CN106803230A - A kind of image encryption method based on digital watermarking - Google Patents

A kind of image encryption method based on digital watermarking Download PDF

Info

Publication number
CN106803230A
CN106803230A CN201710027762.4A CN201710027762A CN106803230A CN 106803230 A CN106803230 A CN 106803230A CN 201710027762 A CN201710027762 A CN 201710027762A CN 106803230 A CN106803230 A CN 106803230A
Authority
CN
China
Prior art keywords
watermark
block
image
quick response
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710027762.4A
Other languages
Chinese (zh)
Inventor
朱文忠
项阳
朱生鹏
应雪莲
俞维佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN201710027762.4A priority Critical patent/CN106803230A/en
Publication of CN106803230A publication Critical patent/CN106803230A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0092Payload characteristic determination in a watermarking scheme, e.g. number of bits to be embedded

Abstract

The present invention is calculated the coordinate of embedded watermark in image by character type watermark information, character type information is generated into watermark by two-dimension code generator, again by Quick Response Code watermark embedding image, and detect that original image whether there is two-dimentional code watermark, resisted watermark and repeated the embedded method attacked.The present invention is based on mathematical theory and characteristic image data, the characteristic of associative transformation domain watermarking algorithm and the theory of utilization air space algorithm, with watermark information mapping algorithm, two-dimensional water mark distribution embedded technology and similarity detection algorithm as key technology so that this method can meet the embedded purpose of resistance repetition and possess preferable robustness and data capacity higher again.

Description

A kind of image encryption method based on digital watermarking
Technical field
The present invention relates to general image real time transfer, the more particularly to image encryption method based on digital watermarking.
Background technology
With the high speed development of Internet technologies, the propagation of digital information has reached unprecedented speed, various biographies The information of system is all digitized.Digital information has the convenient inherent advantage of exchange, but this advantage is significantly facilitating propagation Cause that the mode for forging tampered image is increasingly various simultaneously, higher examining is proposed to the property right protection and content authentication of image Test.The ownership problem of copyright, anti-tamper problem etc. are all the hot issues for meriting attention cybertimes.Fully enjoying While by propagating convenient, how the copyright of copyright preferably to be protected using technological means, had become one Widely studied problem.Digital watermarking is the core technology of the subject study.
Digital watermark technology can be applied in image, sound, in the middle of the various copyrights such as video, protect the version of works Power.Traditional encryption technology can play a protective role, but once be decrypted, and author would become hard to follow the trail of the works of oneself again And possess it legal copyright.At present, digital watermark technology has turned into and has realized copyright protection of digital product and information integrity The effective means of checking, is a study hotspot of information security field.Digital watermark technology is that additional information is embedded in into original It is therein with identifiability without a kind of information encryption of influence host's data availability in beginning data (host's data) Additional information be referred to as digital watermarking, its form is varied, such as:Text information, audio data, image etc..Digital watermarking is led to Cross Information Hiding Techniques, be it is for host's data has stamped a permanent copyright branding and hidden in wherein, anyway Propagate, digital watermark information can be extracted all without disappearance.
Counted through patent consulting, both at home and abroad the patent in terms of existing many digital watermarkings:For example, a kind of based on DWT domains Digital watermark method and system(2011104009618), a kind of stream media digital watermarking system(2007101798841), onlap The meaningful digital watermarking algorithm of number frequency domain(2008100340277), embedding algorithm method, extracting method and its device (200810240311X)Deng.
But current technology can not solve the problems, such as to repeat embedded watermark in digital watermarking, i.e., after once embedded watermark meeting Once embedded watermark is capped before causing, so as to cannot realize preventing data from being asked by the tracking of pirate copies and copyright protection etc. Topic.
The content of the invention
To solve the deficiencies in the prior art, there is provided a kind of image encryption method based on digital watermarking, this method design Rationally, realize simply, there is the embedded covering problem for solving repetitive watermark, prevent data by pirate copies, favourable copyright protection.
To achieve the above object, the present invention uses following technical scheme:
A kind of image encryption method based on digital watermarking:
Step a, obtains coordinate points:The coordinate points of generation watermark Quick Response Code insertion preprocessed to character type watermark information;
Step a1, character type watermark information sequence is W, W={ B0, B1, B2, B3, B4,..., B n , wherein,nIt is Chief Information Officer Degree, B n It is the unit information of watermark information, B n It is ASCII value;
Step a2, by B n ASCII value be converted to octet character string K, K=k 0,k 1...,k i ,k i Value take 0 or 1,i =7;
Step a3, settingb nj,Wherein j=1,2,3,
b n0=000000 k 0 k 1,b n1=00000k 2 k 3 k 4,b n2=00000k 5 k 6 k 7,
Willb nj Decimal system conversion is carried out, is obtaineda nj =del(b nj );
Step a4 is righta nj Carry out Nonlinear Mapping as follows:
(Formula 1)
Step a5, calculating parametert n , i.e., to A nj Take the mean:
(Formula 2)
Step a6, obtains a length of of imagel, image it is a width ofw, by following formula obtain watermark embedded location coordinate points (x,y):
(Formula 3)
Step b, is embedded in two dimension code watermark in the picture:
Image block where taking each coordinate points in step a, is referred to as sub-block, each coordinate points be designated as (x,y) n , son Block is designated as Q n (x,y), sub-block collection Q (x,y)={Q0(x,y), Q1(x,y), Q2(x,y) ..., Q n (x,y), by water Official seal breath generates Quick Response Code by two-dimension code generator, and Quick Response Code is zoomed to the size of each sub-block, and method is as follows:
Total pixel number of sub-block is N, and sub-block is changed by the region projection formula of following formula:
(Formula 4)
Wherein:
And 0<p<N, 0<q< N;
Y p Represent projection of the black pixel point to sub-block, C on Quick Response Code p Represent throwing of the white pixel point to sub-block on Quick Response Code Shadow,x p The one-row pixels point of sub-block is represented,y p A row pixel of sub-block is represented,
Step c, whether there is watermark Quick Response Code in detection information:The coordinate points of watermark Quick Response Code are obtained by step a, is extracted and is sat The image of sub-block where punctuate, watermark Quick Response Code is whether there is in comparing detection information by pixel average value, if extracted The pixel average value of the image for arriving is equal to the pixel average value of the image of watermarked Quick Response Code, then there is watermark in information Quick Response Code, conversely, not existing then.
In step b, after the completion of pixel is changed, watermark Quick Response Code is just embedded in coordinate points, the watermark two of each insertion Tie up code length and width be max (l, w)/20, will Quick Response Code be singly embedded into what is obtained by step a on image In coordinate points
% is remainder operation in formula 3.
The size of each sub-block can be with sets itself.The length and width of sub-block are equal, and be can not be overlapped between each sub-block.
Pixel average value described in step c refers to that the value that all pixels of image are selected is added and removes in the total of image slices vegetarian refreshments Number.
In step c, the pixel average value of image refers to all pixels point of traversal entire image, adds up and obtains all pictures The gray value summation of vegetarian refreshments, average value is the business of gray value summation and pixel number, and its method is as follows:
Step c1, travels through the pixel of pending source images;
Step c2, the gray value to each pixel carries out cumulative summation;
Step c3, calculates the pixel total number of image;
Step c4, seeks the average gray value of image.
The present invention is calculated the coordinate of embedded watermark in image by character type watermark information, character type information is passed through into two dimension Code generator generates watermark, then by Quick Response Code watermark embedding image, and detect that original image whether there is two-dimentional code watermark, support Watermark has been resisted to repeat the embedded method attacked.
Meanwhile, the present invention is based on mathematical theory and characteristic image data, and the characteristic of associative transformation domain watermarking algorithm is simultaneously used The theory of air space algorithm, be with watermark information mapping algorithm, two-dimensional water mark distribution embedded technology and similarity detection algorithm Key technology so that this method can meet the embedded purpose of resistance repetition and possess preferable robustness and data appearance higher again Amount.
Brief description of the drawings
Fig. 1 is a kind of schematic diagram of the embodiment of the present invention;
Fig. 2 is a kind of Technology Roadmap of the invention;
Fig. 3 is a kind of encryption flow figure of the invention.
Marked in figure:1 two-dimension code image, 2 original images that need to be encrypted, 3 coordinate points example on the diagram, 4 use watermark Image after the two-dimentional code encryption that information is produced.
Specific embodiment
Referring to the drawings, the present embodiment carries out watermark covering encryption to image using " Zhejiang Polytechnical University " as encryption information.
It is specifically used following:
Step a, obtains coordinate points:
Step a1, gives watermark information sequence W " Zhejiang Polytechnical University ", W={ B0, B1, B2, B3, B4,..., B n , wherein,nIt is message length 5, B0It is " Zhejiang ", B1It is " river " that by that analogy, B5 is " ";
Step a2, by B n ASCII value be converted to octet character string K=(k 0,k 1...,k i ),k i Value take 0 or 1,i= 7:
The ASCII value in " Zhejiang " is converted into octet character string K=(01001011), the corresponding ASCII value of other several words is such as Under:
Zhejiang:01001011
River:01001011
Work:01001011
Industry:01001011
Greatly:01001011
Learn:01001011
Step a3, obtainsb n0,b n1,b n2,b n0=000000 k 0 k 1,b n1=00000k 2 k 3 k 4,b n2=00000k 5 k 6 k 7Then willb nj Decimal system del conversions are carried out, is obtaineda nj =del(b nj ),j=1,2,3:
Then " Zhejiang "k 0=01,k 1=001,k 2=011, then understandb 00=00000 001,b 01=00000 001,b 02= 00000 011, then willb 00,b 01,b 02Decimal system del conversions are carried out, is obtaineda 00=del(b 00)=1,a 01=del(b 01)= 1,a 02=del(b 02)=3;
Step a4 is righta nj Carry out Nonlinear Mapping, i.e. A nj =G(a nj ):
(Formula 1)
Pass through(Formula 1)To " Zhejiang "a 00,a 01,a 02Value carries out Nonlinear Mapping, obtains A00=G(a 00)=9, A01=G(a 01)=9, A02 =G(a 02)=13;
Step a5, is obtained by following formulat n , i.e., to A nj Take the mean:
(Formula 2)
Pass through(Formula 2)Obtain
Step a6, obtains a length of of imagel, image it is a width ofw, message lengthn, the seat of watermark embedded location is obtained by following formula Punctuate (x,y), wherein, % is operated for remainder:
(Formula 3)
A length of 300 pixel of image is taken, a width of 300 pixel of image, message length 6 passes through(Formula 3)Obtain the coordinate points in " Zhejiang " (x,y)0=(3/9, (3/9) ' 3%3)0=(0.33,1)0
The coordinate of other characters is obtained according to the above method;
Step b, is embedded in two dimension code watermark in the picture:Image block where taking each coordinate points in step a, is referred to as Sub-block.Wherein, each coordinate points be designated as (x,y) n , sub-block is designated as Q n (x,y).By " Zhejiang Polytechnical University " this watermark character The Quick Response Code of Information Pull two-dimension code generator generation, and Quick Response Code is zoomed to the size of each sub-block, this is scaled Quick Response Code is embedded in corresponding coordinate;
Step b1, makes total pixel number of sub-block for N, changes sub-block by the projection formula in the region of following formula, in a sub-block Pixel after embedded watermark Quick Response Code:
(Formula 4)
Wherein,,, And 0<p<N, 0<q<N, Y i Represent projection of the black pixel point to sub-block, C on Quick Response Code i Represent white pixel on Quick Response Code Projection of the point to sub-block,x i The one-row pixels point of sub-block is represented,y j Represent a row pixel of sub-block;
Step b2, pixel change after the completion of, watermark Quick Response Code is just successfully embedded in coordinate points, will Quick Response Code one by one Ground has been embedded on image in the coordinate points obtained by step a.
Take the image block corresponding to the coordinate points of " Zhejiang " word obtained in step a, the coordinate points in " Zhejiang " be designated as (0.33, 1)0, sub-block is designated as Q0(0.33,1), the Quick Response Code generated using two-dimension code generator is zoomed to the size of each sub-block, is led to The pixel crossed after formula 4 changes sub-block insertion watermark Quick Response Code.
Step c, whether there is watermark Quick Response Code in detection information:The coordinate points of watermark Quick Response Code are obtained by step a, is carried The image of sub-block size is taken, by the average value of pixel point value(I.e. the value of all pixels point of image is added and removes in pixel Total number)Compare with the presence or absence of watermark Quick Response Code in detection information, if average value of the pixel point value of the image for extracting etc. In the average value of the pixel point value of the image of watermarked Quick Response Code, then there is watermark Quick Response Code in information, conversely, not existing. Wherein, the average value of the pixel point value of image is asked for, direct method is exactly all pixels point for traveling through entire image, it is cumulative to ask The value summation of all pixels point is taken, average value is the summation of all pixels point value and the business of the total number of image slices vegetarian refreshments, step It is as follows:
(1)The pixel of the pending source images src of traversal;
(2)Gray value to each pixel carries out cumulative summation sum;
(3)Calculate the pixel total number of image:m = src->width*src->height;
(4)Seek the average gray value of image:avg_value = sum/m.

Claims (1)

1. a kind of image encryption method based on digital watermarking:
Step a, obtains coordinate points:The coordinate points of generation watermark Quick Response Code insertion preprocessed to character type watermark information;
Step a1, character type watermark information sequence is W, W={ B0, B1, B2, B3, B4,..., B n , wherein,nIt is message length, B n It is the unit information of watermark information, B n It is ASCII value;
Step a2, by B n ASCII value be converted to octet character string K, K=k 0,k 1...,k i ,k i Value take 0 or 1,i= 7;
Step a3, settingb nj,Wherein j=1,2,3,
b n0=000000 k 0 k 1,b n1=00000k 2 k 3 k 4,b n2=00000k 5 k 6 k 7,
Willb nj Decimal system conversion is carried out, is obtaineda nj =del(b nj );
Step a4 is righta nj Carry out Nonlinear Mapping as follows:
(Formula 1)
Step a5, calculating parametert n , i.e., to A nj Take the mean:
(Formula 2)
Step a6, obtains a length of of imagel, image it is a width ofw, by following formula obtain watermark embedded location coordinate points (x,y):
(Formula 3)
Step b, is embedded in two dimension code watermark in the picture:
Image block where taking each coordinate points in step a, is referred to as sub-block, each coordinate points be designated as (x,y) n , son Block is designated as Q n (x,y), sub-block collection Q (x,y)={Q0(x,y), Q1(x,y), Q2(x,y) ..., Q n (x,y), by water Official seal breath generates Quick Response Code by two-dimension code generator, and Quick Response Code is zoomed to the size of each sub-block, and method is as follows:
Total pixel number of sub-block is N, and sub-block is changed by the region projection formula of following formula:
(Formula 4)
Wherein:
And 0<p<N, 0<q< N;
Y p Represent projection of the black pixel point to sub-block, C on Quick Response Code p Projection of the white pixel point to sub-block on Quick Response Code is represented,x p The one-row pixels point of sub-block is represented,y p A row pixel of sub-block is represented,
Step c, whether there is watermark Quick Response Code in detection information:The coordinate points of watermark Quick Response Code are obtained by step a, is extracted and is sat The image of sub-block where punctuate, watermark Quick Response Code is whether there is in comparing detection information by pixel average value, if extracted The pixel average value of the image for arriving is equal to the pixel average value of the image of watermarked Quick Response Code, then there is watermark in information Quick Response Code, conversely, not existing then.
CN201710027762.4A 2017-01-16 2017-01-16 A kind of image encryption method based on digital watermarking Pending CN106803230A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710027762.4A CN106803230A (en) 2017-01-16 2017-01-16 A kind of image encryption method based on digital watermarking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710027762.4A CN106803230A (en) 2017-01-16 2017-01-16 A kind of image encryption method based on digital watermarking

Publications (1)

Publication Number Publication Date
CN106803230A true CN106803230A (en) 2017-06-06

Family

ID=58985713

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710027762.4A Pending CN106803230A (en) 2017-01-16 2017-01-16 A kind of image encryption method based on digital watermarking

Country Status (1)

Country Link
CN (1) CN106803230A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770407A (en) * 2017-11-01 2018-03-06 湖北工程学院 The image encryption method and device of joint zero watermarking insertion
CN108648132A (en) * 2018-04-16 2018-10-12 深圳市联软科技股份有限公司 According to the method for graphic hotsopt watermark, system, terminal and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0928110A2 (en) * 1997-12-30 1999-07-07 Sarnoff Corporation Image signal processing for electronic watermarking
CN102223561A (en) * 2011-07-01 2011-10-19 宁波大学 Blind watermark embedding and extracting method of stereoscopic video image
CN102609890A (en) * 2011-01-20 2012-07-25 北京中盈信安科技发展有限责任公司 Image digital watermark embedding and detecting system
CN103136718A (en) * 2013-03-13 2013-06-05 上海理工大学 Anti-geometric-transformation practical color image digital watermark technology
CN103646376A (en) * 2013-12-25 2014-03-19 北京德信易税网络技术有限公司 Digital watermark image generation method
CN105741226A (en) * 2016-02-01 2016-07-06 江苏实达迪美数据处理有限公司 Electronic stamp based visible digital image watermark embedding and detection methods

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0928110A2 (en) * 1997-12-30 1999-07-07 Sarnoff Corporation Image signal processing for electronic watermarking
CN102609890A (en) * 2011-01-20 2012-07-25 北京中盈信安科技发展有限责任公司 Image digital watermark embedding and detecting system
CN102223561A (en) * 2011-07-01 2011-10-19 宁波大学 Blind watermark embedding and extracting method of stereoscopic video image
CN103136718A (en) * 2013-03-13 2013-06-05 上海理工大学 Anti-geometric-transformation practical color image digital watermark technology
CN103646376A (en) * 2013-12-25 2014-03-19 北京德信易税网络技术有限公司 Digital watermark image generation method
CN105741226A (en) * 2016-02-01 2016-07-06 江苏实达迪美数据处理有限公司 Electronic stamp based visible digital image watermark embedding and detection methods

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
MENG YINGJIE ET AL: ""Text Zero-Watermark Based on Texture Mapping Coordinates"", 《2012 9TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD 2012)》 *
ZUNERA JALIL ET AL: ""A Zero Text Watermarking Algorithm based on Non-Vowel ASCII Characters"", 《201O INTERNATIONAL CORIFERENCE ON EDUCATIONAL AND INFORMATION TECHNOLOGY (ICEIT 2010)》 *
张立忠 等: ""基于中英文字符型属性的数据库水印算法"", 《科学技术与工程》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770407A (en) * 2017-11-01 2018-03-06 湖北工程学院 The image encryption method and device of joint zero watermarking insertion
CN107770407B (en) * 2017-11-01 2019-07-19 湖北工程学院 The image encryption method and device of joint zero watermarking insertion
CN108648132A (en) * 2018-04-16 2018-10-12 深圳市联软科技股份有限公司 According to the method for graphic hotsopt watermark, system, terminal and medium
CN108648132B (en) * 2018-04-16 2020-08-14 深圳市联软科技股份有限公司 Method, system, terminal and medium for generating watermark according to image

Similar Documents

Publication Publication Date Title
Abd El-Latif et al. Efficient quantum information hiding for remote medical image sharing
Liao et al. Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels
Cao et al. Nonlinear scrambling-based reversible watermarking for 2D-vector maps
CN104537600A (en) Secondary image encrypting and decrypting methods and watermark information tamper area positioning method
Peng et al. A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation
CN111667395A (en) Three-dimensional model copyright authentication method
Zhang et al. QISLSQb: A quantum image steganography scheme based on Least Significant Qubit
WO2013149579A1 (en) Continuous vector graph description-based digital watermarking system and implementation method
Koliwad A comprehensive survey of contemporary researches in watermarking for copyright protection of digital images
Hsu et al. DIGITAL WATERMARKING SCHEME FOR COPYRIGHT PROTECTION AND TAMPERING DETECTION.
CN106803230A (en) A kind of image encryption method based on digital watermarking
Wang et al. A numerically stable fragile watermarking scheme for authenticating 3D models
CN102142129A (en) Visual secret sharing-based image content tampering detection method
Xing et al. A color image watermarking scheme resistant against geometrical attacks
CN104036448B (en) Digital watermark algorithm for three-dimensional model
CN104376236A (en) Scheme self-adaptive digital watermark embedding and extracting method based on camouflage technology
CN101847250A (en) Vector map data blind watermarking method based on DCT transformation
Cao et al. Iterative embedding-based reversible watermarking for 2D-vector maps
CN103903218B (en) Robust geographic data watermarking method for public ownership verification
Gu et al. Research on information hiding technology
Zhou et al. Quantum color image watermarking based on fast bit-plane scramble and dual embedded
Valarmathi et al. Secure data transfer through audio signal with LSA
Czaplewski et al. Digital fingerprinting for color images based on the quaternion encryption scheme
CN104103031A (en) Normalization-based vector spatial data blind watermark method
Zhang et al. Research on video copyright protection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170606

WD01 Invention patent application deemed withdrawn after publication