Skip to main content

2019 | OriginalPaper | Buchkapitel

A Blind Watermarking Scheme Using Adaptive Neuro-Fuzzy Inference System Optimized by BP Network and LS Learning Model

verfasst von : Jilin Yang, Chunjie Cao, Jun Zhang, Jixin Ma, Xiaoyi Zhou

Erschienen in: Cyberspace Safety and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To maintain a trade-off between robustness and imperceptibility, as well as secure transmission of digital images over communication channels, a digital image blind watermarking scheme on the basis of adaptive neuro-fuzzy inference system (ANFIS) is proposed in this study. To achieve better results, an optimized ANFIS (OANFIS) combines a back propagation neural network and a least-square (LS) hybrid learning model. Each 3 × 3 non-overlap block of the original host image is selected to form a sample dataset, which is trained to establish a model of nonlinear mapping between the input and the output. As a sequence, the host image is decomposed by wavelet transform to obtain a low frequency subband. Finally, each watermark signal is adaptively embedded into the low frequency subband by OANFIS. Results show that our scheme is robust to various attacks while effectively maintaining satisfying transparency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhang, M., Zhang, L., Huang, X.: Neural network-based digital image watermarking algorithm. J. Jiangxi Normal Univ. (Natural Sciences Edition) 31(5), 445–449 (2007)MATH Zhang, M., Zhang, L., Huang, X.: Neural network-based digital image watermarking algorithm. J. Jiangxi Normal Univ. (Natural Sciences Edition) 31(5), 445–449 (2007)MATH
2.
Zurück zum Zitat YAN, F., WANG, U., SHI, L., et al.: Digital image watermarking algorithm based on DWT and PNN. Nat. Sci. J. Xiangtan Univ. 38(3), 89–93 (2016)MATH YAN, F., WANG, U., SHI, L., et al.: Digital image watermarking algorithm based on DWT and PNN. Nat. Sci. J. Xiangtan Univ. 38(3), 89–93 (2016)MATH
3.
Zurück zum Zitat Xu, B.: Blind watermark technology based on BP-neural networks for image. Comput. Knowl. Technol. 5(13) (2009) Xu, B.: Blind watermark technology based on BP-neural networks for image. Comput. Knowl. Technol. 5(13) (2009)
4.
Zurück zum Zitat Gu, T., Li, X.: Dynamic digital watermark technique based on neural network. In: Independent Component Analyses, Wavelets, Unsupervised Nano-Biomimetic Sensors, and Neural Networks VI. International Society for Optics and Photonics, vol. 6979, p. 69790I (2008) Gu, T., Li, X.: Dynamic digital watermark technique based on neural network. In: Independent Component Analyses, Wavelets, Unsupervised Nano-Biomimetic Sensors, and Neural Networks VI. International Society for Optics and Photonics, vol. 6979, p. 69790I (2008)
5.
Zurück zum Zitat Hamamoto, I., Kawamura, M.: Image watermarking technique using embedder and extractor neural networks. IEICE Trans. Inf. Syst. 102(1), 19–30 (2019)CrossRef Hamamoto, I., Kawamura, M.: Image watermarking technique using embedder and extractor neural networks. IEICE Trans. Inf. Syst. 102(1), 19–30 (2019)CrossRef
6.
Zurück zum Zitat Islam, M., Roy, A., Laskar, R.H.: Neural network based robust image watermarking technique in LWT domain. J. Intell. Fuzzy Syst. 34(3), 1691–1700 (2018)CrossRef Islam, M., Roy, A., Laskar, R.H.: Neural network based robust image watermarking technique in LWT domain. J. Intell. Fuzzy Syst. 34(3), 1691–1700 (2018)CrossRef
7.
Zurück zum Zitat Movaghar, R.K., Bizaki, H.K.: A new approach for digital image watermarking to predict optimal blocks using artificial neural networks. Turkish J. Electrical Eng. Comput. Sci. 25(1), 644–654 (2017)CrossRef Movaghar, R.K., Bizaki, H.K.: A new approach for digital image watermarking to predict optimal blocks using artificial neural networks. Turkish J. Electrical Eng. Comput. Sci. 25(1), 644–654 (2017)CrossRef
8.
Zurück zum Zitat Sun, L., Xu, J., Liu, S., et al.: A robust image watermarking scheme using Arnold transform and BP neural network. Neural Comput. Appl. 30(8), 2425–2440 (2018)CrossRef Sun, L., Xu, J., Liu, S., et al.: A robust image watermarking scheme using Arnold transform and BP neural network. Neural Comput. Appl. 30(8), 2425–2440 (2018)CrossRef
9.
Zurück zum Zitat Zhang, J., Gu, Z., Jang, J., et al.: Protecting intellectual property of deep neural networks with watermarking. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 159–172. ACM (2018) Zhang, J., Gu, Z., Jang, J., et al.: Protecting intellectual property of deep neural networks with watermarking. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 159–172. ACM (2018)
10.
Zurück zum Zitat Nagai, Y., Uchida, Y., Sakazawa, S., et al.: Digital watermarking for deep neural networks. Int. J. Multimedia Inf. Retrieval 7(1), 3–16 (2018)CrossRef Nagai, Y., Uchida, Y., Sakazawa, S., et al.: Digital watermarking for deep neural networks. Int. J. Multimedia Inf. Retrieval 7(1), 3–16 (2018)CrossRef
11.
Zurück zum Zitat Li, L.Z., Gao, T.G., Gu, Q.L., et al.: A zero-watermarking algorithm based on fuzzy adaptive resonance theory. In: 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery, vol. 3, pp. 378–382. IEEE (2009) Li, L.Z., Gao, T.G., Gu, Q.L., et al.: A zero-watermarking algorithm based on fuzzy adaptive resonance theory. In: 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery, vol. 3, pp. 378–382. IEEE (2009)
12.
Zurück zum Zitat Motwani, M., Beke, N., Bhoite, A., et al.: Adaptive fuzzy watermarking for 3D models. In: International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007), vol. 4, pp. 49–53. IEEE (2007) Motwani, M., Beke, N., Bhoite, A., et al.: Adaptive fuzzy watermarking for 3D models. In: International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007), vol. 4, pp. 49–53. IEEE (2007)
13.
Zurück zum Zitat Duong, D.M., Duong, D.A.: A hybrid watermarking scheme using contourlet transform and fuzzy logic. In: 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, pp. 386–390. IEEE (2012) Duong, D.M., Duong, D.A.: A hybrid watermarking scheme using contourlet transform and fuzzy logic. In: 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, pp. 386–390. IEEE (2012)
14.
Zurück zum Zitat Jamali, M., Rafiei, S., Soroushmehr, S.M., et al.: Adaptive image watermarking using human perception based fuzzy inference system. J. Intell. Fuzzy Syst. 1–20 (2018, Preprint) Jamali, M., Rafiei, S., Soroushmehr, S.M., et al.: Adaptive image watermarking using human perception based fuzzy inference system. J. Intell. Fuzzy Syst. 1–20 (2018, Preprint)
15.
Zurück zum Zitat Papakostas, G.A., Tsougenis, E.D., Koulouriotis, D.E.: Fuzzy knowledge-based adaptive image watermarking by the method of moments. Complex Intell. Syst. 2(3), 205–220 (2016)CrossRef Papakostas, G.A., Tsougenis, E.D., Koulouriotis, D.E.: Fuzzy knowledge-based adaptive image watermarking by the method of moments. Complex Intell. Syst. 2(3), 205–220 (2016)CrossRef
16.
Zurück zum Zitat Agarwal, C., Mishra, A., Sharma, A.: A novel gray-scale image watermarking using hybrid Fuzzy-BPN architecture. Egyptian Inform. J. 16(1), 83–102 (2015)CrossRef Agarwal, C., Mishra, A., Sharma, A.: A novel gray-scale image watermarking using hybrid Fuzzy-BPN architecture. Egyptian Inform. J. 16(1), 83–102 (2015)CrossRef
17.
Zurück zum Zitat Loganathan, A., Kaliyaperumal, G.: An adaptive HVS based video watermarking scheme for multiple watermarks using BAM neural networks and fuzzy inference system. Expert Syst. Appl. 63, 412–434 (2016)CrossRef Loganathan, A., Kaliyaperumal, G.: An adaptive HVS based video watermarking scheme for multiple watermarks using BAM neural networks and fuzzy inference system. Expert Syst. Appl. 63, 412–434 (2016)CrossRef
18.
Zurück zum Zitat Mishra, A., Sehra, K., Chetty, G.: Neuro fuzzy architecture for gray scale image watermarking using fractal dimensions. In: 2018 International Joint Conference on Neural Networks (IJCNN), pp. 1–8. IEEE (2018) Mishra, A., Sehra, K., Chetty, G.: Neuro fuzzy architecture for gray scale image watermarking using fractal dimensions. In: 2018 International Joint Conference on Neural Networks (IJCNN), pp. 1–8. IEEE (2018)
19.
Zurück zum Zitat Nobuhara, H., Pedrycz, W., Hirota, K.: A digital watermarking algorithm using image compression method based on fuzzy relational equation. In: 2002 IEEE World Congress on Computational Intelligence. 2002 IEEE International Conference on Fuzzy Systems. FUZZ-IEEE’02. Proceedings (Cat. No. 02CH37291), vol. 2, pp. 1568–1573. IEEE (2002) Nobuhara, H., Pedrycz, W., Hirota, K.: A digital watermarking algorithm using image compression method based on fuzzy relational equation. In: 2002 IEEE World Congress on Computational Intelligence. 2002 IEEE International Conference on Fuzzy Systems. FUZZ-IEEE’02. Proceedings (Cat. No. 02CH37291), vol. 2, pp. 1568–1573. IEEE (2002)
20.
Zurück zum Zitat Moosazadeh, M., Andalib, A.: A new robust color digital image watermarking algorithm in DCT domain using genetic algorithm and coefficients exchange approach. In: 2016 Second International Conference on Web Research (ICWR), pp. 19–24. IEEE (2016) Moosazadeh, M., Andalib, A.: A new robust color digital image watermarking algorithm in DCT domain using genetic algorithm and coefficients exchange approach. In: 2016 Second International Conference on Web Research (ICWR), pp. 19–24. IEEE (2016)
21.
Zurück zum Zitat Takore, T.T., Kumar, P.R., Devi, G.L.: Efficient gray image watermarking algorithm based on DWT-SVD using genetic algorithm. In: 2016 International Conference on Information Communication and Embedded Systems (ICICES), pp. 1–6. IEEE (2016) Takore, T.T., Kumar, P.R., Devi, G.L.: Efficient gray image watermarking algorithm based on DWT-SVD using genetic algorithm. In: 2016 International Conference on Information Communication and Embedded Systems (ICICES), pp. 1–6. IEEE (2016)
22.
Zurück zum Zitat Lai, C.C., Yeh, C.H., Ko, C.H., et al.: Image watermarking scheme using genetic algorithm. In: 2012 Sixth International Conference on Genetic and Evolutionary Computing, pp. 476–479. IEEE (2012) Lai, C.C., Yeh, C.H., Ko, C.H., et al.: Image watermarking scheme using genetic algorithm. In: 2012 Sixth International Conference on Genetic and Evolutionary Computing, pp. 476–479. IEEE (2012)
23.
Zurück zum Zitat Latif, A., Naghsh-Nilchi, A.R., Derhami, V.: A reinforcement learning method for decision making process of watermark strength in still images. Sci. Res. Essays 6(10), 2119–2128 (2011)CrossRef Latif, A., Naghsh-Nilchi, A.R., Derhami, V.: A reinforcement learning method for decision making process of watermark strength in still images. Sci. Res. Essays 6(10), 2119–2128 (2011)CrossRef
24.
Zurück zum Zitat Jang, J.S.R.: Fuzzy modeling using generalized neural networks and kalman filter algorithm. In: AAAI, vol. 91, pp. 762–767 (1991) Jang, J.S.R.: Fuzzy modeling using generalized neural networks and kalman filter algorithm. In: AAAI, vol. 91, pp. 762–767 (1991)
25.
Zurück zum Zitat Jang, J.S.R.: ANFIS: adaptive-network-based fuzzy inference system. IEEE Trans. Syst. Man Cybernet. 23(3), 665–685 (1993)CrossRef Jang, J.S.R.: ANFIS: adaptive-network-based fuzzy inference system. IEEE Trans. Syst. Man Cybernet. 23(3), 665–685 (1993)CrossRef
26.
Zurück zum Zitat Zhao, X.Y., Gang, C.: Ergodic matrix in image encryption. In: Second International Conference on Image and Graphics. International Society for Optics and Photonics, vol. 4875, pp. 394–402 (2002) Zhao, X.Y., Gang, C.: Ergodic matrix in image encryption. In: Second International Conference on Image and Graphics. International Society for Optics and Photonics, vol. 4875, pp. 394–402 (2002)
27.
Zurück zum Zitat Kandi, H., Mishra, D., Gorthi, S.R.K.S.: Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Comput. Secur. 65, 247–268 (2017)CrossRef Kandi, H., Mishra, D., Gorthi, S.R.K.S.: Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Comput. Secur. 65, 247–268 (2017)CrossRef
28.
Zurück zum Zitat Liu, J.X., Wen, X., Yuan, L.M., et al.: A robust approach of watermarking in contourlet domain based on probabilistic neural network. Multimedia Tools Appl. 76(22), 24009–24026 (2017)CrossRef Liu, J.X., Wen, X., Yuan, L.M., et al.: A robust approach of watermarking in contourlet domain based on probabilistic neural network. Multimedia Tools Appl. 76(22), 24009–24026 (2017)CrossRef
29.
Zurück zum Zitat Makbol, N.M., Khoo, B.E.: Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int. J. Electron. Commun. 67(2), 102–112 (2013)CrossRef Makbol, N.M., Khoo, B.E.: Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int. J. Electron. Commun. 67(2), 102–112 (2013)CrossRef
30.
Zurück zum Zitat Rani, A., Raman, B., Kumar, S.: A robust watermarking scheme exploiting balanced neural tree for rightful ownership protection. Multimedia Tools Appl. 72(3), 2225–2248 (2014)CrossRef Rani, A., Raman, B., Kumar, S.: A robust watermarking scheme exploiting balanced neural tree for rightful ownership protection. Multimedia Tools Appl. 72(3), 2225–2248 (2014)CrossRef
31.
Zurück zum Zitat Singh, A.K., Kumar, B., Singh, S.K., et al.: Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Gener. Comput. Syst. 86, 926–939 (2018)CrossRef Singh, A.K., Kumar, B., Singh, S.K., et al.: Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Gener. Comput. Syst. 86, 926–939 (2018)CrossRef
32.
Zurück zum Zitat Cheng, R., Xu, R., Tang, X., et al.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. Comput. Mater. Continua 55(1), 095 (2018) Cheng, R., Xu, R., Tang, X., et al.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. Comput. Mater. Continua 55(1), 095 (2018)
33.
Zurück zum Zitat Cheng, J., Zhou, J., Liu, Q., et al.: A DDoS detection method for socially aware networking based on forecasting fusion feature sequence. Comput. J. 61(7), 959–970 (2018)CrossRef Cheng, J., Zhou, J., Liu, Q., et al.: A DDoS detection method for socially aware networking based on forecasting fusion feature sequence. Comput. J. 61(7), 959–970 (2018)CrossRef
34.
Zurück zum Zitat Cheng, J., Zhang, C., Tang, X., et al.: Adaptive DDoS attack detection method based on multiple-kernel learning. Secur. Commun. Networks 2018 (2018) Cheng, J., Zhang, C., Tang, X., et al.: Adaptive DDoS attack detection method based on multiple-kernel learning. Secur. Commun. Networks 2018 (2018)
35.
Zurück zum Zitat Cheng, J., Li, M., Tang, X., et al.: Flow correlation degree optimization driven random forest for detecting DDoS attacks in cloud computing. Secur. Commun. Networks 2018 (2018) Cheng, J., Li, M., Tang, X., et al.: Flow correlation degree optimization driven random forest for detecting DDoS attacks in cloud computing. Secur. Commun. Networks 2018 (2018)
37.
Zurück zum Zitat Li, J., Liu, Z., Chen, X., Tan, X., Wong, D.S.: L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl.-Based Syst. 79, 18–26 (2015)CrossRef Li, J., Liu, Z., Chen, X., Tan, X., Wong, D.S.: L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl.-Based Syst. 79, 18–26 (2015)CrossRef
42.
Zurück zum Zitat Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Cluster Comput. 16(4), 787–796 (2013)CrossRef Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Cluster Comput. 16(4), 787–796 (2013)CrossRef
44.
Zurück zum Zitat Chen, W., Lei, H., Qi, K.: Lattice-based linearly homomorphic signatures in the standard model. Theor. Comput. Sci. 634, 47–54 (2016)MathSciNetCrossRef Chen, W., Lei, H., Qi, K.: Lattice-based linearly homomorphic signatures in the standard model. Theor. Comput. Sci. 634, 47–54 (2016)MathSciNetCrossRef
45.
Zurück zum Zitat Chen, W., et al.: Inapproximability results for the minimum integral solution problem with preprocessing over infinity norm. Theoret. Comput. Sci. 478, 127–131 (2013)MathSciNetCrossRef Chen, W., et al.: Inapproximability results for the minimum integral solution problem with preprocessing over infinity norm. Theoret. Comput. Sci. 478, 127–131 (2013)MathSciNetCrossRef
Metadaten
Titel
A Blind Watermarking Scheme Using Adaptive Neuro-Fuzzy Inference System Optimized by BP Network and LS Learning Model
verfasst von
Jilin Yang
Chunjie Cao
Jun Zhang
Jixin Ma
Xiaoyi Zhou
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-37352-8_23