CN113807997A - Method for embedding and extracting invisible mark for image - Google Patents
Method for embedding and extracting invisible mark for image Download PDFInfo
- Publication number
- CN113807997A CN113807997A CN202111090433.7A CN202111090433A CN113807997A CN 113807997 A CN113807997 A CN 113807997A CN 202111090433 A CN202111090433 A CN 202111090433A CN 113807997 A CN113807997 A CN 113807997A
- Authority
- CN
- China
- Prior art keywords
- embedding
- invisible
- image
- extracting
- transformation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 230000009466 transformation Effects 0.000 claims abstract description 25
- 238000000354 decomposition reaction Methods 0.000 claims description 7
- 230000000007 visual effect Effects 0.000 claims description 6
- GNFTZDOKVXKIBK-UHFFFAOYSA-N 3-(2-methoxyethoxy)benzohydrazide Chemical compound COCCOC1=CC=CC(C(=O)NN)=C1 GNFTZDOKVXKIBK-UHFFFAOYSA-N 0.000 claims description 3
- 238000000605 extraction Methods 0.000 abstract description 6
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000012966 insertion method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0057—Compression invariant watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0065—Extraction of an embedded watermark; Reliable detection
Abstract
A method for embedding and extracting invisible marks on an image is based on wavelet transformation and cosine transformation and carries out embedding and extraction on the invisible marks through phase characteristics of the image, and original content which does not need to be embedded is taken as reference during extraction. The problem that the visibility of the watermark, the influence on the original image quality and the robustness of the watermark are difficult to be considered simultaneously is solved. The method is suitable for scenes such as copyright protection and evidence collection, video content source tracing and the like. By combining DWT transformation and DCT transformation, the characteristics of the DWT transformation and the DCT transformation are fully utilized to achieve better balance of invisibility, robustness and computational efficiency of the embedded content.
Description
Technical Field
The invention relates to the technical field of image processing, in particular to a method for embedding and extracting an invisible mark for an image.
Background
With the development of internet technology and the increase of network transmission rate, the way in which people acquire information daily is changing significantly. Multimedia works in various forms, such as videos and images, can be published and transmitted through a network, and great convenience is brought to work and life of people. But at the same time, because of the openness of the internet, the works can be copied, modified and spread without the consent of the original authors, and the infringement of the intellectual property of the original works becomes easier. Therefore, there is a need for an accurate and efficient method for ownership proof and theft tracing of digital media works.
For the field of image embedding and extraction, the traditional methods include Fourier-Mellin transformation, template insertion, embedding of the invisible mark to be embedded into the annular region or the circumference of the DFT domain and a localized watermarking method, and for the Fourier-Mellin transformation proposed by O' Ruanadh and the like, the RST invariance of the transformation is utilized to realize the geometric attack resistance of the embedded content. But this method causes the image quality after embedding to become very poor. Template insertion method proposed for S' Pereira: template embedding and extraction are extremely complex, embedding capacity is small, embedding of the mark to be invisible on a DFT domain annular area or a DFT domain circumference is proposed by V.Solachidis and the like, and only small capability of resisting rotation transformation can be obtained. For the localized watermarking method: the method has stronger robustness to clipping, but cannot deal with geometric transformation.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method
The technical scheme adopted by the invention for overcoming the technical problems is as follows:
a method for embedding and extracting invisible marks in an image, comprising the steps of:
a) carrying out wavelet decomposition on the original image to obtain a plurality of detail sub-image coefficients FDjAnd an approximation subgraph coefficient FAL;
b) Embedding the invisible mark W into the approximate subgraph coefficient FA in an overlapping modeLIn the method, an approximate subgraph FA embedded with the invisible mark is obtainedL′;
c) For approximate subgraph FA embedded with invisible markLExecuting global DCT transformation to obtain a visual characteristic vector V of the image;
d) generating a logic sequence K by using a HASH function for the visual feature vector V; .
e) When the invisible mark W is extracted, performing wavelet decomposition on the image to be extracted through wavelet transformation to obtain an approximation subgraph 2_ FAL;
f) Pair approximation subgraph 2_ FALPerforming global DCT to obtain a feature vector V2;
g) According to the logic sequence K and the feature vector V2Finding the invisible signature W2。
Preferably, the wavelet decomposition in step a) is of L level, where L is 1.
Further, the invisible mark W in the step b) is logo image or serial number image indicating property.
Further, in step b) by formula FAL′=FAL+ xW calculation to obtain approximate subgraph FA embedded with invisible markL', where x is the embedding strength.
Preferably, the value range of x is as follows: x is more than 0 and less than 0.5.
Further, by the formulaThe logical sequence K is calculated and generated,is a HASH function. Preferably, in step e), the wavelet is decomposed into L levels, and L is 1.
The invention has the beneficial effects that: based on wavelet transform and cosine transform, the invisible mark is embedded and extracted through the phase characteristics of the image, and the original content which is not required to be embedded is taken as reference during extraction. The problem that the visibility of the watermark, the influence on the original image quality and the robustness of the watermark are difficult to be considered simultaneously is solved. The method is suitable for scenes such as copyright protection and evidence collection, video content source tracing and the like. By combining DWT transformation and DCT transformation, the characteristics of the DWT transformation and the DCT transformation are fully utilized to achieve better balance of invisibility, robustness and computational efficiency of the embedded content.
Drawings
FIG. 1 is a flow chart of a method for invisible mark embedding of the present invention;
FIG. 2 is a flow chart of the method for extracting invisible marks of the present invention.
Detailed Description
The invention will be further explained with reference to fig. 1 and 2.
A method for embedding and extracting invisible marks in an image, comprising the steps of:
a) carrying out wavelet decomposition on the original image to obtain a plurality of detail sub-image coefficients FDjAnd an approximation subgraph coefficient FAL;
b) Embedding the invisible mark W into the approximate subgraph coefficient FA in an overlapping modeLIn the method, an approximate subgraph FA embedded with the invisible mark is obtainedL′;
c) For approximate subgraph FA embedded with invisible markLExecuting global DCT transformation to obtain a visual characteristic vector V of the image;
d) generating a logic sequence K by using a HASH function for the visual feature vector V; .
e) When the invisible mark W is extracted, performing wavelet decomposition on the image to be extracted through wavelet transformation to obtain an approximation subgraph 2_ FAL;
f) Pair approximation subgraph 2_ FALPerforming global DCT to obtain a feature vector V2;
g) According to the logic sequence K and the feature vector V2Finding the invisible signature W2。
According to the obtained invisible mark W2And judging whether the invisible mark is embedded according to the correlation degree of the original invisible mark W, thereby determining the property right of the image to be detected. Based on wavelet transform and cosine transform, the invisible mark is embedded and extracted through the phase characteristics of the image, and the original content which does not need to be embedded in the extraction process is used as the original contentReference is made to. The problem that the visibility of the watermark, the influence on the original image quality and the robustness of the watermark are difficult to be considered simultaneously is solved. The method is suitable for scenes such as copyright protection and evidence collection, video content source tracing and the like. By combining DWT transformation and DCT transformation, the characteristics of the DWT transformation and the DCT transformation are fully utilized to achieve better balance of invisibility, robustness and computational efficiency of the embedded content.
Further, in step a), the wavelet is decomposed into L levels, and L is 1.
Further, the invisible mark W in the step b) is logo image or serial number image indicating property.
Further, in step b) by formula FAL′=FAL+ xW calculation to obtain approximate subgraph FA embedded with invisible markL', where x is the embedding strength.
Further, the value range of x is as follows: x is more than 0 and less than 0.5.
Further, in step e), the wavelet is decomposed into L levels, and L is 1.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (8)
1. A method for embedding and extracting invisible marks in an image is characterized by comprising the following steps:
a) carrying out wavelet decomposition on the original image to obtain a plurality of detail sub-image coefficients FDjAnd an approximation subgraph coefficient FAL;
b) Embedding the invisible mark W into the approximate subgraph coefficient FA in an overlapping modeLIn the method, an approximate subgraph FA embedded with the invisible mark is obtainedL′;
c) For approximate subgraph FA embedded with invisible markLExecuting global DCT transformation to obtain a visual characteristic vector V of the image;
d) generating a logic sequence K by using a HASH function for the visual feature vector V; .
e) When the invisible mark W is extracted, performing wavelet decomposition on the image to be extracted through wavelet transformation to obtain an approximation subgraph 2_ FAL;
f) Pair approximation subgraph 2_ FALPerforming global DCT to obtain a feature vector V2;
g) According to the logic sequence K and the feature vector V2Finding the invisible signature W2。
2. The method of embedding and extracting invisible marks for images of claim 1, wherein: in step a), the wavelet is decomposed into L levels, and L is 1.
3. The method of embedding and extracting invisible marks for images of claim 1, wherein: the invisible mark W in the step b) is logo image or serial number image indicating property.
4. The method of embedding and extracting invisible marks for images of claim 1, wherein: in step b) by formula FAL′=FAL+ xW calculation to obtain approximate subgraph FA embedded with invisible markL', where x is the embedding strength。
5. The method for embedding and extracting the invisible mark into the image according to claim 4, wherein the value range of x is as follows: x is more than 0 and less than 0.5.
7. The method of embedding and extracting invisible marks for images according to claim 2, wherein: in step e), the wavelet is decomposed into L levels, and L is 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111090433.7A CN113807997A (en) | 2021-09-17 | 2021-09-17 | Method for embedding and extracting invisible mark for image |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111090433.7A CN113807997A (en) | 2021-09-17 | 2021-09-17 | Method for embedding and extracting invisible mark for image |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113807997A true CN113807997A (en) | 2021-12-17 |
Family
ID=78895625
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111090433.7A Pending CN113807997A (en) | 2021-09-17 | 2021-09-17 | Method for embedding and extracting invisible mark for image |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113807997A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1808495A (en) * | 2006-01-18 | 2006-07-26 | 李京兵 | Wavelet-based geometric attack resistant digital watermark method |
CN102360486A (en) * | 2011-09-13 | 2012-02-22 | 海南大学 | Medical-image robust multiple-watermark method based on DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform) |
-
2021
- 2021-09-17 CN CN202111090433.7A patent/CN113807997A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1808495A (en) * | 2006-01-18 | 2006-07-26 | 李京兵 | Wavelet-based geometric attack resistant digital watermark method |
CN102360486A (en) * | 2011-09-13 | 2012-02-22 | 海南大学 | Medical-image robust multiple-watermark method based on DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform) |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9443277B2 (en) | Method for embedding and extracting multi-scale space based watermark | |
EP0981899B1 (en) | Embedding and detecting a watermark in images | |
US8755598B2 (en) | System for embedding data | |
US20030172275A1 (en) | Real-time blind watermarking method using quantization | |
CN102930499A (en) | Method for adding and removing digital watermark to and from digital image signal | |
CN104766263A (en) | Color image watermark embedding and detecting method based on quaternion Legendre moment correction | |
GB2383219A (en) | Marking material using a two part watermark | |
JP3651319B2 (en) | Digital watermark information recording method, reproduction method, digital watermark information recording apparatus, and reproduction apparatus | |
CN113807997A (en) | Method for embedding and extracting invisible mark for image | |
CN116962851A (en) | Multimedia copyright protection method and device | |
CN115272039A (en) | Watermark attack method and system based on GAN and digital watermark embedding method | |
Ishizuka et al. | A zero-watermarking-like steganography and potential applications | |
GB2383218A (en) | Watermarking using cyclic shifting of code words | |
Rawat et al. | Review of methodologies and techniques for digital watermarking | |
Choi et al. | Digital watermarking technique using block correlation of DCT coefficients | |
US7336800B2 (en) | Method and a device for detecting a watermark in digital data | |
CN114168908A (en) | Copyright protection technology based on audio and video analysis | |
Bala | A brief survey on robust video watermarking techniques | |
Pal et al. | Survey Of Digital Watermarking Using Dct | |
Dehghan et al. | Robust image watermarking in the wavelet domain for copyright protection | |
CN111640052B (en) | Robust high-capacity digital watermarking method based on mark code | |
KR20020005805A (en) | Watermarking method using block based on wavelet transform | |
Chauhan | Information hiding watermarking detection technique by psnr and rgb intensity | |
Nagar et al. | Detection of tampering in color image | |
Schlauweg et al. | Self-synchronizing robust texel watermarking in Gaussian scale-space |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211217 |