Fuzzy Inference Rule Based Reversible Watermarking for Digital Images

  • Ruchira Naskar
  • Rajat Subhra Chakraborty
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7671)


The last couple of decades have seen rapid growth of research interest in the field of reversible watermarking of multimedia data. The primary aim of reversible watermarking is to restore the original cover data content, with zero residual distortion, after watermark extraction. Such a feature is desirable in industries dealing with highly sensitive data, e.g. in military, medical and legal industries. In this paper we propose a reversible watermarking algorithm for grayscale images, based on fuzzy inference mechanism based pixel prediction method. We apply a thresholding technique on the prediction errors to embed the watermark bits. Our experimental results show that the quality of the watermarked cover data, produced by the proposed method, is considerably high compared to the other state–of–the–art schemes.


Digital watermarking fuzzy inference rules pixel correlation pixel prediction reversible watermarking 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann Publishers (2008)Google Scholar
  2. 2.
    Feng, J.B., Lin, I.C., Tsai, C.S., Chu, Y.P.: Reversible watermarking: current status and key issues. International Journal of Network Security 2(3), 161–171 (2006)Google Scholar
  3. 3.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Transactions on Circuits Systems and Video Technology 13(8), 890–896 (2003)CrossRefGoogle Scholar
  4. 4.
    Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security 5(1), 187–193 (2010)CrossRefGoogle Scholar
  5. 5.
    Kim, K.S., Lee, M.J., Lee, H.Y., Lee, H.K.: Reversible data hiding exploiting spatial correlation between sub–sampled images. Pattern Recognition 42(11), 3083–3096 (2009)zbMATHCrossRefGoogle Scholar
  6. 6.
    Lin, C.C., Hsueh, N.L.: A lossless data hiding scheme based on three-pixel block differences. Pattern Recognition 41(4), 1415–1425 (2008)zbMATHCrossRefGoogle Scholar
  7. 7.
    Bezdek, J.C., Keller, J.M., Krishnapuram, R., Pal, N.R.: Fuzzy Models and Algorithms for Pattern Recognition and Image Processing. Kluwer, Boston (1999)zbMATHGoogle Scholar
  8. 8.
    Maity, S.P., Maity, S.: Multistage Spread Spectrum Watermark Detection Technique using Fuzzy Logic. IEEE Signal Processing Letters 16(4), 245–248 (2009)CrossRefGoogle Scholar
  9. 9.
    Tamane, S.C., Manza, R.R., Deshmukh, R.R.: 3D Models Watermarking using Fuzzy Logic. In: IEEE 2009 International Conference on Advances in Computing, Control and Telecommunication Technologies, pp. 195–197 (December 2009)Google Scholar
  10. 10.
    Queslati, S., Cherif, A., Solaiman, B.: A Fuzzy Watermarking System using the Wavelet Technique for Medical Images. International Journal of Research and Reviews in Computing Engineering 1(1), 43–48 (2011)Google Scholar
  11. 11.
    Russo, F.: Recent advances in fuzzy techniques for image enhancement. IEEE Transactions on Instrumentation and Measurement 47(6), 1428–1434 (1998)CrossRefGoogle Scholar
  12. 12.
    Russo, F.: Fire operators for image processing. Fuzzy Sets Syst. 103(2), 265–275 (1999)CrossRefGoogle Scholar
  13. 13.
    Lee, C.S., Kuo, Y.H.: Adaptive Fuzzy Filter and Its Application to Image Enhancement. In: Kerre, E.E., Nachtegael, M. (eds.) Fuzzy Techniques in Image Processing. STUDFUZZ, vol. 52, pp. 172–193. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  14. 14.
    Bloch, I.: Fuzzy spatial relationships for image processing and interpretation: a review. Image Vision Comput. 23(2), 89–110 (2005)CrossRefGoogle Scholar
  15. 15.
    Bhaskaran, V., Konstantinides, K.: Image and Video Compression Standards: Algorithms and Applications, 2nd edn. Kluwer, Norwell (1995)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Ruchira Naskar
    • 1
  • Rajat Subhra Chakraborty
    • 1
  1. 1.Department of Computer Science and EngineeringIndian Institute of TechnologyKharagpurIndia

Personalised recommendations