Notes in Computer Science, vol 3540. Springer, Berlin, Heidelberg

  25. Reddy AA, Chatterji BN (2005) A new wavelet based logo-watermarking scheme. Pattern Recogn Lett 26(7):1019–1027

    Article  Google Scholar 

  26. Reddy VP, Varadarajan S (2010) An Effective Wavelet-Based Watermarking Scheme Using Human Visual System for Protecting Copyrights of Digital Images. Int J Comput Electr Eng 2(1):32–40

    Article  Google Scholar 

  27. Ruanaidh JJ, Pun T (1998) Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Process 66(3):303–317

    Article  Google Scholar 

  28. Sharma V, Mann PS (2017) A review on various optimized image watermarking techniques. Int J Comput Appl 162(2):26–30. https://doi.org/10.5120/ijca2017913264

    Article  Google Scholar 

  29. Sridevi T, Fatima SS (2013) Digital image watermarking using fuzzy logic approach based on DWT and SVD. Int J Comput Appl 74(13):16–20 https://doi.org/10.5120/12945-0014

    Article  Google Scholar 

  30. Waleed J, Dong H, Abbas T, Abid S, Hatem H (2014) A survey of digital image watermarking optimization based on nature inspired algorithms NIAs. Int J Secur Appl 8:315–334. https://doi.org/10.14257/ijsia.2014.8.6.28

    Article  Google Scholar 

  31. Youssef SM, Abouelfarag A, Ghatwary NM (2012) Adaptive Digital Watermarking Integrating Fuzzy Inference HVS Perceptual Model. World Academy of Science, Engineering and Technology

  32. Yusof Y, Khalifa OO (2007) Digital watermarking for digital images using wavelet transform. In Telecommunications and Malaysia International Conference on Communications, 2007. ICT-MICC 2007. IEEE International Conference on (pp. 665–669). IEEE

  33. Zhang XD, Feng J, Lo KT (2003) Image watermarking using tree-based spatial-frequency feature of wavelet transform. J Vis Commun Image Represent 14(4):474–491

    Article  Google Scholar 

  34. Zhang Y (2009) Blind watermark algorithm based on HVS and RBF neural network in DWT domain. WSEAS Trans Comput 8(1):174–183

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ayyaz Hussain.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Naseem, M.T., Nadeem, M., Qureshi, I.M. et al. Optimal Secure Information using Digital Watermarking and Fuzzy Rule base. Multimed Tools Appl 78, 7691–7712 (2019). https://doi.org/10.1007/s11042-018-6501-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6501-8

Keywords

Navigation