{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:47:11Z","timestamp":1777704431927,"version":"3.51.4"},"reference-count":50,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2018,8,31]],"date-time":"2018-08-31T00:00:00Z","timestamp":1535673600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,10,27]]},"abstract":"<jats:p>Development of digital content has increased the necessity of copyright protection using watermarking. Imperceptibility and robustness are two important features of watermarking algorithms. The goal of watermarking methods is to satisfy the tradeoff between these two contradicting characteristics. Recently, watermarking methods in transform domains have displayed favorable results. In this paper, we present an adaptive blind watermarking method, which has high imperceptibility in areas that are important to the human visual system. We propose a fuzzy system to control the embedding strength factor adaptively. Image saliency, intensity, and edge-concentration are shown to be important to a human observer and are hence used as fuzzy attributes. Embedding is performed in the discrete cosine transform of the wavelet domain to achieve high imperceptibility and acceptable robustness. Experimental results show the superiority of the proposed algorithm over comparable methods.<\/jats:p>","DOI":"10.3233\/jifs-171805","type":"journal-article","created":{"date-parts":[[2018,8,31]],"date-time":"2018-08-31T12:02:07Z","timestamp":1535716927000},"page":"4589-4608","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":5,"title":["Adaptive image watermarking using human perception based fuzzy inference system"],"prefix":"10.1177","volume":"35","author":[{"given":"Maedeh","family":"Jamali","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Isfahan University of Technology, Isfahan, Iran"}]},{"given":"Shima","family":"Rafiei","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Isfahan University of Technology, Isfahan, Iran"}]},{"given":"S.M. Reza","family":"Soroushmehr","sequence":"additional","affiliation":[{"name":"Department of Computational Medicine and Bioinformatics, University of Michigan, Ann Arbor, USA"}]},{"given":"Nader","family":"Karimi","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Isfahan University of Technology, Isfahan, Iran"}]},{"given":"Shahram","family":"Shirani","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, McMaster University, Hamilton, Canada"}]},{"given":"Kayvan","family":"Najarian","sequence":"additional","affiliation":[{"name":"Department of Computational Medicine and Bioinformatics, University of Michigan, Ann Arbor, USA"}]},{"given":"Shadrokh","family":"Samavi","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Isfahan University of Technology, Isfahan, Iran"},{"name":"Department of Computational Medicine and Bioinformatics, University of Michigan, Ann Arbor, USA"},{"name":"Department of Electrical and Computer Engineering, McMaster University, Hamilton, Canada"}]}],"member":"179","published-online":{"date-parts":[[2018,8,31]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.7753\/IJCATR0503.1006"},{"key":"e_1_3_1_3_2","first-page":"337","article-title":"A review study on digital watermarking","author":"Liu J.","year":"2005","unstructured":"J.Liu and X.He, A review study on digital watermarking, in Proc IEEE International Conference on Information and Communication Technology, 2005, pp. 337\u2013341.","journal-title":"in Proc IEEE International Conference on Information and Communication Technology"},{"key":"e_1_3_1_4_2","first-page":"709","article-title":"A survey of digital image watermarking techniques","author":"Potdar V.M.","year":"2005","unstructured":"V.M.Potdar, S.Han and E.Chang, A survey of digital image watermarking techniques, in Proc IEEE International Conference on Industrial Informatics, 2005, pp. 709\u2013716.","journal-title":"in Proc IEEE International Conference on Industrial Informatics"},{"key":"e_1_3_1_5_2","first-page":"117","article-title":"Robust hash for detecting and localizing image tampering","volume":"6","author":"Roy S.","year":"2007","unstructured":"S.Roy and Q.Sun, Robust hash for detecting and localizing image tampering, in Proc IEEE Int Conf Image Process (ICIP), vol. 6, 2007, pp. 117\u2013120.","journal-title":"in Proc IEEE Int Conf Image Process (ICIP)"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2028251"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.04.026"},{"key":"e_1_3_1_8_2","first-page":"717","article-title":"Robust histogram shape-based method for image watermarking","author":"Zong T.","year":"2014","unstructured":"T.Zong, Y.Xiang, I.Natgunanathan, S.Guo, W.Zhou and G.Beliakov, Robust histogram shape-based method for image watermarking, IEEE Transactions on Circuits and Systems for Video Technology (2014), 717\u2013729.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2118216"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/83.967401"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2003.817155"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2009.027523"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2016.02.005"},{"key":"e_1_3_1_14_2","first-page":"1","article-title":"Framework for robust blind image watermarking based on classification of attacks","author":"Heidari M.","year":"2016","unstructured":"M.Heidari, S.Samavi, S.M.R.Soroushmehr, S.Shirani, N.Karimi and K.Najarian, Framework for robust blind image watermarking based on classification of attacks, Multimedia Tools and Applications (2016), 1\u201321.","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.07.003"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1579-5"},{"key":"e_1_3_1_17_2","first-page":"218","article-title":"A fuzzy watermarking approach based on the human visual system","author":"Oueslati S.","year":"2010","unstructured":"S.Oueslati, A.Cherif and B.Solaiman, A fuzzy watermarking approach based on the human visual system, International Journal of Image Processing (2010), 218\u2013231.","journal-title":"International Journal of Image Processing"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1729-y"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.02.095"},{"key":"e_1_3_1_20_2","first-page":"505","article-title":"Survey of wavelet-domain watermarking algorithms","author":"Meerwald P.","year":"2001","unstructured":"P.Meerwald and U.Andreas, Survey of wavelet-domain watermarking algorithms, International Society for Optics and Photonics (2001), 505\u2013516.","journal-title":"International Society for Optics and Photonics"},{"key":"e_1_3_1_21_2","first-page":"709","article-title":"A survey of digital image watermarking techniques","author":"Potdar V.M.","year":"2005","unstructured":"V.M.Potdar, S.Han and E.Chang, A survey of digital image watermarking techniques, in Proce IEEE International Conference on Industrial Informatics, 2005, pp. 709\u2013716.","journal-title":"in Proce IEEE International Conference on Industrial Informatics"},{"key":"e_1_3_1_22_2","first-page":"1","article-title":"Colour image watermarking based on wavelet and QR decomposition","author":"Rasti P.","year":"2017","unstructured":"P.Rasti, G.Anbarjafari and H.Demirel, Colour image watermarking based on wavelet and QR decomposition, In Proc of IEEE Signal Processing and Communications Applications Conference, 2017, pp. 1\u20134.","journal-title":"In Proc of IEEE Signal Processing and Communications Applications Conference"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2010.2066770"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.02.036"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.03.060"},{"key":"e_1_3_1_26_2","first-page":"2614","article-title":"A New Watermarking Algorithm Based on DCT and DWT Fusion","author":"Bin W.H.","year":"2010","unstructured":"W.H.Bin, Y.H.Liang, W.C.Dong and W.S.Ming, A New Watermarking Algorithm Based on DCT and DWT Fusion, in Proc International Conference on Electrical and Control Engineering, 2010, pp. 2614\u20132617.","journal-title":"in Proc International Conference on Electrical and Control Engineering"},{"key":"e_1_3_1_27_2","first-page":"740","article-title":"Combined DWT-DCT digital image watermarking","author":"Al-Haj A.","year":"2007","unstructured":"A.Al-Haj, Combined DWT-DCT digital image watermarking, Journal of Computer Science (2007), 740\u2013746.","journal-title":"Journal of Computer Science"},{"key":"e_1_3_1_28_2","first-page":"166","article-title":"Robust DWT-SVD domain image watermarking: Embedding data in all frequencies","author":"Ganic E.","year":"2004","unstructured":"E.Ganic and A.M.Eskicioglu, Robust DWT-SVD domain image watermarking: Embedding data in all frequencies, in Proc workshop on Multimedia and Security, 2004, 166\u2013174.","journal-title":"in Proc workshop on Multimedia and Security"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2163627"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2013.0386"},{"key":"e_1_3_1_31_2","article-title":"Perceptual copyright protection using multiresolution wavelet-based watermarking and fuzzy logic","author":"Hsieh M.S.","year":"2010","unstructured":"M.S.Hsieh, Perceptual copyright protection using multiresolution wavelet-based watermarking and fuzzy logic, arXiv preprint arXiv:1007.5136, 2010.","journal-title":"arXiv preprint arXiv:1007.5136"},{"key":"e_1_3_1_32_2","first-page":"4261","article-title":"Wavelet based fuzzy perceptual maskfor images","author":"Motwani M.C.","year":"2009","unstructured":"M.C.Motwani, R.C.Motwani and F.C.Harris, Wavelet based fuzzy perceptual maskfor images, in Proc IEEE International Conference on Image Processing (ICIP), 2009, pp. 4261\u20134264.","journal-title":"in Proc IEEE International Conference on Image Processing (ICIP)"},{"key":"e_1_3_1_33_2","article-title":"Logo based image copyright protection using discrete wavelet transform and fuzzy inference system","author":"Jabade V.S.","year":"2012","unstructured":"V.S.Jabade and S.R.Gengaje, Logo based image copyright protection using discrete wavelet transform and fuzzy inference system, International Journal of Computer Applications (2012).","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_1_34_2","first-page":"3645","article-title":"Enhancing robustness of digital image watermarks using Contourlet transform","author":"Ghannam S.","year":"2009","unstructured":"S.Ghannam and F.E.Abou-Chadi, Enhancing robustness of digital image watermarks using Contourlet transform, in Proc IEEE International Conference on In Image Processing, 2009, pp. 3645\u20133648.","journal-title":"in Proc IEEE International Conference on In Image Processing"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3200-6"},{"key":"e_1_3_1_36_2","first-page":"1","article-title":"Robust image watermarking scheme using bit-plane of Hadamard coefficients","author":"Etemad E.","year":"2017","unstructured":"E.Etemad, S.Samavi, S.R.Soroushmehr, N.Karimi, M.Etemad, S.Shirani and K.Najarian, Robust image watermarking scheme using bit-plane of Hadamard coefficients, Multimedia Tools and Applications (2017), 1\u201323.","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_3_1_37_2","first-page":"6739","article-title":"Elevating watermark robustness by data diffusion in Contourlet coefficients","author":"Kaviani H.R.","year":"2012","unstructured":"H.R.Kaviani, S.Samavi, N.Karimi and S.Shirani, Elevating watermark robustness by data diffusion in Contourlet coefficients, IEEE International Conference on Communications (ICC), 2012, pp. 6739\u20136743.","journal-title":"IEEE International Conference on Communications (ICC)"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2038774"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2508147"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2146250"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2012.0693"},{"key":"e_1_3_1_42_2","article-title":"Graph-based visual saliency","author":"Harel J.","year":"2006","unstructured":"J.Harel, C.Koch and P.Perona, Graph-based visual saliency, in NIPS, 2006.","journal-title":"NIPS"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.3390\/info8030097"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1541-0"},{"key":"e_1_3_1_45_2","first-page":"1","article-title":"A comparative study and measuring performance of manufacturing systems with Mamdani fuzzy inference system","author":"Pourjavad E.","year":"2017","unstructured":"E.Pourjavad and R.V.Mayorga, A comparative study and measuring performance of manufacturing systems with Mamdani fuzzy inference system, Journal of Intelligent Manufacturing (2017), 1\u201313.","journal-title":"Journal of Intelligent Manufacturing"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.3233\/IFS-141378"},{"key":"e_1_3_1_47_2","unstructured":"Available at: http:\/\/www.decsai.ugr.es\/cvg\/dbimagenes\/index.php"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.07.003"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0042-6989(00)00031-6"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.visres.2006.08.019"},{"key":"e_1_3_1_51_2","author":"Gonzalez R.C.","year":"2012","unstructured":"R.C.Gonzalez and R.E.Woods, Digital image processing, 2012.","journal-title":"Digital image processing"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-171805","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-171805","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-171805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:12Z","timestamp":1777455672000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-171805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,31]]},"references-count":50,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10,27]]}},"alternative-id":["10.3233\/JIFS-171805"],"URL":"https:\/\/doi.org\/10.3233\/jifs-171805","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,31]]}}}