Skip to main content
42
Views
253
Downloads
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Reviewed article

A BTC-Based Watermarking Scheme for Digital Images

How to cite:
Shu-Fen Tu, Ching-Sheng Hsu
"A BTC-Based Watermarking Scheme for Digital Images"
Information & Security: An International Journal,
15
no. 2
(2004):
216-228.
http://dx.doi.org/10.11610/isij.1515

A BTC-Based Watermarking Scheme for Digital Images

Source:

Information & Security: An International Journal,
Volume: 15,
Issue2,
p.216-228
(2004)

Abstract:

This article presents a novel watermarking scheme for digital images based on Block Truncation Coding (BTC). Unlike other watermarking schemes, the proposed method does not alter the original image during the process of watermark casting. Instead, an ownership share is constructed as a key to reveal the watermark without resorting to the original image. Moreover, it is possible to register multiple watermarks for a single host image in the proposed scheme. During watermark casting, the feature of the host image, which is extracted by means of BTC, is combined with the watermark to generate an ownership share. When revealing the watermark, the author can address his/her ownership share to extract the watermark. Even though the host image has been attacked, the extracted watermark is still perceivable. Altogether, the method has many other applications besides copyright protection. For example, it can be used to cover the transmission of confidential images. The experimental results of this study show the robustness of the novel scheme against several common attacks.

42
Views
253
Downloads
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
40
Citations
IEEE International Conference on Signal Processing and Communications
(2007):
International Journal of Video&Image Processing and Network Security IJVIPNS-IJENS
16,
no. 3
(2016):
Advanced Informatics School
Master of Computer Science (Information Security)
(2012):
Fifth International Conference on Information Assurance and Security
(2009):
International Information Institute (Tokyo). Information; Koganei
16,
no. 3
(2013):
1861-1872.
Swarm, Evolutionary, and Memetic Computing. SEMCCO 2015. Lecture Notes in Computer Science
(2015):
International Journal on Computer Science and Engineering (IJCSE)
3,
no. 4
(2011):
Intelligent Information and Database Systems. ACIIDS 2011. Lecture Notes in Computer Science
(2011):
International Conference on Communications, Devices and Intelligent Systems (CODIS)
(2012):
14th International Workshop on Systems, Signals and Image Processing and 6th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services
(2007):
The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
(2007):
Eco-friendly Computing and Communication Systems. ICECCS 2012. Communications in Computer and Information Science
(2012):
178-185.
Advances in Intelligent Information and Database Systems. Studies in Computational Intelligence
(2010):
International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
(2016):
Intelligent Information and Database Systems. ACIIDS 2012. Lecture Notes in Computer Science
(2012):
IEEE International Conference on Acoustics, Speech and Signal Processing
(2009):
The International Arab Journal of Information Technology
9,
no. 3
(2012):
Information Technology Journal
10,
no. 7
(2011):
1415-1420.
International MultiConference of Engineers and Computer Scientists, IMECS 2008
(2008):
The Journal of The Institute of Internet, Broadcasting and Communication
14,
no. 2
(0):
11-16 .
International Journal of Applied Engineering Research
11,
no. 5
(2016):
3484-3495.