CN103034971A - BTC-combined visible watermark erasing scheme - Google Patents

BTC-combined visible watermark erasing scheme Download PDF

Info

Publication number
CN103034971A
CN103034971A CN201310012513XA CN201310012513A CN103034971A CN 103034971 A CN103034971 A CN 103034971A CN 201310012513X A CN201310012513X A CN 201310012513XA CN 201310012513 A CN201310012513 A CN 201310012513A CN 103034971 A CN103034971 A CN 103034971A
Authority
CN
China
Prior art keywords
watermark
original image
visible
image
btc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310012513XA
Other languages
Chinese (zh)
Inventor
杨恒伏
李勇帆
田祖伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310012513XA priority Critical patent/CN103034971A/en
Publication of CN103034971A publication Critical patent/CN103034971A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a BTC (Block Truncation Coding)-combined visible watermark erasing scheme, which comprises three steps of computing a watermark embedding factor, embedding a watermark, and erasing a visible watermark and restoring an original image. First, a non-watermark region pixel is used for predicting a watermark region pixel so as to generate an original image prediction version. Next, an adaptive embedding factor is computed according to perceptual characteristics of the prediction version. Then, watermark information is adaptively embedded into the original image BTC visibly. In addition, the chaotically encrypted watermark is invisibly embedded into the original image BTC in a lossless manner so as to prevent the visible watermark from being erased illegally. At the receiving end, only an authorized user can accurately extract binary watermark information so as to successfully erase the visible watermark and restore the original image. According to the BTC-combined visible watermark erasing scheme, an explicit copyright notice is provided while the high-quality image browsing is provided for the authorized user; the computational complexity is low; and the real-time communication security of digital images in network environment can be guaranteed.

Description

A kind of erasable visible watermark scheme in conjunction with the BTC coding
Technical field
The invention belongs to the multi-media information security field; relate to a kind of erasable visible watermark scheme in conjunction with the BTC coding; particularly utilize visible watermark to realize the explicit copyright notice of multimedia; authorized user obtains the high definition carrier data by effective removal visible watermark, Protection of consumer and copyright owner's legitimate rights and interests.
Background technology
The digital picture visible watermarking technique is rendered as carrier image by watermark in the self-adaptation of initial carrier image a kind of explicit copyright notice is provided, and does not have watermark extracting or testing process, is a kind of effectively Digital Media copyright protection mode directly perceived.Common visible watermark can be introduced distortion inevitably, causes the initial carrier visual quality of images to descend.Although this distortion is not serious, in fields such as Medical Image Processing, the processing of military image, engineering drawing processing, law evidence obtainings, for the consideration of the factors such as fidelity, technique, law, the image deterioration that this distortion causes is not allowed.This has just proposed the requirement to erasable visible watermark.Hu etc. (2006) have proposed a kind of erasable visible watermark algorithm in DCT territory of user key control.This algorithm is that different user embeds similar but the watermark version (list of references [1]: Y. J. Hu that digital content is different of vision, S. Kwong and J. Huang, " An algorithm for removable visible watermarking; " IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 1, pp. 129 – 133, Jan. 2006.).Yang etc. (2008) are on the basis of considering DCT coefficient visual characteristic, a kind of erasable visible watermark algorithm (list of references [2]: Y. Yang is proposed, X. Sun, H. Yang, and C. T. Li. " Removable visible image watermarking algorithm in the discrete cosine transform domain; " Journal of Electronic Imaging, vol. 17, no. 3, pp. 033008-1 – 033008-11, Jul.-Sep. 2008.), this algorithm is embedded in the original image by the pre-service watermark self-adaptation that key is relevant, illegally removes to stop visible watermark.But these two kinds of algorithms all need original visible watermark information when visible watermark is removed, and this transmission demand to original watermark information under real time environment or low-bandwidth condition is unpractical.In above two kinds of algorithms, the disabled user can remove visible watermark preferably by the key of minor alteration in addition, generates the original image approximate version of better quality, and this can not stop illegal removal visible watermark.Yip etc. (2006) have designed two kinds of reversible visible watermark schemes (list of references [3]: S. K. Yip, O. C. Au, C. W. Ho and H. M. Wong, " Lossless visible watermarking; " in Proc. Int. Conf. Multimedia and Expo., 2006, pp. 853-856.): PVMA (Pixel Value Matching Algorithm) and PPSA (Pixel Position Shift Algorithm), they adopt respectively dijection mapping function and circulation pixel shift to embed visible watermark.Liu and Tsai utilizes one to one, and Compound Mappings realizes that visible watermark embeds and original image Distortionless (list of references [4]: T. Y. Liu and W. H. Tsai, " Generic Lossless Visible Watermarking-A New Approach; " IEEE Transactions on Image Processing, vol. 19, no. 5, pp. 1224-1234, May 2010.).Though document [3], [4] described scheme Distortionless original image needs original watermark information in original image rejuvenation, and watermark is clear not in the concealed image (containing the visible watermark image), visibility is not high.Other has the reversible visible watermark scheme of a class to utilize the lossless data hiding technology that some are embedded in the image-carrier about the additional information of watermark or original image is harmless, thereby the additional information of utilizing Distortionless to go out is removed visible watermark.The embedding of additional information can reduce the visible watermark sharpness undoubtedly.In general, above erasable visible watermark scheme is not all carried out in compression domain, and its practicality is not strong, is difficult to be applied to the internet environment multimedia realtime communication.
Summary of the invention
1. technical matters:
There is certain defect in existing erasable visible watermark scheme, or can't stop the disabled user only illegally to remove visible watermark by the key of subtle change, or the participation of process need original watermark information is removed in watermark, and scarcely directly carrying out visible watermark for compressed image embeds, its practicality is not strong, is difficult to be applied to the internet and communicates by letter with the mobile computing environment multimedia digital.
2. technical scheme:
A kind of erasable visible watermark scheme in conjunction with the BTC coding of the present invention comprises that watermark embeds factor calculating, watermark embedding, visible watermark is removed and original image recovers altogether three phases.Idiographic flow is:
(1) watermark embeds factor calculating
Step 1: read original image, obtain image B TC coding
Figure 402927DEST_PATH_IMAGE001
, i=1,2 ..., p, and
Figure 964358DEST_PATH_IMAGE002
, wherein m* nBe the image size, s* sBe image block size in the BTC cataloged procedure.
Step 2: reading in size is
Figure 529332DEST_PATH_IMAGE003
Two-value visible watermark image W, according to watermark information, original image can be divided into watermark areas and non-watermark areas (i.e. the corresponding watermark areas of 0 pixel, the corresponding non-watermark areas of 1 pixel).
Step 3: go to predict watermark areas image block average according to the neighborhood pixels predicted method by non-watermark areas image block average, obtain prediction average image
Figure 626006DEST_PATH_IMAGE004
Step 4: by prediction average image version Calculate the smoothness properties of each piecemeal of image
Figure 551423DEST_PATH_IMAGE005
With the brightness sensitivity characteristic
Figure 338113DEST_PATH_IMAGE006
, and derive thus BTC each image block sight factor of encoding
Figure 446884DEST_PATH_IMAGE007
, be shown below.
Figure 995939DEST_PATH_IMAGE008
(1)
Step 5: for avoiding causing concealed image (containing the visible watermark image) visual quality obviously to descend because embedment strength difference is excessive, will
Figure 774539DEST_PATH_IMAGE007
Normalize to the interval [ r 1 , r 2 ] in, namely get the image block self-adaptation and embed the factor
Figure 173159DEST_PATH_IMAGE009
, get in the experiment r 1 =0.1, r 2 =0.3.
Figure 288883DEST_PATH_IMAGE010
(2)
(2) watermark embeds
Step 1: two-dimentional visible watermark is converted to the one dimension watermark signal, namely W=
Step 2: to each tlv triple of image B TC coding , embed the visible watermark signal with self-adaptation, tlv triple after must adjusting by adjusting to some extent its quantized level
Figure 790512DEST_PATH_IMAGE012
, the visible watermark embedding strategy is shown below,
Figure 850872DEST_PATH_IMAGE013
(3)
Wherein T,
Figure 873055DEST_PATH_IMAGE014
Be respectively the image block BTC coded quantization level that embeds after the visible watermark information, namely t
Figure 118091DEST_PATH_IMAGE015
,
Figure 960145DEST_PATH_IMAGE016
Parameter ρ 1 , ρ 2 Be user's defining constant, and
Figure 824196DEST_PATH_IMAGE017
, The watermark component W A And gray threshold G 1 For experience often is worth, usually get in the experiment W A =20 Hes G 1 =128.This embedding strategy is so that visible watermark has respectively high and low gray-scale value at darker and brighter background area, and this can guarantee that the visible watermark that embeds has higher sharpness.
Step 3: utilize chaotic maps that the one dimension watermark signal is encrypted pre-service.
Step 4: utilize lossless data hiding method, by adjusting the encode magnitude relationship of two quantized levels of image block BTC, the watermark signal that will add after chaos encryption is processed is embedded in the image B CT coding with invisible mode, and the image block BTC coding tlv triple after note is adjusted again is
Figure 618288DEST_PATH_IMAGE019
After whole encrypted watermark bits embeddings are complete, namely produce final concealed image I w
(3) visible watermark is removed with original image and is recovered
Step 1: read concealed image I w , obtain image B TC coding.
Step 2: according to concealed image B TC coding tlv triple In two quantum step sizes relations extract encrypted watermark information, utilize with the watermark embed process same key it carried out chaos decode, obtain watermark signal, and recover each tlv triple that only contains visible watermark information
Step 3: the watermark information according to recovering is divided into watermark areas and non-watermark areas with concealed image.
Step 4: utilize the neighborhood pixels predicted method by the non-watermark areas BTC coded prediction of concealed image watermark areas image block average, can obtain an average image prediction version (since watermark embed before and after average image prediction data produces by non-watermark areas pixel prediction, therefore the original image mean prediction version of the concealed image mean prediction version that produces here and the generation of watermark embedding stage is consistent).
Step 5: according to the watermark embed process same procedure, calculate the visible watermark self-adaptation by concealed image prediction version and embed the factor.
Step 6: to each image block in the concealed image, its BTC coding tlv triple is
Figure 877734DEST_PATH_IMAGE012
, then can remove the visible watermark component by formula (4).Until after all images piecemeal watermark component is removed, namely recover original image.
Figure 339939DEST_PATH_IMAGE020
(4)
Wherein
Figure 655121DEST_PATH_IMAGE014
, tBe respectively the piecemeal BTC coded quantization level of concealed image and Recovery image, namely
Figure 251187DEST_PATH_IMAGE016
, t
Figure 836889DEST_PATH_IMAGE015
3. beneficial effect:
Adopt technical scheme provided by the invention, compare with existing correlation technique a few days ago, have following distinguishing feature and advantage:
(1) the concealed image visual effect of embedding visible watermark is good.To dissimilar image, its PNSR value on average can reach more than 24.50 dB, can satisfy preferably domestic consumer to the demand of tentatively browsing of digital visual media.
(2) watermark observability is good.Because the watermark self-adaptation embeds the calculating of the factor and takes into full account the image perception characteristic, visible watermark all has the embedment strength visible watermark contrast of appropriateness high in different brightness, different texture zone, and human eye can clearly pick out the visible watermark in the concealed image.This can play the effect that shows copyright notice effectively.
(3) visible watermark strong robustness.The signal processing operations such as common figure image intensifying, image sharpening, image filtering, compression of images, conspiracy attack, binaryzation are difficult to remove the visible watermark in the concealed image.
(4) high-quality original image recovers.The authorized user that has password can effectively be removed visible watermark, and high quality resume goes out original image.Than document [2] method, the original image PNSR value that method of the present invention recovers on average will exceed more than 8.0 dB.This can guarantee that authorized user browses demand to the high-quality of visual media.
(5) safe.The present invention's key space that proposes a plan is 10 30, can effectively stop exhaustive attack, even and have faint different key and also can't correctly remove visible watermark.When the disabled user uses and with correct key key (only key last different) the removal watermark of subtle change to be arranged, it is following (at this moment that the original image PSNR value that the inventive method recovers is low to moderate 19.0 dB, the original image that recovers has no value for use), compare with document [2] method, its PSNR value on average will be hanged down more than 18.0 dB.This can stop unauthorized user to obtain the high definition visual media preferably.
(6) real-time.Method of the present invention realizes in image B TC coding since BTC coding techniques computation complexity low, simple, be easy to realization, so that this scheme can better be applied to network real time environment digital visual medium copyright protection and secure communication.
Description of drawings
Fig. 1 is that visible watermark embeds factor calculation flow chart
Fig. 2 is that watermark of the present invention embeds process flow diagram
Fig. 3 is that visible watermark of the present invention is removed and original image recovery process flow diagram
Embodiment
The below provides possible Application Example of technical scheme that the present invention proposes.The technical scheme that copyright owner or publisher propose by the present invention obtains original image BTC coding, directly in the BTC coding corresponding BTC compressed image is carried out visible watermark and embed, and watermark data can't harm and is hidden in its BTC encodes after will encrypting.The BTC compressed image that will embed again visible watermark is uploaded to network, browses use for domestic consumer.But domestic consumer can't correctly not extract watermark information owing to there being correct key, thereby can not effectively remove visible watermark information.Played so preferably copyright notice.On the other hand, user's wish interested obtains high-quality image copyright, can obtain correct key with effective removal visible watermark by buying copyright, reaches high-quality and browses demand.
Embodiment is:
(1) visible watermark embeds factor calculating
With reference to Fig. 1, it is as follows that visible watermark embeds factor calculating idiographic flow.
Step 1: read original image, obtain image B TC coding
Figure 469996DEST_PATH_IMAGE001
, i=1,2 ..., p, and
Figure 305097DEST_PATH_IMAGE002
, wherein m* nBe the image size, s* sBe image block size in the BTC cataloged procedure,
Figure 409581DEST_PATH_IMAGE021
Be respectively two quantized levels that are higher than the piecemeal average and are lower than average,
Figure 256314DEST_PATH_IMAGE022
Be image block position diagram (be higher than the corresponding position of average value 1, otherwise value 0).
Step 2: reading in size is Two-value visible watermark image W, according to watermark information, original image can be divided into watermark areas
Figure 976195DEST_PATH_IMAGE023
With non-watermark areas (i.e. the corresponding watermark areas of 0 pixel, the corresponding non-watermark areas of 1 pixel).
Step 3: by image B TC each tlv triple of encoding
Figure 615303DEST_PATH_IMAGE001
, calculate a Mean Matrix L, its element value is as follows:
Figure 947802DEST_PATH_IMAGE025
(1)
Wherein For in the image block more than or equal to the number of pixels of piecemeal average.
Step 4: for matrix LBut in the watermark areas pixel value, can use the neighborhood pixels predicted method, by in the image block neighborhood non-watermark areas image block average and watermark areas image block the prediction average produce, thereby obtain predicting the average image
Figure 312105DEST_PATH_IMAGE004
So, the average image Each pixel value can be calculated by formula (2),
Figure 731771DEST_PATH_IMAGE027
(2)
Wherein
Figure 733487DEST_PATH_IMAGE028
={ image block block iNon-watermark block in the neighborhood }, ={ image block block iObtained to predict the watermark block of average in the neighborhood },
Figure 282466DEST_PATH_IMAGE030
Represent to round up function,
Figure 864757DEST_PATH_IMAGE031
The gesture of set is asked in expression.Attention: prediction average image
Figure 852305DEST_PATH_IMAGE004
Generation do not use the watermark areas Pixel Information, thereby at receiving end, utilize same method, authorized user can generate identical prediction average image by concealed image.
Step 5: by prediction average image version
Figure 180342DEST_PATH_IMAGE004
Calculate the smoothness properties of each piecemeal of image
Figure 569735DEST_PATH_IMAGE005
With the brightness sensitivity characteristic
Figure 57348DEST_PATH_IMAGE006
, and derive thus BTC each image block sight factor of encoding
Figure 532192DEST_PATH_IMAGE007
, be shown below.
Figure 153666DEST_PATH_IMAGE008
(3)
Step 6: for avoiding causing concealed image (containing the visible watermark image) visual quality obviously to descend because embedment strength difference is excessive, will
Figure 804090DEST_PATH_IMAGE007
Normalize to the interval [ r 1 , r 2 ] in, namely get the image block self-adaptation and embed the factor
Figure 823124DEST_PATH_IMAGE032
Figure 519684DEST_PATH_IMAGE033
(4)
Get among the embodiment r 1 =0.1, r 2 =0.3.
(2) watermark embeds
With reference to Fig. 2, it is as follows that watermark embeds idiographic flow.
Step 1: two-dimentional visible watermark is mapped as the one dimension watermark signal, namely W=
Figure 679270DEST_PATH_IMAGE011
Step 2: to each tlv triple of image B TC coding
Figure 449780DEST_PATH_IMAGE001
, by adjusting to some extent its quantized level
Figure 138250DEST_PATH_IMAGE021
Embed the visible watermark signal with self-adaptation, tlv triple was after note was revised and adjusted
Figure 351801DEST_PATH_IMAGE012
, then the visible watermark embedding strategy is shown below,
Figure 783919DEST_PATH_IMAGE013
(5)
Wherein T, Be respectively the image block BTC coded quantization level that embeds after the visible watermark information, namely t
Figure 799466DEST_PATH_IMAGE015
,
Figure 470618DEST_PATH_IMAGE016
Parameter ρ 1 , ρ 2 Be user's defining constant, and
Figure 847373DEST_PATH_IMAGE017
,
Figure 421836DEST_PATH_IMAGE018
The watermark component W A And gray threshold G 1 For experience often is worth, usually get in the experiment W A =20 Hes G 1 =128.This embedding strategy is so that visible watermark has respectively high and low gray-scale value at darker and brighter background area, and this can guarantee that the visible watermark that embeds has higher sharpness.
Step 3: given user key key1, and it is mapped to the interval In obtain k1.
Step 4: with k1 binary pseudo-random of initial value grey iterative generation as logistic chaotic maps (seeing formula 6) D 1 , D 1 = d 1 ( i) | d 1 ( i)=0,1, i=1,2 ..., p, }.
Figure 548241DEST_PATH_IMAGE035
(6)
Branch parameter wherein μIn the interval (3.599456,4] interior value, be in chaos state to guarantee chaotic maps.
Step 5: given another user key key2, and it is mapped to the interval
Figure 322162DEST_PATH_IMAGE034
In obtain k2.Utilize k2 to make the chaotic maps initial value to generate a pseudorandom integer sequence D 2 ,
Figure 780825DEST_PATH_IMAGE036
Step 6: utilize binary pseudo-random D 1 Carry out the step-by-step XOR with watermark signal W, obtain the modulation watermark signal
Figure 388524DEST_PATH_IMAGE037
Further by the pseudorandom integer sequence D 2 To the watermark signal after the modulation
Figure 532804DEST_PATH_IMAGE037
Carry out the position scramble, to obtain the encrypted watermark signal
Step 7: utilize lossless data hiding method, by adjusting the encode magnitude relationship of two quantized levels of image block BTC, the watermark signal that will add after chaos encryption is processed is embedded in the image B CT coding with invisible mode.After all encrypted watermark bits embeddings are complete, namely produce final concealed image I w
Image block BTC coding tlv triple after note is adjusted again is
Figure 830110DEST_PATH_IMAGE019
, then concrete hiding strategy can be expressed as follows,
Figure 202186DEST_PATH_IMAGE039
(7)
Wherein
Figure 866385DEST_PATH_IMAGE040
Expression step-by-step inversion operation.
(3) visible watermark is removed with original image and is recovered
With reference to Fig. 3, visible watermark is removed with original image recovery concrete steps and is described below.
Step 1: read concealed image I w , obtain concealed image B TC coding.
Step 2: according to concealed image B TC coding tlv triple
Figure 483574DEST_PATH_IMAGE019
In two quantized levels Magnitude relationship is extracted encrypted watermark information
Figure 866331DEST_PATH_IMAGE038
, namely
Figure 486668DEST_PATH_IMAGE042
(8)
Step 3: further and recover the image B TC that only contains visible watermark information each tlv triple of encoding
Figure 834789DEST_PATH_IMAGE043
(9)
Step 4: given user key key1 and key2, utilize with the watermark embed process same procedure and generate pseudo-random sequence D 1 With D 2 Utilize sequence D 1 With D 2 To the encrypted watermark signal Carry out chaos decode, obtain watermark information W
Step 5: according to the watermark information that recovers W, concealed image is divided into watermark areas and non-watermark areas.
Step 6: utilize the neighborhood pixels predicted method by the non-watermark areas BTC coded prediction of concealed image watermark areas image block average, can obtain an average image prediction version (since watermark embed before and after average image prediction data produces by non-watermark areas pixel prediction, therefore the original image mean prediction version of the concealed image mean prediction version that produces here and the generation of watermark embedding stage is consistent).
Step 7: according to the watermark embed process same procedure, calculate the visible watermark self-adaptation by concealed image prediction version and embed the factor
Figure 561361DEST_PATH_IMAGE032
Step 8: to each image block in the concealed image, its BTC coding tlv triple is
Figure 18887DEST_PATH_IMAGE012
, then can remove visible watermark component in the concealed image by formula (10).Until after all images piecemeal visible watermark component is removed, namely recover original BTC coded image.
Figure 426734DEST_PATH_IMAGE020
(10)
Wherein
Figure 718038DEST_PATH_IMAGE014
, tBe respectively the piecemeal BTC coded quantization level of concealed image and Recovery image, namely
Figure 47389DEST_PATH_IMAGE016
, t
Figure 341229DEST_PATH_IMAGE015
, and ρ 1 , ρ 2 , W A With G 1 Value and watermark to embed the stage identical.

Claims (4)

1. the erasable visible watermark scheme in conjunction with the BTC coding is characterized in that, comprises three steps:
(1) watermark embeds factor calculating: calculate self-adaptation according to the original image apperceive characteristic and embed the factor;
(2) watermark embeds: with visual way watermark information is embedded among the original image adaptively, with invisible mode the encrypted watermark information lossless is embedded in the original image simultaneously;
(3) visible watermark is removed with original image and recovered: authorized user uses correct key correctly to extract binary watermarking information, thereby is removed visible watermark and recover original image.
2. watermark embeds factor computing module as described in claim 1, it is characterized in that, according to visible watermark information original image is divided into watermark areas and non-watermark areas two parts; Utilize the neighbor predicted method to predict the watermark areas pixel by non-watermark areas pixel, to generate an original image predicted version; Calculate self-adaptation in conjunction with former figure predicted version apperceive characteristic and embed the factor.
3. watermark merge module as described in claim 1 is characterized in that, watermark information is embedded into adaptively among two quantized levels of original image BTC coding with visual way; Watermark information is embedded among the former figure BTC coding so that invisible mode is harmless after will encrypting, and illegally removes to stop visible watermark.
4. visible watermark is removed and original image recovery module as described in claim 1, it is characterized in that, at receiving end, the authorized user that has key correctly extracts binary watermarking information; Generate former figure predicted version according to the non-watermark areas pixel prediction of binary watermarking information, and further calculate the embedding factor; Utilize the embedding factor that obtains, from contain watermarking images, remove visible watermark and recover original image.
CN201310012513XA 2013-01-14 2013-01-14 BTC-combined visible watermark erasing scheme Pending CN103034971A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310012513XA CN103034971A (en) 2013-01-14 2013-01-14 BTC-combined visible watermark erasing scheme

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310012513XA CN103034971A (en) 2013-01-14 2013-01-14 BTC-combined visible watermark erasing scheme

Publications (1)

Publication Number Publication Date
CN103034971A true CN103034971A (en) 2013-04-10

Family

ID=48021840

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310012513XA Pending CN103034971A (en) 2013-01-14 2013-01-14 BTC-combined visible watermark erasing scheme

Country Status (1)

Country Link
CN (1) CN103034971A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104835104A (en) * 2014-02-07 2015-08-12 湖南第一师范学院 Digital image active camouflage scheme based on fractal
CN104885082A (en) * 2013-04-27 2015-09-02 东莞宇龙通信科技有限公司 Terminal and method for hiding and protecting data information
CN105069455A (en) * 2015-07-15 2015-11-18 广州敦和信息技术有限公司 Method and device for filtering official seal of invoice
CN105812816A (en) * 2016-03-17 2016-07-27 安徽大学 Compression, encryption and authentication joint coding method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110194727A1 (en) * 2010-02-11 2011-08-11 National Taiwan University Of Science & Technology Image data processig systems for hiding secret information and data hiding methods using the same
CN102722855A (en) * 2011-03-31 2012-10-10 北京大学 Reversible watermark embedding method, extracting method thereof, device and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110194727A1 (en) * 2010-02-11 2011-08-11 National Taiwan University Of Science & Technology Image data processig systems for hiding secret information and data hiding methods using the same
CN102722855A (en) * 2011-03-31 2012-10-10 北京大学 Reversible watermark embedding method, extracting method thereof, device and system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
MINGHUI SHI等: "Dual Image Watermarking Algorithm Based on Block Truncation Code", 《INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ISSUES》 *
姜明芳: "基于自适应可见水印的文档资源版权保护机制", 《情报杂志》 *
杨恒伏等: "结合视觉感知的BTC域高容量数据隐藏方案", 《计算机工程与应用》 *
郎永祥等: "用于实时通信版权保护的BTC图像水印技术", 《电视技术》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104885082A (en) * 2013-04-27 2015-09-02 东莞宇龙通信科技有限公司 Terminal and method for hiding and protecting data information
CN104885082B (en) * 2013-04-27 2018-04-10 东莞宇龙通信科技有限公司 The hiding guard method of terminal and data message
CN104835104A (en) * 2014-02-07 2015-08-12 湖南第一师范学院 Digital image active camouflage scheme based on fractal
CN104835104B (en) * 2014-02-07 2017-11-03 湖南第一师范学院 Digital picture active Camouflage project based on point shape
CN105069455A (en) * 2015-07-15 2015-11-18 广州敦和信息技术有限公司 Method and device for filtering official seal of invoice
CN105069455B (en) * 2015-07-15 2018-04-24 广州敦和信息技术有限公司 A kind of method and device of invoice official seal filtering
CN105812816A (en) * 2016-03-17 2016-07-27 安徽大学 Compression, encryption and authentication joint coding method
CN105812816B (en) * 2016-03-17 2019-04-09 安徽大学 A kind of compression encryption certification joint coding method

Similar Documents

Publication Publication Date Title
Das et al. A novel steganography method for image based on Huffman Encoding
Juneja et al. An improved LSB based steganography technique for RGB color images
Hamid et al. Image steganography techniques: an overview
Yang et al. A contrast-sensitive reversible visible image watermarking technique
Hussain et al. Pixel intensity based high capacity data embedding method
Shejul et al. A secure skin tone based steganography using wavelet transform
Sajasi et al. An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method
Yang et al. A secure removable visible watermarking for BTC compressed images
Keyvanpour et al. Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the DWT domain
Santoso et al. An improved message capacity and security using divide and modulus function in spatial domain steganography
Bhautmage et al. Advanced video steganography algorithm
Kang et al. A digital watermarking approach based on DCT domain combining QR code and chaotic theory
Rai et al. Analysis of image steganography techniques: a survey
Arora et al. Comparative study of image steganography techniques
Bekkouch et al. Robust and reversible image watermarking scheme using combined DCT-DWT-SVD transforms
CN103034971A (en) BTC-combined visible watermark erasing scheme
Siddiqui et al. Chaos-based video steganography method in discrete cosine transform domain
Verma Review of steganography techniques
Yan-yan et al. A Watermarking-based Visual Cryptography Scheme with Meaningful Shares
Rahmani et al. A new lossless watermarking scheme based on DCT coefficients
Naseem et al. Novel technique for capacity maximizing in digital watermarking using fuzzy rule base
Sheth Snake and ladder based algorithm for steganographic application of specific streamline bits on prime gap method
Shiju et al. Performance analysis of high dynamic range image watermarking based on quantization index modulation
Goswami et al. Coloured and Gray Scale Image Steganography using Block Level DWT DCT Transformation
Arjun et al. An approach to adaptive steganography based on matrix embedding

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130410