Multimedia Systems

, Volume 25, Issue 5, pp 551–563 | Cite as

Cloud image watermarking: high quality data hiding and blind decoding scheme based on block truncation coding

  • Yung-Yao ChenEmail author
  • Kuan-Yu Chi
Special Issue Paper


Cloud computing is an Internet-based computing model that shares computing resources such as computers, servers, and storage. In future smart cities, new applications can take advantage of cloud computing; for example, a cloud-based home health-care system can provide immediate disease management by analyzing medical images. However, if the size of cloud data is large (e.g., medical images), their transition through the Internet is time consuming. Cloud data authentication is another problem that should be addressed. To address the aforementioned problems, this study presents a novel data hiding method based on the block truncation coding (BTC) image compression technique. This method has two advantages: reduces image size and increases security. This study also proposes a block classification scheme for determining smooth blocks, complex_1 blocks, and complex_2 blocks in an image. Secret data are embedded in these three block types using different approaches. To improve the quality of images without damaging the secret data, we propose a progressive data hiding strategy and integrating an iteration-based halftoning method into BTC. When decoding, the secret data are extracted without recalling the original image. According to experimental results, the proposed method outperforms existing methods in both embedding capacity and image quality evaluations.


Cloud data security Data hiding Blind decoding Block truncation coding (BTC) Direct binary search (DBS) 



This work was supported in part by the Ministry of Science and Technology (104-2221-E-027-032).


  1. 1.
    Deng, M., Petkovic, M., Nalin, M., Baroni, I.: A home healthcare system in the cloud-addressing security and privacy challenges. In: Proc. IEEE Int. Conf. Cloud, Computing, pp. 549–556 (2011)Google Scholar
  2. 2.
    Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)CrossRefGoogle Scholar
  3. 3.
    Jiang, R.: Advanced secure user authentication framework for cloud computing. Int. J. Smart Sens. Intell. Syst. 6(4), 1700–1724 (2013)CrossRefGoogle Scholar
  4. 4.
    Arka, I., Chellappan, K.: Collaborative compressed i-cloud medical image storage with decompress viewer. Procedia Comput. Sci. 42, 114–121 (2014)CrossRefGoogle Scholar
  5. 5.
    Podilchuk, C., Delp, E.: Digital watermarking: algorithms and applications. IEEE Signal Process. Mag. 18, 33–46 (2001)CrossRefGoogle Scholar
  6. 6.
    Chan, P.W., Lyu, M.R., Chin, R.T.: A novel scheme for hybrid digital video watermarking: approach, evaluation and experimentation. IEEE Trans. Circuits Syst. Video Technol. 15, 1638–1649 (2005)CrossRefGoogle Scholar
  7. 7.
    Panah, A.S., Schyndel, R.V., Sellis, T., Bertino, E.: On the properties of non-media digital watermarking: a review of state of the art techniques. In: IEEE, Access, pp. 2670–2704 (2016)Google Scholar
  8. 8.
    Chen, P., Lin, H.: A dwt based approach for image steganography. Int. J. Appl. Sci. Eng. 4, 275–290 (2006)Google Scholar
  9. 9.
    Shejul, A.A., Kulkarni, U.L.: A dwt based approach for steganography using biometrics. In: Proc. IEEE Int. Conf. Data Storage and Data, Engineering, pp. 39–43 (2010)Google Scholar
  10. 10.
    Parah, S.A., Sheikh, J.A., Loan, N.A., Bhat, G.M.: Robust and blind watermarking technique in dct domain using inter-block coefficient differencing. Digit. Signal Process. 53, 11–24 (2016)CrossRefGoogle Scholar
  11. 11.
    Chang, C., Hsiao, J., Chan, C.: Finding optimal lsb substitution in image hiding by dynamic programming strategy. Pattern Recognit. 36(7), 1583–1595 (2003)CrossRefGoogle Scholar
  12. 12.
    Balasubramanian, C., Selvakumar, S., Geetha, S.: High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimed. Tools Appl. 73(3), 2223–2245 (2014)CrossRefGoogle Scholar
  13. 13.
    Parah, S.A., Sheikh, J.A., Assad, U.I., Bhat, G.M.: Hiding in encrypted images: a three tier security data hiding system. In: Multidimensional systems and Signal Processing, pp. 1–24 (2015)Google Scholar
  14. 14.
    Delp, E., Mitchell, O.: Image compression using block truncation coding. IEEE Trans. Commun. 27(9), 1335–1342 (1979)CrossRefGoogle Scholar
  15. 15.
    Lema, M., Mitchell, O.: Absolute moment block truncation coding and its application to color images. IEEE Trans. Commun. 32(10), 1148–1157 (1984)CrossRefGoogle Scholar
  16. 16.
    Hong, W., Chen, T., Shiu, C.: Lossless steganography for ambtc-compressed images. In: Proc. IEEE Congress on Image and Signal Processing, pp. 13–17 (2008)Google Scholar
  17. 17.
    Chen, J., Hong, W., Shiu, C.: Steganography for btc compressed images using no distortion technique. Imaging Sci J 58(4), 177–185 (2010)CrossRefGoogle Scholar
  18. 18.
    Yang, H., Yin, J.: A secure removable visible watermarking for btc compressed images. Multimed. Tools Appl. 74(6), 1725–1739 (2015)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Ou, D., Sun, W.: High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed. Tools Appl. 74(21), 9117–9139 (2015)CrossRefGoogle Scholar
  20. 20.
    Chang, C., Liu, Y., Nguyen, S.T.: A novel data hiding scheme for block truncation coding compressed images using dynamic programming strategy. In: SPIE Int. Conf. Graphic and Image Processing (ICGIP), pp. 1–10 (2015)Google Scholar
  21. 21.
    Tang, M., Zeng, S., Chen, X., Hu, J., Du, Y.: An adaptive image steganography using ambtc compression and interpolation technique. Optik (Int. J. Light Electron Opt.) 127, 471–477 (2016)CrossRefGoogle Scholar
  22. 22.
    Huang, Y., Chang, C., Chen, Y.: Hybrid secret hiding schemes based on absolute moment block truncation coding. In: Multimedia tools and applications, pp. 1–16 (2016)Google Scholar
  23. 23.
    Hong, W., Chen, T., Yin, Z., Luo, B., Ma, Y.: Data hiding in ambtc images using quantization level modification and perturbation technique. In: Multimedia tools and applications, pp. 1–22 (2016)Google Scholar
  24. 24.
    Lin, C., Huang, Y., Tai, W.: Novel image authentication scheme for ambtc-compressed images. In: Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 134–137 (2014)Google Scholar
  25. 25.
    Li, W., Lin, C., Pan, J.: Novel image authentication scheme with fine image quality for btc-based compressed images. In: Multimedia Tools and Applications, pp. 4771–4793 (2015)CrossRefGoogle Scholar
  26. 26.
    Lin, C., Huang, Y., Tai, W.: A novel hybrid image authentication scheme based on absolute moment block truncation coding. In: Multimedia tools and applications, pp. 1–26 (2015)CrossRefGoogle Scholar
  27. 27.
    Zhang, Y., Guo, S., Lu, Z., Luo, H.: Reversible data hiding for btc-compressed images based on lossless coding of mean tables. IEICE Trans. Commun. E96-B, 624–631 (2013)CrossRefGoogle Scholar
  28. 28.
    Chang, I., Hu, Y., Chen, W., Lo, C.: High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding. Signal Process. 108, 376–388 (2015)CrossRefGoogle Scholar
  29. 29.
    Floyd, R., Steinberg, L.: An adaptive algorithm for spatial grayscale. In: Proc. Int. Conf. SID Dig. Soc. Inform. Display, pp. 75–77 (1976)Google Scholar
  30. 30.
    Guo, J., Su, C.: Improved block truncation coding using extreme mean value scaling and block-based high speed direct binary search. IEEE Signal Process. Lett. 18, 694–697 (2011)CrossRefGoogle Scholar
  31. 31.
    Analoui, M., Allebach, J.P.: Model-based halftoning using direct binary search. In: Proc. SPIE, Human Vision, Visual Processing, and Digital Display III, vol. 1666, pp. 96–108 (1992)Google Scholar
  32. 32.
    Olmos, A., Kingdom, F.A.: A biologically inspired algorithm for the recovery of shading and reflectance images. Perception 33, 1463–1473 (2004)CrossRefGoogle Scholar
  33. 33.
    Rosset, A., Spadola, L., Ratib, O.: Osirix: An open-source software for navigating in multidimensional dicom images. J. Digit. Imaging 17(3), 205–216 (2004)CrossRefGoogle Scholar
  34. 34.
    Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13, 600–612 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany 2017

Authors and Affiliations

  1. 1.Graduate Institute of Automation TechnologyNational Taipei University of TechnologyTaipeiTaiwan, ROC

Personalised recommendations