A Blind Image Watermarking Scheme Utilizing BTC Bitplanes

A Blind Image Watermarking Scheme Utilizing BTC Bitplanes

Chun-Ning Yang (Zhejiang University, China) and Zhe-Ming Lu (Zhejiang University, China)
Copyright: © 2011 |Pages: 12
DOI: 10.4018/jdcf.2011100104
OnDemand PDF Download:
No Current Special Offers


This paper presents a novel image watermarking scheme utilizing Block Truncation Coding (BTC). This scheme uses BTC to guide the watermark embedding and extraction processes. During the embedding process, the original cover image is first partitioned into non-overlapping 4×4 blocks. Then, BTC is performed on each block to obtain its BTC bitplane, and the number of ‘1’s in the bitplane is counted. If the watermark bit to be embedded is ‘1’ and the number of ‘1’s is odd, or the watermark bit to be embedded is ‘0’ and the number of ‘1’s is even, then no change is made. Otherwise, by changing at most three pixels in the original image block, the number of ‘1’s (or ‘0’s) in the renewed bitplane are forced to be odd for the watermark bit ‘1’ or to be even for the watermark bit ‘0’. During the extraction process, BTC is first performed on each block to obtain its bitplane. If the number of ‘1’s in the bitplane is odd, then the embedded watermark bit is ‘1’. Otherwise, the embedded watermark bit is ‘0’. The experimental results show that the proposed watermarking method is semi-fragile except for the changes in brightness and contrast; therefore, the proposed method can be used for image authentication.
Article Preview


In the digital information network age, many media formats are easy to copy using a machine, allowing consumers to distribute copies via the Internet to their friends. On the other hand, digital media can be easily edited and modified by various multimedia tools. As a result, copy protection, digital rights management and content authentication have become three urgent and serious issues in the digital world. Copy protection refers to the technology attempting to frustrate copying, and not to make the legal remedies available to users whose copyrights are violated. Digital rights management (DRM) stands for the access control technology used by hardware manufacturers, publishers, copyright holders and individuals to inhibit uses of digital content that is not desired or intended by the content provider. Unlike data authentication techniques that check whether the data have been changed or not, content authentication refers to the technique used to verify whether the content or semantics of the media has been changed or not. Over the last two decades, digital watermarking has provided an effective solution to above problems. Digital watermarking describes the technologies to embed information, for example a number or a text or an image, into the digital media, such as images (Niu et al., 2000a, 2000b; Luo et al., 2011), video (Wang et al., 2005; Wang, Lu, Li, & Sun, 2009; Wang, Lu, Liang, & Zheng, 2009; Wu et al., 2011) and audio (Lu et al., 2005b; Yan et al., 2006), in order to protect the copyright or authenticate the content.

Complete Article List

Search this Journal:
Volume 14: 2 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing