A new fuzzy performance modeling for evaluating the trade-off among robustness, quality and capacity in watermaking algorithms

There are several digital watermarking metrics proposed by researchers. These metrics can determine the robustness and the imperceptibility of watermarking schemes discretely. Here, there is a lack of an effective strategy to evaluate the balanced trade-off between these requirements. Meanwhile, it is hardly possible to determine crisp thresholds to limit the acceptable and unacceptable boundaries for robustness and imper-ceptibility. Hence, it is difficult to obtain an accurate mathematical model in order to evaluate the degree of trade-off between watermarking requirements. Thus, it is most advantageous to adopt the fuzzy-based model to fulfill this need. This paper develops a fuzzy inference system (FIS) effectively for exploring the performance trade-off among watermarking performance requirements. We implemented this technique to evaluate EISB (Enhanced Intermediate Significant Bit) watermarking scheme. We also focused on different intensities of Reset Removal Attack which were less considered before, by other researchers. Two main contributions of this paper are the performance fuzzy model itself, and the performance analysis of this model which was carried out and confirmed by results via simulation. A new fuzzy performance modeling for evaluating the trade-off among robustness, quality and capacity in watermarking algorithms.

[1]  Jacek Kluska Analytical Methods in Fuzzy Modeling and Control , 2009, Studies in Fuzziness and Soft Computing.

[2]  Alan C. Bovik,et al.  Unifying analysis of full reference image quality assessment , 2008, 2008 15th IEEE International Conference on Image Processing.

[3]  Der-Chyuan Lou,et al.  A semi-blind digital watermarking scheme based on singular value decomposition , 2006, Comput. Stand. Interfaces.

[4]  Jeng-Shyang Pan,et al.  Genetic Watermarking for Copyright Protection , 2009 .

[5]  Bernd Girod,et al.  Robustness of a blind image watermarking scheme , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[6]  Zhizhong Ding,et al.  Spread Spectrum Watermark for Color Image Based on Wavelet Tree Structure , 2008, 2008 International Conference on Computer Science and Software Engineering.

[7]  Prabir Bhattacharya,et al.  Video watermarking using wavelet transform and tensor algebra , 2010, Signal Image Video Process..

[8]  Shereen Ghannam,et al.  WPT versus WT for a Robust Watermarking Technique , 2009 .

[9]  Malay Kumar Kundu,et al.  Robust and Blind Spatial Watermarking In Digital Image , 2002, ICVGIP.

[10]  Chin-Chen Chang,et al.  AN SVD ORIENTED WATERMARK EMBEDDING SCHEME WITH HIGH QUALITIES FOR THE RESTORED IMAGES , 2007 .

[11]  Madjid Merabti,et al.  Analysis of Digital Image Watermark Attacks , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[12]  Ramiro Jordan,et al.  Geometric attacks on image watermarking systems , 2005, IEEE MultiMedia.

[13]  Thierry Pun,et al.  Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..

[14]  Man Xuan,et al.  A Novel Watermarking Algorithm in Entropy Coding Based on Image Complexity Analysis , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[15]  Hyoung-Kee Choi,et al.  1-D fast normalized cross-correlation using additions , 2010, Digit. Signal Process..

[16]  Min-Shiang Hwang,et al.  Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..

[17]  Jiying Zhao,et al.  An accurate method for image quality evaluation using digital watermarking , 2005, IEICE Electron. Express.

[18]  Jiying Zhao,et al.  Human visual system based adaptive digital image watermarking , 2008, Signal Process..

[19]  Adeel Mumtaz,et al.  Digital Image Watermarking in the Wavelet Transform Domain , 2008 .

[20]  Djemel Ziou,et al.  Image Quality Metrics: PSNR vs. SSIM , 2010, 2010 20th International Conference on Pattern Recognition.

[21]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[22]  Masatoshi Sakawa,et al.  Interactive Computer Programs for Fuzzy Linear Programming with Multiple Objectives , 1983, Int. J. Man Mach. Stud..

[23]  Thierry Pun,et al.  Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.

[24]  S.Maruthu Perumal,et al.  A Wavelet based Digital Watermarking Method using Thresholds on Intermediate Bit Values , 2011 .

[25]  Zixiang Xiong,et al.  Multiresolution watermarking for images and video , 1999, IEEE Trans. Circuits Syst. Video Technol..

[26]  W. Fourati,et al.  Amelioration of the JPEG2000 by a Variable Window Pretreatment , 2006, 2006 2nd International Conference on Information & Communication Technologies.

[27]  H. Zimmermann Fuzzy programming and linear programming with several objective functions , 1978 .

[28]  M. Devapriya,et al.  Statistical Image Watermarking In DWT with Capacity Improvement , 2010 .

[29]  Ahmad Reza Naghsh-Nilchi,et al.  Robust Digital Image Watermarking Based on Joint DWT-DCT , 2009, J. Digit. Content Technol. its Appl..

[30]  Narendrakumar Ramchandra Dasre,et al.  On watermarking in frequency domain , 2010, International Conference on Digital Image Processing.

[31]  Lakhmi C. Jain,et al.  Error-Resilient Triple-Watermarking with Multiple Description Coding , 2010, J. Networks.