Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 931672, 14 pages
http://dx.doi.org/10.1155/2015/931672
Research Article

An Image Watermarking Scheme Using Arnold Transform and Fuzzy Smooth Support Vector Machine

1College of Computer and Information Engineering, Henan Normal University, Henan 453007, China
2Engineering Technology Research Center for Computing Intelligence and Data Mining, Henan 453007, China
3Engineering Laboratory of Intellectual Business and Internet of Things Technologies, Henan 453007, China
4College of Information Science and Technology, Beijing Normal University, Beijing 100875, China

Received 10 October 2014; Revised 2 January 2015; Accepted 5 January 2015

Academic Editor: Daniel Zaldivar

Copyright © 2015 Lin Sun et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

With the development of information security, the traditional encryption algorithm for image has been far from ensuring the security of image in the transmission. This paper presents a new image watermarking scheme based on Arnold Transform (AT) and Fuzzy Smooth Support Vector Machine (FSSVM). First of all, improved AT (IAT) is obtained by adding variables and expanding transformation space, and FSSVM is proposed by introducing fuzzy membership degree. The embedding positions of watermark are obtained from IAT, and the pixel values are embedded in carrier image by quantization embedding rules. Then, the watermark can be embedded in carrier image. In order to realize blind extraction of watermark, FSSVM model is used to find the embedding positions of watermark, and the pixel values are extracted by using quantization extraction rules. Through using improved Arnold inverse transformation for embedding positions, the watermark coordinates can be calculated, and the extraction of watermark is carried out. Compared with other watermarking techniques, the presented scheme can promote the security by adding more secret keys, and the imperceptibility of watermark is improved by introducing quantization rules. The experimental results show that the proposed method outperforms many existing methods against various types of attacks.