Professional Documents
Culture Documents
Watermarking Digital Images Using Fuzzy Matrix Compositions and (α,β) - Cut of Fuzzy Set
Watermarking Digital Images Using Fuzzy Matrix Compositions and (α,β) - Cut of Fuzzy Set
Watermarking Digital Images Using Fuzzy Matrix Compositions and (α,β) - Cut of Fuzzy Set
net/publication/271198521
CITATIONS READS
4 296
1 author:
Sharbani Bhattacharya
IEC Group of Institutions
27 PUBLICATIONS 40 CITATIONS
SEE PROFILE
All content following this page was uploaded by Sharbani Bhattacharya on 22 January 2015.
in original and watermarking image. Using hash code and this method is resistant to geometric attacks, noise attacks
hash file for watermarking can be used in videos where and compression attacks it desirable to be added in videos
each image is watermarked and then compressed. Since, and films as watermark.
Table 1Hash Table
Character K1 Positions K2 ASCII Code K3 K4 Hash value K5
R=0.8 K3=(meanA+K5)/0.8 K4=K3 * 0.8 K5=K4-meanR
D 1 068 54.4 -27.72
o 2,5 111 88.5 6.38
n 4,22 110 88 5.88
t 6,9,14,19,25 116 92.8 10.68
e 8,24 101 80.8 -1.32
c 10 099 79.2 -2.92
r 11,23 114 91.2 9.08
S= 0.91 K3=(meanB+K5)/0.91 K4 =K3 * 0.91 K5=K4-meanS
y 12 121 110.11 24.34
p 13 112 101.92 15.43
j 16 106 96.46 10.69
u 17 117 106.47 20.7
s 18,23 115 104.65 18.88
i 21 105 95.55 9.78
blank 3,7,15,20 32 29.12 -56.65
. 26 46 41.86 -43.91
Computer Applications (0975 – 8887) Volume 74– [15] Sameh Oueslati, Adnane Cherif & Basel Solaiman,
No.13, July . (2010), “A Fuzzy Watermarking Approach Based
on the Human Visual System”, page 218,
[6] Chuntao WangJiangqun Ni,and Jiwu, (2012), “An
International Journal Of Image Processing (IJIP),
Informed Watermarking Scheme Using Hidden
Vol (4): Issue (3).
Markov Model in the Wavelet Domain”
Huang,Page853, IEEE Transactions On [16] Anandabrata Pal and Nasir Memon, (2009),
Information Forensics And Security, Vol. 7, No. 3, “Evolution of File Carving”, ,Page 59, IEEE Signal
June. Processing Magazine,March .
[7] Anderson Rocha, Walter Scheirer and Terrance [17] Chun-Hsiang Huang,Shang-Chih Chuang, Yen-Lin
Boult, Siome Goldenstein, (2011),“Vision of the Huang, and Ja-Ling Wu,(2009),“Unseen Visible
Unseen: Current Trends and Challenges in Digital Watermarking: A Novel Methodology for Auxiliary
Image and Video Forensics” ACM Computing Information Delivery via Visual Contents”,
Surveys, Vol. 43, No. 4, Article 26, Publication Page193, IEEE Transactions On Information
date: October . Forensics And Security, Vol. 4, No. 2, June.
[8] Manjit Thapa ,Dr. Sandeep Kumar Sood ,A.P [18] Alain Tr ´emeau,Shoji Tominaga and Konstantinos
Meenakshi Sharma, (2011),“Digital Image N. Plataniotis, (2008),Review Article “Color in
Watermarking Technique Based on Different Image and Video Processing: Most Recent
Attacks”, (IJACSA) International Journal of Trendsand Future Research Directions”, Hindawi
Advanced Computer Science and Applications, Publishing Corporation EURASIP Journal on
Vol. 2, No. 4. Image and Video Processing Volume Article ID
581371, 26 pages ,doi:10.1155/2008/581371.
[9] Jen-Sheng Tsai, Win-Bin Huang, and Yau-Hwang
Kuo,(2011), “On the Selection of Optimal Feature [19] S. P. Mohanty, O. B. Adamo, and E. Kougianos,
Region Set for Robust Digital Image (2007),"VLSI Architecture of an Invisible
Watermarking” , page 735, IEEE Transactions On Watermarking Unit for a Biometric-Based Security
Image Processing, Vol. 20, No. 3, March. System in a Digital Camera", in Proceedings of the
25th IEEE International Conference on Consumer
[10] Mohammad Ali Akhaee,Sayed Mohammad
Electronics (ICCE), pp. 485-486.
Ebrahim Sahraeian, and Craig Jin,(2011), “Blind
Image Watermarking Using a Sample Projection [20] Dong Zheng, Yan Liu, Jiying Zhao, And
Approach” Page 883, IEEE Transactions On Abdulmotaleb El Saddik, (2007),“A Survey of RST
Information Forensics And Security, Vol. 6, No. 3, Invariant Image Watermarking
September. Algorithms”,University of Ottawa, ACM
Computing Surveys, Vol. 39, No. 2, Article 5,
[11] G. Fahmy,M. F. Fahmy and U. S.Mohammed,
Publication date: June.
(2010),Research Article “Nonblind and Quasiblind
Natural PreserveTransformWatermarking”Hindawi [21] Franco Frattolillo, (2007), “Watermarking Protocol
Publishing Corporation EURASIP Journal on for Web Context” ,Page 350, IEEE Transactions On
Advances in Signal Processing,Vol, Article ID Information Forensics And Security, Vol. 2, No. 3,
452548, 13 pages doi:10.1155/2010/452548. September .
[12] Roberto Caldelli, Francesco Filippini, and Rudy [22] David J. Coumou, Athimoottil Mathew,“A Fuzzy
Becarelli,(2010) Review Article “Reversible Logic Approach To Digital Image Watermarking”
Watermarking Techniques:An Overview and a ,Rochester Institute of Technology.
Classification” , Hindawi Publishing Corporation
[23] Farid, “Digital Image Forensic”
EURASIP Journal on Information Security ,Vol ,
farid@cs.dartmouth.edu
Article ID 134546, 19 pages
,www.cs.dartmouth.edu/farid.
,doi:10.1155/2010/134546.
[24] Yuan and Xiao-Ping Zhang, (2006), “Multiscale
[13] Sameh Oueslati and Adnane Cherif and Bassel
Fragile Watermarking Based on the Gaussian
Solaiman, (2010),“Maximizing Strength of Digital
Mixture Model” Page 3189, IEEE Transactions On
Watermarks Using Fuzzy Logic”, Signal & Image
Image Processing, Vol. 15, No. 10, October .
Processing : An International Journal(SIPIJ) Vol.1,
No.2, December . [25] Chin-Laung Lei, Pei-Ling Yu, Pan-Lung Tsai, and
Ming-Hwa Chan, (2004),“An Efficient and
[14] Pankaj U.Lande ,Sanjay N. Talbar ,G.N. Shinde,
Anonymous Buyer-Seller Watermarking
(2010),“Robust Image Adaptive Watermarking
Protocol”,Page 1618, IEEE Transactions On Image
Using Fuzzy Logic An FPGA Approach”,
Processing, Vol. 13, No. 12, December .
International Journal of Signal Processing, Image
Processing and Pattern Recognition ,Vol. 3, No. 4, [26] Nebu John Mathai, Deepa Kundurand Ali
December. Sheikholeslami,(2003), “Hardware Implementation
Perspectives of Digital Video Watermarking [40] E. C. C. Tsang, Changzhong Wang, Degang Chen,
Algorithms”, Page 925, IEEE Transactions On Congxin Wu and Qinghua Hu, “Communication
Signal Processing, Vol. 51, No. 4, April. Between Information Systems Using Fuzzy Rough
Sets”, IEEE Transactions On Fuzzy Systems, Vol.
[27] Rakesh Agrawal, Peter J. Haas, Jerry
21, No. 3, June 2013, Page 527.
Kiernan,(2003),“Watermarking relational data:
framework, algorithms and analysis” , The VLDB [41] Teresa Garcia-Valverde, Alberto Garcia-Sola, Hani
Journal 12: 157–169 / Digital Object Identifier Hagras, James A. Dooley,Victor Callaghan and
(DOI) 10.1007/s00778-003-0097-x. Juan A. Botia, “A Fuzzy Logic-Based System for
Indoor Localization Using WiFi in Ambient
[28] Fawad Ahmed, Farook Sattar, Mohammed Yakoob
Intelligent Environments”, IEEE Transactions On
Siyal, and Dan Yu, (2006),“A Secure
Fuzzy System, Vol. 21, No. 4, August 2013, Page
Watermarking Scheme for Buyer-Seller
702.
Identification and Copyright Protection” , Hindawi
Publishing Corporation EURASIP Journal on [42] Hooman Tahayori, Alireza Sadeghian and Witold
Applied Signal Processing Volume, Article ID Pedrycz, “Induction of Shadowed Sets Based on
56904, Pages 1–15 ,DOI 10.1155/ASP/2006/56904. the Gradual Grade of Fuzziness”, ”, IEEE
Transactions On Fuzzy System, Vol. 21, No. 5,
[29] Ravi,K, Sharma, Steve Decker, (2002),“Practical
October 2013,Page 937.
Challenges for Digital Watermarking
Applications”, EURASIP Journal on Applied Signal [43] S.P.Tiwari and Arun K.Srivastava,“Fuzzy rough
Processing 2002:2, 133–139 © 2002 Hindawi sets,fuzzy preorders and fuzzy topologies”,
Publishing Corporation. Elsevier, Fuzzy Sets and Systems, Vol. 210
,2013,Page 63.
[30] A. Menezes, P. van Oorschot, and S. Vanstone,
“Handbook of Applied Cryptography”, CRC Press, [44] Dong Zheng, Yan Liu, Jiyang Zhao, and
1996. Abdulmotelab El Sadikk , “A Survey of RST
Invariant Image Watermarking Algorithms” ,
[31] An Introduction to Cryptography, 1999 Network
,University of Ottawa ACM Computing Surveys”,
Associates, Inc. and its Affiliated Companies.
Vol. 39, No. 2, Article 5, Publication date: June
[32] Glenn Durfee, PhD thesis “Cryptanalysis Of RSA 2007.
Using Algebraic And Lattice Methods”, June 2002,
[45] Sameh Oueslati, Adnane Cherif and Basel
Stanford University.
Solaiman, “A Fuzzy Watermarking Approach
[33] Alina Mihaela Oprea ,“Efficient Cryptographic Based on the Human Visual System”, page 218,
Techniques for Securing Storage Systems” CMU- International Journal Of Image Processing, Volume
CS-07-119April 2007, PhD thesis, School of (4): Issue (3). 2010.
Computer Science Carnegie Mellon University
[46] Anderson Rocha, Walter Scheirer and Terrance
,Pittsburgh, PA 15213.
Boult, Siome Goldenstein,“Vision of the Unseen:
[34] Shafi Goldwasser, Mihir Bellare,“Lecture Notes on Current Trends and Challenges in Digital Image
Cryptography”, MIT,July 2008. and Video Forensics” ACM Computing Surveys,
Vol. 43, No. 4, Article 26, Publication date:
[35] Whitefiled Diffie and Martin E. Hellman ,
October 2011.
“Multiuser Cryptographic Techniques*” , Stanford
University Stanford, California. [47] Chuntao WangJiangqun Ni,and Jiwu, “An Informed
Watermarking Scheme Using Hidden Markov
[36] Kenneth W. Dam and Herbert S. Lin,
Model in the Wavelet Domain” Huang,IEEE
“Cryptography's Role in Securing the Information
Transactions On Information Forensics And
Society”, Editors, Committee to Study National
Security, Vol. 7, No. 3, June 2012 , Page853.
Cryptography Policy, National Research Council.
[48] J. C. Kelkboom, Jeroen Breebaart, Ileana Buhan,
[37] Harvey Cohn, “Advanced Number Theory”, and Raymond N. J.Veldhuis, “Maximum Key Size
Distinguished Professor, City University New
and Classification Performance of Fuzzy
York.
Commitment for Gaussian Modeled Biometric
[38] Rethinking Public Key Infrastructures and Digital Sources” IEEE Transaction On Information
Certificates, Rethinking Public Key Infrastructures Forensic and Security, Vol. 7, No. 4, August 2012
and Digital Certificates, MIT PressR. Page No. 122.
[39] Xinyuan Wang and Douglas S. Reeves “Robust [49] Peyman Rahmati, Andy Adler and Thomas Tran ,
Correlation of Encrypted Attack Traffic Through “ Watermarking in E-commerce”, International
Stepping Stones By Watermarking The Interpacket Journal of Advanced Computer Science and
Timing”, Dept. of Computer Science ,North Applications, Vol. 4, No. 6, 2013.
Carolina State University, Raleigh, NC 27695.
[50] T.Sridevi and S Sameena Fatima,“Digital Image Sciences and Applications, Vol. 1, No. 3,
Watermarking using Fuzzy Logic approach based September 2011.
on DWT and SVD”, International Journal of
[62] Sharbani Bhattacharya , “Watermarking Digital
Computer Applications ,Vol 74– No.13, July 2013.
Images Using Fuzzy Matrix Compositions and
[51] Mriganka Gogoi , H.M.Khalid Raihan Bhuyan Fuzzy Max-n-Min Set”, accepted in International
,Koushik Mahanta , Dibya Jyoti Das and Ankita Journal of Advanced Computing, Recent Science
Dutta, “ Image and Video based double watermark Publications, United Kingdom. ISSN Number :
extraction spread spectrum watermarking in low 2051-0845 assigned by The British Library, UK.
variance region”, International Journal of Advanced
[63] Sharbani Bhattacharya , “Watermarking Digital
Computer Science and Applications, Vol. 4, No. 6,
Images Using Fuzzy Matrix Rules and
July 2013.
Neighborhood Set”, accepted in International
[52] Alimohammad Latif, “ An Adaptive Digital Image Journal of Advanced Computing, Recent Science
Watermarking Scheme using Fuzzy Logic and Tabu Publications, United Kingdom. ISSN Number :
Search”, Journal of Information Hiding and 2051-0845 assigned by The British Library, UK.
Multimedia Signal Processing, Volume 4, Number
4, October 2013.
[53] Elzbieta Zielinska, Wojciech Mazurczyk and
Krzysztof Szczypiorski, “Trends in
Steganography”, Communication of ACM, Vol 57
,No. 3, March 2014.
[54] Nikolaos V. Boulgouris,Ioannis
Kompatsiaris,(2002),“Segmentation and Content-
Based Watermarking for Color Image and Image
Region Indexing and Retrieval” EURASIP Journal
on Applied Signal Processing 2002:4, 418–431.
[55] Prayoth Kumsawat, Kitti Attakitmongcol, and
Arthit Srikaew, (2005), “A New Approach for
Optimization in Image Watermarking by Using
Genetic Algorithms” page 4707, IEEE
Transactions On Signal Processing, Vol. 53, No. 12,
December.
[56] Pik Wah Chan,Michael R.lyu and Roland T. Chin,
(2005), “A Novel scheme For Hybrid Digital
VideoWatermarking : Approach, Evaluation And
Experimentation”, IEEE Transactions on circuits
and system for video technology,Vol 15,No.
12,Dec.
[57] Juan R.Hernandez,Martin Amado,Fernando Perez-
Gonzalez, (2000),”DCT Domain watermarking
technique for still Image :Detectors Performance
analysis and New Structure”, IEEE Transaction on
Image processing,Vol.9,No.1,January.
[58] L.T. Brown ,(2006) “Computer Evidence and
Collection Preservtation and Preservation” ,
Thomson/Delmar Learning. Published by Charles
River Media, Inc.
[59] Stefan Katzenbeisser and Fabien A.P. Petitcolas
,“Information hiding techniques for steganography
and digital watermarking’, Archtech House Inc.
[60] Peter Wayner,“Disaapearing Cryptograpy-
Information hidind, steganography and
watermarking” , Published by Elsevier Inc.
[61] P.K. Sharma, “(α, β) – cut of Intuitionistic Fuzzy
Module”, International Journal of Mathematical