CN106803230A - A kind of image encryption method based on digital watermarking - Google Patents
A kind of image encryption method based on digital watermarking Download PDFInfo
- Publication number
- CN106803230A CN106803230A CN201710027762.4A CN201710027762A CN106803230A CN 106803230 A CN106803230 A CN 106803230A CN 201710027762 A CN201710027762 A CN 201710027762A CN 106803230 A CN106803230 A CN 106803230A
- Authority
- CN
- China
- Prior art keywords
- watermark
- block
- image
- quick response
- sub
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0092—Payload characteristic determination in a watermarking scheme, e.g. number of bits to be embedded
Abstract
The present invention is calculated the coordinate of embedded watermark in image by character type watermark information, character type information is generated into watermark by two-dimension code generator, again by Quick Response Code watermark embedding image, and detect that original image whether there is two-dimentional code watermark, resisted watermark and repeated the embedded method attacked.The present invention is based on mathematical theory and characteristic image data, the characteristic of associative transformation domain watermarking algorithm and the theory of utilization air space algorithm, with watermark information mapping algorithm, two-dimensional water mark distribution embedded technology and similarity detection algorithm as key technology so that this method can meet the embedded purpose of resistance repetition and possess preferable robustness and data capacity higher again.
Description
Technical field
The present invention relates to general image real time transfer, the more particularly to image encryption method based on digital watermarking.
Background technology
With the high speed development of Internet technologies, the propagation of digital information has reached unprecedented speed, various biographies
The information of system is all digitized.Digital information has the convenient inherent advantage of exchange, but this advantage is significantly facilitating propagation
Cause that the mode for forging tampered image is increasingly various simultaneously, higher examining is proposed to the property right protection and content authentication of image
Test.The ownership problem of copyright, anti-tamper problem etc. are all the hot issues for meriting attention cybertimes.Fully enjoying
While by propagating convenient, how the copyright of copyright preferably to be protected using technological means, had become one
Widely studied problem.Digital watermarking is the core technology of the subject study.
Digital watermark technology can be applied in image, sound, in the middle of the various copyrights such as video, protect the version of works
Power.Traditional encryption technology can play a protective role, but once be decrypted, and author would become hard to follow the trail of the works of oneself again
And possess it legal copyright.At present, digital watermark technology has turned into and has realized copyright protection of digital product and information integrity
The effective means of checking, is a study hotspot of information security field.Digital watermark technology is that additional information is embedded in into original
It is therein with identifiability without a kind of information encryption of influence host's data availability in beginning data (host's data)
Additional information be referred to as digital watermarking, its form is varied, such as:Text information, audio data, image etc..Digital watermarking is led to
Cross Information Hiding Techniques, be it is for host's data has stamped a permanent copyright branding and hidden in wherein, anyway
Propagate, digital watermark information can be extracted all without disappearance.
Counted through patent consulting, both at home and abroad the patent in terms of existing many digital watermarkings:For example, a kind of based on DWT domains
Digital watermark method and system(2011104009618), a kind of stream media digital watermarking system(2007101798841), onlap
The meaningful digital watermarking algorithm of number frequency domain(2008100340277), embedding algorithm method, extracting method and its device
(200810240311X)Deng.
But current technology can not solve the problems, such as to repeat embedded watermark in digital watermarking, i.e., after once embedded watermark meeting
Once embedded watermark is capped before causing, so as to cannot realize preventing data from being asked by the tracking of pirate copies and copyright protection etc.
Topic.
The content of the invention
To solve the deficiencies in the prior art, there is provided a kind of image encryption method based on digital watermarking, this method design
Rationally, realize simply, there is the embedded covering problem for solving repetitive watermark, prevent data by pirate copies, favourable copyright protection.
To achieve the above object, the present invention uses following technical scheme:
A kind of image encryption method based on digital watermarking:
Step a, obtains coordinate points:The coordinate points of generation watermark Quick Response Code insertion preprocessed to character type watermark information;
Step a1, character type watermark information sequence is W, W={ B0, B1, B2, B3, B4,..., B n , wherein,nIt is Chief Information Officer
Degree, B n It is the unit information of watermark information, B n It is ASCII value;
Step a2, by B n ASCII value be converted to octet character string K, K=k 0,k 1...,k i ,k i Value take 0 or 1,i
=7;
Step a3, settingb nj,Wherein j=1,2,3,
b n0=000000 k 0 k 1,b n1=00000k 2 k 3 k 4,b n2=00000k 5 k 6 k 7,
Willb nj Decimal system conversion is carried out, is obtaineda nj =del(b nj );
Step a4 is righta nj Carry out Nonlinear Mapping as follows:
(Formula 1)
Step a5, calculating parametert n , i.e., to A nj Take the mean:
(Formula 2)
Step a6, obtains a length of of imagel, image it is a width ofw, by following formula obtain watermark embedded location coordinate points (x,y):
(Formula 3)
Step b, is embedded in two dimension code watermark in the picture:
Image block where taking each coordinate points in step a, is referred to as sub-block, each coordinate points be designated as (x,y) n , son
Block is designated as Q n (x,y), sub-block collection Q (x,y)={Q0(x,y), Q1(x,y), Q2(x,y) ..., Q n (x,y), by water
Official seal breath generates Quick Response Code by two-dimension code generator, and Quick Response Code is zoomed to the size of each sub-block, and method is as follows:
Total pixel number of sub-block is N, and sub-block is changed by the region projection formula of following formula:
(Formula 4)
Wherein:
And 0<p<N, 0<q< N;
Y p Represent projection of the black pixel point to sub-block, C on Quick Response Code p Represent throwing of the white pixel point to sub-block on Quick Response Code
Shadow,x p The one-row pixels point of sub-block is represented,y p A row pixel of sub-block is represented,
Step c, whether there is watermark Quick Response Code in detection information:The coordinate points of watermark Quick Response Code are obtained by step a, is extracted and is sat
The image of sub-block where punctuate, watermark Quick Response Code is whether there is in comparing detection information by pixel average value, if extracted
The pixel average value of the image for arriving is equal to the pixel average value of the image of watermarked Quick Response Code, then there is watermark in information
Quick Response Code, conversely, not existing then.
In step b, after the completion of pixel is changed, watermark Quick Response Code is just embedded in coordinate points, the watermark two of each insertion
Tie up code length and width be max (l, w)/20, will Quick Response Code be singly embedded into what is obtained by step a on image
In coordinate points
% is remainder operation in formula 3.
The size of each sub-block can be with sets itself.The length and width of sub-block are equal, and be can not be overlapped between each sub-block.
Pixel average value described in step c refers to that the value that all pixels of image are selected is added and removes in the total of image slices vegetarian refreshments
Number.
In step c, the pixel average value of image refers to all pixels point of traversal entire image, adds up and obtains all pictures
The gray value summation of vegetarian refreshments, average value is the business of gray value summation and pixel number, and its method is as follows:
Step c1, travels through the pixel of pending source images;
Step c2, the gray value to each pixel carries out cumulative summation;
Step c3, calculates the pixel total number of image;
Step c4, seeks the average gray value of image.
The present invention is calculated the coordinate of embedded watermark in image by character type watermark information, character type information is passed through into two dimension
Code generator generates watermark, then by Quick Response Code watermark embedding image, and detect that original image whether there is two-dimentional code watermark, support
Watermark has been resisted to repeat the embedded method attacked.
Meanwhile, the present invention is based on mathematical theory and characteristic image data, and the characteristic of associative transformation domain watermarking algorithm is simultaneously used
The theory of air space algorithm, be with watermark information mapping algorithm, two-dimensional water mark distribution embedded technology and similarity detection algorithm
Key technology so that this method can meet the embedded purpose of resistance repetition and possess preferable robustness and data appearance higher again
Amount.
Brief description of the drawings
Fig. 1 is a kind of schematic diagram of the embodiment of the present invention;
Fig. 2 is a kind of Technology Roadmap of the invention;
Fig. 3 is a kind of encryption flow figure of the invention.
Marked in figure:1 two-dimension code image, 2 original images that need to be encrypted, 3 coordinate points example on the diagram, 4 use watermark
Image after the two-dimentional code encryption that information is produced.
Specific embodiment
Referring to the drawings, the present embodiment carries out watermark covering encryption to image using " Zhejiang Polytechnical University " as encryption information.
It is specifically used following:
Step a, obtains coordinate points:
Step a1, gives watermark information sequence W " Zhejiang Polytechnical University ", W={ B0, B1, B2, B3, B4,..., B n , wherein,nIt is message length 5, B0It is " Zhejiang ", B1It is " river " that by that analogy, B5 is " ";
Step a2, by B n ASCII value be converted to octet character string K=(k 0,k 1...,k i ),k i Value take 0 or 1,i=
7:
The ASCII value in " Zhejiang " is converted into octet character string K=(01001011), the corresponding ASCII value of other several words is such as
Under:
Zhejiang:01001011
River:01001011
Work:01001011
Industry:01001011
Greatly:01001011
Learn:01001011
Step a3, obtainsb n0,b n1,b n2,b n0=000000 k 0 k 1,b n1=00000k 2 k 3 k 4,b n2=00000k 5 k 6 k 7Then willb nj
Decimal system del conversions are carried out, is obtaineda nj =del(b nj ),j=1,2,3:
Then " Zhejiang "k 0=01,k 1=001,k 2=011, then understandb 00=00000 001,b 01=00000 001,b 02=
00000 011, then willb 00,b 01,b 02Decimal system del conversions are carried out, is obtaineda 00=del(b 00)=1,a 01=del(b 01)=
1,a 02=del(b 02)=3;
Step a4 is righta nj Carry out Nonlinear Mapping, i.e. A nj =G(a nj ):
(Formula 1)
Pass through(Formula 1)To " Zhejiang "a 00,a 01,a 02Value carries out Nonlinear Mapping, obtains A00=G(a 00)=9, A01=G(a 01)=9, A02
=G(a 02)=13;
Step a5, is obtained by following formulat n , i.e., to A nj Take the mean:
(Formula 2)
Pass through(Formula 2)Obtain;
Step a6, obtains a length of of imagel, image it is a width ofw, message lengthn, the seat of watermark embedded location is obtained by following formula
Punctuate (x,y), wherein, % is operated for remainder:
(Formula 3)
A length of 300 pixel of image is taken, a width of 300 pixel of image, message length 6 passes through(Formula 3)Obtain the coordinate points in " Zhejiang "
(x,y)0=(3/9, (3/9) ' 3%3)0=(0.33,1)0。
The coordinate of other characters is obtained according to the above method;
Step b, is embedded in two dimension code watermark in the picture:Image block where taking each coordinate points in step a, is referred to as
Sub-block.Wherein, each coordinate points be designated as (x,y) n , sub-block is designated as Q n (x,y).By " Zhejiang Polytechnical University " this watermark character
The Quick Response Code of Information Pull two-dimension code generator generation, and Quick Response Code is zoomed to the size of each sub-block, this is scaled
Quick Response Code is embedded in corresponding coordinate;
Step b1, makes total pixel number of sub-block for N, changes sub-block by the projection formula in the region of following formula, in a sub-block
Pixel after embedded watermark Quick Response Code:
(Formula 4)
Wherein,,,
And 0<p<N, 0<q<N, Y i Represent projection of the black pixel point to sub-block, C on Quick Response Code i Represent white pixel on Quick Response Code
Projection of the point to sub-block,x i The one-row pixels point of sub-block is represented,y j Represent a row pixel of sub-block;
Step b2, pixel change after the completion of, watermark Quick Response Code is just successfully embedded in coordinate points, will Quick Response Code one by one
Ground has been embedded on image in the coordinate points obtained by step a.
Take the image block corresponding to the coordinate points of " Zhejiang " word obtained in step a, the coordinate points in " Zhejiang " be designated as (0.33,
1)0, sub-block is designated as Q0(0.33,1), the Quick Response Code generated using two-dimension code generator is zoomed to the size of each sub-block, is led to
The pixel crossed after formula 4 changes sub-block insertion watermark Quick Response Code.
Step c, whether there is watermark Quick Response Code in detection information:The coordinate points of watermark Quick Response Code are obtained by step a, is carried
The image of sub-block size is taken, by the average value of pixel point value(I.e. the value of all pixels point of image is added and removes in pixel
Total number)Compare with the presence or absence of watermark Quick Response Code in detection information, if average value of the pixel point value of the image for extracting etc.
In the average value of the pixel point value of the image of watermarked Quick Response Code, then there is watermark Quick Response Code in information, conversely, not existing.
Wherein, the average value of the pixel point value of image is asked for, direct method is exactly all pixels point for traveling through entire image, it is cumulative to ask
The value summation of all pixels point is taken, average value is the summation of all pixels point value and the business of the total number of image slices vegetarian refreshments, step
It is as follows:
(1)The pixel of the pending source images src of traversal;
(2)Gray value to each pixel carries out cumulative summation sum;
(3)Calculate the pixel total number of image:m = src->width*src->height;
(4)Seek the average gray value of image:avg_value = sum/m.
Claims (1)
1. a kind of image encryption method based on digital watermarking:
Step a, obtains coordinate points:The coordinate points of generation watermark Quick Response Code insertion preprocessed to character type watermark information;
Step a1, character type watermark information sequence is W, W={ B0, B1, B2, B3, B4,..., B n , wherein,nIt is message length,
B n It is the unit information of watermark information, B n It is ASCII value;
Step a2, by B n ASCII value be converted to octet character string K, K=k 0,k 1...,k i ,k i Value take 0 or 1,i=
7;
Step a3, settingb nj,Wherein j=1,2,3,
b n0=000000 k 0 k 1,b n1=00000k 2 k 3 k 4,b n2=00000k 5 k 6 k 7,
Willb nj Decimal system conversion is carried out, is obtaineda nj =del(b nj );
Step a4 is righta nj Carry out Nonlinear Mapping as follows:
(Formula 1)
Step a5, calculating parametert n , i.e., to A nj Take the mean:
(Formula 2)
Step a6, obtains a length of of imagel, image it is a width ofw, by following formula obtain watermark embedded location coordinate points (x,y):
(Formula 3)
Step b, is embedded in two dimension code watermark in the picture:
Image block where taking each coordinate points in step a, is referred to as sub-block, each coordinate points be designated as (x,y) n , son
Block is designated as Q n (x,y), sub-block collection Q (x,y)={Q0(x,y), Q1(x,y), Q2(x,y) ..., Q n (x,y), by water
Official seal breath generates Quick Response Code by two-dimension code generator, and Quick Response Code is zoomed to the size of each sub-block, and method is as follows:
Total pixel number of sub-block is N, and sub-block is changed by the region projection formula of following formula:
(Formula 4)
Wherein:
And 0<p<N, 0<q< N;
Y p Represent projection of the black pixel point to sub-block, C on Quick Response Code p Projection of the white pixel point to sub-block on Quick Response Code is represented,x p The one-row pixels point of sub-block is represented,y p A row pixel of sub-block is represented,
Step c, whether there is watermark Quick Response Code in detection information:The coordinate points of watermark Quick Response Code are obtained by step a, is extracted and is sat
The image of sub-block where punctuate, watermark Quick Response Code is whether there is in comparing detection information by pixel average value, if extracted
The pixel average value of the image for arriving is equal to the pixel average value of the image of watermarked Quick Response Code, then there is watermark in information
Quick Response Code, conversely, not existing then.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710027762.4A CN106803230A (en) | 2017-01-16 | 2017-01-16 | A kind of image encryption method based on digital watermarking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710027762.4A CN106803230A (en) | 2017-01-16 | 2017-01-16 | A kind of image encryption method based on digital watermarking |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106803230A true CN106803230A (en) | 2017-06-06 |
Family
ID=58985713
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710027762.4A Pending CN106803230A (en) | 2017-01-16 | 2017-01-16 | A kind of image encryption method based on digital watermarking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106803230A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107770407A (en) * | 2017-11-01 | 2018-03-06 | 湖北工程学院 | The image encryption method and device of joint zero watermarking insertion |
CN108648132A (en) * | 2018-04-16 | 2018-10-12 | 深圳市联软科技股份有限公司 | According to the method for graphic hotsopt watermark, system, terminal and medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0928110A2 (en) * | 1997-12-30 | 1999-07-07 | Sarnoff Corporation | Image signal processing for electronic watermarking |
CN102223561A (en) * | 2011-07-01 | 2011-10-19 | 宁波大学 | Blind watermark embedding and extracting method of stereoscopic video image |
CN102609890A (en) * | 2011-01-20 | 2012-07-25 | 北京中盈信安科技发展有限责任公司 | Image digital watermark embedding and detecting system |
CN103136718A (en) * | 2013-03-13 | 2013-06-05 | 上海理工大学 | Anti-geometric-transformation practical color image digital watermark technology |
CN103646376A (en) * | 2013-12-25 | 2014-03-19 | 北京德信易税网络技术有限公司 | Digital watermark image generation method |
CN105741226A (en) * | 2016-02-01 | 2016-07-06 | 江苏实达迪美数据处理有限公司 | Electronic stamp based visible digital image watermark embedding and detection methods |
-
2017
- 2017-01-16 CN CN201710027762.4A patent/CN106803230A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0928110A2 (en) * | 1997-12-30 | 1999-07-07 | Sarnoff Corporation | Image signal processing for electronic watermarking |
CN102609890A (en) * | 2011-01-20 | 2012-07-25 | 北京中盈信安科技发展有限责任公司 | Image digital watermark embedding and detecting system |
CN102223561A (en) * | 2011-07-01 | 2011-10-19 | 宁波大学 | Blind watermark embedding and extracting method of stereoscopic video image |
CN103136718A (en) * | 2013-03-13 | 2013-06-05 | 上海理工大学 | Anti-geometric-transformation practical color image digital watermark technology |
CN103646376A (en) * | 2013-12-25 | 2014-03-19 | 北京德信易税网络技术有限公司 | Digital watermark image generation method |
CN105741226A (en) * | 2016-02-01 | 2016-07-06 | 江苏实达迪美数据处理有限公司 | Electronic stamp based visible digital image watermark embedding and detection methods |
Non-Patent Citations (3)
Title |
---|
MENG YINGJIE ET AL: ""Text Zero-Watermark Based on Texture Mapping Coordinates"", 《2012 9TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD 2012)》 * |
ZUNERA JALIL ET AL: ""A Zero Text Watermarking Algorithm based on Non-Vowel ASCII Characters"", 《201O INTERNATIONAL CORIFERENCE ON EDUCATIONAL AND INFORMATION TECHNOLOGY (ICEIT 2010)》 * |
张立忠 等: ""基于中英文字符型属性的数据库水印算法"", 《科学技术与工程》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107770407A (en) * | 2017-11-01 | 2018-03-06 | 湖北工程学院 | The image encryption method and device of joint zero watermarking insertion |
CN107770407B (en) * | 2017-11-01 | 2019-07-19 | 湖北工程学院 | The image encryption method and device of joint zero watermarking insertion |
CN108648132A (en) * | 2018-04-16 | 2018-10-12 | 深圳市联软科技股份有限公司 | According to the method for graphic hotsopt watermark, system, terminal and medium |
CN108648132B (en) * | 2018-04-16 | 2020-08-14 | 深圳市联软科技股份有限公司 | Method, system, terminal and medium for generating watermark according to image |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abd El-Latif et al. | Efficient quantum information hiding for remote medical image sharing | |
Liao et al. | Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels | |
Cao et al. | Nonlinear scrambling-based reversible watermarking for 2D-vector maps | |
CN104537600A (en) | Secondary image encrypting and decrypting methods and watermark information tamper area positioning method | |
Peng et al. | A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation | |
CN111667395A (en) | Three-dimensional model copyright authentication method | |
Zhang et al. | QISLSQb: A quantum image steganography scheme based on Least Significant Qubit | |
WO2013149579A1 (en) | Continuous vector graph description-based digital watermarking system and implementation method | |
Koliwad | A comprehensive survey of contemporary researches in watermarking for copyright protection of digital images | |
Hsu et al. | DIGITAL WATERMARKING SCHEME FOR COPYRIGHT PROTECTION AND TAMPERING DETECTION. | |
CN106803230A (en) | A kind of image encryption method based on digital watermarking | |
Wang et al. | A numerically stable fragile watermarking scheme for authenticating 3D models | |
CN102142129A (en) | Visual secret sharing-based image content tampering detection method | |
Xing et al. | A color image watermarking scheme resistant against geometrical attacks | |
CN104036448B (en) | Digital watermark algorithm for three-dimensional model | |
CN104376236A (en) | Scheme self-adaptive digital watermark embedding and extracting method based on camouflage technology | |
CN101847250A (en) | Vector map data blind watermarking method based on DCT transformation | |
Cao et al. | Iterative embedding-based reversible watermarking for 2D-vector maps | |
CN103903218B (en) | Robust geographic data watermarking method for public ownership verification | |
Gu et al. | Research on information hiding technology | |
Zhou et al. | Quantum color image watermarking based on fast bit-plane scramble and dual embedded | |
Valarmathi et al. | Secure data transfer through audio signal with LSA | |
Czaplewski et al. | Digital fingerprinting for color images based on the quaternion encryption scheme | |
CN104103031A (en) | Normalization-based vector spatial data blind watermark method | |
Zhang et al. | Research on video copyright protection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170606 |
|
WD01 | Invention patent application deemed withdrawn after publication |