SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 233
Fuzzy Logic based watermarking using non – blind HVS technique
M Suneetha1, K Meenakshi2,
1Assistant Professor, Department of ECE, GRIET, Hyderabad, India
2Assistant Professor, Department of ECE, GRIET, Hyderabad, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - This article proposes a non-blindwater-marking
based on Human Visual System (HVS) and Fuzzy Inference
System (FIS) with Discrete Cosine transform(DCT). Theimage
transformed is segmented into 8 × 8 non over-lapping blocks
and for each block parameters such as contrast sensitivity,
luminous sensitivity, edge sensitivity, number of on pixels and
number of regions are designed and are fed to FIS. The output
of fuzzy system is a single value whichgivesacontinuousvalue
of analogous to each DCT coincident. A binary watermark is
set in the original image based on perpetual weight
premeditated through FIS. Therobustnessofproposedmethod
is examined by subjecting watermarked image to several
attacks. It is institute that fuzzy based watermarkingachieves
high imperceptibility and robustness to attacks.
Key Words: HVS, FIS, DCT
1.INTRODUCTION
With the increase in the availability of digital data
over internet, the images so distributed can be copied
repeatedly with or without error, putting the rights of
owner at risk. One way to arrest illegalduplicationisto
in-sert owner’s identity known as watermark into
potentially vulnerable images so that watermarks are
inseparable from the images itself. The important
requirements of watermarking [1] are centered on
three main issues -These are imperceptible quality of
watermarked and attacked images, robustness and
embedding capacity. Among these the former two
parameters are important and these are found to be
mutually conflicting. Because of this water-marking
may be perceived as anoptimizationproblemtoobtain
robust embedding and extraction scheme. This paper
addresses the problem by constructing fuzzy perpet-
ual masks. Human Visual System is the ultimate
receiver of most processed images. Incorporating. Just
Noticeable Difference(JND)providesameanstomodel
perpetual redundancy that is the maximum distortion
which cannot be perceived by human eye. In [6]-[8]
JND thresholds are computed based on background
luminance adaption and spatial contrast masking. In
[2] a more accurate JND map is deduced considering
the overlapping effect between luminousadaptionand
spatial contrast masking. But the drawback of the
scheme is it does not consider contrast sensitivity
function.A brief introduction of fuzzy logic is provided
in section II. Proposed watermark embeding and
extraction algorithms are presented in section III.
Simulation results are presented in section IV.
Conclusions are provided is in section V
2. FUZZY LOGIC
Fuzzy logic provides a means for incorporating
human knowledge in the solution of problems whose
formulation is based on vague concepts [1]. FIS is used
to map a given input to output based on fuzzy logic.
Unlike crisp sets, fuzzy sets are having infinite valued
membership functions. The mapping then provides a
framework for interpreting the data from which
decisions can be made.
Principles of Fuzzy set theory: Let Z is a set of
elements with element of Z denoted by z. This set is
called Universe of Discourse. A fuzzy set A in Z is
denoted by µA(Z) that associates each element with an
interval between [0, 1].Therefore a fuzzy set is an
ordered pair consists of values of z and a membership
function that assigns a grade of membership to each z.
The FIS has the following blocks as given in Ref.
[2].
• Fuzzification: for eachscalarinput,findthecorre-
sponding fuzzy values bymapping the input to the
interval [0, 1], using applicable rules defined in
rule editor.
• Apply an implication method: It is way to use
inputs and the knowledge base represented by if-
then rules to creates the output of system. This
process is known as implication or inference.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 234
• Defuzzification;Finalstepisconvertingfuzzyout-
put to crisp output by computing the center of
gravity of aggregated fuzzy set.
Pn
v0 = i=1 iQ(i)
(1)
Pn
i=1 i
3. PROPOSED ALGORITHM
The proposed watermarking is a non-blind
watermark-ing based on Fuzzy logic. The input
parametersfedtoFISarecontrastsensitivity,luminous
sensitivity,edgesensitivity,numberofobjects,Number
of active pixels.
3.1. WATERMARK EMBEDDING ALGORITHM
The watermark concealing algorithm is given in
the following steps in fig.1:
1) Take original image of size 256 ×256istakenand
segment it into 8 × 8 blocks and compute number
of on pixels and number of regionsandapplyDCT
and compute luminous sensitivity, edge
sensitivity and contrast sensitivity.
a) Luminous sensitivity : If the background is
brighter, more information can be hidden in
original image [3] without noticing distortion.
Luminous sensitivity is measure of brightness of
back ground. In eachblockthefirstelement(0,0)
represent DC component of block and XDCM is the
mean of all D.C. coefficients of 8 × 8. It is defined
in Eqn.2.
Luminous sensitivity =
XDC,i
(2)
XDCM
b) Contrast sensitivity: Watermark embedded in
textured region is harder to notice compared to
smooth regions. The contrast sensitivity is
measured by computing variance in each block
using the matlab command “statxure ”. Where
image_seg is 8 × 8 block of image and C is the
second element of 7 row vectorgeneratedbythis
command.This parameter is obtained by Eqn 3
C = statxture(image_seg) (3)
c) Edge sensitivity: Watermark embedded in edge
regions are harder to perceive compared to
smoother region. The edges are detected by matlab
command
j = graythresh(image_seg) (4)
d) Number of on pixels: In Ref. [5] a pixel is said to be
active if it has intensity less than mean value by a
factor of where K(σ) where σ is taken 1.2.
e) Number of Regions: In Ref [5] it is calculated by
converting image into binary image and count-ing
the number of regions of connected pixels.
Rules used in Fuzzy inference system
i) If (luminous sensitivity is dark) and (contrast
sensitivity is low) and (edge sensitivity is small)
then (weight is least) (1)
ii) If (luminous sensitivity is dark) and (contrast
sensitivity is medium) and (edge sensitivity is
low) then (weight is least) (1)
iii) If (luminous sensitivity is dark) and (contrast
sensitivity is high) and (edge sensitivity is low)
then (weight is least) (1)
iv) If (luminous sensitivity is medium) and (con-
trast sensitivity is low) and (edge sensitivity is
low) then (weight is least) (1)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 235
v) If (luminous sensitivity is medium) and (con-
trast sensitivity is medium) and (edge sensitiv-
ity is low) then (weight is least) (1)
vi) If (luminous sensitivity is medium) and (con-
trast sensitivity is high) and (edge sensitivity is
low) then (weight is least) (1)
vii) If (luminous sensitivity is bright) and (contrast
sensitivity is low) and (edge sensitivity is low)
then (weight is least) (1)
viii) If (luminous sensitivity is bright) and (contrast
sensitivity is medium) and (edge sensitivity is
low) then (weight is least) (1)
ix) If (luminous sensitivity is bright) and (contrast
sensitivity is high) and (edge sensitivity is low
then (weight is least) (1)
x) If (luminous sensitivity is dark) and (con-trast
sensitivity is low) and (edge sensitivity is
medium) and (Number of active pixels is low)
and (number of objects is high) then (weight is
less.)
xi) If (luminous sensitivity is dark) and (contrast
sensitivity is high) and (edge sensitivity is
medium) and (Number of on pixels is low) and
((number of regions is high) then (weight is
Higher) (1)
xii) If (luminous sensitivity is dark) and (contrast
sensitivity is medium) and (edge sensitivity is
medium) and (Number ofonpixelsislowislow)
and (number of regions is high) then (weight is
Higher) (1)
xiii) If (luminous sensitivity is medium) and (con-
trast sensitivity is low) and (edge sensitivity is
medium) and (Number of on pixels is low) and
((number of regions is high) then (weight is
less) (1)
xiv) If (luminous sensitivity is medium) and (con-
trast sensitivity is medium) and (edge sensi-
tivity is medium) and (Number of on pixels is
high) and ((number of regions is low) then
(weight is average) (1)
xv) If (luminous sensitivity is medium) and (con
trast sensitivity is high) and (edge sensitivity is
medium) and (Number of on pixels is high)
(weight is and ((number of regions is low) then
average) (1)
xvi) . If (luminous sensitivity is bright)and(contrast
sensitivity is low) and (edge sensitivity is
medium) and (Number of on pixels is high) and
((number of regions is low) then (weight is
average) (1)
xvii) If (luminous sensitivity is bright) and (contrast
sensitivity is medium) and (edge sensitivity is
medium) and (Number of on pixels is high) and
((number regions is low) then (weight is
average) (1)
xviii) If (luminous sensitivityisbright)and(contrast
sensitivity is high) and (edge sensitivity is
medium) and (Number of on pixels is low) and
((number of regions is high) then (weight is
Higher) (1)
xix) If (luminous sensitivity is bright) and (con trast
sensitivity is high) and (edge sensitivity is
medium) and (Number of on pixels is low) and
((number of regions is high) then (weight is
Higher) (1)
xx) . If (luminous sensitivity is dark) and (contrast
sensitivity is low) and (edge sensitivity is large)
and (Number of on pixels is high) and ((number
of regions is low) then (weight is less)
xxi) If (luminous sensitivity is dark) and (contrast
sensitivity is medium) and (edge sensitivity is
large) and (Number of on pixels is low) and
((number of regions is high) then (weight is
Higher) (1)
xxii)If (luminous sensitivity is dark) and (contrast
sensitivity is high) and (edge sensitivityislarge)
and (Number of on pixels is low) and ((number
of regions is high) then (weight is high) (1)
xxiii) If (luminous sensitivity is medium) and (con
trast sensitivity is low) and (edge sensitivity is
large) and (Number of on pixels is high) and
((number of regions is low) then (weight is
average)
If (luminous sensitivity is medium) and (con
trast sensitivity is medium) and (edge sensitiv
ity is large) and (Number of on pixels is high)
and ((number of regions is low) then (weight
is average) (1)
xxv) If (luminous sensitivity is medium) and (con-
trast sensitivity is high) and (edge sensitivity is
large) and (Number of on pixels is low) and
((number of regions is high) then (weight is
Higher) (1)
xxvi) If (luminous sensitivity is bright) and (contrast
sensitivity is low) and (edge sensitivity is large)
and (Number of active pixels is high) and (num-
ber of objects is low) then (weight is Higher) (1)
xxvii) If (luminous sensitivity is bright) and (contrast
sensitivity is low) and (edge sensitivity is large)
and (Number of on pixels is high) and (number
of regions is low) then (weight is Higher) (1)
xxviii) If (luminous sensitivity is bright)and(contrast
sensitivity is high) and (edge sensitivityislarge)
and (Number of on pixels is low) and number of
regions is high then weight is Highest) (1)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 236
f) Obtain weight α from fuzzy inference system for
each 8 × 8 block using fuzzy inference logic.
g) Take watermark of size 32 × 32 and using rear-
range bits to serially convert watermark into 1
dimensional vector.
h) Select, a robust location ACp at the same po-sition
from each 8 × 8 block.
i) Rearrange ACq in the same position where
watermark embedded.
j) Apply inverse DCT and obtain watermarked image.
ACp + T W hen W = 0
ACq = ACp − T W hen W = 1 (5)
Fig. 3. Rule viewer of proposed scheme
3.2. Watermark Extraction
1) The input to watermark extraction is
watermarked image and original watermark.
2) Apply DCT and segment it into 8 × 8blocks to the
watermarked image and original image.
3) Apply FIS to both original and watermarked
image.
4) Identify the embedding location ACp and ACq and
before embedding the coefficient is and after
embed-ding it becomes
5) if ACq >ACp then watermark bit is 1 else
watermark bit 0.
6) Concatenate all watermark bits.
7) Convert 2d Arrays into 1d array.
8) Extract watermark
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 237
Fig. 4. Watermark Extraction Algorithm
4. Simulation results
The host images of size 512 × 512. gray scale cover
images Lena, Mandril and Pirate are used. The
watermark is 64 × 64 is a logo of Gokaraju Rangaraju
institute of Engineering and Technology. The peak
signal to noise ratio gives the measure of
imperceptibility. Higher the P.S.N.R, the better
imperceptibility.
4.1. Imperceptibility
Normally, in image processing, the quality of
watermark is judged based on P.S.N.R. The P.S.N.R
between water- marked and the original frame .
P SN R = 10log10
2552
(6)
M.S.E
As scaling factor is improved the imperceptibility is in-
creased but the robustness against attacks reduced. A
subjective evaluation test is conducted by 30 subjects
and it unanimously confirmed that the perpetual
invisibility of the watermark. The experimental set up
was conducted on four images which consist of two
copies of each image and the images are displayed on
computer screen and the subjects were asked to
carefully look at displayed image
Fig. 5. Original images of lena, living room, Baboon,
Pirate. And watermarked images of Lena, living
room, Baboon and pirate.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 238
and then report if there is any difference between the
two images.
4.2. Robustness
To assess the robustness of proposed watermarking
algo-rithms several attacks are applied. These attacks
include JPEG compression, rotation, cropping on both
sides and salt &pepper and Gaussian noise. The bit
error rate and normalized cross correlation is
computed between original watermark and extracted
watermark.
5. CONCLUSIONS
The images having more number of objects and less
number of active pixels the imperceptibility is less.
Con-trary to this for smoother images, the proposed
method yield high imperceptibility. Fuzzy output is
taken as nor-malized crisp output lying between 0 and
1. The pro-posed algorithm is found to be robust
against number of attacks like JPEG compression
(80%), Rotation, sym-metrical croppinguptoThehigh
peak signal to noise ratio and robustness against
number of attacks signifies the proposed method is
highly imperceptible and robust.
REFERENCES
[1] Charu Agarwal and Anurag Mishra and Arpita Sharma,
Gray-scale image watermarking using GA-BPN hybrid
network , 24rd ed, volume:7 Journal of Visual
Communication and Image Representation, 2013.
[2]Beghdadi, Azeddine and Larabi, M-C and Bouzerdoum,
Abdes-selam and Iftekharuddin, Khan M, A survey of
perceptual image processing methods , 28rded,volume:8,
pp no:811–831Signal Processing:ImageCommunication,
2013.

More Related Content

What's hot

New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...ijtsrd
 
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...CSCJournals
 
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...ijcsit
 
Lifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet TransformLifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet TransformDavid Bařina
 
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...IJERA Editor
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVDIRJET Journal
 
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...IJECEIAES
 
Data-Driven Motion Estimation With Spatial Adaptation
Data-Driven Motion Estimation With Spatial AdaptationData-Driven Motion Estimation With Spatial Adaptation
Data-Driven Motion Estimation With Spatial AdaptationCSCJournals
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...IJECEIAES
 
Fuzzy entropy based optimal
Fuzzy entropy based optimalFuzzy entropy based optimal
Fuzzy entropy based optimalijsc
 
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...CSCJournals
 
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...IRJET Journal
 
FastV2C-HandNet - ICICC 2020
FastV2C-HandNet - ICICC 2020FastV2C-HandNet - ICICC 2020
FastV2C-HandNet - ICICC 2020RohanLekhwani
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingCSCJournals
 
A130104
A130104A130104
A130104irjes
 
Review of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image CompressionReview of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image CompressionIRJET Journal
 

What's hot (20)

New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...
 
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
 
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
 
Gh2411361141
Gh2411361141Gh2411361141
Gh2411361141
 
Lifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet TransformLifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet Transform
 
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
 
Ceis 5
Ceis 5Ceis 5
Ceis 5
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
 
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
 
Data-Driven Motion Estimation With Spatial Adaptation
Data-Driven Motion Estimation With Spatial AdaptationData-Driven Motion Estimation With Spatial Adaptation
Data-Driven Motion Estimation With Spatial Adaptation
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...
 
Fuzzy entropy based optimal
Fuzzy entropy based optimalFuzzy entropy based optimal
Fuzzy entropy based optimal
 
Ppt
PptPpt
Ppt
 
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
 
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
 
FastV2C-HandNet - ICICC 2020
FastV2C-HandNet - ICICC 2020FastV2C-HandNet - ICICC 2020
FastV2C-HandNet - ICICC 2020
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
 
A130104
A130104A130104
A130104
 
Review of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image CompressionReview of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image Compression
 

Similar to Fuzzy Logic based watermarking using non – blind HVS technique

Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...IRJET Journal
 
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...IRJET Journal
 
Garbage Classification Using Deep Learning Techniques
Garbage Classification Using Deep Learning TechniquesGarbage Classification Using Deep Learning Techniques
Garbage Classification Using Deep Learning TechniquesIRJET Journal
 
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hidingMinimum image disortion of reversible data hiding
Minimum image disortion of reversible data hidingIRJET Journal
 
An Energy Efficient and High Speed Image Compression System Using Stationary ...
An Energy Efficient and High Speed Image Compression System Using Stationary ...An Energy Efficient and High Speed Image Compression System Using Stationary ...
An Energy Efficient and High Speed Image Compression System Using Stationary ...rahulmonikasharma
 
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueImplementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueIRJET Journal
 
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformMedical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformeSAT Publishing House
 
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformMedical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformeSAT Journals
 
Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET Journal
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET Journal
 
Optimal Deployment Scheme for Load Balancing in Sensor Network
Optimal Deployment Scheme for Load Balancing in Sensor NetworkOptimal Deployment Scheme for Load Balancing in Sensor Network
Optimal Deployment Scheme for Load Balancing in Sensor NetworkIRJET Journal
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...eSAT Publishing House
 
Image Fusion Ehancement using DT-CWT Technique
Image Fusion Ehancement using DT-CWT TechniqueImage Fusion Ehancement using DT-CWT Technique
Image Fusion Ehancement using DT-CWT TechniqueIRJET Journal
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet TransformIRJET Journal
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainIRJET Journal
 
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...IRJET Journal
 
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...IJERA Editor
 
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET Journal
 
Implementation of Noise Removal methods of images using discrete wavelet tran...
Implementation of Noise Removal methods of images using discrete wavelet tran...Implementation of Noise Removal methods of images using discrete wavelet tran...
Implementation of Noise Removal methods of images using discrete wavelet tran...IRJET Journal
 
IRJET- Parallelization of Definite Integration
IRJET- Parallelization of Definite IntegrationIRJET- Parallelization of Definite Integration
IRJET- Parallelization of Definite IntegrationIRJET Journal
 

Similar to Fuzzy Logic based watermarking using non – blind HVS technique (20)

Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
 
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
 
Garbage Classification Using Deep Learning Techniques
Garbage Classification Using Deep Learning TechniquesGarbage Classification Using Deep Learning Techniques
Garbage Classification Using Deep Learning Techniques
 
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hidingMinimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
 
An Energy Efficient and High Speed Image Compression System Using Stationary ...
An Energy Efficient and High Speed Image Compression System Using Stationary ...An Energy Efficient and High Speed Image Compression System Using Stationary ...
An Energy Efficient and High Speed Image Compression System Using Stationary ...
 
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueImplementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection Technique
 
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformMedical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
 
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformMedical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
 
Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
Optimal Deployment Scheme for Load Balancing in Sensor Network
Optimal Deployment Scheme for Load Balancing in Sensor NetworkOptimal Deployment Scheme for Load Balancing in Sensor Network
Optimal Deployment Scheme for Load Balancing in Sensor Network
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...
 
Image Fusion Ehancement using DT-CWT Technique
Image Fusion Ehancement using DT-CWT TechniqueImage Fusion Ehancement using DT-CWT Technique
Image Fusion Ehancement using DT-CWT Technique
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet Transform
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
 
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
 
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
 
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
 
Implementation of Noise Removal methods of images using discrete wavelet tran...
Implementation of Noise Removal methods of images using discrete wavelet tran...Implementation of Noise Removal methods of images using discrete wavelet tran...
Implementation of Noise Removal methods of images using discrete wavelet tran...
 
IRJET- Parallelization of Definite Integration
IRJET- Parallelization of Definite IntegrationIRJET- Parallelization of Definite Integration
IRJET- Parallelization of Definite Integration
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

Fuzzy Logic based watermarking using non – blind HVS technique

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 233 Fuzzy Logic based watermarking using non – blind HVS technique M Suneetha1, K Meenakshi2, 1Assistant Professor, Department of ECE, GRIET, Hyderabad, India 2Assistant Professor, Department of ECE, GRIET, Hyderabad, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This article proposes a non-blindwater-marking based on Human Visual System (HVS) and Fuzzy Inference System (FIS) with Discrete Cosine transform(DCT). Theimage transformed is segmented into 8 × 8 non over-lapping blocks and for each block parameters such as contrast sensitivity, luminous sensitivity, edge sensitivity, number of on pixels and number of regions are designed and are fed to FIS. The output of fuzzy system is a single value whichgivesacontinuousvalue of analogous to each DCT coincident. A binary watermark is set in the original image based on perpetual weight premeditated through FIS. Therobustnessofproposedmethod is examined by subjecting watermarked image to several attacks. It is institute that fuzzy based watermarkingachieves high imperceptibility and robustness to attacks. Key Words: HVS, FIS, DCT 1.INTRODUCTION With the increase in the availability of digital data over internet, the images so distributed can be copied repeatedly with or without error, putting the rights of owner at risk. One way to arrest illegalduplicationisto in-sert owner’s identity known as watermark into potentially vulnerable images so that watermarks are inseparable from the images itself. The important requirements of watermarking [1] are centered on three main issues -These are imperceptible quality of watermarked and attacked images, robustness and embedding capacity. Among these the former two parameters are important and these are found to be mutually conflicting. Because of this water-marking may be perceived as anoptimizationproblemtoobtain robust embedding and extraction scheme. This paper addresses the problem by constructing fuzzy perpet- ual masks. Human Visual System is the ultimate receiver of most processed images. Incorporating. Just Noticeable Difference(JND)providesameanstomodel perpetual redundancy that is the maximum distortion which cannot be perceived by human eye. In [6]-[8] JND thresholds are computed based on background luminance adaption and spatial contrast masking. In [2] a more accurate JND map is deduced considering the overlapping effect between luminousadaptionand spatial contrast masking. But the drawback of the scheme is it does not consider contrast sensitivity function.A brief introduction of fuzzy logic is provided in section II. Proposed watermark embeding and extraction algorithms are presented in section III. Simulation results are presented in section IV. Conclusions are provided is in section V 2. FUZZY LOGIC Fuzzy logic provides a means for incorporating human knowledge in the solution of problems whose formulation is based on vague concepts [1]. FIS is used to map a given input to output based on fuzzy logic. Unlike crisp sets, fuzzy sets are having infinite valued membership functions. The mapping then provides a framework for interpreting the data from which decisions can be made. Principles of Fuzzy set theory: Let Z is a set of elements with element of Z denoted by z. This set is called Universe of Discourse. A fuzzy set A in Z is denoted by µA(Z) that associates each element with an interval between [0, 1].Therefore a fuzzy set is an ordered pair consists of values of z and a membership function that assigns a grade of membership to each z. The FIS has the following blocks as given in Ref. [2]. • Fuzzification: for eachscalarinput,findthecorre- sponding fuzzy values bymapping the input to the interval [0, 1], using applicable rules defined in rule editor. • Apply an implication method: It is way to use inputs and the knowledge base represented by if- then rules to creates the output of system. This process is known as implication or inference.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 234 • Defuzzification;Finalstepisconvertingfuzzyout- put to crisp output by computing the center of gravity of aggregated fuzzy set. Pn v0 = i=1 iQ(i) (1) Pn i=1 i 3. PROPOSED ALGORITHM The proposed watermarking is a non-blind watermark-ing based on Fuzzy logic. The input parametersfedtoFISarecontrastsensitivity,luminous sensitivity,edgesensitivity,numberofobjects,Number of active pixels. 3.1. WATERMARK EMBEDDING ALGORITHM The watermark concealing algorithm is given in the following steps in fig.1: 1) Take original image of size 256 ×256istakenand segment it into 8 × 8 blocks and compute number of on pixels and number of regionsandapplyDCT and compute luminous sensitivity, edge sensitivity and contrast sensitivity. a) Luminous sensitivity : If the background is brighter, more information can be hidden in original image [3] without noticing distortion. Luminous sensitivity is measure of brightness of back ground. In eachblockthefirstelement(0,0) represent DC component of block and XDCM is the mean of all D.C. coefficients of 8 × 8. It is defined in Eqn.2. Luminous sensitivity = XDC,i (2) XDCM b) Contrast sensitivity: Watermark embedded in textured region is harder to notice compared to smooth regions. The contrast sensitivity is measured by computing variance in each block using the matlab command “statxure ”. Where image_seg is 8 × 8 block of image and C is the second element of 7 row vectorgeneratedbythis command.This parameter is obtained by Eqn 3 C = statxture(image_seg) (3) c) Edge sensitivity: Watermark embedded in edge regions are harder to perceive compared to smoother region. The edges are detected by matlab command j = graythresh(image_seg) (4) d) Number of on pixels: In Ref. [5] a pixel is said to be active if it has intensity less than mean value by a factor of where K(σ) where σ is taken 1.2. e) Number of Regions: In Ref [5] it is calculated by converting image into binary image and count-ing the number of regions of connected pixels. Rules used in Fuzzy inference system i) If (luminous sensitivity is dark) and (contrast sensitivity is low) and (edge sensitivity is small) then (weight is least) (1) ii) If (luminous sensitivity is dark) and (contrast sensitivity is medium) and (edge sensitivity is low) then (weight is least) (1) iii) If (luminous sensitivity is dark) and (contrast sensitivity is high) and (edge sensitivity is low) then (weight is least) (1) iv) If (luminous sensitivity is medium) and (con- trast sensitivity is low) and (edge sensitivity is low) then (weight is least) (1)
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 235 v) If (luminous sensitivity is medium) and (con- trast sensitivity is medium) and (edge sensitiv- ity is low) then (weight is least) (1) vi) If (luminous sensitivity is medium) and (con- trast sensitivity is high) and (edge sensitivity is low) then (weight is least) (1) vii) If (luminous sensitivity is bright) and (contrast sensitivity is low) and (edge sensitivity is low) then (weight is least) (1) viii) If (luminous sensitivity is bright) and (contrast sensitivity is medium) and (edge sensitivity is low) then (weight is least) (1) ix) If (luminous sensitivity is bright) and (contrast sensitivity is high) and (edge sensitivity is low then (weight is least) (1) x) If (luminous sensitivity is dark) and (con-trast sensitivity is low) and (edge sensitivity is medium) and (Number of active pixels is low) and (number of objects is high) then (weight is less.) xi) If (luminous sensitivity is dark) and (contrast sensitivity is high) and (edge sensitivity is medium) and (Number of on pixels is low) and ((number of regions is high) then (weight is Higher) (1) xii) If (luminous sensitivity is dark) and (contrast sensitivity is medium) and (edge sensitivity is medium) and (Number ofonpixelsislowislow) and (number of regions is high) then (weight is Higher) (1) xiii) If (luminous sensitivity is medium) and (con- trast sensitivity is low) and (edge sensitivity is medium) and (Number of on pixels is low) and ((number of regions is high) then (weight is less) (1) xiv) If (luminous sensitivity is medium) and (con- trast sensitivity is medium) and (edge sensi- tivity is medium) and (Number of on pixels is high) and ((number of regions is low) then (weight is average) (1) xv) If (luminous sensitivity is medium) and (con trast sensitivity is high) and (edge sensitivity is medium) and (Number of on pixels is high) (weight is and ((number of regions is low) then average) (1) xvi) . If (luminous sensitivity is bright)and(contrast sensitivity is low) and (edge sensitivity is medium) and (Number of on pixels is high) and ((number of regions is low) then (weight is average) (1) xvii) If (luminous sensitivity is bright) and (contrast sensitivity is medium) and (edge sensitivity is medium) and (Number of on pixels is high) and ((number regions is low) then (weight is average) (1) xviii) If (luminous sensitivityisbright)and(contrast sensitivity is high) and (edge sensitivity is medium) and (Number of on pixels is low) and ((number of regions is high) then (weight is Higher) (1) xix) If (luminous sensitivity is bright) and (con trast sensitivity is high) and (edge sensitivity is medium) and (Number of on pixels is low) and ((number of regions is high) then (weight is Higher) (1) xx) . If (luminous sensitivity is dark) and (contrast sensitivity is low) and (edge sensitivity is large) and (Number of on pixels is high) and ((number of regions is low) then (weight is less) xxi) If (luminous sensitivity is dark) and (contrast sensitivity is medium) and (edge sensitivity is large) and (Number of on pixels is low) and ((number of regions is high) then (weight is Higher) (1) xxii)If (luminous sensitivity is dark) and (contrast sensitivity is high) and (edge sensitivityislarge) and (Number of on pixels is low) and ((number of regions is high) then (weight is high) (1) xxiii) If (luminous sensitivity is medium) and (con trast sensitivity is low) and (edge sensitivity is large) and (Number of on pixels is high) and ((number of regions is low) then (weight is average) If (luminous sensitivity is medium) and (con trast sensitivity is medium) and (edge sensitiv ity is large) and (Number of on pixels is high) and ((number of regions is low) then (weight is average) (1) xxv) If (luminous sensitivity is medium) and (con- trast sensitivity is high) and (edge sensitivity is large) and (Number of on pixels is low) and ((number of regions is high) then (weight is Higher) (1) xxvi) If (luminous sensitivity is bright) and (contrast sensitivity is low) and (edge sensitivity is large) and (Number of active pixels is high) and (num- ber of objects is low) then (weight is Higher) (1) xxvii) If (luminous sensitivity is bright) and (contrast sensitivity is low) and (edge sensitivity is large) and (Number of on pixels is high) and (number of regions is low) then (weight is Higher) (1) xxviii) If (luminous sensitivity is bright)and(contrast sensitivity is high) and (edge sensitivityislarge) and (Number of on pixels is low) and number of regions is high then weight is Highest) (1)
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 236 f) Obtain weight α from fuzzy inference system for each 8 × 8 block using fuzzy inference logic. g) Take watermark of size 32 × 32 and using rear- range bits to serially convert watermark into 1 dimensional vector. h) Select, a robust location ACp at the same po-sition from each 8 × 8 block. i) Rearrange ACq in the same position where watermark embedded. j) Apply inverse DCT and obtain watermarked image. ACp + T W hen W = 0 ACq = ACp − T W hen W = 1 (5) Fig. 3. Rule viewer of proposed scheme 3.2. Watermark Extraction 1) The input to watermark extraction is watermarked image and original watermark. 2) Apply DCT and segment it into 8 × 8blocks to the watermarked image and original image. 3) Apply FIS to both original and watermarked image. 4) Identify the embedding location ACp and ACq and before embedding the coefficient is and after embed-ding it becomes 5) if ACq >ACp then watermark bit is 1 else watermark bit 0. 6) Concatenate all watermark bits. 7) Convert 2d Arrays into 1d array. 8) Extract watermark
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 237 Fig. 4. Watermark Extraction Algorithm 4. Simulation results The host images of size 512 × 512. gray scale cover images Lena, Mandril and Pirate are used. The watermark is 64 × 64 is a logo of Gokaraju Rangaraju institute of Engineering and Technology. The peak signal to noise ratio gives the measure of imperceptibility. Higher the P.S.N.R, the better imperceptibility. 4.1. Imperceptibility Normally, in image processing, the quality of watermark is judged based on P.S.N.R. The P.S.N.R between water- marked and the original frame . P SN R = 10log10 2552 (6) M.S.E As scaling factor is improved the imperceptibility is in- creased but the robustness against attacks reduced. A subjective evaluation test is conducted by 30 subjects and it unanimously confirmed that the perpetual invisibility of the watermark. The experimental set up was conducted on four images which consist of two copies of each image and the images are displayed on computer screen and the subjects were asked to carefully look at displayed image Fig. 5. Original images of lena, living room, Baboon, Pirate. And watermarked images of Lena, living room, Baboon and pirate.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 238 and then report if there is any difference between the two images. 4.2. Robustness To assess the robustness of proposed watermarking algo-rithms several attacks are applied. These attacks include JPEG compression, rotation, cropping on both sides and salt &pepper and Gaussian noise. The bit error rate and normalized cross correlation is computed between original watermark and extracted watermark. 5. CONCLUSIONS The images having more number of objects and less number of active pixels the imperceptibility is less. Con-trary to this for smoother images, the proposed method yield high imperceptibility. Fuzzy output is taken as nor-malized crisp output lying between 0 and 1. The pro-posed algorithm is found to be robust against number of attacks like JPEG compression (80%), Rotation, sym-metrical croppinguptoThehigh peak signal to noise ratio and robustness against number of attacks signifies the proposed method is highly imperceptible and robust. REFERENCES [1] Charu Agarwal and Anurag Mishra and Arpita Sharma, Gray-scale image watermarking using GA-BPN hybrid network , 24rd ed, volume:7 Journal of Visual Communication and Image Representation, 2013. [2]Beghdadi, Azeddine and Larabi, M-C and Bouzerdoum, Abdes-selam and Iftekharuddin, Khan M, A survey of perceptual image processing methods , 28rded,volume:8, pp no:811–831Signal Processing:ImageCommunication, 2013.