Abstract
We present a fragile colour image watermarking based on the greatest solution of a bilinear fuzzy relation equation. The original image is coded with fuzzy transforms and divided in sub-images of sizes 2 × 2 called blocks. The watermark is applied on these blocks. A pre-processing phase is used to determine the best compression rate for the coding process. We test this scheme in tamper detection analysis on a sample of colour images of different sizes. Comparisons with various block-based fragile watermarking methods are presented as well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ansari, I.A., Pant, M., Ahn, C.W.: SVD based fragile watermarking scheme for tamper localization and self-recovery. J. Mach. Learn. Cybern. 7, 1225–1239 (2016). https://doi.org/10.1007/s1304201504551
Al-Otum, H.A., Al-Taba’a, A.O.: Adaptive color image watermarking based on a modified improved pixel-wise masking technique. Comput. Electr. Eng. 5, 673–695 (2009)
Barni, M.: Improved wavelet-based watermarking through pixel-wise making. IEEE Trans. Image Process. 10(5), 783–791 (2002). https://doi.org/10.1109/83.918570
Chang, Y.F., Tai, W.L.: A block-based watermarking scheme for image tamper detection and self-recovery. OPTO−Electron. Rev. 21(2), 182–190 (2013). https://doi.org/10.2478/s1177201300884
Chen, W.C., Wang, M.S.: A fuzzy C-means clustering-based fragile watermarking scheme for image authentication. Expert Syst. Appl. 36, 1300–1307 (2009). https://doi.org/10.1016/j.eswa.2007.11.018
Cox, I.J., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Stenography, 2nd edn. Morgan Kaufmann, New York (2007). ISBN 0123725852
Di Martino, F., Sessa, S.: Digital watermarking in coding/decoding processes with fuzzy relation equations. Soft. Comput. 10, 238–243 (2006). https://doi.org/10.1007/s0050000504779
Di Martino, F., Sessa, S.: Digital Watermarking Strings with Images Compressed by Fuzzy Relation Equations. In: Chatterjee, A., Siarry, P. (eds.) Computational Intelligence in Image Processing. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-30621-1_9
Di Martino, F., Sessa, S.: Fragile watermarking tamper detection with images compressed by fuzzy transform. Inf. Sci. 195, 62–90 (2012). https://doi.org/10.1016/j.ins.2012.01.014
Di Martino, F., Sessa, S.: Comparison between images via bilinear fuzzy relation equations. J. Ambient Intell. Humaniz. Comput. (2017). https://doi.org/10.1007/s1265201705763
Hirota, K., Pedrycz, W.: Data compression with fuzzy relational equations. Fuzzy Sets Syst. 126(3), 325–335 (2002). https://doi.org/10.1016/S01650114(01)000094
Li, J.X.: A new algorithm for the greatest solution of fuzzy bilinear equations. Fuzzy Sets Syst. 46, 193–210 (1992). https://doi.org/10.1016/0165-0114(92)90132N
MeenakshiDevi, P., Venkatesan, M., Duraiswamy, K.: Fragile watermarking scheme for image authentication with tamper localization using integer wavelet transform. J. Comput. Sci. 5(11), 831–837 (2009). https://doi.org/10.3844/jcssp.2009.831.837
Nobuhara, H., Pedrycz, W., Hirota, K.: A digital watermarking algorithm using image compression method based on fuzzy relational equations. In: Proceedings of FUZZ-IEEE 2002, vol. 2, pp. 1568–1573. IEEE Press, New York (2002). https://doi.org/10.1109/fuzz.2002.1006740
Perfilieva, I.: Fuzzy transforms. Fuzzy Sets Syst. 157(8), 993–1023 (2006). https://doi.org/10.1016/j.fss.2005.11.012
Qin, C., Ji, P., Zhang, X., Dong, J., Wang, J.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138, 280–293 (2017). https://doi.org/10.1016/j.sigpro.2017.03.033
Shih, F.Y.: Digital Watermarking and Steganography: Fundamentals and Techniques. CRC Press, Boca Raton (2007). ISBN 9781420047578
Singh, D., Singh, S.K.: DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed. Tools Appl. 76, 953–977 (2017). https://doi.org/10.1007/s110420153010x
Tong, X., Liu, Y., Zhang, M., Chen, Y.: A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process.: Image Commun. 28, 301–308 (2013). https://doi.org/10.1016/j.image.2012.12.003
Walton, S.: Information authentication for a slippery new age. Dr. Dobbs J. 20(4), 18–26 (1995)
Funding
This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Di Martino, F., Sessa, S. (2018). A Fragile Watermarking and Bilinear Fuzzy Equations. In: Castiglione, A., Pop, F., Ficco, M., Palmieri, F. (eds) Cyberspace Safety and Security. CSS 2018. Lecture Notes in Computer Science(), vol 11161. Springer, Cham. https://doi.org/10.1007/978-3-030-01689-0_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-01689-0_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01688-3
Online ISBN: 978-3-030-01689-0
eBook Packages: Computer ScienceComputer Science (R0)