Abstract
Computational intelligent techniques can be useful in developing efficient watermarking approaches that are able to maintain and reduce risks to integrity, confidentiality, and availability of information and resources in computer and network systems. This paper aims to develop a new spatial domain-based watermarking approach that uses the fuzzy rough set to select well thought out blocks to embed secret data with acceptable rate of imperceptibility and robustness against different scenarios of attacks. The proposed model focuses on analyzing the host image to discover specified features in some blocks that in turn will be considered in the watermarking process. These features include the characteristics of the Human Visual System (HVS) regarding the color sensitivity and the textured/semi-smooth regions, where embedding the watermark in low color sensitivity to the human eye and more textured regions gains high imperceptibility and robustness. The experiment results show that the proposed approach gives interesting and remarkable results to preserve the image authentication.
Access provided by CONRICYT-eBooks. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
Digital watermarking is one of the appropriate solutions, which can contribute significantly to the authentication of the transmitted text, images, and videos on the Internet. Many watermarking approaches are proposed both in spatial and frequency domains [1–5]. taking into account the complexity of modern systems and the diversity of attacks are needed. Computational intelligent techniques exhibit many capabilities to adapt and provide multimodal solutions for these complex systems. The scope of computational intelligent methods involves fuzzy logic, genetic algorithm, artificial neural network, and rough set. Some frequency domain-based watermarking approaches use these techniques with a goal to develop an efficient watermarking approach using Discrete Cosine Transform (DCT), Discreet Wavelet Transform (DWT), and Singular Value Decomposition (SVD) [4, 5]. Intelligent techniques in spatial domain based watermarking approaches have not been widely used. Few works such as those proposed in [6–8] explore the artificial neural network and rough set principles. This paper aims to develop a new spatial domain watermarking approach based on the fuzzy rough set technique by selecting particular blocks to embed secret data with an acceptable rate of imperceptibility by achieving a remarkable robustness against different kind of attacks and maintaining a low process complexity. The rest of this paper is organized as follows: In Sect. 2, we present a literature review. Section 3, illustrates the rough set principle. Then, the system model is illustrated in Sect. 4. The experiments result is presented in Sect. 5 and a comparative study is conducted in Sect. 6. Finally, we conclude the presented approach in Sect. 7.
2 Literature Review
This section presents a literature review on spatial and frequency domain-based digital image watermarking approaches using computational intelligent techniques in both watermark embedding/extraction processes.
In the case of spatial domain, authors in [6] proposed an efficient watermarking approach that embeds an encoded watermark image in the image blue components. The different intensities of the original blue components are used as a feature to train an Artificial Neural Network (ANN) and extract the attacked watermark image. The experiments result showed that the Bit Correct Rate (BCR) ratio ranged between [57.23–100]% and the Peak Signal-to-Noise Ratio (PSNR) ranged between [10.03–39.6] dB. As well, authors in [8] proposed a fragile watermarking scheme that operates in spatial domain based on the K-means method. The proposed scheme computes the distance between each 2 \(\times \) 2 block and its centroid to find the feature sequence that XOR-ed with random sequence number to generate a 8 authenticated bits that replace the Least Significant Bits (LSBs) in each 2 \(\times \) 2 block of the original image. This model was tested in tamperproofing under a variety of attacks like cut-paste and collage attacks. The experiments result showed that the PSNR ratio reached the 46.2 dB. For the case of frequency domain, a probabilistic neural network technique was proposed in [9] based on a DWT watermarking scheme. As well, a genetic algorithm was applied to develop an SVD-based watermarking scheme in [10] and a DCT-based scheme in [11]. In addition, [12] utilized a fuzzy rough set to design a DWT-based watermarking scheme.
3 Rough Set Principle
Rough set is one of the computational intelligent tools that deals with the induction of concept approximation to process information in a database. It is concerned with classification and analysis of imprecise and incomplete information or knowledge to facilitate the tasks of feature selection and knowledge discovery [13, 14]. The imprecision and uncertainty in rough set theory is expressed by boundary region of a set. Rough set technique is based on sets of objects (U) and attributes (A) that represent an information system I such as I = (U,A), where X \(\subseteq \) U and P\(\subseteq \)A. The system table is built such as its rows correspond to objects U and columns correspond to attributes A. Based on the defined attributes P, the rough set can approximate X using only the information contained in P by defining three regions, as illustrated in Fig. 1; (1) The B-upper region \(\overline{PX}\), which is the set of all of objects that can be possibly classified as member of X with respect to P. It can be denoted by \(\overline{PX}\) = \(\{x\) \(\vert \)p(x) \(\bigcap \) X \(\ne \) \(\phi \) \(\}\). (2) The B-lower region \(\underline{PX}\), which is the set of all objects that can be classified with certainly as member of X regarding P, and certainly belong to the subset of interest. It can be denoted by \(\underline{PX}\) = \(\{x\) \(\vert \)p(x) \(\subseteq \) X\(\}\). (3) The boundary region BNp(X), represents the set of all of objects, which cannot be classified neither in \(\overline{PX}\) nor \(\underline{PX}\). If the BNp(X) is empty, then the set is called ‘Crisp set’. Otherwise, if the BNp(X) is non-empty, then the set X is called ‘Rough set’ in other terms BNp(X) = \(\overline{PX}\)-\(\underline{PX}\) [14].
4 System Model
The proposed system considers two types of colored image: semi-smooth and textured images to construct a system table, where any colored image I consists of three components R, G, and B that can be converted to YCbCr components to display each of luminance component(Y), blue-difference (Cb), and red-difference (Cr). Then the proposed model exploits the low HVS sensitivity to the blue component (Cb) [6] and the highly textured regions in the original image to be concerned in the embedding process. Selecting those attributes is justifited by the availability of imperceptibility and robustness against attacks [6, 11].
4.1 Construct an Information System for both Semi-smooth and Textured Images
Table 1 below, illustrates the information systems for both semi-smooth and textured images by taking into account that the average value of 8 \(\times \) 8 block pixels in Cb matrix corresponds to Cb attribute and the range of the DC coefficient in each block corresponds to DC coefficient attribute. The decision of the information system is based on two thresholds: T1 that corresponds to the average value of Cb component and T2 corresponds to the range of DC coefficient in any 8 \(\times \) 8 block. By demonstrating the information systems in Table 1 for semi-smooth and textured images respectively, we can find that the decision for semi-smooth images depends on T1 \(\le \) 127 and T2 = [4-5]. This can be theoretically justified by noting that the probability to see an increasing value in the average Cb in each block is very low, particularly when the average value did not exceeded 127, compared to when the average value of Cb is greater than 127. As well as regard, the value of DC coefficient where the probability to see a change in DC coefficient may be increased if the DC coefficient becomes greater than or equal to [4, 5]. On the other hand, the decision regarding the textured images depends on T1 > 127 and T2 = [1-3]. This can be justified by the fact that embedding watermark in more textured regions is imperceptible and highly robust against attacks. So the probability to see an increasing value in the average of Cb for each block in the textured images is very low, particularly when the average value exceeds 127 and the value of DC coefficient is equal to or greater than [1–3].
4.2 The Employment of Rough Set Technique
From the information systems illustrated in Table 1, we can build a unified information system as illustrated in Table 2 to be manipulated in one of computational intelligent technique to deal with a variety of images regardless of its nature. Rough set is our choice to deduce a concepts approximation of existing information in our model. By rough set, we can extract the CD-upper approximation \(\overline{CD}\), the CD-lower approximation \(\underline{CD}\), and the boundary BNc(D) regions as following:
Then our model concerned with those blocks that are matching the condition for any rough set element (i.e. inside the BNc(D) set).
4.3 Parsing JPEG Bitstream
As proposed in [15], the JPEG file structure is constructed by combining many segments that represent the bitstream file for any image. Each 8 \(\times \) 8 DCT block was compressed by 1 DC and possibly 63 AC coefficients. In our model, we parse the encoded data to find the DC coefficient category based on Huffman table that is illustrated in [16].
4.4 Model Initialization
The proposed model has to read the Cb component from the RGB image to build an avg_matrix and category_matrix that define the attributes of the prearranged information systems to deduce the decision in the proposed model. The initialization process is illustrated in Fig. 2.
4.5 Watermark Embedding Process
After defining the avg_matrix and category_matrix from Cb matrix of RGB image, we can check whether the given block of Cb matrix matches the rough set rules by means of BNc(D) set or not. Subsequently, any satisfied block will be in-queued in rough set RS queue, and will be embedded with a watermark w by a linear interpolation equation. This equation gives us the ability to control the visibility/invisibility of embedded watermark by factor t. The obtained watermarked image iw_cb is illustrated in Eq. (1), and the embedding process is illustrated in Fig. 3.
where i is a squared size Cb component of the RGB image, w is the watermark image sized 8 \(\times \) 8, and t is the linear interpolation factor. The value of the linear interpolation factor t reflects the degree of visibility/invisibility of the embedded watermark in the original image within three cases.
Case 1 (visible case): if t closes to 0, then i\(_w\) = \(\underbrace{(1-t)*w}_\text {goes to 1}\) +\(\underbrace{(t*i)}_\text {goes to zero}\). The result will be as i\(_w\) = w, which means that w is the dominant in i\(_w\).
Case 2 (invisible case): if t closes to 1, then i\(_w\) = \(\underbrace{(1-t)*w}_\text {goes to zero}\) +\(\underbrace{(t*i)}_\text {goes to 1}\). The result will be as i\(_w\) = i, which means that i is the dominant in i\(_w\).
Case 3 (semi-visibility case): if t \(\in [0.4-0.6]\), then w will be clear with some visibility degrees. So, in our experiments we used t = 0.98, since the invisibility is achieved if t is closes to 1. After embedding the watermark, the resulting iw_cb matrix and the RS queue would be sent to the receiver via public network, which requires to concatenate the Y and Cr of the original image with iw_cb. The Receiver will receive the attacked iwa_RGB image and the attacked RS queue, because the RS may be also prone to different attacks, we need to secure it. One-Time Pad (OTP) algorithm can be a best choice to encrypt it due to its unbreakability.
4.6 Watermark Extraction Process
The watermark extraction will be applied on the attacked watermarked image iwa_RGB in order to extract the attacked watermark \(w_a\) also via linear interpolation as illustrated in Eq. (2).
where \(w_a\) is the extracted attacked watermark image, i_wa is the attacked watermarked image, and t = 0.98. The extraction process is illustrated in Fig. 4.
5 Experiments Result
The proposed model processed a square color images sized 128 \(\times \) 128 as an original image and 8\(\,\times \) 8 watermark image. The resulted watermarked images are exposed to a variety of attacks including: geometric attack (i.e. such as rotation) and non-geometric attacks (i.e. like JPEG compression, Gaussian noise, and median filtering) by StirMark Benchmark v.4 [17]. Figure 5 illustrates a sample of the processed images. The tests are conducted on these seven images that are in turn partitioned as 8 \(\times \) 8 blocks and a watermark image w sized 8 \(\times \) 8 is embedded in particular blocks of the original images that satisfy the rough set rules.
To evaluate the performance of our model, we applied three metrics (i.e. PSNR, Bit Error Rate (BER), and Correlation Coefficient (CC) [6, 11]), where the PSNR and CC measured the robustness and the similarity between the original watermark w and all extracted attacked watermark w\(_a\), while the BER metric measured the stabilization (i.e. the number of correct bits that can be extracted from the attacked watermarked image). Due to the large number of blocks that satisfy the rough set rules, our experiment’s result are displayed in average as showed in Table 3.
The results of PSNR, CC, and BER are very interesting, where the PSNR ratio ranges between (43.4–45.5) dB and the CC ratio is equal to 1 in most cases, while the BER ratio ranges between (18–20) %. By comparing the results with the different kind of attacks, we can note that the result involved with Noise_10 and Rot_45 are the least ones in terms of PSNR, while JPEG_80 and Median_9 present the same results in PSNR, CC, and BER. From the displayed results we can also conclude that our proposed model is compatible to deal with both textured and semi-smooth images. This will give us a sense that the rough set-based watermarking technique is very useful to achieve the robustness and imperceptibility in terms of stabilization and similarity.
6 Comparative Study
In this section we compare the results achieved by the proposed model with those of other interesting related approaches. An adaptive work has been made on our model to be compatible with other related work, in terms of the host image and watermark sizes. All of these approaches involved a particular computational intelligent technique. Our comparisons held on three images (i.e. Lena, Baboon and F16) with different attacks scenario. Firstly, our results are compared with [11, 18] in terms of CC. Secondly, our results are compared with [11] in terms of PSNR and finally, our results are compared with [6] in terms of BER. Tables 4, 5 and 6 present these results, followed by a discussion in Table 7. Through Tables 4, 5 and 6, we can note that our model outperformed [11, 18] models, in terms of CC under Noise_10 and Median_9 attacks, whereas in the case of JPEG_80 the CC in all approaches are convergent. Our model also enhanced a robustness ratio by (1–2) dB in all attacks scenario comparing with [11]. Similarly, the BER was enhanced by 25 % with JPEG_80 attack, and it is approximately the same in Rot_45 attack. In terms of Noise_10 and Rot_10, the results of BER ratio in [6] outperformed our model by 10 %. This is due the low noise and rotation used factors. However, we think that our model is more practical than model in [6], especially with the high used factors in noise, rotation, or JPEG attacks, which appear clearly in the case of Rot_45 attack.
7 Conclusion
This paper aims to develop a new spatial domain-based watermarking approach that utilizes the fuzzy rough set technique by selecting many blocks to embed secret data with acceptable rate of imperceptibility and robustness against different kinds of attacks. Based on the proposed model structure, we can conclude that the rough set-based watermarking model in spatial domain is capable to achieve a significant rate of robustness and imperceptibility with means of similarity and stabilization. The experiment’s result showed that the results of PSNR, CC, and BER are very interesting. This gives a sense that the rough set-based watermarking can serve significantly in achieving both watermark imperceptibility and robustness.
References
Sun, Q., et al.: A blind color image watermarking based on DC component in the spatial domain. Optics 124(23), 6255–6260 (2013). Elsevier
Laouamer, L., et al.: Improving authenticity and robustness of medical images watermarking schemes based on multi-resolution decomposition. In: International Conference on Imaging Systems and Techniques, pp. 331–336. IEEE (2015)
Ouyang, L., et al.: A blind robust color image watermarking method using quaternion fourier transform. In: Congress on Image and Signal Processing, vol. 1, pp. 485–489. IEEE (2013)
Laouamer, L., Tayan, O.: A semi-blind robust DCT watermarking approach for sensitive text images. Arabian J. Sci. Eng. 40(4), 1097–1109 (2015)
Benhocine, A., et al.: New images watermarking scheme based on singular value decomposition. J. Inf. Hiding Multimed. Sig. Process. 4(1), 9–18 (2013)
Findik, O., et al.: Implementation of BCH coding on artificial neural network-based color image watermarking. Int. J. Innov. Comput. Inf. Control 7(8), 4905–4914 (2011)
Bhattacharya, S.: Watermarking digital image using fuzzy matrix compositions and rough set. Int. J. Adv. Comput. Sci. Appl. 5(6), 135–140 (2014)
Albakrawy, L., et al.:A rough k-means fragile water-marking approach for image authentication. In: Proceedings of the Federated Conference on Computer Science and Information Systems, pp. 19–23. IEEE (2011)
Alnabhani, Y.: Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. J. King Saud Univ. Comput. Inf. Sci. 27(4), 1–9 (2015). Elsevier
Aslantas, V.: A singular-value decomposition-based image watermarking using genetic algorithm. J. Electron. Commun. 62(5), 386–394 (2008). Elsevier
Han, J.: A digital image watermarking method based on host image analysis and genetic algorithm. J. Ambient Intell. Humanized Comput. 7(1), 37–45 (2016)
Cong, J., et al.: Robust digital image watermark scheme on wavelet domain using fuzzy rough sets. J. Int. Fuzzy Sys. 30(1), 1–12 (2015). IOS
Swiniarski, R., Skowron, A.: Rough set methods in feature selection and recognition. Pattern Recogn. Lett. 24, 833–849 (2003)
Rissino, S., Lambert-Torres, G.: Rough set theory-fundamental concepts, principals, data extraction, and applications, data mining and knowledge discovery in real life applications. In: Data Mining and Knowledge Discovery in Real Life Applications, pp. 35–58, Chap. 3. InTech (2009)
Ghadi, M., et al.: JPEG bitstream based integrity with lightweight complexity of medical image in WMSNS environment. MEDES, pp. 53–58. ACM (2015)
Ghadi, M., et al.: Enhancing digital image integrity by exploiting JPEG bitstream attributes. JIDES 2(1–2), 20–31 (2015). Elsevier
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–238. Springer, Heidelberg (1998). doi:10.1007/3-540-49380-8_16
Lu, Y., et al.: A novel color image watermarking method based on genetic algorithm. In: International Conference on Intelligent Computing, vol. 345, pp. 72–80 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Ghadi, M., Laouamer, L., Nana, L., Pascu, A. (2017). Fuzzy Rough Set Based Image Watermarking Approach. In: Hassanien, A., Shaalan, K., Gaber, T., Azar, A., Tolba, M. (eds) Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2016. AISI 2016. Advances in Intelligent Systems and Computing, vol 533. Springer, Cham. https://doi.org/10.1007/978-3-319-48308-5_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-48308-5_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48307-8
Online ISBN: 978-3-319-48308-5
eBook Packages: EngineeringEngineering (R0)