A Novel Watermarking Approach based on Fuzzy Wavelets for High Authentication and Robustness

U. Ravi Babu*
*Professor, Department of Computer Science and Engineering, Narsimha Reddy Engineering College, Secunderabad, India.
Periodicity:April - June'2016

Abstract

The present study derives a novel scheme to embed the watermark for high authentication, robustness, security and copyright protection based on Fuzzy Wavelet. So far no researcher has attempted to use fuzzy logic in the spatial domain. The present paper developed a new technique called Fuzzy Wavelet (FW) approach for selecting the pixel locations to insert the watermark. The main aim of the proposed method is embedding the watermark image fully and to extract the watermarked image in an efficient manner. The approach is called Fuzzy Wavelet Region based Even, Odd (FWREO) method. The watermark bits are embedded in the pixel location selected by the FW approach by using the novel approach called Region based Even Odd (REO) method. The proposed method mainly consists of two steps. In step one, identify the pixel locations where the watermark is embedded. In the second step, REO method is applied on the FW approach of the first step. To find the effectiveness of the proposed method, the present method is tested on 24 images with the size of 512×512. The proposed gives comparative results when compared with other existing methods.

Keywords

Fuzzy Wavelet, Watermark, Wavelet Region, Even Odd Method.

How to Cite this Article?

Babu, U.R. (2016). A Novel Watermarking Approach based on Fuzzy Wavelets for High Authentication and Robustness. i-manager's Journal on Image Processing, 3(2), 1-7.

References

[1]. Cox I.J, Kilian J, Leighton F.T, and Shamoon T, (1997). “Secure Spread Spectrum Watermarking for Multimedia”. IEEE Trans. Image Processing, Vol. 6, pp. 1673–1687.
[2]. Katzenbeisser S. and Petitcolas F.A.P (2000). Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers.
[3]. Voyatzis G. and Pitas I. (1998). “Chaotic watermarks for embedding in the spatial digital image domain”. In Proc. IEEE Int. Conf. Image Processing (ICIP'98), Chicago, IL.
[4]. Jiang Lung Liu, Der Chyuan Lou, Ming Chang Chang and Hao Kuan Tso, (2006). “A Robust watermarking scheme using self reference image”. Computer Standards and Interfaces, Elsevier, pp. 356-367.
[5]. Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsaib, and Min-Shiang Hwang, (2007). “A high quality steganographic method with pixel-value differencing and modulus function”. The Journal of Systems and Software, Vol. 81, pp. 150-158.
[6]. Cox I.J, Kilian J, Leighton F.T and Shamoon T. (1997). “Secure spread spectrum watermarking for multimedia”. IEEE Trans. on Image Processing, Vol. 6, No. 12, pp. 1673- 1687.
[7]. Podilchuk C.I and Zeng W, (1998). “Image-adaptive watermarking using visual models”. IEEE J. Select. Areas Commun., Vol. 16, pp. 525–539.
[8]. S. Maruthuperumal, V. Vijayakumar and B. Vijayakumar, (2012a). “Sorted Pixel Value Difference on Fuzzy Watermarking Scheme”. GJCST, Vol. 12, No. 4, pp. 41-46.
[9]. S. Maruthuperumal, G. Roseline Nesakumari, and V. Vijayakumar, (2012b). “Region BasedOdd Watermarking Method with Fuzzy Wavelet”. International Journal of Computer Engineering Science (IJCES), Vol. 2, No. 8, pp. 16-25.
[10]. USC SIPI. The USC-SIPI Image Database. Retrieved from http://sipi.usc.edu/services/database/Database.html.
[11]. Gaurav Bhatnagar, Balasubramanian Raman, and Swaminathan K. (2008). “DWT-SVD based Dual Watermarking st Scheme”. 1 IEEE International Conference on the Applications of Digital Information and Web Technologies (IEEE-ICADIWT 2008), pp.526-531.
[12]. Saeed K. Amirgholipour, Ahmad R. Naghsh-Nilchi, (2009). “Robust Digital Image Watermarking Based on Joint DWT-DCT”. International Journal of Digital Content Technology and its Applications, pp. 42- 54, Vol. 3, No. 2.
[13]. Sameh Oueslati, Adnane Cherif, and Bassel Solaiman, (2011). “A Fuzzy Watermarking System Using the Wavelet Technique for Medical Images”. International Journal of Research and Reviews in Computing Engineering, Vol. 1, No. 1.
[14]. Wei-Che Chen, and Ming-Shi Wang, (2009). “A fuzzy c-means clustering-based fragile watermarking scheme for image authentication”. Expert Systems with Applications, Vol. 36, pp. 1300-1307.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.