Reversible Digital Image Watermarking Scheme Using Bit Replacement and Majority Algorithm Technique


The current paper presents a new digital watermarking method through bit replacement technology, which stores mul-tiple copies of the same data that is to be hidden in a scrambled form in the cover image. In this paper an indigenous approach is described for recovering the data from the damaged copies of the data under attack by applying a majority algorithm to find the closest twin of the embedded information. A new type of non-oblivious detection method is also proposed. The improvement in performance is supported through experimental results which show much enhancement in the visual and statistical invisibility of hidden data.

Share and Cite:

K. Pal, G. Ghosh and M. Bhattacharya, "Reversible Digital Image Watermarking Scheme Using Bit Replacement and Majority Algorithm Technique," Journal of Intelligent Learning Systems and Applications, Vol. 4 No. 3, 2012, pp. 199-206. doi: 10.4236/jilsa.2012.43020.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] P. W. Wong, “A Public Key Watermark for Image Verification and Authentication,” Proceedings of the IEEE International Conference on Image Processing, Chicago, 4-7 October 1998, pp. 455-459.
[2] R. C Gonzalez and R. E. Woods, “Digital Image Processing,” Prentice Hall, Upper Saddle River, 2002.
[3] I. J. Cox, M. Miller and J. Bloom, “Digital Watermarking,” Morgan Kaufmann Publishers, Burlington, 2002.
[4] M.Chandra, S. Pandey and R. Chaudhary, “Digital Watermarking Technique for Protecting Digital Images,” 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT),” Chengdu, 9-11 July 2010, pp. 226-233. doi:10.1109/ICCSIT.2010.5565177
[5] M. Kutter and F. A. P. Petitcolas, “A Fair Benchmark for Image Watermarking Systems,” Proceedings of SPIE Security and Watermarking of Multimedia Contents, San Jose, January 1999, pp. 226-239.
[6] R. M. Prasad and S. Koliwad, “A Robust Wavelet-Based Watermarking Scheme for Copyright Protection of Digital Images,” International Conference on Computing Communication and Networking Technologies (ICCCNT), Karur, 29-31 July 2010, pp. 1-9.
[7] M. L. Miller, I. J. Cox, J. M. G. Linnartz and T. Kalker, “A Review of Watermarking Principles and Practices,” In: K. K. Parhi and T. Nishitani, Eds., Digital Signal Processing for Multimedia Syatems, Marcel Dekker Inc., New York, 1999, pp. 461-485.
[8] D. Osborne, D. Abbott, M. Sorell and D. Rogers, “Multiple Embedding Using Robust Watermarks for Wireless Medical Images,” IEEE Symposium on Electronics and Telecommunications, Timisoara, October 2004, pp. 245-250.
[9] N. V. Dharwadkar, B. B. Amberker, Supriya and P. B. Panchannavar, “Reversible Fragile Medical Image Watermarking with Zero Distortion,” International Conference on Computer and Communication Technology (ICCCT), 17-19 September 2010.
[10] D. Coltuc, “Low Distortion Transform for Reversible Watermarking,” IEEE Transactions on Image Processing, Vol. 21, No. 1, 2012, pp. 412-417.
[11] J. Fridrich, et al., “Lossless Data Embedding for All Image Formats,” Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents, San Jose, January 2002, pp. 572-583.
[12] H. Huang, G. Coatrieux, H. Z. Shu, L. M. Luo and C. Roux, “Medical Image Integrity Control and Forensics Based on Watermarking—Approximating Local Modifications and Identifying Global Image Alterations,” Annual International Conference of the IEEE on Engineering in Medicine and Biology Society, Boston, 30 August-3 September 2001, pp. 8062-8065.
[13] M. A. Dorairangaswamy and B. Padhmavathi, “An Effective Blind Watermarking Scheme for Protecting Rightful Ownership of Digital Images,” IEEE Region 10 Conference, TENCON 2009, Singapore, 23-26 January 2009, pp. 1-6.
[14] Ling Na Hu Ling Ge Jiang, “Blind Detection of LSB Watermarking at Low Embedding Rate in Grayscale Images,” In: M. Celik, G. Sharma, E. Saber and A. Tekalp, Eds., Hierarchical Watermarking for secure Image Authentication with Localization, IEEE Transactions on Image Process, Vol. 11, No. 6, 2002, pp. 585-595.
[15] N. F. Johnson, Z. Duric and S. Jajodia, “Information Hiding: Steganography and Watermarking—Attacks and Countermeasures,” Kluwer Academic Press, Norwell, 2001,
[16] P. Wong, “A Watermark for Image Integrity and Ownership Verification,” Image Processing, Image Quality, Image Capture Systems Conference, Portland, May 1998, pp. 374-379.
[17] Y. Q. Shi, “Reversible Data Hiding,” Digital Watermarking, Vol. 3304, 2005, pp. 1-12. doi:10.1007/978-3-540-31805-7_1
[18] E. T. Lin and E. J. Delp, “A Review of Fragile Image Watermarks,” Proceedings of the Multimedia and Security Workshop at ACM Multimedia’99, Orlando, October 1999, pp. 35-39.
[19] K. Pal, G. Ghosh and M. Bhattacharya, “A Novel Digital Image Watermarking Scheme for Data Security Using Bit Replacement and Majority Algorithm Technique,” Watermarking, Vol. 1, 2012, pp. 117-132.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.