CN113807997A - Method for embedding and extracting invisible mark for image - Google Patents

Method for embedding and extracting invisible mark for image Download PDF

Info

Publication number
CN113807997A
CN113807997A CN202111090433.7A CN202111090433A CN113807997A CN 113807997 A CN113807997 A CN 113807997A CN 202111090433 A CN202111090433 A CN 202111090433A CN 113807997 A CN113807997 A CN 113807997A
Authority
CN
China
Prior art keywords
embedding
invisible
image
extracting
transformation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111090433.7A
Other languages
Chinese (zh)
Inventor
张宇
刘永辉
谢恩鹏
赵明
徐杰
高海营
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Yunman Intelligent Technology Co ltd
Original Assignee
Shandong Yunman Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Yunman Intelligent Technology Co ltd filed Critical Shandong Yunman Intelligent Technology Co ltd
Priority to CN202111090433.7A priority Critical patent/CN113807997A/en
Publication of CN113807997A publication Critical patent/CN113807997A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0057Compression invariant watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Abstract

A method for embedding and extracting invisible marks on an image is based on wavelet transformation and cosine transformation and carries out embedding and extraction on the invisible marks through phase characteristics of the image, and original content which does not need to be embedded is taken as reference during extraction. The problem that the visibility of the watermark, the influence on the original image quality and the robustness of the watermark are difficult to be considered simultaneously is solved. The method is suitable for scenes such as copyright protection and evidence collection, video content source tracing and the like. By combining DWT transformation and DCT transformation, the characteristics of the DWT transformation and the DCT transformation are fully utilized to achieve better balance of invisibility, robustness and computational efficiency of the embedded content.

Description

Method for embedding and extracting invisible mark for image
Technical Field
The invention relates to the technical field of image processing, in particular to a method for embedding and extracting an invisible mark for an image.
Background
With the development of internet technology and the increase of network transmission rate, the way in which people acquire information daily is changing significantly. Multimedia works in various forms, such as videos and images, can be published and transmitted through a network, and great convenience is brought to work and life of people. But at the same time, because of the openness of the internet, the works can be copied, modified and spread without the consent of the original authors, and the infringement of the intellectual property of the original works becomes easier. Therefore, there is a need for an accurate and efficient method for ownership proof and theft tracing of digital media works.
For the field of image embedding and extraction, the traditional methods include Fourier-Mellin transformation, template insertion, embedding of the invisible mark to be embedded into the annular region or the circumference of the DFT domain and a localized watermarking method, and for the Fourier-Mellin transformation proposed by O' Ruanadh and the like, the RST invariance of the transformation is utilized to realize the geometric attack resistance of the embedded content. But this method causes the image quality after embedding to become very poor. Template insertion method proposed for S' Pereira: template embedding and extraction are extremely complex, embedding capacity is small, embedding of the mark to be invisible on a DFT domain annular area or a DFT domain circumference is proposed by V.Solachidis and the like, and only small capability of resisting rotation transformation can be obtained. For the localized watermarking method: the method has stronger robustness to clipping, but cannot deal with geometric transformation.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method
The technical scheme adopted by the invention for overcoming the technical problems is as follows:
a method for embedding and extracting invisible marks in an image, comprising the steps of:
a) carrying out wavelet decomposition on the original image to obtain a plurality of detail sub-image coefficients FDjAnd an approximation subgraph coefficient FAL
b) Embedding the invisible mark W into the approximate subgraph coefficient FA in an overlapping modeLIn the method, an approximate subgraph FA embedded with the invisible mark is obtainedL′;
c) For approximate subgraph FA embedded with invisible markLExecuting global DCT transformation to obtain a visual characteristic vector V of the image;
d) generating a logic sequence K by using a HASH function for the visual feature vector V; .
e) When the invisible mark W is extracted, performing wavelet decomposition on the image to be extracted through wavelet transformation to obtain an approximation subgraph 2_ FAL
f) Pair approximation subgraph 2_ FALPerforming global DCT to obtain a feature vector V2
g) According to the logic sequence K and the feature vector V2Finding the invisible signature W2
Preferably, the wavelet decomposition in step a) is of L level, where L is 1.
Further, the invisible mark W in the step b) is logo image or serial number image indicating property.
Further, in step b) by formula FAL′=FAL+ xW calculation to obtain approximate subgraph FA embedded with invisible markL', where x is the embedding strength.
Preferably, the value range of x is as follows: x is more than 0 and less than 0.5.
Further, by the formula
Figure BDA0003266993630000021
The logical sequence K is calculated and generated,
Figure BDA0003266993630000022
is a HASH function. Preferably, in step e), the wavelet is decomposed into L levels, and L is 1.
Further, step g) is performed by the formula
Figure BDA0003266993630000023
Calculating to obtain an invisible mark W2
The invention has the beneficial effects that: based on wavelet transform and cosine transform, the invisible mark is embedded and extracted through the phase characteristics of the image, and the original content which is not required to be embedded is taken as reference during extraction. The problem that the visibility of the watermark, the influence on the original image quality and the robustness of the watermark are difficult to be considered simultaneously is solved. The method is suitable for scenes such as copyright protection and evidence collection, video content source tracing and the like. By combining DWT transformation and DCT transformation, the characteristics of the DWT transformation and the DCT transformation are fully utilized to achieve better balance of invisibility, robustness and computational efficiency of the embedded content.
Drawings
FIG. 1 is a flow chart of a method for invisible mark embedding of the present invention;
FIG. 2 is a flow chart of the method for extracting invisible marks of the present invention.
Detailed Description
The invention will be further explained with reference to fig. 1 and 2.
A method for embedding and extracting invisible marks in an image, comprising the steps of:
a) carrying out wavelet decomposition on the original image to obtain a plurality of detail sub-image coefficients FDjAnd an approximation subgraph coefficient FAL
b) Embedding the invisible mark W into the approximate subgraph coefficient FA in an overlapping modeLIn the method, an approximate subgraph FA embedded with the invisible mark is obtainedL′;
c) For approximate subgraph FA embedded with invisible markLExecuting global DCT transformation to obtain a visual characteristic vector V of the image;
d) generating a logic sequence K by using a HASH function for the visual feature vector V; .
e) When the invisible mark W is extracted, performing wavelet decomposition on the image to be extracted through wavelet transformation to obtain an approximation subgraph 2_ FAL
f) Pair approximation subgraph 2_ FALPerforming global DCT to obtain a feature vector V2
g) According to the logic sequence K and the feature vector V2Finding the invisible signature W2
According to the obtained invisible mark W2And judging whether the invisible mark is embedded according to the correlation degree of the original invisible mark W, thereby determining the property right of the image to be detected. Based on wavelet transform and cosine transform, the invisible mark is embedded and extracted through the phase characteristics of the image, and the original content which does not need to be embedded in the extraction process is used as the original contentReference is made to. The problem that the visibility of the watermark, the influence on the original image quality and the robustness of the watermark are difficult to be considered simultaneously is solved. The method is suitable for scenes such as copyright protection and evidence collection, video content source tracing and the like. By combining DWT transformation and DCT transformation, the characteristics of the DWT transformation and the DCT transformation are fully utilized to achieve better balance of invisibility, robustness and computational efficiency of the embedded content.
Further, in step a), the wavelet is decomposed into L levels, and L is 1.
Further, the invisible mark W in the step b) is logo image or serial number image indicating property.
Further, in step b) by formula FAL′=FAL+ xW calculation to obtain approximate subgraph FA embedded with invisible markL', where x is the embedding strength.
Further, the value range of x is as follows: x is more than 0 and less than 0.5.
Further, by the formula
Figure BDA0003266993630000041
The logical sequence K is calculated and generated,
Figure BDA0003266993630000042
is a HASH function.
Further, in step e), the wavelet is decomposed into L levels, and L is 1.
Further, step g) is performed by the formula
Figure BDA0003266993630000043
Calculating to obtain an invisible mark W2
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A method for embedding and extracting invisible marks in an image is characterized by comprising the following steps:
a) carrying out wavelet decomposition on the original image to obtain a plurality of detail sub-image coefficients FDjAnd an approximation subgraph coefficient FAL
b) Embedding the invisible mark W into the approximate subgraph coefficient FA in an overlapping modeLIn the method, an approximate subgraph FA embedded with the invisible mark is obtainedL′;
c) For approximate subgraph FA embedded with invisible markLExecuting global DCT transformation to obtain a visual characteristic vector V of the image;
d) generating a logic sequence K by using a HASH function for the visual feature vector V; .
e) When the invisible mark W is extracted, performing wavelet decomposition on the image to be extracted through wavelet transformation to obtain an approximation subgraph 2_ FAL
f) Pair approximation subgraph 2_ FALPerforming global DCT to obtain a feature vector V2
g) According to the logic sequence K and the feature vector V2Finding the invisible signature W2
2. The method of embedding and extracting invisible marks for images of claim 1, wherein: in step a), the wavelet is decomposed into L levels, and L is 1.
3. The method of embedding and extracting invisible marks for images of claim 1, wherein: the invisible mark W in the step b) is logo image or serial number image indicating property.
4. The method of embedding and extracting invisible marks for images of claim 1, wherein: in step b) by formula FAL′=FAL+ xW calculation to obtain approximate subgraph FA embedded with invisible markL', where x is the embedding strength。
5. The method for embedding and extracting the invisible mark into the image according to claim 4, wherein the value range of x is as follows: x is more than 0 and less than 0.5.
6. The method of embedding and extracting invisible marks for images according to claim 4, wherein: by the formula
Figure FDA0003266993620000011
The logical sequence K is calculated and generated,
Figure FDA0003266993620000012
is a HASH function.
7. The method of embedding and extracting invisible marks for images according to claim 2, wherein: in step e), the wavelet is decomposed into L levels, and L is 1.
8. The method of embedding and extracting invisible marks for images of claim 6, wherein: in step g) by the formula
Figure FDA0003266993620000021
Calculating to obtain an invisible mark W2
CN202111090433.7A 2021-09-17 2021-09-17 Method for embedding and extracting invisible mark for image Pending CN113807997A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111090433.7A CN113807997A (en) 2021-09-17 2021-09-17 Method for embedding and extracting invisible mark for image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111090433.7A CN113807997A (en) 2021-09-17 2021-09-17 Method for embedding and extracting invisible mark for image

Publications (1)

Publication Number Publication Date
CN113807997A true CN113807997A (en) 2021-12-17

Family

ID=78895625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111090433.7A Pending CN113807997A (en) 2021-09-17 2021-09-17 Method for embedding and extracting invisible mark for image

Country Status (1)

Country Link
CN (1) CN113807997A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1808495A (en) * 2006-01-18 2006-07-26 李京兵 Wavelet-based geometric attack resistant digital watermark method
CN102360486A (en) * 2011-09-13 2012-02-22 海南大学 Medical-image robust multiple-watermark method based on DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform)

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1808495A (en) * 2006-01-18 2006-07-26 李京兵 Wavelet-based geometric attack resistant digital watermark method
CN102360486A (en) * 2011-09-13 2012-02-22 海南大学 Medical-image robust multiple-watermark method based on DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform)

Similar Documents

Publication Publication Date Title
US9443277B2 (en) Method for embedding and extracting multi-scale space based watermark
EP0981899B1 (en) Embedding and detecting a watermark in images
US8755598B2 (en) System for embedding data
US20030172275A1 (en) Real-time blind watermarking method using quantization
CN102930499A (en) Method for adding and removing digital watermark to and from digital image signal
CN104766263A (en) Color image watermark embedding and detecting method based on quaternion Legendre moment correction
GB2383219A (en) Marking material using a two part watermark
JP3651319B2 (en) Digital watermark information recording method, reproduction method, digital watermark information recording apparatus, and reproduction apparatus
CN113807997A (en) Method for embedding and extracting invisible mark for image
CN116962851A (en) Multimedia copyright protection method and device
CN115272039A (en) Watermark attack method and system based on GAN and digital watermark embedding method
Ishizuka et al. A zero-watermarking-like steganography and potential applications
GB2383218A (en) Watermarking using cyclic shifting of code words
Rawat et al. Review of methodologies and techniques for digital watermarking
Choi et al. Digital watermarking technique using block correlation of DCT coefficients
US7336800B2 (en) Method and a device for detecting a watermark in digital data
CN114168908A (en) Copyright protection technology based on audio and video analysis
Bala A brief survey on robust video watermarking techniques
Pal et al. Survey Of Digital Watermarking Using Dct
Dehghan et al. Robust image watermarking in the wavelet domain for copyright protection
CN111640052B (en) Robust high-capacity digital watermarking method based on mark code
KR20020005805A (en) Watermarking method using block based on wavelet transform
Chauhan Information hiding watermarking detection technique by psnr and rgb intensity
Nagar et al. Detection of tampering in color image
Schlauweg et al. Self-synchronizing robust texel watermarking in Gaussian scale-space

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211217