Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Secure and Robust Reversible Watermarking Algorithm using Fuzzy Matching – Quad Tree Segmentation (F-QTS) Technique for Digital Images

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 108 - Number 9
Year of Publication: 2014
Authors:
Ruban R
S. Santhosh Baboo
10.5120/18937-7868

Ruban R and S.santhosh Baboo. Article: A Secure and Robust Reversible Watermarking Algorithm using Fuzzy Matching - Quad Tree Segmentation (F-QTS) Technique for Digital Images. International Journal of Computer Applications 108(9):4-10, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Ruban R and S.santhosh Baboo},
	title = {Article: A Secure and Robust Reversible Watermarking Algorithm using Fuzzy Matching - Quad Tree Segmentation (F-QTS) Technique for Digital Images},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {108},
	number = {9},
	pages = {4-10},
	month = {December},
	note = {Full text available}
}

Abstract

The attainment incompetence of extracting the original image is one of the most challenging tasks in digital image watermarking methods. When an image is embedded into another image, this increases more complications. To overcome this problematic scenario, this paper proposes a Fuzzy based Quad Tree Segmentation (F-QTS) method. In this paper, a binary logo image is embedded into a RGB cover image. Due to the embedding data is an image, Quad Tree Segmentation method is applied in both the images in order to allocate the blocks for logo image. This space allocation is empowered by Fuzzy Rules and the binary logo image is embedded into the R-plane of the cover image. Moreover, performances of the proposed watermarking method is evaluated with the various watermarking attacks and presented in terms of PSNR (Peak signal-to-noise ratio).

References

  • Y. -T. Wu and F. Y. Shih, "Genetic algorithm based methodology for breaking the steganalytic systems," IEEE Trans. Syst. , Man, Cybern. B, Cybern, Vol. 36, no. 1, pp. 24–31, Feb. 2006
  • Huawei Tian, Yao Zhao and Rongrong Ni, "LDFT-Based Watermarking Resilient to Local Desynchronization Attacks", IEEE Transactions on Cybernetics, Vol. 43, pp. 2190- 2201, 2013
  • W. Zeng, "Digital watermarking and data hiding: technologies and applications," in Proc. Int. Conf. Inf. Syst. Anal. Synth. , vol. 3, pp. 223-229,1998
  • C. W. Honsinger, P. Jones, M. Rabbani and J. C. Stoffel, "Reversible recovery of an original image containing embedded data," U. S. patent: 6,278,791, 2001
  • J. Fridrich, M. Goljan and R. Du, "Invertible authentication," in Proc. Security Watermarking Multimedia Contents, pp. 197-208, 2001
  • R. Caldelli, F. Filippini, and R. Becarelli, "Reversible watermarking techniques: an overview and aclassification," EURASIP Journal on Information Security, vol. 2010, Article ID 134546, 19 pages, 2010
  • Chip-Hong Chang, Zhi Ye, and Mingyan Zhang, "Fuzzy-ART Based Adaptive Digital Watermarking Scheme", IEEE Transactions on Circuits and Systems for Video Technology, Vol. 15, pp. 65-81, 2005
  • Neethu V. Gopal and Madhu S. Nair, "Fuzzy-ART Based Geometrically Invariant Robust Watermarking Scheme", Engineering Letters, Vol. 22, 2014
  • Xinpeng Zhang, "Reversible Data Hiding with Optimal Value Transfer", IEEE Transactions on Multimedia, Vol. 15, pp. 316-325, 2013
  • Priyanka D. Godase, Snehal B. Kale, Sonika S. Shelke, S. M. Sangve and S. P. Deshmukh, "Robust Digital Watermarking for Color Images Using Fuzzy Vault", Global Journal of Computer Science and Technology, Vol. 12, 2012
  • G. RoslineNesakumari, L. Sumalatha and V. Vijayakumar, "Fuzzy Based Chaotic and Logistic Method for Digital Watermarking Systems", International Journal of Scientific & Engineering Research Vol. 3, 2012
  • Hung-Hsu TSAI and Shih-Che LO, "JND-Based Watermark Embedding and GA-Based Watermark Extraction with Fuzzy Inference System for Image Verification", Informatica, Vol. 25, 2014
  • Yih-Chuan Lin and Tzung-Shian Li, "Reversible Image Data Hiding Using Quad-tree Segmentation and Histogram Shifting", Journal of Multimedia, Vol. 6, pp. 349-358, 2011
  • LIU Jinhua and SHE Kun, "Quantization-Based Robust Image Watermarking Using the Dual Tree Complex Wavelet Transform", China Communications, pp. 1-6, 2010
  • Hong Peng, Jun Wang and Weixing Wang, "Image watermarking method in multiwavelet domain based on support vector machines", The Journal of Systems and Software, Vol. 83, pp. 1470–1477, 2010
  • Pawe? Korus and AndrzejDziech, "Efficient Method for Content Reconstruction with Self-Embedding", IEEE Transactions on Image Processing, Vol. 22, pp. 1134- 1147, 2013.
  • L. Agilandeswari and K. Muralibabu, "A novel block based video in video watermarking algorithm using discrete wavelet transform and singular value decomposition", International journal of advanced research in computer science and software engineering, vol. 3, Issue: 4, April 2014
  • S. Ponni, S. Ramakrishnan, S. Arjun and V. Mahendran, "Selective Pixel based efficient video watermarking using dual singular value decomposition in the discrete wavelet transform domain", Research journal of computer science and engineering, vol. 4, pp. 720-725, June 2013
  • Young-Chang Hou, Shih-Chieh Wei, Hsin-Ju Liu, and A-Yu Tseng, "Watermarking Scheme based on wavelet transformation and visual cryptography", Journal of Electronic science and technology, vol. 12, No. 1, March 2014
  • Li Zhang, Xilan Yan1, Hongsong Li and Minrong Chen, "A Dynamic Multiple Watermarking Algorithm Based on DWT and HVS", International Journal of Communications, Network and System Sciences, vol. 5, pp. 490-495, 2012.