scholarly journals A Fuzzy Controlled Image Watermarking Based on a Dual Transform Technique

Author(s):  
Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra

This paper presents a new watermarking technique using hybrid image transforms that aims to be very robust against attacks. It also aims to reduce the amount of distortion created from embedding the watermark as much as possible, and have good capacity. The proposed system uses a hybrid watermarking technique that is based on Non-Subsampled Contourlet Transform and Discrete Wavelet Transform. In addition, the proposed system makes use of the fuzzy logic to automatically choose the strength of the embedded watermark. Furthermore, the system uses Spread Spectrum Code Division Multiple Access to embed and recover the watermark after transforming the image. To enhance recoverability of the watermarks, the system uses a high level of redundancy in the embedding process, which allows a powerful Error Correcting Code to be used in the recovery process. The fuzzy logic is used to help the system in producing watermarked images that reserve their quality and not be heavily altered after embedding the watermark. Experiments were performed to measure the quality of the proposed system using JPEG compression attacks. The results showed that the proposed system is robust and has good capacity and imperceptibly although it suffers from being computationally complex.

Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5540
Author(s):  
Nayeem Hasan ◽  
Md Saiful Islam ◽  
Wenyu Chen ◽  
Muhammad Ashad Kabir ◽  
Saad Al-Ahmadi

This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with an auto extraction feature. The 2DWT has been selected based on the analysis of the trade-off between imperceptibility of the watermark and embedding capacity at various levels of decomposition. DCT operation is applied to the selected area to gather the image coefficients into a single vector using a zig-zig operation. We have utilized the same random bit sequence as the watermark and seed for the embedding zone coefficient. The quality of the reconstructed image was measured according to bit correction rate, peak signal-to-noise ratio (PSNR), and similarity index. Experimental results demonstrated that the proposed scheme is highly robust under different types of image-processing attacks. Several image attacks, e.g., JPEG compression, filtering, noise addition, cropping, sharpening, and bit-plane removal, were examined on watermarked images, and the results of our proposed method outstripped existing methods, especially in terms of the bit correction ratio (100%), which is a measure of bit restoration. The results were also highly satisfactory in terms of the quality of the reconstructed image, which demonstrated high imperceptibility in terms of peak signal-to-noise ratio (PSNR ≥ 40 dB) and structural similarity (SSIM ≥ 0.9) under different image attacks.


Author(s):  
SANTI P. MAITY ◽  
MALAY K. KUNDU

This paper investigates the scope of wavelets for performance improvement in spread spectrum image watermarking. Performance of a digital image watermarking algorithm, in general, is determined by the visual invisibility of the hidden data (imperceptibility), reliability in the detection of the hidden information after various common and deliberate signal processing operations (robustness) applied on the watermarked signals and the amount of data to be hidden (payload) without affecting the imperceptibility and robustness properties. In this paper, we propose a few spread spectrum (SS) image watermarking schemes using discrete wavelet transform (DWT), biorthogonal DWT and M-band wavelets coupled with various modulation, multiplexing and signaling techniques. The performance of the watermarking methods are also reported along with the relative merits and demerits.


Author(s):  
Dan Martis

This method, based on fuzzy logic principles, is intended to find the most likely solution of an over-determined system, in specific conditions. The method addresses typical problems encountered in gas turbine performance analysis and, more specifically, to the alignment of a synthesis model with measured data. Generally speaking, the relatively low accuracy of measurements introduces a random noise around the true value of a performance parameter and distorts any deteministic solution of a square matrix-based linear system. The Fuzzy Logic Estimator (FLE) is able to get very close to the real solution by using additional (pseudoredundant) parameters and by building the most likely solution based on each of the measurement accuracies. The accuracy — or “quality” — of a measurement is encapsulated within an extra dimension which is defined as fuzzy and which encompasses the whole range of values, between 0 (false) and 1 (true). The value of the method is shown in two examples. The first simulates compressor fouling, the other deals with actual engine test data following a hardware modification. Both examples experience noisy measurements. The method is stable and effective even at high level of noise. The results are within the close vicinity of the expected levels (within 0.2% accuracy) and the accuracy is about ten times lower than the noise level.


2004 ◽  
Vol 129 (1) ◽  
pp. 88-96 ◽  
Author(s):  
Dan Martis

This method, based on fuzzy logic principles, is intended to find the most likely solution of an over-determined system, in specific conditions. The method addresses typical problems encountered in gas turbine performance analysis and, more specifically, to the alignment of a synthesis model with measured data. Generally speaking, the relatively low accuracy of measurements introduces a random noise around the true value of a performance parameter and distorts any deterministic solution of a square matrix-based linear system. The fuzzy logic estimator is able to get very close to the real solution by using additional (pseudo-redundant) parameters and by building the most likely solution based on each of the measurement accuracies. The accuracy—or “quality”—of a measurement is encapsulated within an extra dimension which is defined as fuzzy and which encompasses the whole range of values, between 0 (false) and 1 (true). The value of the method is shown in two examples. The first simulates compressor fouling, the other deals with actual engine test data following a hardware modification. Both examples experience noisy measurements. The method is stable and effective even at high level of noise. The results are within the close vicinity of the expected levels (within 0.2% accuracy) and the accuracy is about ten times lower than the noise level.


2021 ◽  
Vol 2070 (1) ◽  
pp. 012111
Author(s):  
Kodathala Sai Varun ◽  
Ajay Kumar Mandava ◽  
Rakesh Chowdary

Abstract Copyright protection for digital multimedia has become a research hotspot in recent years. As an efficient solution, the digital watermarking scheme has emerged at the right moment. In this article, a highly robust and hybrid watermarking method is proposed. The discrete wavelet transform (DWT) and the singular value decomposition (SVD) as well as iterative blending are adopted in this method to insert and recover the watermark. To enhance the watermark imperceptibility, the second low-level (LL2) coefficients after SVD are modified by using the watermark. Compared with the conventional DWT-SVD-based watermarking method and other watermarking techniques, the watermarked images obtained by the proposed method have higher image quality. In addition, the proposed method achieves high robustness in resisting various image processing attacks.


Entropy ◽  
2020 ◽  
Vol 22 (2) ◽  
pp. 198 ◽  
Author(s):  
Vedran Vukotić ◽  
Vivien Chappelier ◽  
Teddy Furon

Image watermarking is usually decomposed into three steps: (i) a feature vector is extracted from an image; (ii) it is modified to embed the watermark; (iii) and it is projected back into the image space while avoiding the creation of visual artefacts. This feature extraction is usually based on a classical image representation given by the Discrete Wavelet Transform or the Discrete Cosine Transform for instance. These transformations require very accurate synchronisation between the embedding and the detection and usually rely on various registration mechanisms for that purpose. This paper investigates a new family of transformation based on Deep Neural Networks trained with supervision for a classification task. Motivations come from the Computer Vision literature, which has demonstrated the robustness of these features against light geometric distortions. Also, adversarial sample literature provides means to implement the inverse transform needed in the third step above mentioned. As far as zero-bit watermarking is concerned, this paper shows that this approach is feasible as it yields a good quality of the watermarked images and an intrinsic robustness. We also tests more advanced tools from Computer Vision such as aggregation schemes with weak geometry and retraining with a dataset augmented with classical image processing attacks.


Author(s):  
Ghulam Jilani Waqas ◽  
Ishtiaq Ahmad ◽  
Muhammad Kashif Samee ◽  
Muhammad Nasir Khan ◽  
Ali Raza

Digital watermarking is a process of embedding hidden information called watermark into different kinds of media objects. It uses basic modulation, multiplexing and transform techniques of communication for hiding information. Traditional techniques used are least significant bit (LSB) modification, discrete cosine transform (DCT), discrete wavelet transform (DWT), discrete Fourier transform (DFT), code division multiple access (CDMA) or a combination of these. Among these, CDMA is the most robust against different attacks except geometric attacks. This paper proposes a blind and highly robust watermarking technique by utilizing the basis of orthogonal frequency division multiplexing (OFDM) and CDMA communication system. In this scheme, the insertion process starts by taking DFT of host images, permuting the watermark bits in randomized manner and recording them in a seed as a key. Then PSK modulation follows inverse DFT (IDFT) that gives watermark information as OFDM symbols. These symbols are spread using spreading codes and then arithmetically added to the host image. Finally, scheme applies inverse DCT (IDCT) to get watermarked host images. The simulation results of the proposed scheme are compared with CDMA-based scheme in DCT domain. The results show that the robustness of the proposed scheme is higher than the existing scheme for non-geometric attacks.


2018 ◽  
Vol 2 (1) ◽  
Author(s):  
Raid Daoud ◽  
Yaareb Al-Khashab

The internet service is provided by a given number of servers located in the main node of internet service provider (ISP). In some cases; the overload problem was occurred because a demand on a given website goes to very high level. In this paper, a fuzzy logic control (FLC) has proposed to distribute the load into the internet servers by a smart and flexible manner. Three effected parameters are tacked into account as input for FLC: link capacity which has three linguistic variables with Gaussian membership function (MF): (small, medium and big), traffic density with linguistic variables (low, normal and high) and channel latency with linguistic variables (empty, half and full); with one output which is the share server status (single, simple and share). The proposed work has been simulated by using MATLAB 2016a, by building a structure in the Fuzzy toolbox. The results were fixed by two manners: the graphical curves and the numerical tables, the surface response was smoothly changed and translates the well-fixed control system. The numerical results of the control system satisfy the idea of the smart rout for the incoming traffics from the users to internet servers. So, the response of the proposed system for the share of server ratio is 0.122, when the input parameter in the smallest levels; and the ratio is 0.879 when the input parameters are in highest level. The smart work and flexible use for the FLC is the main success solution for most of today systems control.


2018 ◽  
Vol 1 (80) ◽  
Author(s):  
Audrius Gocentas ◽  
Anatoli Landõr ◽  
Aleksandras Kriščiūnas

Research background and hypothesis. Replete schedule of competitions and intense training are features of contemporary team sports. Athletes, especially the most involved ones, may not have enough time to recover. As a consequence, aggregated fatigue can manifest in some undesirable form and affect athlete’s performance and health.Research aim. The aim of this study was to evaluate the changes in heart rate recovery (HRR) and investigate possible relations with sport-specifi c measures of effi cacy in professional basketball players during competition season.Research methods. Eight male high-level basketball players (mean ± SD, body mass, 97.3 ± 11.33 kg; height 2.02 ± 0.067 m, and age 23 ± 3.12 years) were investigated. The same basketball specifi c exercise was replicated several times from September till April during the practice sessions in order to assess the personal trends of HRR. Heart rate monitoring was performed using POLAR TEAM SYSTEM. Investigated athletes were ranked retrospectively according to the total amount of minutes played and the coeffi cients of effi cacy. Research results. There were signifi cant differences in the trends of HRR between the investigated players. The most effective players showed decreasing trends of HRR in all cases of ranking.Discussion and conclusions. Research fi ndings have shown that the quality of heart rate recovery differs between basketball players of the same team and could be associated with sport-specifi c effi cacy and competition playing time.Keywords: adaptation, autonomic control, monitoring training.


Sign in / Sign up

Export Citation Format

Share Document