CN108257073A - A kind of invisible watermark embedding grammar and Blind extracting method - Google Patents

A kind of invisible watermark embedding grammar and Blind extracting method Download PDF

Info

Publication number
CN108257073A
CN108257073A CN201810044685.8A CN201810044685A CN108257073A CN 108257073 A CN108257073 A CN 108257073A CN 201810044685 A CN201810044685 A CN 201810044685A CN 108257073 A CN108257073 A CN 108257073A
Authority
CN
China
Prior art keywords
domain information
frequency domain
original image
watermark
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810044685.8A
Other languages
Chinese (zh)
Inventor
余水来
曾明
辛琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dexin Orient Network Technology Co ltd
Original Assignee
Beijing New Oriental Fast Network Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing New Oriental Fast Network Polytron Technologies Inc filed Critical Beijing New Oriental Fast Network Polytron Technologies Inc
Priority to CN201810044685.8A priority Critical patent/CN108257073A/en
Publication of CN108257073A publication Critical patent/CN108257073A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Abstract

The present invention provides a kind of invisible watermark embedding grammar and Blind extracting method, belongs to computer realm, which includes step 1:Original image obtains the time-domain information of pretreated original image after pretreatment;Step 2:The time-domain information of original image is converted, obtains the frequency domain information of pretreated original image;Step 3:Key random permutations are carried out to the frequency domain information of watermarking images, generate the watermarking images frequency domain information of upset;Step 4:The watermarking images frequency domain information of upset is added in the frequency domain information of pretreated original image, obtains the image frequency domain information of embedded watermark;Step 5:The image frequency domain information of embedded watermark is converted to obtain the time-domain information of the image of embedded watermark.The invention has good safety, stability, robustness, concealment, can effectively resist common de-watermarked attack.

Description

A kind of invisible watermark embedding grammar and Blind extracting method
Technical field
The present invention relates to field of computer technology more particularly to a kind of invisible watermark embedding grammar and Blind extracting methods.
Background technology
Digital watermarking (Digital Watermarking) technology is that some identification informations (i.e. digital watermarking) are directly embedding Enter in digital carrier (including multimedia, document, software etc.) or secondary indication (structure of modification specific region), and not shadow The use value of original vector is rung, be also not easy to be ascertained and is changed again.But it can be identified and recognized by producer.Pass through these Information in the carrier is hidden, can be reached and be confirmed creator of content, buyer, transmission secret information or whether judge carrier The purpose of being tampered.Digital watermarking has the characteristics that safety, concealment, robustness, sensibility, is protection information safety, real It is existing it is anti-fake trace to the source, the effective way of copyright protection, be Investigation of Information Hiding Technology field important branch and research direction.Number Whether digital watermark can be divided into visible watermarking technique, invisible watermark technology by whether watermark is visible, needed by extraction watermark Want original reference image that can be divided into Blind extracting digital watermark, non-Blind extracting digital watermark.
Existing digital watermark technology generally use LSB methods, Patchwork methods, based on full-scale transform domain DFT Method, block-based dct transform method.LSB methods are to least significant bit embedding information, and LSB methods are to filtering, encoding, geometry Transformation etc. is all very sensitive, is a kind of very fragile water mark method;Patchwork methods are a kind of are based between modification set Certain relationship be embedded in watermark;When extracting watermark, then the information of embedded watermark is extracted according to corresponding relationship, advantage is It can realize blind Detecting, but it can only hide the information of 1bit, and the image can only be illustrated with the presence or absence of watermark, hiding information It measures smaller;Based on full-scale transform domain DFT method, there is good invisibility, and can effectively resist filtering, compile Operations such as code, geometric transformation, and bulk information can be embedded in, but for cut size it is larger when, resistance is poor, and transports Calculation amount is very big, almost unavailable for real-time video coding/decoding system;Block-based dct transform method and other transform domain sides Method is similar to have good invisibility, and can effectively resist the operations such as filtering, coding, geometric transformation, and can be embedding Enter bulk information, can effectively resist large scale and cut out attack, but main DCT methods are mainly become using fixed 8x8 at present It changes, frequency domain value correction position is generally fixed, it is impossible to resist some statistical attack means.
Invention content
In view of the above problems, a kind of invisible watermark embedding grammar provided by the invention and Blind extracting method, with Solve the deficiency of digital watermark technology in the prior art.
To achieve the above object, the technical solution taken of the present invention is:
Invisible watermark embedding grammar provided by the invention, including
Step 1:Original image obtains the time-domain information of pretreated original image after pretreatment;
Step 2:The time-domain information of original image is converted, obtains the frequency domain information of pretreated original image;
Step 3:Key random permutations are carried out to the frequency domain information of watermarking images, generate the watermarking images frequency domain letter of upset Breath;
Step 4:The watermarking images frequency domain information of upset is added in the frequency domain information of pretreated original image, Obtain the image frequency domain information of embedded watermark;
Step 5:The image frequency domain information of embedded watermark is converted to obtain the time-domain information of the image of embedded watermark.
Invisible watermark embedding grammar provided by the invention, it is preferable that be transformed to DCT changes in step 1 to step 5 It changes.
The Blind extracting method of invisible watermark provided by the invention, for above-mentioned invisible watermark embedding grammar insertion Watermark extract, including:
Step 1:The frequency domain that the time-domain information of the image of embedded watermark is converted to obtain the image of embedded watermark is believed Breath;
Step 2:Original image obtains the time-domain information of pretreated original image after pretreatment;
Step 3:The time-domain information of original image is converted, obtains the frequency domain information of pretreated original image;
Step 4:The water of upset is calculated by the frequency domain information of image and the frequency domain information of original image of embedded watermark The frequency domain information of watermark image;
Step 5:The frequency domain information of the watermarking images of upset and Key are subjected to inversely processing, obtain the frequency domain letter of watermarking images Breath.
The Blind extracting method of invisible watermark provided by the invention, it is preferable that be transformed to DCT in step 1 to step 5 Transformation.
Above-mentioned technical proposal has the following advantages that or advantageous effect:
Invisible watermark embedding grammar provided by the invention and Blind extracting method have good safety, stability, Shandong Stick, concealment can effectively resist common de-watermarked attack.
Description of the drawings
Upon reading the detailed description of non-limiting embodiments with reference to the following drawings, the present invention and its feature, outer Shape and advantage will become more apparent.Attached drawing is not drawn to scale deliberately, it is preferred that emphasis is the purport of the present invention is shown.
Fig. 1 is the flow chart for the invisible watermark embedding grammar that the embodiment of the present invention 1 provides;
Fig. 2 is the flow chart of the Blind extracting method for the invisible watermark that the embodiment of the present invention 1 provides.
Specific embodiment
The invention will be further described with specific embodiment below in conjunction with the accompanying drawings, but not as the limit of the present invention It is fixed, those of ordinary skill in the art according to the equivalent transformation in these embodiment institute work energy, methods either structure or Substitute, all belong to the scope of protection of the present invention within.
Embodiment 1:
As shown in Figure 1, invisible watermark embedding grammar provided by the invention, including
Step 1 101:Original image obtains the time-domain information of pretreated original image after pretreatment;
Step 2 102:The time-domain information of original image is converted, obtains the frequency domain letter of pretreated original image Breath;
Step 3 103:Key random permutations are carried out to the frequency domain information of watermarking images, generate the watermarking images frequency domain of upset Information;
Step 4 104:The watermarking images frequency domain information of upset is added to the frequency domain information of pretreated original image In, obtain the image frequency domain information of embedded watermark;
Step 5 105:The time domain that the image frequency domain information of embedded watermark is converted to obtain the image of embedded watermark is believed Breath.
By the frequency domain information of the time-domain information conversion original image of original image, it is placed in the frequency domain information of original image The watermarking images information of upset so that the invisible watermark embedding grammar has good concealment, robustness, for going to remove water (rotation is put down for print attack (A/D conversions, D/A conversions, filtering, denoising, histogram modification, quantization, compressed encoding etc.), geometric attack Shifting, cutting, deletes row or column etc. at size change over), repeat the methods of embedded attack, collusion attack there is good resistance, increase The safety of watermark.
More specifically, it is transformed to dct transform in step 1 to step 5.
Using dct transform mainly with transform size is variable, transform method is more, DCT frequency domains point modification coefficient changes at random The features such as so that invisible watermark embedding grammar provided by the invention can preferably keep out de-watermarked attack (statistics, confederate etc. De-watermarked attack), there is sufficiently strong safety, stability.
It should be noted that step three 103 and step 1 101, the sequence of step 2 102 in the present invention can be according to realities Border is exchanged, and can also be carried out at the same time.
As shown in Fig. 2, the Blind extracting method of invisible watermark provided by the invention, for providing the embodiment of the present invention 1 Invisible watermark embedding grammar insertion watermark extract, including:
Step 1 201:The time-domain information of the image of embedded watermark is converted to obtain the frequency domain of the image of embedded watermark Information;
Step 2 202:Original image obtains the time-domain information of pretreated original image after pretreatment;
Step 3 203:The time-domain information of original image is converted, obtains the frequency domain letter of pretreated original image Breath;
Step 4 204:Upset is calculated by the frequency domain information of image and the frequency domain information of original image of embedded watermark Watermarking images frequency domain information;
Step 5 205:The frequency domain information of the watermarking images of upset and Key are subjected to inversely processing, obtain the frequency of watermarking images Domain information.
More specifically, it is transformed to dct transform in step 1 to step 5.
It should be noted that step one 201 and step 2 202, the sequence of step 3 203 in the present invention can be according to realities Border is exchanged, and can also be carried out at the same time.
It should be appreciated by those skilled in the art that those skilled in the art combine the prior art and above-described embodiment can be real The existing change case, it will not be described here.Such change case does not affect the essence of the present invention, and it will not be described here.
Presently preferred embodiments of the present invention is described above.It is to be appreciated that the invention is not limited in above-mentioned Particular implementation, wherein the equipment and structure be not described in detail to the greatest extent are construed as giving reality with the common mode in this field It applies;Any those skilled in the art, do not depart from technical solution of the present invention make many possible changes and modifications or The equivalent embodiment of equivalent variations is revised as, this is not affected the essence of the present invention.Therefore, it is every without departing from skill of the present invention The content of art scheme, any simple modification made to the above embodiment of technical spirit according to the present invention, equivalent variations and is repaiied Decorations, still fall within technical solution of the present invention protection in the range of.

Claims (4)

1. a kind of invisible watermark embedding grammar, which is characterized in that including
Step 1:Original image obtains the time-domain information of pretreated original image after pretreatment;
Step 2:The time-domain information of original image is converted, obtains the frequency domain information of pretreated original image;
Step 3:Key random permutations are carried out to the frequency domain information of watermarking images, generate the watermarking images frequency domain information of upset;
Step 4:The watermarking images frequency domain information of upset is added in the frequency domain information of pretreated original image, is obtained The image frequency domain information of embedded watermark;
Step 5:The image frequency domain information of embedded watermark is converted to obtain the time-domain information of the image of embedded watermark.
2. invisible watermark embedding grammar as described in claim 1, which is characterized in that the transformation in step 1 to step 5 is equal For dct transform.
3. a kind of Blind extracting method of invisible watermark, for invisible described in any one in claim 1~2 to utilizing The watermark of watermark embedding method insertion extracts, which is characterized in that including:
Step 1:The time-domain information of the image of embedded watermark is converted to obtain the frequency domain information of the image of embedded watermark;
Step 2:Original image obtains the time-domain information of pretreated original image after pretreatment;
Step 3:The time-domain information of original image is converted, obtains the frequency domain information of pretreated original image;
Step 4:The watermark figure of upset is calculated by the frequency domain information of image and the frequency domain information of original image of embedded watermark The frequency domain information of picture;
Step 5:The frequency domain information of the watermarking images of upset and Key are subjected to inversely processing, obtain the frequency domain information of watermarking images.
4. the Blind extracting method of invisible watermark as claimed in claim 3, which is characterized in that the change in step 1 to step 5 It is changed to dct transform.
CN201810044685.8A 2018-01-17 2018-01-17 A kind of invisible watermark embedding grammar and Blind extracting method Pending CN108257073A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810044685.8A CN108257073A (en) 2018-01-17 2018-01-17 A kind of invisible watermark embedding grammar and Blind extracting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810044685.8A CN108257073A (en) 2018-01-17 2018-01-17 A kind of invisible watermark embedding grammar and Blind extracting method

Publications (1)

Publication Number Publication Date
CN108257073A true CN108257073A (en) 2018-07-06

Family

ID=62741461

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810044685.8A Pending CN108257073A (en) 2018-01-17 2018-01-17 A kind of invisible watermark embedding grammar and Blind extracting method

Country Status (1)

Country Link
CN (1) CN108257073A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111737662A (en) * 2020-06-16 2020-10-02 北京达佳互联信息技术有限公司 Watermark adding method, watermark extracting method, watermark adding device, watermark extracting device and electronic equipment
CN114245053A (en) * 2021-12-10 2022-03-25 天津洪恩完美未来教育科技有限公司 Video watermark generation method and device
CN115426537B (en) * 2022-09-05 2023-10-13 上海赛连信息科技有限公司 Method and system for adding invisible watermark and tracing information in video picture

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030172275A1 (en) * 2002-03-11 2003-09-11 Seung Wook Lee Real-time blind watermarking method using quantization
CN102750660A (en) * 2012-06-08 2012-10-24 北京京北方信息技术有限公司 Method and device for embedding and extracting digital watermarking
CN102930500A (en) * 2012-11-19 2013-02-13 海南大学 Medical image robust watermarking method based on Arnold scrambling transformation and DCT (discrete cosine transformation)
CN103295184A (en) * 2013-05-13 2013-09-11 西安电子科技大学 Frequency domain and airspace combined halftone watermarking method
CN106600516A (en) * 2016-11-10 2017-04-26 江苏信息职业技术学院 Digital fingerprint based image insertion method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030172275A1 (en) * 2002-03-11 2003-09-11 Seung Wook Lee Real-time blind watermarking method using quantization
CN102750660A (en) * 2012-06-08 2012-10-24 北京京北方信息技术有限公司 Method and device for embedding and extracting digital watermarking
CN102930500A (en) * 2012-11-19 2013-02-13 海南大学 Medical image robust watermarking method based on Arnold scrambling transformation and DCT (discrete cosine transformation)
CN103295184A (en) * 2013-05-13 2013-09-11 西安电子科技大学 Frequency domain and airspace combined halftone watermarking method
CN106600516A (en) * 2016-11-10 2017-04-26 江苏信息职业技术学院 Digital fingerprint based image insertion method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
段晓明 等: "基于图像置乱和小波变换的数字水印算法", 《微计算机信息》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111737662A (en) * 2020-06-16 2020-10-02 北京达佳互联信息技术有限公司 Watermark adding method, watermark extracting method, watermark adding device, watermark extracting device and electronic equipment
CN114245053A (en) * 2021-12-10 2022-03-25 天津洪恩完美未来教育科技有限公司 Video watermark generation method and device
CN115426537B (en) * 2022-09-05 2023-10-13 上海赛连信息科技有限公司 Method and system for adding invisible watermark and tracing information in video picture

Similar Documents

Publication Publication Date Title
Sun A novel edge based image steganography with 2k correction and Huffman encoding
CN102156955B (en) Robust reversible watermark embedding and extracting method based on histogram neighborhood
CN107688731B (en) Digital watermarking algorithm based on text document protection
CN101901470A (en) Image-tampering detection and recovery method based on energy-domain semi-fragile watermarking
CN103974144A (en) Video digital watermarking method based on characteristic scale variation invariant points and microscene detection
Zhang et al. A contour-based semi-fragile image watermarking algorithm in DWT domain
CN103106636A (en) Gray image watermark embedding and extracting method based on singular value decomposition
CN105632506A (en) Robust digital audio watermark embedding and detection method based on polar harmonic transform
CN108257073A (en) A kind of invisible watermark embedding grammar and Blind extracting method
CN101286224A (en) Watermark embedding and extraction method based on fractal image coding
CN104978706B (en) Watermark embedding and extracting method, device and system based on Fourier descriptor
Zhiwei et al. Steganography based on wavelet transform and modulus function
Lu et al. Multipurpose image watermarking method based on mean-removed vector quantization
KR100944488B1 (en) Watermark Inserting Method to Vector data for using Azimuth Information and Watermark Detecting Method to the same
CN103079066A (en) Image watermark embedding and extracting method combining ridgelet transform and DCT transform
CN104103031A (en) Normalization-based vector spatial data blind watermark method
CN109685711B (en) Anti-rotation watermark method for embedding periodogram in characteristic region
CN105208462A (en) Video digital watermarking processing method and video digital watermarking system executing same
CN103379325A (en) Video geographical data digital watermarking method with copyright protection service orientation
CN105590292A (en) Color image watermark embedding and detection method based on quaternion PHT synchronous correction
CN104616240A (en) Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting device, and system thereof
Liao et al. Data hiding in video using adaptive LSB
Dutta et al. A neural network based image watermarking technique using spiral encoding of DCT coefficients
CN103065073B (en) A kind of method for anti-counterfeit of the digital printed product based on digital watermark technology
Kiani et al. Image authentication using fractal watermarking and chaos theory

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20181102

Address after: 100080 17 1701-07 unit, 2 East 3rd Street, Haidian, Haidian District, Beijing.

Applicant after: Beijing Dexin orient Network Technology Co.,Ltd.

Address before: 100080 801-01 8, No. 2 East Third Street, Haidian, Haidian District, Beijing.

Applicant before: BEIJING NEW ORIENTAL XUNCHENG NETWORK TECHNOLOGY CO.,LTD.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180706