CN105427231A - SVD dual-layer digital watermarking method capable of avoiding false alarm - Google Patents

SVD dual-layer digital watermarking method capable of avoiding false alarm Download PDF

Info

Publication number
CN105427231A
CN105427231A CN201510859634.7A CN201510859634A CN105427231A CN 105427231 A CN105427231 A CN 105427231A CN 201510859634 A CN201510859634 A CN 201510859634A CN 105427231 A CN105427231 A CN 105427231A
Authority
CN
China
Prior art keywords
image
watermark
diff
block
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510859634.7A
Other languages
Chinese (zh)
Other versions
CN105427231B (en
Inventor
谢德红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Forestry University
Original Assignee
Nanjing Forestry University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Forestry University filed Critical Nanjing Forestry University
Priority to CN201510859634.7A priority Critical patent/CN105427231B/en
Publication of CN105427231A publication Critical patent/CN105427231A/en
Application granted granted Critical
Publication of CN105427231B publication Critical patent/CN105427231B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention relates to an SVD (Singular Value Decomposition) dual-layer digital watermarking method capable of avoiding a false alarm. The method comprises: performing SVD on a host image and superposing a singular value matrix of the host image into a watermarking image; performing SVD on the watermarking image superposed with singular values and replacing the singular value matrix of the host image with a singular value matrix of the watermarking image to form an image with a first layer of watermark; performing Hash encryption on an eigenvalue matrix of the watermarking image superposed with the singular values; and performing block discrete cosine transform on the image embedded with the first layer of watermark and embedding a Hash code obtained by encryption into a discrete cosine transform coefficient of each sub-block to obtain an image with a second layer of watermark. The method is suitable for copyright protection of printed products; the dual-layer watermarks can keep high visual quality while increasing watermarking capacity; and the problem of the false alarm happened during watermark extraction is avoided.

Description

A kind of SVD double-layer digital water mark method avoiding police by mistake
Technical field
The present invention relates to image procossing and information security field.The present invention designs a kind of digital watermark embedding and extracting method of anti-print and scan, and the method has raising watermark embedment capacity, reduces the characteristic identifying alert rate by mistake, may be used for protecting literary property of presswork.
Technical background
Universal and fast-developing along with network technology, digital content has no to copy temperately and propagate, and the Copyright Protection of digital product is received much concern, and in order to solve this problem, digital watermark technology arises at the historic moment.Digital watermark technology is a kind of technology embedded by identification information in digital content, and it does not affect former digital content quality substantially, is also not easily found out and revises, but can be extracted identification, for the copyright protection of numerical information and false proof.Through development for many years, digital watermark technology achieves certain achievement.In view of digital watermark technology is realizing in copyright protection and false proof process; numerical information need only be changed; without the need to increasing other costs (as the cost that special paper or specialty inks bring), cause the copyright protection of paper media and the extensive concern of anti-counterfeit field.Digital watermarking be used for paper media copyright protection and false proof time; often to experience printing (printing)-scan process; and print (printing)-scanning and be actually digital content and have passed through D/A and A/D twice conversion; simultaneously also with attacks such as to a certain degree noise, fuzzy, geometric transformations; digital content is caused to be subjected to very large loss or distortion; to such an extent as in digital content, watermark information is difficult to retain, thus lose copyright protection and false proof effect.But; the forgery of the paper media such as current bill, the packing of product, certificate, vital document and copy and bring very large loss to the mechanism such as enterprise, finance, urgently expects that this digital watermark technology without application cost can become and replaces traditional false proof a kind of new technology with copyright protection.Therefore, digital watermarking realizes the false proof and copyright protection of paper media, there is huge applications and is worth, be also faced with very large technological challenge.The robust performance particularly improving the anti-printing of digital watermark technology (printing)-scanning is the basic premise of energy practical application, is a problem being worth research and breaking through.
In recent years, occurred that some can resist the digital watermarking algorithm of printing-scanning attack.Consult data of literatures, roughly have the digital watermarking algorithm of two types to achieve certain effect at present in opposing printing-scanning attack.One class embeds on the basis of the Spectrum Conversions such as discrete cosine transform (DiscreetCosineTransformation, DCT), discrete Fourier transformation (DiscreetFourierTransformation, DFT).Namely region (the being mid-frequency region substantially) embed watermark information that in original image DCT/DFT coefficient, vision is insensitive and basicly stable after printing-scanning attack digital watermarking is sought.Such as, the patent " the anti printing and scanning coloured image blind watermark method based on DCT coefficient statistical property " of the people such as Wang Quan, Chinese patent, the patent No. is CN103559676A.Another kind of is wavelet transform (DiscreetWaveletTransformation, DWT) in conjunction with svd (SingularValueDecomposition, SVD), namely DWT is utilized to obtain the strong low-frequency image of attack resistance stability, again SVD decomposition is carried out to low-frequency image, watermark information is embedded in the singular value coefficient of SVD.Such as, the patent " the Robust Zero watermarking algorithm based on svd, harr wavelet transformation and mean value computation " of Ye Tianyu, Chinese patent, the patent No. is: CN102129659A.The large quantity research carried out through numerous scholar finds, print and scan process is at the applied environment of reality, be not only D/A and A/D conversion in sampling and quantize produce attack, the noise produced due to equipment limitation in print and scan environment, the attack such as fuzzy, can aggravate loss and the distortion of information.Therefore, in actual applications, the attack suffered by the watermark signal of embedding is not one or more the different simple combination of attacking in simple emulation experiment, but the result of Various Complex signal synthesis effect.This makes to be difficult to seek equilibrium point between the robust performance and embed watermark information capacity of visual quality of images, anti-print and scan based on the digital watermark method of DCT.And the equipment in print and scan process, the difference of parameters also also exist very large impact to the robustness of embed watermark information.Comparatively speaking, DWT can obtain the more stable feature of image in conjunction with DWT and SVD in the digital watermark method of SVD, thus obtains more strong robustness, and the capacity of embed watermark information is larger.Therefore, DWT obtains good effect in conjunction with the digital watermark method of SVD in anti-print and scan.But in these methods, in order to increase the visual quality of embed watermark information capacity and raising embedded images, reality is that the singular value that watermark information SVD decomposes is hidden in the singular value of original image DWT changing image substantially.When extracting watermark information, first obtain the watermarking images of scanning and original image DWT convert after singular value difference, recycle the singular vector reconstructuring water-mark information of this unusual value difference and original watermark.But in fact singular vector is only the key message forming any image (as watermarking images), and singular value size just affects the power of final image.Thus, if there is piece image, do not have embed watermark information, after print and scan process, the singular value that its DWT converts has changed, and will obtain watermark information.That is there is no embed watermark, but have identified watermark, thereby produce alert problem by mistake.In the print and scan process of reality, all can there is change in various degree in the singular value of DWT conversion, therefore by mistake alert problem inevitably occurs this type of digital watermark method, and this makes digital watermarking lose the value of the practical application of copyright protection usually.
Summary of the invention
The object of the invention is to, for there is the problem missed alert problem and high power capacity and high-quality and be difficult to balance in existing anti-print and scan digital watermarking algorithm, proposing a kind of SVD double-layer digital water mark method avoiding police by mistake.
The technical solution used in the present invention is, a kind of SVD double-layer digital water mark method avoiding police by mistake, comprises watermark embedment and watermark extracting two processes, implement according to following steps:
First, the embedding of watermark, specifically comprises the following steps:
Steps A 1, utilizes SVD to decompose host image H and watermarking images W, is designated as H=U respectively hs hv h tand W=U ws wv w t;
Steps A 2, embeds host image singular value matrix S by watermarking images W h, obtain new image array be calculated as follows:
I H m = S H + α W ,
Wherein, α is embedment strength, and α ∈ [0.01,0.1];
Steps A 3, by the singular value matrix S of host image hreplace with image the singular value matrix of gained is operated through SVD obtain the image H embedding ground floor watermark information w, be calculated as follows:
H W = U H S H m V H T ;
Steps A 4, by the watermarking images superposing singular value feature value vector matrix U wand V wone dimension matrix u is lined up by row wand v w, utilize SHA-256 Hash cryptographic algorithm to be encrypted this one dimension matrix, obtain corresponding Hash codes R uand R v:
R U=Harshing (SHA-256)(u W),
R V=Harshing (SHA-256)(v W),
And R uand R vbe converted to binary coded form, then to binary R uand R vcarry out logic xor operation, obtain a new binary signal R, and get R front 64 as second layer watermark information, be designated as R w;
Steps A 5, carries out piecemeal DCT operation to the image carrying ground floor watermark information, will second time watermark information R wbe embedded into direct current (DC) the coefficient c of each sub-block i(i=1,2 ..., 64) in, wherein step comprises:
A () will carry the image H of ground floor watermark wbe divided into the sub-block of 8 × 8, DCT operation implemented to each sub-block, obtains the DC coefficient c of each sub-block i, and calculate its mean value
c ‾ = Σ i = 1 64 c i ;
B () calculates each sub-block DC coefficient c iwith its mean value between difference:
d i f f ( c i ) = c i - c ‾ ;
C () is according to second layer watermark information R wthe bit value R of i position w(i) and diff (c i) symbol revise the DC coefficient c of corresponding sub-block i, concrete operations are: if R w(i)=1 and diff (c iduring)>=0, current sub-block DC coefficient c iincrease | diff (c i) |; If R w(i)=1 and diff (c i) < 0 time, current sub-block DC coefficient c ireduce | diff (c i) |; If R w(i)=0 and diff (c iduring)>=0, current sub-block DC coefficient c ito reduce 2 times | diff (c i) |; If R w(i)=0 and diff (c i) < 0 time, current sub-block DC coefficient c ito increase by 2 times | diff (c i) |;
D () carries out DCT inverse transformation to each sub-block revising coefficient, obtain the image embedding two-layer watermark information
Then, the extraction of watermark, specifically comprises the following steps:
Step B1, is divided into the sub-block of 8 × 8 by the image H ' of watermark to be extracted and original host image H, and implements DCT operation to each sub-block, obtains the DC coefficient of their sub-blocks separately respectively with (i=1,2 ..., 64), and according to a pair DC coefficient of the two correspondence position sub-block with generate binary signal R ', wherein contain following steps:
A () calculates DC coefficient respectively with mean value respective with it with difference:
d i f f ( c i W ) = ( c i W - c &OverBar; W ) ,
d i f f ( c i H ) = ( c i H - c &OverBar; H ) ;
B () from left to right, from top to bottom checks successively with symbol, obtain the binary data R ' of a group 64: when and or and time, bit value R ' (i)=1 of the i position of binary data R '; When and or and time, bit value R ' (i)=0 of the i position of binary data R ';
Step B2, due to original watermark image W and the image superposing host image singular value there is identical eigen vector, therefore watermarking images W is operated the eigenvectors matrix U of gained through SVD wand V wone dimension matrix u is lined up by row wand v w, and by SHA-256 Hash cryptographic algorithm this one-dimensional signal is encrypted and obtains Hash codes R uand R v, then Hash codes is converted to binary coded form, utilizes logic XOR to binary R uand R voperate, obtain binary signal R, first 64 that get R, namely obtain the second layer watermark information R of embedding w;
The second layer watermark information R that the binary signal R ' that step B3, determining step B1 obtain and step B2 obtain wmatching, if the value of the two is identical, then carries out next step and extract operation, if the value of the two is different, then terminates the operation of extracting watermark, represent in the image of watermark to be extracted and do not carry watermark information;
Step B4, operates the singular value matrix S of gained through SVD by original watermark image W wthe image H ' replacing with watermark to be extracted operates the singular value matrix S of gained through SVD h ', obtain new image
I H &prime; m = U W S H &prime; V W T ,
According to the singular value matrix S of host image h, image and embedment strength α, extract ground floor watermarking images W ', specific as follows:
W &prime; = ( I H &prime; m - S H ) / &alpha; .
The invention has the beneficial effects as follows, improve based on the high problem of the alert rate of SVD method embed watermark mistiming, attacks of print_scan can be resisted, improve the capacity of watermark embedment, avoid alert phenomenon by mistake to produce, can be used for the copyright protection of printed matter.
Accompanying drawing explanation
Fig. 1 a is the process flow diagram of watermark embed process of the present invention, and Fig. 1 b is the process flow diagram of watermark extraction process of the present invention;
Fig. 2 a is the host image adopted in the embodiment of the present invention, Fig. 2 b is the watermarking images adopted in the embodiment of the present invention, Fig. 2 c is the image after embedding two-layer watermark in the embodiment of the present invention, Fig. 2 d be in the embodiment of the present invention to Fig. 2 c through the printing of KonicaMinoltaC6000 digital printer and Microtek1000XLPlus scanner scanning gained image, Fig. 2 e be in the embodiment of the present invention to Fig. 2 d extract watermarking images.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.
Use the present invention in the picture embed watermark method as shown in Figure 1a, concrete steps are as follows:
1st step, utilizes SVD to decompose host image H and watermarking images W, is designated as H=U respectively hs hv h tand W=U ws wv w t;
2nd step, embeds host image singular value matrix S by watermarking images W h, obtain new image array be calculated as follows:
I H m = S H + &alpha; W ,
Wherein, α is embedment strength, and gets α=0.01;
3rd step, by the singular value matrix S of host image hreplace with image the singular value matrix of gained is operated through SVD obtain the image H embedding ground floor watermark information w, be calculated as follows:
H W = U H S H m V H T ;
4th step, by the watermarking images superposing singular value feature value vector matrix U wand V wone dimension matrix u is lined up by row wand v w, utilize SHA-256 Hash cryptographic algorithm to be encrypted this one dimension matrix, obtain corresponding Hash codes R uand R v:
R U=Harshing (SHA-256)(u W),
R V=Harshing (SHA-256)(v W),
And R uand R vbe converted to binary coded form, then to binary R uand R vcarry out logic xor operation, obtain a new binary signal R, and get R front 64 as second layer watermark information, be designated as R w;
5th step, carries out piecemeal DCT operation to the image carrying ground floor watermark information, will second time watermark information R wbe embedded into the DC coefficient c of each sub-block i(i=1,2 ..., 64) in, wherein step comprises:
A () will carry the image H of ground floor watermark wbe divided into the sub-block of 8 × 8, DCT operation implemented to each sub-block, obtains the DC coefficient c of each sub-block i, and calculate its mean value
c &OverBar; = &Sigma; i = 1 64 c i ;
B () calculates each sub-block DC coefficient c iwith its mean value between difference:
d i f f ( c i ) = c i - c &OverBar; ;
C () is according to second layer watermark information R wthe bit value R of i position w(i) and diff (c i) symbol revise the DC coefficient c of corresponding sub-block i, concrete operations are: if R w(i)=1 and diff (c iduring)>=0, current sub-block DC coefficient c iincrease | diff (c i) |; If R w(i)=1 and diff (c i) < 0 time, current sub-block DC coefficient c ireduce | diff (c i) |; If R w(i)=0 and diff (c iduring)>=0, current sub-block DC coefficient c ito reduce 2 times | diff (c i) |; If R w(i)=0 and diff (c i) < 0 time, current sub-block DC coefficient c ito increase by 2 times | diff (c i) |;
D () carries out DCT inverse transformation to each sub-block revising coefficient, obtain the image of the two-layer watermark information of embedded quantity
Use the present invention to extract the method for watermark as shown in Figure 1 b in the image of watermark to be extracted, concrete steps are as follows:
1st step, is divided into the sub-block of 8 × 8 by the image H ' of watermark to be extracted and original host image H, and implements DCT operation to each sub-block, obtains the DC coefficient of their sub-blocks separately respectively with (i=1,2 ..., 64), and according to a pair DC coefficient of the two correspondence position sub-block with generate binary signal R ', wherein contain following steps:
A () calculates DC coefficient respectively with mean value respective with it with difference:
d i f f ( c i W ) = ( c i W - c &OverBar; W ) ,
d i f f ( c i H ) = ( c i H - c &OverBar; H ) ;
B () from left to right, from top to bottom checks successively with symbol, obtain the binary data R ' of a group 64: when and or and time, bit value R ' (i)=1 of the i position of binary data R '; When and or and time, bit value R ' (i)=0 of the i position of binary data R ';
2nd step, due to original watermark image W and the image superposing host image singular value there is identical eigen vector, therefore watermarking images W is operated the eigenvectors matrix U of gained through SVD wand V wone dimension matrix u is lined up by row wand v w, and by SHA-256 Hash cryptographic algorithm this one-dimensional signal is encrypted and obtains Hash codes R uand R v, then Hash codes is converted to binary coded form, utilizes logic XOR to binary R uand R voperate, obtain binary signal R, first 64 that get R, namely obtain the second layer watermark information R of embedding w;
3rd step, the second layer watermark information R that the binary signal R ' that determining step B1 obtains and step B2 obtain wmatching, if the value of the two is identical, then carries out next step and extract operation, if the value of the two is different, then terminates the operation of extracting watermark, represent in the image of watermark to be extracted and do not carry watermark information;
This step but utilizes step below to extract watermarking images when can avoid not having embed watermark, namely avoids the generation of alert phenomenon by mistake;
4th step, operates the singular value matrix S of gained through SVD by original watermark image W wthe image H ' replacing with watermark to be extracted operates the singular value matrix S of gained through SVD h ', obtain new image
I H &prime; m = U W S H &prime; V W T ,
According to the singular value matrix S of host image h, image and embedment strength α, extract ground floor watermarking images W ', specific as follows:
W &prime; = ( I H &prime; m - S H ) / &alpha; .
For the image shown in Fig. 2, embodiment, illustrates that the present invention is for protecting literary property of presswork.
Host image shown in Fig. 2 and watermarking images are coloured image, when the present invention is applied to coloured image: before embed watermark, first image coloured image being divided into red, green, blue three passages is needed, then utilize the method for embed watermark of the present invention to embed corresponding three-channel watermarking images respectively to three-channel host image, finally synthesize the triple channel image of embed watermark; Before extracting watermark, first the image of watermark to be extracted is divided into the image of red, green, blue three passages, then corresponding three-channel watermarking images is extracted to the method that triple channel image utilizes the present invention to extract watermark respectively, finally the three-channel water watermark image of extraction is synthesized coloured image.
In practical operation: first, copy the watermarking images (image size is 225 × 225) shown in tiling Fig. 2 b, make the size of its host image (image size is 512 × 512) shown in image size with Fig. 2 a identical; Then, use the method for the present invention's embed watermark as shown in Figure 1a, the watermarking images of subchannel is embedded in the host image of respective channel respectively, synthesis passage obtains the image carrying two-layer watermark information, as shown in Figure 2 c, wherein, strength factor α=0.01 of embed watermark; Then, on KonicaMinoltaC6000 digital printer by the image carrying two-layer watermark information shown in Fig. 2 c with the output resolution ratio the output for printing of 600dpi, scan the image of the output for printing again with the scanning resolution of 300dpi with Microtek1000XLPlus scanner, result as shown in Figure 2 d; Finally, use the method for the present invention's extraction watermark as shown in Figure 1 b from Fig. 2 d of subchannel, extract the watermarking images of respective channel, synthesis three-channel water watermark image, extracts result as shown in Figure 2 e.
In order to the beneficial effect of the inventive method is described, calculate this watermarking images extracted and the texture paging index (SSIM) copying the watermarking images be paved into, result is 0.7288.As can be seen here, the image carrying watermark information passes through the attack of printing and scanning process, still can extract the watermarking images showing copyright.
The foregoing is only the embodiment in the present invention, but protection scope of the present invention is not limited thereto.Any those skilled in the art, in the technical scope disclosed by the present invention, can carry out converting or substituting.The conversion carried out and replacement all should be included within the scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claims.

Claims (3)

1. avoid a by mistake alert SVD double-layer digital water mark method, it is characterized in that, comprise watermark embedment and watermark extracting two processes, implement according to following steps:
First, the embedding of watermark, specifically comprises the following steps:
Steps A 1, utilizes SVD to decompose host image H and watermarking images W, is designated as H=U respectively hs hv h tand W=U ws wv w t;
Steps A 2, embeds host image singular value matrix S by watermarking images W h, obtain new image array be calculated as follows:
I H m = S H + &alpha; W ,
Wherein, α is embedment strength, and α ∈ [0.01,0.1];
Steps A 3, by the singular value matrix S of host image hreplace with image the singular value matrix of gained is operated through SVD obtain the image H embedding ground floor watermark information w, be calculated as follows:
H W = U H S H m V H T ;
Steps A 4, by the watermarking images superposing singular value feature value vector matrix U wand V wone dimension matrix u is lined up by row wand v w, utilize SHA-256 Hash cryptographic algorithm to be encrypted this one dimension matrix, obtain corresponding Hash codes R uand R v:
R U=Harshing (SHA-256)(u W),
R V=Harshing (SHA-256)(v W),
And R uand R vbe converted to binary coded form, then to binary R uand R vcarry out logic xor operation, obtain a new binary signal R, and get R front 64 as second layer watermark information, be designated as R w;
Steps A 5, will carry the image H of ground floor watermark information wbe divided into the sub-block of 8 × 8, and DCT operation is implemented, by second layer watermark information R to each sub-block wbe embedded into direct current (DC) the coefficient c of each sub-block i(i=1,2 ..., 64) in, carry out the image that DCT inverse transformation obtains carrying two-layer watermark information
Then, the extraction of watermark, specifically comprises the following steps:
Step B1, is divided into the sub-block of 8 × 8 by the image H ' of watermark to be extracted and original host image H, and implements DCT operation to each sub-block, obtains the DC coefficient of their sub-blocks separately respectively with and according to a pair DC coefficient of the two correspondence position sub-block with generate binary signal R ';
Step B2, due to original watermark image W and the image superposing host image singular value there is identical eigen vector, therefore watermarking images W is operated the eigenvectors matrix U of gained through SVD wand V wone dimension matrix u is lined up by row wand v w, and by SHA-256 Hash cryptographic algorithm this one-dimensional signal is encrypted and obtains Hash codes R uand R v, then Hash codes is converted to binary coded form, utilizes logic XOR to binary R uand R voperate, obtain binary signal R, first 64 that get R, namely obtain the second layer watermark information R of embedding w;
The second layer watermark information R that the binary signal R ' that step B3, determining step B1 obtain and step B2 obtain wmatching, if the value of the two is identical, then carries out next step and extract operation, if the value of the two is different, then terminates the operation of extracting watermark, represent in the image of watermark to be extracted and do not carry watermark information;
Step B4, operates the singular value matrix S of gained through SVD by original watermark image W wthe image H ' replacing with watermark to be extracted operates the singular value matrix S of gained through SVD h., obtain new image
I H &prime; m = U W S H &prime; V W T ,
According to the singular value matrix S of host image h, image and embedment strength α, extract ground floor watermarking images W ', specific as follows:
W &prime; = ( I H &prime; m - S H ) / &alpha; .
2. a kind of SVD double-layer digital water mark method avoiding police by mistake according to claim 1, is characterized in that: in described steps A 5, by second layer watermark information R wbe embedded into image each sub-block DC coefficient c i(i=1,2 ..., 64) operation, concrete grammar is as follows:
First, each sub-block DC coefficient c is calculated iwith its mean value between difference diff (c i):
d i f f ( c i ) = c i - c &OverBar; ,
c &OverBar; = &Sigma; i = 1 64 c i ;
Then, according to second layer watermark information R wthe bit value R of i position w(i) and diff (c i) symbol revise the DC coefficient c of corresponding sub-block i, concrete operations are: if R w(i)=1 and diff (c iduring)>=0, current sub-block DC coefficient c iincrease | diff (c i) |; If R w(i)=1 and diff (c i) < 0 time, current sub-block DC coefficient c ireduce | diff (c i) |; If R w(i)=0 and diff (c iduring)>=0, current sub-block DC coefficient c ito reduce 2 times | diff (c i) |; If R w(i)=0 and diff (c i) < 0 time, current sub-block DC coefficient c ito increase by 2 times | diff (c i) |.
3., according to a kind of SVD double-layer digital water mark method avoiding police by mistake according to claim 1, it is characterized in that: in described step B1, according to DC coefficient with generate the operation of binary signal R ', concrete grammar is as follows:
First, DC coefficient is calculated respectively with mean value respective with it with difference:
d i f f ( c i W ) = ( c i W - c &OverBar; W ) ,
d i f f ( c i H ) = ( c i H - c &OverBar; H ) ;
Then, from left to right, check diff (c successively from top to bottom i w) and diff (c i h) symbol, obtain the binary data R ' of a group 64: as diff (c i w)>=0 and diff (c i h)>=0 or diff (c i w) < 0 and diff (c i h) < 0 time, bit value R ' (i)=1 of the i position of binary data R '; As diff (c i w) < 0 and diff (c i h) > 0 or diff (c i w) > 0 and diff (c i h) < 0 time, bit value R ' (i)=0 of the i position of binary data R '.
CN201510859634.7A 2015-11-26 2015-11-26 A kind of SVD double-layer digital water mark methods avoiding false alarm Active CN105427231B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510859634.7A CN105427231B (en) 2015-11-26 2015-11-26 A kind of SVD double-layer digital water mark methods avoiding false alarm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510859634.7A CN105427231B (en) 2015-11-26 2015-11-26 A kind of SVD double-layer digital water mark methods avoiding false alarm

Publications (2)

Publication Number Publication Date
CN105427231A true CN105427231A (en) 2016-03-23
CN105427231B CN105427231B (en) 2018-11-06

Family

ID=55505413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510859634.7A Active CN105427231B (en) 2015-11-26 2015-11-26 A kind of SVD double-layer digital water mark methods avoiding false alarm

Country Status (1)

Country Link
CN (1) CN105427231B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108681982A (en) * 2018-04-04 2018-10-19 微梦创科网络科技(中国)有限公司 A kind of embedding algorithm and extracting method and system based on singular value decomposition
CN111984943A (en) * 2020-07-29 2020-11-24 南京信息工程大学 DWT-SVD digital watermarking method based on artificial bee colony algorithm
CN112232428A (en) * 2020-10-23 2021-01-15 上海电力大学 Image hash acquisition method based on three-dimensional characteristics and energy change characteristics
CN113570494A (en) * 2021-07-28 2021-10-29 上海明略人工智能(集团)有限公司 Encrypted digital watermark adding method, system, equipment and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111145069B (en) * 2019-12-03 2021-04-27 支付宝(杭州)信息技术有限公司 Image watermarking processing method and device based on block chain

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102008012426A1 (en) * 2007-10-31 2009-05-07 Bundesdruckerei Gmbh Document-production method for producing a security inserts imaging information/data into layers of a document to form a total security image
CN102208097B (en) * 2011-05-26 2013-06-19 浙江工商大学 Network image copyright real-time distinguishing method
CN103810668A (en) * 2014-02-19 2014-05-21 鲁东大学 Double color image blind watermarking method based on singular value decomposition

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108681982A (en) * 2018-04-04 2018-10-19 微梦创科网络科技(中国)有限公司 A kind of embedding algorithm and extracting method and system based on singular value decomposition
CN111984943A (en) * 2020-07-29 2020-11-24 南京信息工程大学 DWT-SVD digital watermarking method based on artificial bee colony algorithm
CN111984943B (en) * 2020-07-29 2023-08-22 南京信息工程大学 DWT-SVD digital watermarking method based on artificial bee colony algorithm
CN112232428A (en) * 2020-10-23 2021-01-15 上海电力大学 Image hash acquisition method based on three-dimensional characteristics and energy change characteristics
CN112232428B (en) * 2020-10-23 2021-11-16 上海电力大学 Image hash acquisition method based on three-dimensional characteristics and energy change characteristics
CN113570494A (en) * 2021-07-28 2021-10-29 上海明略人工智能(集团)有限公司 Encrypted digital watermark adding method, system, equipment and storage medium
CN113570494B (en) * 2021-07-28 2024-01-26 上海明略人工智能(集团)有限公司 Encryption digital watermark adding method, system, device and storage medium

Also Published As

Publication number Publication date
CN105427231B (en) 2018-11-06

Similar Documents

Publication Publication Date Title
CN105427231A (en) SVD dual-layer digital watermarking method capable of avoiding false alarm
CN100517381C (en) Methof for embedding and extracting watermark based on statistical model of coefficient in transform domain of digital images
CN103886545B (en) Transformation domain printing-scanning resistant digital watermarking method based on computer-generated holography
CN102592257B (en) Cyan, magenta, yellow and black (CMYK) color space-based optical holographic watermark algorithm
CN109035129B (en) Color digital image blind watermarking method based on two-dimensional discrete sine transformation
Zhang Digital watermarking technology: A review
CN101122995B (en) Binary image digit water mark embedding, extraction method and device
CN102880999B (en) Color image digital watermark method capable of resisting stamping, printing and scanning processes
CN110390621B (en) DCT domain color digital image blind watermarking method based on variable step length
Hadmi et al. Perceptual image hashing
CN105512999B (en) A kind of color image holographic watermark method of double transformation
CN101950407A (en) Method for realizing color image digital watermark for certificate anti-counterfeiting
CN105701757B (en) Product anti-counterfeiting method and device based on digital watermark and graphic code
CN101122996B (en) Digital image embedding, extraction method and device
CN103955880A (en) DWT-SVD robust blind watermark method based on Zernike moments
CN101833745B (en) Method for detecting embedding and extracting of multiple binary embedded watermarks of digital image
Kaur et al. A review on digital watermarking using LSB
EP3175423B1 (en) Digital image watermarking system and method
Muñoz-Ramirez et al. A robust watermarking scheme to JPEG compression for embedding a color watermark into digital images
CN108648130B (en) Totally-blind digital watermarking method with copyright protection and tampering positioning functions
Surekha et al. A multiple watermarking technique for images based on visual cryptography
Singh A survey on image steganography techniques
Sun et al. Research on embedding and extracting methods for digital watermarks applied to QR code images
Kekre et al. Robust Watermaking Technique Using Hybrid Wavelet Transform Generated From Kekre Transforms and Discrete Cosine Transform
CN101071499A (en) Printed matter anti-counterfeit digital water print embedding method and its detecting method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20160323

Assignee: Shanghai Xiangtong Vision Technology Co., Ltd

Assignor: Nanjing Forestry University

Contract record no.: X2019340000008

Denomination of invention: SVD dual-layer digital watermarking method capable of avoiding false alarm

Granted publication date: 20181106

License type: Common License

Record date: 20191108

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20160323

Assignee: NANJING ZHAOZHE ELECTROMECHANICAL TECHNOLOGY CO., LTD.

Assignor: Nanjing Forestry University

Contract record no.: X2019320000255

Denomination of invention: SVD dual-layer digital watermarking method capable of avoiding false alarm

Granted publication date: 20181106

License type: Common License

Record date: 20191114

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20160323

Assignee: Victory sky, sea, Qingdao becomes intelligent Science and Technology Ltd.

Assignor: Nanjing Forestry University

Contract record no.: X2019320000276

Denomination of invention: SVD dual-layer digital watermarking method capable of avoiding false alarm

Granted publication date: 20181106

License type: Common License

Record date: 20191118

EE01 Entry into force of recordation of patent licensing contract