Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 931672, 14 pages
http://dx.doi.org/10.1155/2015/931672
Research Article

An Image Watermarking Scheme Using Arnold Transform and Fuzzy Smooth Support Vector Machine

1College of Computer and Information Engineering, Henan Normal University, Henan 453007, China
2Engineering Technology Research Center for Computing Intelligence and Data Mining, Henan 453007, China
3Engineering Laboratory of Intellectual Business and Internet of Things Technologies, Henan 453007, China
4College of Information Science and Technology, Beijing Normal University, Beijing 100875, China

Received 10 October 2014; Revised 2 January 2015; Accepted 5 January 2015

Academic Editor: Daniel Zaldivar

Copyright © 2015 Lin Sun et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. G. A. Papakostas, E. D. Tsougenis, and D. E. Koulouriotis, “Moment-based local image watermarking via genetic optimization,” Applied Mathematics and Computation, vol. 227, pp. 222–236, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. B.-Z. Li and Y.-P. Shi, “Image watermarking in the linear canonical transform domain,” Mathematical Problems in Engineering, vol. 2014, Article ID 645059, 9 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. N. M. Makbol and B. E. Khoo, “Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition,” AEU—International Journal of Electronics and Communications, vol. 67, no. 2, pp. 102–112, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. Y. Naderahmadian and S. Hosseini-Khayat, “Fast and robust watermarking in still images based on QR decomposition,” Multimedia Tools and Applications, vol. 72, no. 3, pp. 2597–2618, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. M. Ali, C. W. Ahn, and M. Pant, “A robust image watermarking technique using SVD and differential evolution in DCT domain,” Optik—International Journal for Light and Electron Optics, vol. 125, no. 1, pp. 428–434, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. A. Mishra, C. Agarwal, A. Sharma, and P. Bedi, “Optimized gray-scale image watermarkingusing DWT-SVD and firefly algorithm,” Expert Systems with Applications, vol. 41, no. 17, pp. 7858–7867, 2014. View at Publisher · View at Google Scholar
  7. E. Nezhadarya and R. K. Ward, “Multiscale derivative transform and its application to image watermarking,” Digital Signal Processing, vol. 33, pp. 148–155, 2014. View at Publisher · View at Google Scholar
  8. M. Mundher, D. Muhamad, A. Rehman, T. Saba, and F. Kausar, “Digital watermarking for images security using discrete slantlet transform,” Applied Mathematics & Information Sciences, vol. 8, no. 6, pp. 2823–2830, 2014. View at Publisher · View at Google Scholar
  9. A. K. Singh, M. Dave, and A. Mohan, “Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain,” National Academy Science Letters, vol. 37, no. 4, pp. 351–358, 2014. View at Publisher · View at Google Scholar
  10. L. Sui and B. Gao, “Color image encryption based on gyrator transform and Arnold transform,” Optics and Laser Technology, vol. 48, pp. 530–538, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. Z. Liu, L. Xu, T. Liu et al., “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Optics Communications, vol. 284, no. 1, pp. 123–128, 2011. View at Publisher · View at Google Scholar · View at Scopus
  12. M. R. Abuturab, “Securing color information using Arnold transform in gyrator transform domain,” Optics and Lasers in Engineering, vol. 50, no. 5, pp. 772–779, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. L. F. Chen, D. M. Zhao, and F. Ge, “Image encryption based on singular value decomposition and Arnold transform in fractional domain,” Optics Communications, vol. 291, pp. 98–103, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. Y.-L. Chen, H.-T. Yau, and G.-J. Yang, “A maximum entropy-based chaotic time-variant fragile: watermarking scheme for image tampering detection,” Entropy, vol. 15, no. 8, pp. 3170–3185, 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. S. Sadasivam, P. Moulin, and T. P. Coleman, “A message-passing approach to combating desynchronization attacks,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 894–905, 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. X.-Y. Wang, E.-N. Miao, and H.-Y. Yang, “A new SVM-based image watermarking using Gaussian-Hermite moments,” Applied Soft Computing, vol. 12, no. 2, pp. 887–903, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. H.-Y. Yang, X.-Y. Wang, and C.-P. Wang, “A robust digital watermarking algorithm in undecimated discrete wavelet transform domain,” Computers and Electrical Engineering, vol. 39, no. 3, pp. 893–906, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. L. D. Li, S. S. Li, A. Abraham, and J. S. Pan, “Geometrically invariant image watermarking using Polar Harmonic Transforms,” Information Sciences, vol. 199, pp. 1–19, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. I. Nasir, F. Khelifi, J. Jiang, and S. Ipson, “Robust image watermarking via geometrically invariant feature points and image normalisation,” IET Image Processing, vol. 6, no. 4, pp. 354–363, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. X. Wang, Z. Xu, and P. Niu, “A feature-based digital watermarking scheme for halftone image,” AEU: International Journal of Electronics and Communications, vol. 64, no. 10, pp. 924–933, 2010. View at Publisher · View at Google Scholar · View at Scopus
  21. Y. Fu, R. Shen, and H. Lu, “Watermarking scheme based on support vector machine for colour images,” Electronics Letters, vol. 40, no. 16, pp. 986–987, 2004. View at Publisher · View at Google Scholar · View at Scopus
  22. H.-H. Tsai and D.-W. Sun, “Color image watermark extraction based on support vector machines,” Information Sciences, vol. 177, no. 2, pp. 550–569, 2007. View at Publisher · View at Google Scholar · View at Scopus
  23. C. H. Li, Z. D. Lu, and K. Zhou, “An image watermarking technique based on support vector regression,” in Proceedings of the International Symposium on Communications and Information Technologies (ISCIT '05), pp. 177–180, October 2005. View at Publisher · View at Google Scholar · View at Scopus
  24. H. Peng, J. Wang, and W. X. Wang, “Image watermarking method in multiwavelet domain based on support vector machines,” Journal of Systems and Software, vol. 83, no. 8, pp. 1470–1477, 2010. View at Publisher · View at Google Scholar · View at Scopus
  25. H.-H. Tsai, H.-C. Tseng, and Y.-S. Lai, “Robust lossless image watermarking based on α-trimmed mean algorithm and support vector machine,” Journal of Systems and Software, vol. 83, no. 6, pp. 1015–1028, 2010. View at Publisher · View at Google Scholar · View at Scopus
  26. C.-H. Li, H.-F. Ling, and Z.-D. Lu, “Semi-fragile watermarking based on SVM for image authentication,” in IEEE International Conference onMultimedia and Expo (ICME '07), pp. 1255–1258, July 2007. View at Publisher · View at Google Scholar · View at Scopus