Using Color Converting to Hide Image Information

  • Wen-Pinn FangEmail author
  • Yu-Feng Huang
  • Lu-Hsuan Li
  • Yan-Ru Pan
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 81)


Recently, it is very popular to convert image or video to different format. For example, copy a color printed paper to gray scale paper or show video with different devices. This paper proposes a fast removable watermark generating method. The watermark disappears after the watermarked image converts to another format. As a gray image can be generated from different color images with same converting approach, the goal of this paper has been achieved. An example shows that it is possible to create recoverable contour style watermark by control hue and saturation properly. A vision quality optimum approach also presented. The advantages of proposed method includes the recover image is identical to the converted image without watermark, people can remove the watermark without computer or the computational cost is very low. The result of this paper is useful for secret removing or demo video transmitting.


Lossless recovery Watermark Fragile Color model Color converting 


  1. 1.
    Yang, H., Yin, J.: A secure removable visible watermarking for BTC compressed images. Multimed. Tools Appl. 74(6), 1725–1739 (2015)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Barni, M., Bartolini, F.: Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker, New York (2004)Google Scholar
  3. 3.
    Lin, W., Zhao, H., Liu, K.: Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks. IEEE Trans. Multimedia 13(2), 191–205 (2011)CrossRefGoogle Scholar
  4. 4.
    Rial, A., Deng, M., Bianchi, T., Piva, A., Preneel, B.: A provably secure anonymous buyer-seller watermarking protocol. IEEE Trans. Inf. Forensics Secur. 5(4), 920–931 (2010)CrossRefGoogle Scholar
  5. 5.
  6. 6.
  7. 7.
    Cox, I.J.: Digital watermarking and steganography. Morgan Kaufmann, Burlington (2008)Google Scholar
  8. 8.
    Mintzer, F., et al.: Safeguarding digital library contents and users. D-lib Mag. 3(7/8) (1997)Google Scholar
  9. 9.
    Honsinger, C.W., et al.: Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 21 August 2001Google Scholar
  10. 10.
    Agarwal, H., Sen, D., Raman, B., Kankanhalli, M.: Visible watermarking based on importance and just noticeable distortion of image regions. Multimed. Tools Appl. 75, 7605–7629 (2015). 25 p.CrossRefGoogle Scholar
  11. 11.
    Fragoso-Navarro, E., et al.: Visible watermarking technique in compressed domain based on JND. In: 2015 Proceedings of the 12th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE). IEEE (2015)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Wen-Pinn Fang
    • 1
    Email author
  • Yu-Feng Huang
    • 1
  • Lu-Hsuan Li
    • 1
  • Yan-Ru Pan
    • 1
  1. 1.Yuan Ze UniversityTaoyuan CityTaiwan (R.O.C.)

Personalised recommendations