1. SHARBANI BHATTACHARYA
Fuzzy Logic in
Watermarking System
Gyanodaya 2014
IEC-College of Engineering & Technology, Greater Noida
29th March 2014
2. WATERMARK AND NATURAL CALAMITY
The natural calamity and disaster
management are often predicted by pictures
taken from satellite from space shuttle.
Terrorist can tamper the image and can given
altogether different image which depicts
different view.
So, image is required to be watermarked
properly to be used for any kind of
judgement..
10. Watermarki
ng text
Encrypte
d Text
Conve
rt to
byte
code
Byte
Code of
Digital
Image
Watermarked
Digital Image
Extracte
d Byte
Code
Covert
to Text
file
Decryptio
n
Algorithm
Watermarking
Text
11. ENCRYPTION
Cryptography is art of converting an
message into cipher text and sent to the
destination. The authorized person can
decipher the text and retrieve the original
message.
12. FUZZY LOGIC
It is logic developed by Loft Zadeh in 1965 at
University of California. It is the logic with
which unprecise data can be captured to
form a set.
13. FUZZIFICATION
Fuzzy set are acquired from Crisp Set using
membership function. This process is known
as fuzzification.
17. FUZZY SET WATERMARKING CRITERIA
FRobustness is Fuzzy set for Robustness criteria
FVisual Quality for Visual Quality
FEmbedding Capacity Information Embedding
Capacity
20. FACTOR EFFECTING ROBUSTNESS
1. Visibile (Vis)
2. Invisible(NVis)
3. Blind(BL)
4. Non-Blind(NBL)
5. Medical Image(Mimg)
6. Non-Medical Image(Nimg)
7. Cryptography (Cryp)
8. Non-Crypotographic (Ncryp)
9. RSA Algo used(RSA)
10. DES Algo used (DES)
11. AES Algo used (AES)
12. New Algo used (Jnew)
13. Watermarking Method using Fuzzy logic(WMF)
14. Watermarking Method using Genetic Algorithm(WMGA)
15. Watermarking Method using Fuzzy-Genetic algo(WMFGA)
16. Fuzzy set for Robust Watermarking Scheme I
17. Fuzzy set for Semi Fragile Watermarking Scheme (SFr)
18. Fuzzy set for Fragile Watermarking Scheme (Fr)
19. Fuzzy set for Watermarking Method(WM)
20. Fuzzy set for Robustness (FRobustness)
21. STEPS FOR WATERMARKING SYSTEM
DESIGN
Taking all the factors on which robustness of
watermarking scheme depends as crisp set.
This crisp set is converted to fuzzy sets.
This fuzzy sets are then used to design the
front-end of the Watermarking System.
Converting crisp set to fuzzy set is called
fuzzification.
These, fuzzy set elements are then put to their
respective places and positions in the user-
friendly front-end according to their membership
functions.
22. FUZZY SETS OF WATERMARKING
SYSTEM
We are defining the following fuzzy sets.
FRobustness =[ (R,0.8), (Fr, 0.2), (SFr,0.4)]
WM =[ (WMF, 0.5) , (WMGA, 0.4),( WMFGA,0.8)]
FCryp = [ (RSA,0.8) , (DES,0.6),(AES,0.4),
(Jnew,0.2)]
Fr=[ (Vis,0.8) , (BL,0.9), (Ncryp,0.9)]
SFr=[ (Vis,0.4),(BL,0.6), (Cryp,0.6)]
R=[(NBL,0.8) , (Cryp,0.8) ,(Nvis,0.9) ,(WM,0.4)]
24. ROBUST TAB HAS
1. Invisibility
2.Cryptography
3.Non-Blind
4.Watermarking method i.e.
-Fuzzy or GA or Fuzzy-Genetic etc.
25.
26. FRONT-END ARCHITECTURE
Using fuzzy sets in front-end architecture can
give more user-friendly interface. The user
can see the values of each factors in
percentage. This is defuzzification of fuzzy
set into crisp set.
27. FRONT-END ARCHITECTURE
The architecture is designed on the fuzzy
rules and user can understand the impact of
the changes with its effects of factors in
percentage given in the text box below a
drop down box.
28. CONCLUSION
The above method is applicable to all kind of
software architecture. As the complexity
increases the fuzzy rules can make design
easier.