List of Journals    /    Call For Papers    /    Subscriptions    /    Login
By Author By Title
 About CSC Journals
 CSC Journals Objectives
 List of Journals
 Call For Papers CFP
 Special Issue CFP
 Submission Guidelines
 Peer Review Process
 Helpful Hints For Getting Published
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 Reviewer Guidelines
 Editor Guidelines
 Join Us As Editor
 Launch Special Issue
 Suggest New Journal
 Browse CSC Library
 Open Access Policy
 Conference Partnership Program (CPP)
 Abstracting & Indexing
 Discounted Packages
 Archival Subscriptions
 How to Subscribe
 Subscriptions Agents
 Order Form
A Fuzzy Watermarking Approach Based on Human Visual System
Full text
International Journal of Image Processing (IJIP)
Table of Contents
Download Complete Issue    PDF(20.36MB)
Volume:  4    Issue:  3
Pages:  192-286
Publication Date:   July 2010
ISSN (Online): 1985-2304
218 - 231
Oueslati Sameh - Tunisia
Adnane Cherif - Tunisia
Basel Solaiman - France
Published Date   
CSC Journals, Kuala Lumpur, Malaysia
Keywords   Abstract   References   Cited by   Related Articles   Collaborative Colleague
KEYWORDS:   Digital watermarking, Fuzzy inference system, insertion force, The human visual system, Robustness 
This Manuscript is indexed in the following databases/websites:-
1. Directory of Open Access Journals (DOAJ)
3. Docstoc
4. Scribd
5. WorldCat
6. Google Scholar
7. Bielefeld Academic Search Engine (BASE)
8. Socol@r
9. iSEEK
The implementation of our watermarking system is based on a hybrid system combining the human visual system (HVS) and the fuzzy inference system (FIS), which always passes through the transcription of human expertise in the form of fuzzy rules expressed in natural language, which allows our watermarking system remain understandable for non expert and become more friendly. The technique discussed in this paper is the use of an advanced approach to the technique of watermark that is the multi-watermark or the watermarking multiple of medical images in the frequency domain. In this approach, the emphasis will be on the safe side and the invisibility while maintaining robustness against a certain target range of attacks. Furthermore, this approach is based on an entirely blind technique which we will detail later. 
1 A.B. Watson, “DCT: A technique for visual optimization of DCT quantization matrices for individual images”. Society for Information Display Digest of Technical Papers, pp. 946-949, 1993
2 N.S. Jayant, J.D. Johnson and R. Safranek. “Signal compression based on models of human perception”. Proceedings of IEEE, Volume 81, No. 10, pp. 1385-1422, 1993
3 B. Miladi, M. Sayadi and F. Fnaiech. “Textures synthesis methods”. International Conference on Electrical Systems and Automatic control, Tunisia, 2010
4 S. Zaboli, A. Tabibiazar and R. Safabakhsh. “Entropy-Based image watermarking using DWT and HVS”. 3rd International Conference of Sciences of Electronic, Technologies of Information and Telecommunications, Tunisia, 2005
5 F.Davoine and S.Pateux. “Tatouage de documents audiovisuels numériques”. Livre édition Hermès Lavoisier, traité IC2 Série Traitement du signal et de l’image, (2004).
6 Patrick Bas and François Cayre, Natural Watermarking: a secure spread spectrum technique for WOA Information Hiding”, pp.1-14, 4437, 2006
7 Coatrieux G.,Puentes J.,Lecornu L., Roux. C., “Compliant secured specialized electronic patient record platform”. In D2H2'00, Proceedings of D2H2, Washington, Etats-Unis, 2006
8 P. Bas, F. Cayre, B. Mathon. “Techniques sures de tatouage pour l’image”. Compression et Représentation des Signaux Audiovisuels, Montpellier, France, 2007
9 N. Palluat. ”Méthodologie de surveillance dynamique à l'aide des réseaux neuro-fous temporels”. PhD Thesis, University of Franche-Comte, 2006
10 O. Cadet. ”Méthodes d'ondelettes pour la segmentation d'images : Applications à l'imagerie médicale et au tatouage d'images”. PhD Thesis at the Polytechnic Institute of Grenoble, 2004
11 B. Mathon, P. Bas, F. Cayre. “Practical performance analysis of secure modulations for WOA spread-spectrum based image watermarking”. Multimedia and Security Workshop, Dallas, Texas, USA, 2007
12 L. Lin, I. J. Cox and G. Doerr. “An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking”. IEEE Int. Conference on Image Processing, 2005
13 M. Vincent. “Contribution des filtres LPTV et des techniques d’interpolation au tatouage numérique”. PhD Thesis presented in Toulouse, 2006
14 A. Westfeld. “A Regression-Based Restoration Technique for Automated Watermark Removal”. Multimedia & Security ACM Workshop MMSEC, Oxford, United Kingdom 2008
15 C. REY. “Tatouage d’image: Gain en robustesse et intégrité des images”. PhD Thesis, University of Avignon and Pays de Vaucluse, 2003
16 G. Coatrieux M. Lamard, W.J. Puente, and C. Roux “A low distortion and reversible watermark: Application to angiographic images of the retina”. In EMBC'05, Proceedings of Int. Conference of the IEEE-EMBS, p. 2224-2227, Shangaï, Chine, 2005
17 A. Zaid. “Compression et tatouage d’images à des fins d’archivage et de transmission : application aux images médicale”. Habilitation University El Manar, Tunisia, April 2009
18 J.Reichel and M.Kunt. “Performance comparison of masking models based on a new psychovisual test method with natural scenery stimuli”. Signal processing: Image communication, 17:807-823, 2002
19 M.Kutter and S.Winkler. “A Vision-based Masking Model for Spread-Spectrum Image Watermarking”. IEEE Transactions on Image processing, 1(2): 244-250, 2002
20 N.sakr et al. “Copyright protection of learning using wavelet objects using wavelet-based watermarking and fuzzy logic, 3rd annual e-learning conference on Intelligent Interactive learning Object”. Repositories Montreal. Quebec, Canada, 2006
21 J.Zhao, E.Koch. “Towards robust and hidden image copyright labelling”. IEEE Workshop on Nonlinear Signal and Image Processing, 1995
22 S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj. “Close Color Pair Signature Ensemble Adaptive Threshold based Steganalysis for LSB Embedding in Digital Images”. Transactions on Data Privacy, pp. 140 – 161, 2008
23 M. Barni, F. Bartolini, V. Cappellini and A. Piva, “A DCT domain system for robust image watermarking”. Signal Processing, vol. 66, no. 3, pp. 357-372, 1998
24 G. Coatrieux, H. Maitre. “Images médicales, sécurité et tatouage”. Annales des Télécommunications, Numéro Spécial Santé, vol. 58, p. 782-800, 2003
25 S. Pereira. “Robust Digital Image Watermarking”. PhD Thesis, University of Geneva, 2000
Oueslati Sameh : Colleagues
Adnane Cherif : Colleagues
Basel Solaiman : Colleagues  
  Untitled Document
Copyrights (c) 2012 Computer Science Journals. All rights reserved.
Best viewed at 1152 x 864 resolution. Microsoft Internet Explorer.
Copyrights & Usage: Articles published by CSC Journals are Open Access. Permission to copy and distribute any other content, images, animation and other parts of this website is prohibited. CSC Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.