{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T17:18:15Z","timestamp":1718817495636},"reference-count":24,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10,1]]},"abstract":"<p>This paper presents a novel image watermarking scheme utilizing Block Truncation Coding (BTC). This scheme uses BTC to guide the watermark embedding and extraction processes. During the embedding process, the original cover image is first partitioned into non-overlapping 4\u00d74 blocks. Then, BTC is performed on each block to obtain its BTC bitplane, and the number of \u20181\u2019s in the bitplane is counted. If the watermark bit to be embedded is \u20181\u2019 and the number of \u20181\u2019s is odd, or the watermark bit to be embedded is \u20180\u2019 and the number of \u20181\u2019s is even, then no change is made. Otherwise, by changing at most three pixels in the original image block, the number of \u20181\u2019s (or \u20180\u2019s) in the renewed bitplane are forced to be odd for the watermark bit \u20181\u2019 or to be even for the watermark bit \u20180\u2019. During the extraction process, BTC is first performed on each block to obtain its bitplane. If the number of \u20181\u2019s in the bitplane is odd, then the embedded watermark bit is \u20181\u2019. Otherwise, the embedded watermark bit is \u20180\u2019. The experimental results show that the proposed watermarking method is semi-fragile except for the changes in brightness and contrast; therefore, the proposed method can be used for image authentication.<\/p>","DOI":"10.4018\/jdcf.2011100104","type":"journal-article","created":{"date-parts":[[2012,1,13]],"date-time":"2012-01-13T16:38:20Z","timestamp":1326472700000},"page":"42-53","source":"Crossref","is-referenced-by-count":6,"title":["A Blind Image Watermarking Scheme Utilizing BTC Bitplanes"],"prefix":"10.4018","volume":"3","author":[{"given":"Chun-Ning","family":"Yang","sequence":"first","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Zhe-Ming","family":"Lu","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]}],"member":"2432","reference":[{"key":"jdcf.2011100104-0","doi-asserted-by":"publisher","DOI":"10.1179\/136821910X12651933390629"},{"key":"jdcf.2011100104-1","doi-asserted-by":"publisher","DOI":"10.2316\/Journal.202.2006.4.202-1735"},{"key":"jdcf.2011100104-2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1979.1094560"},{"key":"jdcf.2011100104-3","doi-asserted-by":"crossref","unstructured":"Hong, W., Chen, T. S., & Shiu, C. W. (2008). Lossless steganography for AMBTC compressed images. In Proceedings of the First International Congress on Image and Signal Processing (Vol. 2, pp. 13-17).","DOI":"10.1109\/CISP.2008.638"},{"key":"jdcf.2011100104-4","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1984.1095973"},{"issue":"3","key":"jdcf.2011100104-5","doi-asserted-by":"crossref","first-page":"1421","DOI":"10.3923\/itj.2011.1421.1426","article-title":"Reversible data hiding for BTC-compressed images based on bitplane flipping and histogram shifting of mean tables.","volume":"10","author":"C. H.Li","year":"2011","journal-title":"Information Technology Journal"},{"key":"jdcf.2011100104-6","unstructured":"Lin, M. H., & Chang, C. C. (2004). A novel information hiding scheme based on BTC. In Proceedings of the Fourth International Conference on Computer and Information Technology (pp. 66-71)."},{"issue":"2","key":"jdcf.2011100104-7","first-page":"152","article-title":"Digital image watermarking technique based on block truncation coding with vector quantization.","volume":"11","author":"Z. M.Lu","year":"2002","journal-title":"Chinese Journal of Electronics"},{"issue":"3","key":"jdcf.2011100104-8","first-page":"621","article-title":"Image retrieval and content integrity verification based on multipurpose image watermarking scheme. International Journal of Innovative Computing","volume":"3","author":"Z. M.Lu","year":"2007","journal-title":"Information and Control"},{"key":"jdcf.2011100104-9","doi-asserted-by":"publisher","DOI":"10.1049\/el:20030041"},{"key":"jdcf.2011100104-10","doi-asserted-by":"publisher","DOI":"10.1049\/el:20000876"},{"key":"jdcf.2011100104-11","doi-asserted-by":"publisher","DOI":"10.1049\/el:20000309"},{"key":"jdcf.2011100104-12","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.847324"},{"key":"jdcf.2011100104-13","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/E88-D.2.330"},{"key":"jdcf.2011100104-14","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e90-d.7.1113"},{"key":"jdcf.2011100104-15","doi-asserted-by":"crossref","unstructured":"Luo, H., Yu, F. X., Huang Z. L., & Lu, Z. M. (2011). Blind image watermarking based on discrete fractional random transform and subsampling. Optik - International Journal for Light and Electron Optics, 122(4), 311-316.","DOI":"10.1016\/j.ijleo.2009.12.018"},{"key":"jdcf.2011100104-16","doi-asserted-by":"publisher","DOI":"10.1109\/30.826391"},{"key":"jdcf.2011100104-17","doi-asserted-by":"publisher","DOI":"10.1049\/el:20000819"},{"issue":"5","key":"jdcf.2011100104-18","first-page":"1441","article-title":"A compressed domain multipurpose video watermarking algorithm using vector quantization. International Journal of Innovative Computing","volume":"5","author":"H. X.Wang","year":"2009","journal-title":"Information and Control"},{"issue":"2","key":"jdcf.2011100104-19","first-page":"247","article-title":"Robust blind video watermarking with adaptive embedding mechanism. International Journal of Innovative Computing","volume":"1","author":"H. X.Wang","year":"2005","journal-title":"Information and Control"},{"key":"jdcf.2011100104-20","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2009.03.004"},{"key":"jdcf.2011100104-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2010.02.003"},{"key":"jdcf.2011100104-22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.879285"},{"issue":"4","key":"jdcf.2011100104-23","first-page":"905","article-title":"Blind fragile image watermarking based on vector quantization and block truncation coding.","volume":"2","author":"C. N.Yang","year":"2011","journal-title":"ICIC Express Letters Part B: Applications"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=62077","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:17:00Z","timestamp":1654121820000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2011100104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,10,1]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,10]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2011100104","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,10,1]]}}}