CFP last date
20 May 2024
Reseach Article

A Secure and Robust Reversible Watermarking Algorithm using Fuzzy Matching - Quad Tree Segmentation (F-QTS) Technique for Digital Images

by Ruban R, S.santhosh Baboo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 9
Year of Publication: 2014
Authors: Ruban R, S.santhosh Baboo
10.5120/18937-7868

Ruban R, S.santhosh Baboo . A Secure and Robust Reversible Watermarking Algorithm using Fuzzy Matching - Quad Tree Segmentation (F-QTS) Technique for Digital Images. International Journal of Computer Applications. 108, 9 ( December 2014), 4-10. DOI=10.5120/18937-7868

@article{ 10.5120/18937-7868,
author = { Ruban R, S.santhosh Baboo },
title = { A Secure and Robust Reversible Watermarking Algorithm using Fuzzy Matching - Quad Tree Segmentation (F-QTS) Technique for Digital Images },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 9 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 4-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number9/18937-7868/ },
doi = { 10.5120/18937-7868 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:42:31.468304+05:30
%A Ruban R
%A S.santhosh Baboo
%T A Secure and Robust Reversible Watermarking Algorithm using Fuzzy Matching - Quad Tree Segmentation (F-QTS) Technique for Digital Images
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 9
%P 4-10
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The attainment incompetence of extracting the original image is one of the most challenging tasks in digital image watermarking methods. When an image is embedded into another image, this increases more complications. To overcome this problematic scenario, this paper proposes a Fuzzy based Quad Tree Segmentation (F-QTS) method. In this paper, a binary logo image is embedded into a RGB cover image. Due to the embedding data is an image, Quad Tree Segmentation method is applied in both the images in order to allocate the blocks for logo image. This space allocation is empowered by Fuzzy Rules and the binary logo image is embedded into the R-plane of the cover image. Moreover, performances of the proposed watermarking method is evaluated with the various watermarking attacks and presented in terms of PSNR (Peak signal-to-noise ratio).

References
  1. Y. -T. Wu and F. Y. Shih, "Genetic algorithm based methodology for breaking the steganalytic systems," IEEE Trans. Syst. , Man, Cybern. B, Cybern, Vol. 36, no. 1, pp. 24–31, Feb. 2006
  2. Huawei Tian, Yao Zhao and Rongrong Ni, "LDFT-Based Watermarking Resilient to Local Desynchronization Attacks", IEEE Transactions on Cybernetics, Vol. 43, pp. 2190- 2201, 2013
  3. W. Zeng, "Digital watermarking and data hiding: technologies and applications," in Proc. Int. Conf. Inf. Syst. Anal. Synth. , vol. 3, pp. 223-229,1998
  4. C. W. Honsinger, P. Jones, M. Rabbani and J. C. Stoffel, "Reversible recovery of an original image containing embedded data," U. S. patent: 6,278,791, 2001
  5. J. Fridrich, M. Goljan and R. Du, "Invertible authentication," in Proc. Security Watermarking Multimedia Contents, pp. 197-208, 2001
  6. R. Caldelli, F. Filippini, and R. Becarelli, "Reversible watermarking techniques: an overview and aclassification," EURASIP Journal on Information Security, vol. 2010, Article ID 134546, 19 pages, 2010
  7. Chip-Hong Chang, Zhi Ye, and Mingyan Zhang, "Fuzzy-ART Based Adaptive Digital Watermarking Scheme", IEEE Transactions on Circuits and Systems for Video Technology, Vol. 15, pp. 65-81, 2005
  8. Neethu V. Gopal and Madhu S. Nair, "Fuzzy-ART Based Geometrically Invariant Robust Watermarking Scheme", Engineering Letters, Vol. 22, 2014
  9. Xinpeng Zhang, "Reversible Data Hiding with Optimal Value Transfer", IEEE Transactions on Multimedia, Vol. 15, pp. 316-325, 2013
  10. Priyanka D. Godase, Snehal B. Kale, Sonika S. Shelke, S. M. Sangve and S. P. Deshmukh, "Robust Digital Watermarking for Color Images Using Fuzzy Vault", Global Journal of Computer Science and Technology, Vol. 12, 2012
  11. G. RoslineNesakumari, L. Sumalatha and V. Vijayakumar, "Fuzzy Based Chaotic and Logistic Method for Digital Watermarking Systems", International Journal of Scientific & Engineering Research Vol. 3, 2012
  12. Hung-Hsu TSAI and Shih-Che LO, "JND-Based Watermark Embedding and GA-Based Watermark Extraction with Fuzzy Inference System for Image Verification", Informatica, Vol. 25, 2014
  13. Yih-Chuan Lin and Tzung-Shian Li, "Reversible Image Data Hiding Using Quad-tree Segmentation and Histogram Shifting", Journal of Multimedia, Vol. 6, pp. 349-358, 2011
  14. LIU Jinhua and SHE Kun, "Quantization-Based Robust Image Watermarking Using the Dual Tree Complex Wavelet Transform", China Communications, pp. 1-6, 2010
  15. Hong Peng, Jun Wang and Weixing Wang, "Image watermarking method in multiwavelet domain based on support vector machines", The Journal of Systems and Software, Vol. 83, pp. 1470–1477, 2010
  16. Pawe? Korus and AndrzejDziech, "Efficient Method for Content Reconstruction with Self-Embedding", IEEE Transactions on Image Processing, Vol. 22, pp. 1134- 1147, 2013.
  17. L. Agilandeswari and K. Muralibabu, "A novel block based video in video watermarking algorithm using discrete wavelet transform and singular value decomposition", International journal of advanced research in computer science and software engineering, vol. 3, Issue: 4, April 2014
  18. S. Ponni, S. Ramakrishnan, S. Arjun and V. Mahendran, "Selective Pixel based efficient video watermarking using dual singular value decomposition in the discrete wavelet transform domain", Research journal of computer science and engineering, vol. 4, pp. 720-725, June 2013
  19. Young-Chang Hou, Shih-Chieh Wei, Hsin-Ju Liu, and A-Yu Tseng, "Watermarking Scheme based on wavelet transformation and visual cryptography", Journal of Electronic science and technology, vol. 12, No. 1, March 2014
  20. Li Zhang, Xilan Yan1, Hongsong Li and Minrong Chen, "A Dynamic Multiple Watermarking Algorithm Based on DWT and HVS", International Journal of Communications, Network and System Sciences, vol. 5, pp. 490-495, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking digital image Fuzzy Rule Quad Tree Segmentation embedding attacks PSNR extraction