Skip to main content
Log in

An oblivious fragile watermarking scheme for images utilizing edge transitions in BTC bitmaps

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

As one of the famous block-based image coding schemes, block truncation coding (BTC) has been also applied in digital watermarking. Previous BTC-based watermarking or hiding schemes usually embed secret data by modifying the BTC encoding stage or BTC-compressed data, obtaining the watermarked image with poorer quality than the BTC-compressed version. This paper presents a new oblivious image watermarking scheme by exploiting BTC bitmaps. Unlike the traditional schemes, our approach does not really perform the BTC compression on images during the embedding process but utilizes the parity of the number of horizontal edge transitions in each BTC bitmap to guide the watermark embedding and extraction processes. The embedding process starts by partitioning the original cover image into non-overlapping 4×4 blocks and performing BTC on each block to obtain its BTC bitmap. One watermark bit is embedded in each block by modifying at most three pixel values in the block to make sure that the parity of the number of horizontal edge transitions in the bitmap of the modified block is equal to the embedded watermark bit. In the extraction stage, the suspicious image is first partitioned into non-overlapping 4×4 blocks and BTC is performed on each block to obtain its bitmap. Then, by checking the parity of the number of horizontal edge transitions in the bitmap, we can extract one watermark bit in each block. Experimental results demonstrate that the proposed watermarking scheme is fragile to various image processing operations while keeping the transparency very well.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Niu X M, Lu Z M, Sun S H. Digital watermarking of still images with gray-level digital watermarks. IEEE Trans Consum Electron, 2000, 46: 137–145

    Article  Google Scholar 

  2. Niu X M, Lu Z M, Sun S H. Digital image watermarking based on multi-resolution decomposition. Electron Lett, 2000, 36: 1108–1110

    Article  Google Scholar 

  3. Luo H, Yu F X, Huang Z L, et al. Blind image watermarking based on discrete fractional random transform and subsampling. Optik — Int J Light Electron Opt, 2011, 122: 311–316

    Article  Google Scholar 

  4. Wang H X, Lu Z M, Li Y N, et al. A compressed domain multipurpose video watermarking algorithm using vector quantization. Int J Innov Comput Inform Contr, 2009, 5: 1441–1450

    Google Scholar 

  5. Wang Y G, Lu Z M, Liang F, et al. Robust dual watermarking algorithm for AVS video. Signal Process Image Commun, 2009, 24: 333–344

    Article  Google Scholar 

  6. Wang H X, Lu Z M, Pan J S, et al. Robust blind video watermarking with adaptive embedding mechanism. Int J Innov Comput Inform Contr, 2005, 1: 247–259

    Google Scholar 

  7. Wu C H, Zheng Y, Ip W H, et al. A flexible H.264/AVC compressed video watermarking scheme using particle swarm optimization based dither modulation. AEU — Int J Electron Commun, 2011, 65: 27–36

    Article  Google Scholar 

  8. Lu Z M, Yan B, Sun S H. Watermarking combined with CELP speech coding for authentication. IEICE Trans Inform Syst, 2005, E88-D: 330–334

    Article  Google Scholar 

  9. Yan B, Lu Z M, Sun S H. Security of autoregressive speech watermarking model under guessing attack. IEEE Trans Inform Forens Secur, 2006, 1: 386–390

    Article  Google Scholar 

  10. Lu Z M, Pan J S, Sun S H. VQ-based digital image watermarking method. Electron Lett, 2000, 36: 1201–1202

    Article  Google Scholar 

  11. Lu Z M, Sun S H. Digital image watermarking technique based on vector quantization. Electron Lett, 2000, 36: 303–305

    Article  Google Scholar 

  12. Lu Z M, Liu C H, Sun S H. Digital image watermarking technique based on block truncation coding with vector quantization. Chin J Electron, 2002, 11: 152–157

    Google Scholar 

  13. Dong P, Brankov J G, Galatsanos N P, et al. Digital watermarking robust to geometric distortions. IEEE Trans Image Process, 2005, 14: 2140–2150

    Article  Google Scholar 

  14. Zhao Y, Ni R, Zhu Z. RST transforms resistant image watermarking based on centroid and sector-shaped partition. Sci China Inf Sci, 2012, 55: 650–662

    Article  MathSciNet  Google Scholar 

  15. Kalantari N K, Ahadi S M. A logarithmic quantization index modulation for perceptually better data hiding. IEEE Trans Image Process, 2010, 19: 1504–1517

    Article  MathSciNet  Google Scholar 

  16. Lu Z M, Liu C H, Xu D G, et al. Semi-fragile image watermarking method based on index constrained vector quantization. Electron Lett, 2003, 39: 35–36

    Article  Google Scholar 

  17. Yang C N, Lu Z M. Blind fragile image watermarking based on vector quantization and block truncation coding. ICIC Expr Lett Part B Appl, 2011, 2: 905–910

    Google Scholar 

  18. Lu Z M, Xu D G, Sun S H. Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans Image Process, 2005, 14: 822–831

    Article  Google Scholar 

  19. Lu Z M, Liu C H, Wang H. Image retrieval and content integrity verification based on multipurpose image watermarking scheme. Int J Innov Comput Inform Contr, 2007, 3: 621–630

    Google Scholar 

  20. Luo H, Pan J S, Lu Z M. Content adaptive visible watermarking during ordered dithering. IEICE Trans Inform Syst, 2007, E90-D: 1113–1116

    Article  Google Scholar 

  21. Delp E J, Mitchell O R. Image compression using block truncation coding. IEEE Trans Commun, 1979, 27: 1335–1342

    Article  Google Scholar 

  22. Lema M D, Mitchell O R. Absolute moment block truncation coding and its application to color images. IEEE Trans Commun, 1984, 32: 1148–1157

    Article  Google Scholar 

  23. Lu Z M, Liu C H, Sun S H. Digital image watermarking technique based on block truncation coding with vector quantization. Chin J Electron, 2002, 11: 152–157

    Google Scholar 

  24. Lin M H, Chang C C. A novel information hiding scheme based on BTC. In: Proc 4th Int Conf Computer and Information Technology, Wuhan, 2004

  25. Chuang J C, Chang C C. Using a simple and fast image compression algorithm to hide secret information. Int J Comput Appl, 2006, 28: 329–333

    Google Scholar 

  26. Hong W, Chen T S, Shiu C W. Lossless steganography for AMBTC compressed images. In: Proc 1st Int Congress on Image and Signal Processing, Sanya, 2008

  27. Chen J, Hong W, Chen T S, et al. Steganography for BTC compressed images using no distortion technique. Imag Sci J, 2010, 58: 177–185

    Article  Google Scholar 

  28. Li C H, Lu Z M, Su Y X. Reversible data hiding for BTC-compressed images based on bitmap flipping and histogram shifting of mean tables. Inform Technol J, 2011, 10: 1421–1426

    Article  Google Scholar 

  29. Wang Y, Huang J W. Robust AVS audio watermarking. Sci China Inf Sci, 2010, 53: 607–618

    Article  Google Scholar 

  30. Wang H X, Fan M Q. Centroid-based semi-fragile audio watermarking in hybrid domain. Sci China Inf Sci, 2010, 53: 619–633

    Article  MATH  Google Scholar 

  31. Luo X Y, Liu F L, Yang C F, et al. Image universal steganalysis based on best wavelet packet decomposition. Sci China Inf Sci, 2010, 53: 634–647

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to ZheMing Lu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, Y., Lu, Z. & Zhao, D. An oblivious fragile watermarking scheme for images utilizing edge transitions in BTC bitmaps. Sci. China Inf. Sci. 55, 2570–2581 (2012). https://doi.org/10.1007/s11432-012-4677-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-012-4677-5

Keywords

Navigation