Multimedia Tools and Applications

, Volume 78, Issue 6, pp 7691–7712 | Cite as

Optimal Secure Information using Digital Watermarking and Fuzzy Rule base

  • Muhammad Tahir Naseem
  • Muhammad Nadeem
  • Ijaz Mansoor Qureshi
  • Ayyaz HussainEmail author


Digital image watermarking is one of the active area of research for data authentication and data hiding. Imperceptibility of the image is the main aspect that confines the amount of information to be embedded in a cover image. In this article, we have proposed a novel block based transform domain technique using Fuzzy Rule Based System (FRBS) that selects an image from sample images that can embed and carry our desired capacity with maximum imperceptibility and robustness. The proposed FRBS is applied in two phases. In first phase, it is used to choose the candidate image blocks and in second phase, it is used to choose the coefficients from the selected candidate blocks for embedding the desired capacity. Some specific images are chosen from the sample images whose total number of coefficients are greater than certain threshold. The selected images are then embedded with the desired capacity and are passed through multiple attacks. PSNR of the watermarked images and correlation of embedded desired capacity is extracted. Finally, the image is selected as a candidate image whose PSNR and correlation is higher than the other images embedded with the same desired capacity. Supremacy of proposed scheme is checked by using different type of images like medical and natural images and the performance is evaluated by comparing with the selected state of the art techniques.


Digital Watermarking Human Visual System (HVS) Fuzzy Rule Based System (FRBS) Local Binary Pattern (LBP) Integer Wavelet Transform (IWT) 



  1. 1.
    Abodena O, Agoyi M, Celebi E (2017) Hybrid Technique for Robust Image Watermarking Using Discrete Time Fourier Transform. Signal Processing and Communications Applications Conference (SIU) AntalyaGoogle Scholar
  2. 2.
    Aliwa MB, El-Tobely TEA, Fahmy MM, Nasr MES, El-Aziz MHA (2010) Fidelity and Robust Digital Watermarking Adaptively Pixel based on Medial Pyramid of Embedding Error Gray Scale Images. IJCSNS 10(6):284Google Scholar
  3. 3.
    Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791CrossRefGoogle Scholar
  4. 4.
    Canny J (1986). A computational approach to edge detection. Pattern Analysis and Machine Intelligence, IEEE Transactions on, (6), 679–698CrossRefGoogle Scholar
  5. 5.
    Chen M, Chen Z, Zeng X, Xiong Z (2009) Reversible image watermarking based on full context prediction. 16th IEEE International Conference on Image Processing (ICIP), (pp. 4253–4256)Google Scholar
  6. 6.
    Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRefGoogle Scholar
  7. 7.
    Foo SW, Dong Q (2010) A Normalization-based Robust Image Watermarking Scheme Using SVD and DCT. World Academy of Science, Engineering and Technology, International Journal of Electrical and Computer EngineeringGoogle Scholar
  8. 8.
    Foriš P, Levický D (2007) Implementations of HVS models in digital image watermarking. J Radio eng 16(1):45–50Google Scholar
  9. 9.
    Haralick RM, Shanmugam K, Dinstein IH (1973) Textural features for image classification. Systems, Man and Cybernetics, IEEE Transactions on, (6), 610–621CrossRefGoogle Scholar
  10. 10.
    Jamali M, Rafiee S, Soroushmehr SM, Karimi N, Shirani S, Najarian K, Samavi S (2017) Adaptive Blind Image Watermarking Using Fuzzy Inference System Based on Human Visual Perception. CoRR, abs/1709.06536 Google Scholar
  11. 11.
    Katzenbeisser S, Petitolas F (2000) Information hiding techniques for steganography and digital watermaking. Artech House Books, NorwoodCrossRefGoogle Scholar
  12. 12.
    Lande PU, Talbar SN, Shinde GN (2010) A Fuzzy logic approach to Encrypted Watermarking for still Images in Wavelet domain on FPGA. Int J Signal Process Image Process Pattern Recogn 3(2):1–9Google Scholar
  13. 13.
    Latif A (2013) An adaptive digital image watermarking scheme using fuzzy logic and tabu search. J Inform Hiding Multimed Signal Process 4(4):250–271Google Scholar
  14. 14.
    Lee C-W, Tsai W-H (2010) A Lossless Data Hiding Method by Histogram Shifting Based on an Adaptive Block Division Scheme. Pattern Recognition and Machine Vision, River Publishers, Aalborg, pp 1–14Google Scholar
  15. 15.
    Miaou SG, Hsu CM, Tsai YS, Chao HM (2000) A secure data hiding technique with heterogeneous data-combining capability for electronic patient records in Engineering in Medicine and Biology Society. Proceedings of the 22nd Annual International Conference of the IEEE (Vol. 1, pp. 280–283)Google Scholar
  16. 16.
    Mohamed Sathik M, Sujatha SS (2010) An improved invisible watermarking technique for image authentication. International Journal of Advanced Science and Technology 24:61–73Google Scholar
  17. 17.
    Mohrekesh M, Azizi S, Shirani S, Karimi N, Samavi S (2017) Hierarchical Watermarking Framework Based on Analysis of Local Complexity Variations. Multimed Tools Appl. CrossRefGoogle Scholar
  18. 18.
    Naseem MT, Qureshi IM, Cheema TA, Rahman A-u (2013) Hash based Medical Image Authentication and Recovery Using Chaos and Residue Number System. J Basic App Sci Res. 3(6):488–495Google Scholar
  19. 19.
    Naseem MT, Qureshi IM, Cheema TA, Zubair M (2012) Invertible and Fragile Watermarking for Medical images Using Residue Number System and Chaos. J Basic App Sci Res 10(2):10643–10651Google Scholar
  20. 20.
    Naseem MT, Qureshi IM, Muzaffar MZ (2014) Novel technique for capacity maximizing in digital watermarking using fuzzy rule base. Journal of Intelligent and Fuzzy SystemsGoogle Scholar
  21. 21.
    Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. Pattern Anal Mach Intell, IEEE Trans 24(7):971–987CrossRefGoogle Scholar
  22. 22.
    Patel RR, Patel DJ (2018) Survey Paper on Digital Image Watermarking, vol. 4, issue. 1, IJARIIEGoogle Scholar
  23. 23.
    Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062–1078CrossRefGoogle Scholar
  24. 24.
    Pietikäinen M (2005) Image Analysis with Local Binary Patterns. In: Kalviainen H., Parkkinen J., Kaarna A. (eds) Image Analysis. SCIA 2005. Lecture Notes in Computer Science, vol 3540. Springer, Berlin, HeidelbergGoogle Scholar
  25. 25.
    Reddy AA, Chatterji BN (2005) A new wavelet based logo-watermarking scheme. Pattern Recogn Lett 26(7):1019–1027CrossRefGoogle Scholar
  26. 26.
    Reddy VP, Varadarajan S (2010) An Effective Wavelet-Based Watermarking Scheme Using Human Visual System for Protecting Copyrights of Digital Images. Int J Comput Electr Eng 2(1):32–40CrossRefGoogle Scholar
  27. 27.
    Ruanaidh JJ, Pun T (1998) Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Process 66(3):303–317CrossRefGoogle Scholar
  28. 28.
    Sharma V, Mann PS (2017) A review on various optimized image watermarking techniques. Int J Comput Appl 162(2):26–30. CrossRefGoogle Scholar
  29. 29.
    Sridevi T, Fatima SS (2013) Digital image watermarking using fuzzy logic approach based on DWT and SVD. Int J Comput Appl 74(13):16–20 CrossRefGoogle Scholar
  30. 30.
    Waleed J, Dong H, Abbas T, Abid S, Hatem H (2014) A survey of digital image watermarking optimization based on nature inspired algorithms NIAs. Int J Secur Appl 8:315–334. CrossRefGoogle Scholar
  31. 31.
    Youssef SM, Abouelfarag A, Ghatwary NM (2012) Adaptive Digital Watermarking Integrating Fuzzy Inference HVS Perceptual Model. World Academy of Science, Engineering and TechnologyGoogle Scholar
  32. 32.
    Yusof Y, Khalifa OO (2007) Digital watermarking for digital images using wavelet transform. In Telecommunications and Malaysia International Conference on Communications, 2007. ICT-MICC 2007. IEEE International Conference on (pp. 665–669). IEEEGoogle Scholar
  33. 33.
    Zhang XD, Feng J, Lo KT (2003) Image watermarking using tree-based spatial-frequency feature of wavelet transform. J Vis Commun Image Represent 14(4):474–491CrossRefGoogle Scholar
  34. 34.
    Zhang Y (2009) Blind watermark algorithm based on HVS and RBF neural network in DWT domain. WSEAS Trans Comput 8(1):174–183Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Muhammad Tahir Naseem
    • 1
  • Muhammad Nadeem
    • 2
  • Ijaz Mansoor Qureshi
    • 3
  • Ayyaz Hussain
    • 2
    Email author
  1. 1.Riphah International UniversityLahorePakistan
  2. 2.International Islamic UniversityIslamabadPakistan
  3. 3.Air UniversityIslamabadPakistan

Personalised recommendations