CN117459650A - Digital video watermarking method and system aiming at copyright protection - Google Patents

Digital video watermarking method and system aiming at copyright protection Download PDF

Info

Publication number
CN117459650A
CN117459650A CN202311753362.3A CN202311753362A CN117459650A CN 117459650 A CN117459650 A CN 117459650A CN 202311753362 A CN202311753362 A CN 202311753362A CN 117459650 A CN117459650 A CN 117459650A
Authority
CN
China
Prior art keywords
video
information
watermark
pseudo
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311753362.3A
Other languages
Chinese (zh)
Other versions
CN117459650B (en
Inventor
胡海浪
朱思涵
王新颖
胡晟
余曾辉
游鸿基
王栋达
张天晋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changsha Research Institute of Mining and Metallurgy Co Ltd
Original Assignee
Changsha Research Institute of Mining and Metallurgy Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changsha Research Institute of Mining and Metallurgy Co Ltd filed Critical Changsha Research Institute of Mining and Metallurgy Co Ltd
Priority to CN202311753362.3A priority Critical patent/CN117459650B/en
Publication of CN117459650A publication Critical patent/CN117459650A/en
Application granted granted Critical
Publication of CN117459650B publication Critical patent/CN117459650B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/3232Robust embedding or watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention relates to the technical field of digital video watermarking, and discloses a digital video watermarking method and a digital video watermarking system aiming at copyright protection, wherein a binary conversion compression mechanism is adopted in the method to convert and compress cross-mode digital video watermarking information, so that universality and generalization capability of the method are improved; the watermark information transfer technology is adopted to transfer the video watermark information storage space, so that the embedding capacity is theoretically not limited.

Description

Digital video watermarking method and system aiming at copyright protection
Technical Field
The invention relates to the technical field of digital video watermarking, in particular to a digital video watermarking method and a digital video watermarking system aiming at copyright protection.
Background
The development and popularization of the internet have led to an increasing popularity of communication of multimedia information, and digitization of multimedia data has provided great convenience for access and circulation of multimedia data. Today, the circulation of digital media information has reached an unprecedented breadth and depth, and people can publish, search and acquire multimedia works and other important information through the internet. The typical use of digital video as digital media is considered an important and effective carrier in the communication world, and is widely used for news, short video, and cable network broadcast video programs. However, with the development of the internet and the continuous progress of video processing tools, video infringement is abused and disastrous, and infringers can quickly and easily download, tamper with, copy and illegally distribute videos, so that the economic benefits and the creation enthusiasm of creators are seriously influenced, the widespread spreading of pirated videos is representative, and copyright disputes appearing subsequently become increasingly serious social problems. How to protect digital video in the current open network environment is an important and urgent problem to be solved. Therefore, in order to protect and declare ownership of video, various solutions have been proposed, and digital video watermarking is one of the important technical means.
The video watermarking technology is an information hiding technology, the carrier of the video watermarking technology is video, and the basic idea is to embed secret information in digital video so as to protect copyright of digital video products, prove the authenticity and reliability of the products, track piracy or provide life cycle circulation tracing. The copyright related information is embedded into the digital video through a certain algorithm, and the method has the characteristics of being not easy to perceive, not easy to tamper, not easy to clear and the like under the condition of not affecting the use value of the copyright related information. The embedded watermark information may be a signature, serial number, or other text or image of special interest, etc. Even if the watermark still exists in the video after the video carrier is subjected to operations such as compression, recording and editing, when the copyright of the digital media information is required to be authenticated, the watermark information is extracted from the carrier by using a watermark extraction algorithm, so that the copyright of the digital media can be proved, and the copyright protection function of the digital media is realized.
Currently, video watermarking technology is vigorously developed, and various embedding, detecting and extracting methods are endless. Although video watermarking technology has been developed, the following disadvantages still exist: firstly, the embedding capacity is limited; secondly, the watermark embedding and extracting speed is low, and the efficiency is low; thirdly, the embedded information type is limited; fourth, the watermarking method is not robust enough. In view of the above, there is a need for a cross-modal high-capacity and fast robust digital video watermarking method for copyright protection.
Disclosure of Invention
The invention provides a digital video watermarking method and a digital video watermarking system aiming at copyright protection, which are used for solving the problems of the digital video watermarking method in the prior art.
In order to achieve the above object, the present invention is realized by the following technical scheme:
in a first aspect, the present invention provides a digital video watermarking method for copyright protection, including:
s1: calculating the video frame number of the video file;
s2: generating a unique identification code of watermark information by using an incremental strategy, wherein the identification code is a binary number;
s3: complementing the identification code to obtain a full code;
s4: generating a pseudo-random number sequence based on the number of video frames;
s5: embedding the full code into the video frame by adopting a multithreading technology of pseudo random numbers;
s6: storing related data such as the video according to the watermark media type;
the step S6 comprises the following steps:
judging the watermark media type, if the watermark media type is text content, calling a database driver insertion function, and writing related data into a copyright information database, wherein the related data comprises a watermark information unique identifier, the watermark information media type and the text content; if the watermark information is the binary file, continuously judging the size of the binary file, if the watermark information is less than 1MB, adopting a Base64 compression technology to compress the file into a binary character string, otherwise, directly uploading the binary file to a file server, returning a download address, writing a watermark information unique identifier, a watermark information media type and the binary character string or the download address into a copyright information database, and finally uploading and storing the video file embedded with the watermark information to the file server.
In a second aspect, the present application provides a digital video watermarking system for copyright protection, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method when executing the computer program.
The beneficial effects are that:
the digital video watermarking method aiming at copyright protection adopts a binary conversion compression mechanism to convert and compress cross-mode digital video watermarking information, thereby improving universality of the method and generalization capability of watermark information media types; the watermark information transfer technology is adopted to transfer the video watermark information storage space, so that the embedding capacity is theoretically not limited.
In a further scheme, a variation window dynamic scanning algorithm is provided, so that the storage position of the digital video watermark can be rapidly and effectively positioned, the watermark can be extracted, and the watermark information extraction efficiency is improved.
In a further scheme, a multithread parallel scanning measure is provided, a plurality of scanning tasks are executed concurrently, thread resources can be effectively utilized, and the video watermarking processing speed is increased.
In a further scheme, a multiple fault-tolerant strategy is provided, and the problems that digital video watermark information is tampered, deleted and the like can be effectively solved by combining overlapping redundancy codes with a voting strategy, so that the robustness of the method is improved.
Drawings
Fig. 1 is one of flowcharts of a digital video watermarking method for copyright protection according to a preferred embodiment of the present invention;
FIG. 2 is a second flowchart of a digital video watermarking method for copyright protection according to a preferred embodiment of the present invention;
FIG. 3 is a flow chart of a multi-threading technique employed in watermark information embedding in accordance with a preferred embodiment of the present invention;
FIG. 4 is a schematic diagram of a video copyright protection process;
FIG. 5 is a flow chart of watermark information extraction in accordance with a preferred embodiment of the present invention;
fig. 6 is a flowchart of a multithreading technique used in watermark information extraction in accordance with a preferred embodiment of the present invention.
Detailed Description
The following description of the present invention will be made clearly and fully, and it is apparent that the embodiments described are only some, but not all, of the embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Unless defined otherwise, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this invention belongs. The terms "first," "second," and the like, as used herein, do not denote any order, quantity, or importance, but rather are used to distinguish one element from another. Likewise, the terms "a" or "an" and the like do not denote a limitation of quantity, but rather denote the presence of at least one. The terms "connected" or "connected," and the like, are not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. "upper", "lower", "left", "right", etc. are used merely to indicate a relative positional relationship, which changes accordingly when the absolute position of the object to be described changes.
Referring to fig. 1-2, a digital video watermarking method for copyright protection provided in the present application includes:
s1: calculating the video frame number of the video file;
s2: generating a unique identification code of watermark information by using an incremental strategy, wherein the identification code is a binary number;
s3: complementing the identification code to obtain a full code;
s4: generating a pseudo-random number sequence based on the number of video frames;
s5: embedding the full code into the video frame by adopting a multithreading technology of pseudo random numbers;
s6: and storing relevant data such as video according to the watermark media type.
According to the digital video watermarking method aiming at copyright protection, a binary conversion compression mechanism is adopted to convert and compress cross-mode digital video watermarking information, so that universality of the method and generalization capability of watermark information media types are improved; the watermark information transfer technology is adopted to transfer the video watermark information storage space, so that the embedding capacity is theoretically not limited.
In an example, the S1 includes:
initializing an opencv video object, calling an opencv video capturing function, taking a video file as a parameter, returning the video parameter, and analyzing a video frame rate fps and a video duration d;
according to the frame rate fps and the duration d, calculating the video frame number fn according to the following calculation formula:
fn = d × fps。
in one example, S2 includes:
generating a unique watermark information identification code, wherein the identification code is a binary number, the generation strategy is to increase 1, namely 1 is added to the value of the latest identification code, if the latest identification code is 0001, the newly generated watermark information identification code is 0010, if the newly added watermark information exists, the newly generated watermark information identification code is 0011, and the like. Where the actual identification code length is not 4 bits but 31 bits and the upper bits are zero filled.
In an example, the S3 includes:
and complementing the unique identification code by using the overlapped redundancy code to obtain a 64-bit full code.
In this embodiment, the complement length has 33 bits, and is located at the high order of the full code, and the 33 bits are composed of 11 stacks of 3 bits, for example, the 33 bits may be composed of 11 110 bits as follows:
110110110110110110110110110110110. the 33-bit overlapped redundant code plus the 31-bit watermark information unique identification code generated in the S2 jointly form a 64-bit full code. Examples are as follows:
1101101101101101101101101101101100000000000000000000000000000001。
in an example, the S4 includes:
calling a first setting function and transmitting a parameter 0; and calling a second setting function, transmitting the second setting function into the video frame number fn to generate M pseudo-random numbers which are not more than fn to obtain a pseudo-random number sequence, and sequencing the pseudo-random number sequence from small to large according to the pseudo-random number.
In this step, the first set function is a seed function in a numpy range packet and the second set function is a choice function in a numpy range packet.
Optionally, the S5 includes:
the multi-thread technology and the image watermark embedding method are used for embedding the built full codes into video image frames according to the pseudo-random number sequence and the time sequence from front to back.
Wherein, as shown in fig. 3, the multithreading technique comprises the following steps:
defining a scanning embedding job and creating a scanning embedding class function;
introducing a multithreading component executor service package and an executor tool package into the class to which the class function belongs, creating a thread pool in the class function body by calling an executor tool class static function, and setting the maximum thread number, the minimum thread number and the optimal thread number to be executed, wherein the creation thread Chi Jingtai function represents that an executor object is instantiated in a fixed thread number manner;
and calling a submitting function of the instantiation executor object, submitting a defined scanning embedding job, creating a plurality of threads by the program, executing the scanning embedding job concurrently, and setting a strategy to ensure that video frames embedded by each thread are not overlapped.
Specifically, the setting policy includes: in the case of the video frame sequence to be embedded, which is given in step S4, the video frame sequence is block-divided by the number of threads. If the number of threads is 3, the video frame sequence is as follows:
{1,7,9,12,14,23,33,43,55,67,642,567};
at this point the video frame sequence size is 12, then the video frame sequence will be processed in 12/3=4 blocks, i.e., thread 1 processes the first block video frame sequence {1,7,9,12}, thread 2 processes the second block video frame sequence {14,23,33,43}, and thread 3 processes the second block video frame sequence {55,67,642,567}.
Therefore, by adopting the multithread parallel scanning measure and concurrently executing a plurality of scanning tasks, the thread resources can be effectively utilized, and the video watermarking processing speed can be increased.
Optionally, the S6 includes:
judging the watermark media type, if the watermark media type is text, calling a database driver insertion function, and writing related data into a database, wherein the related data comprises a watermark information unique identification code, a watermark information media type and watermark information content; if the binary file is the binary file, continuously judging the size of the binary file, if the size is smaller than 1MB, adopting a Base64 compression technology to compress the file into a binary character string, otherwise, directly uploading the binary file to a file server, and returning to a downloading address.
In this embodiment, the media types support both text content and various binary files, including text files, image files, audio files, and video files. The judgment logic here is: if the watermark information is text content, a database driver insertion function is called, related data is written into a copyright information database, and the related data comprises a watermark information unique identifier, a watermark information media type and the text content; if the watermark information is binary files, continuously judging the sizes of the binary files, if the sizes of the binary files are smaller than 1MB, adopting a Base64 compression technology to compress the files into binary character strings, otherwise, directly uploading the binary files to a file server, returning a download address, and then writing the unique identifier of the watermark information, the media type of the watermark information and the binary character strings or the download address into a copyright information database. And finally, uploading the video file embedded with the watermark information and storing the video file into a file server.
It should be noted that a complete and general video copyright protection flow includes: embedding watermark information by a copyright party, releasing video, finding suspected infringement video and extracting watermark information by the copyright party for authentication. The graphic is shown in fig. 4, after the copyright party purchases the video copyright, watermark information is embedded into the video, and then the video with the embedded watermark is distributed on the internet for people to use and consume. If the suspected infringement video is found, the video is retrieved to extract the watermark and authentication is carried out.
Optionally, the method further comprises:
s7: if the suspected infringed video is found, extracting watermark information of the video, and executing an authentication step based on the watermark information.
Specifically, as shown in fig. 5, the step S7 includes:
s71: inputting a video file, initializing an opencv video processing object, then calling an opencv video capturing function, taking the input video file as a parameter, returning the video parameter, and analyzing video frame rate fps and video duration d;
s72: calculating the video frame number fn according to the acquired frame rate fps and the duration d, wherein a calculation formula is fn=d×fps;
s73: calling a first setting function and transmitting a parameter 0; calling a second setting function, transmitting the second setting function into the video frame number to generate M pseudo-random numbers which are not more than the video frame number to obtain a pseudo-random number sequence, and sequencing the pseudo-random number sequence from small to large according to the pseudo-random number sequence;
s74: setting the size of a scanning window;
s75: using a multithreading technology to concurrently scan all video image frames in a window according to the set window size from a video time center point according to a step pseudo-random number sequence; the multithreading is identical to the multithreading when watermark is embedded, as shown in fig. 6, and the difference is only that the definition scan embedding operation is replaced by the definition scan extracting operation, which is not described herein.
S76: aiming at the video frames returned in the step, invoking an image watermark extraction method to extract full-code information in the video frames, intercepting the first 33 bits in the full-code information, splitting the full-code information into 11 segments according to each 3 bits, and finally adopting a voting strategy to elect effective information frames and count the number of the effective information frames;
in this step, the first 33 bits in the full code information are overlapping redundancy codes, and the effective information frame election rule may be: for example, voting 1 st bit in all 11 segments, if the number of votes of 1 is half, determining 1 st bit as 1; voting the 2 nd bit in all 11 sections, and determining the 2 nd bit to be 1 if the number of votes of 1 is half; and finally, voting the 3 rd bit in all 11 sections, if the number of votes of 0 is half, determining that the 3 rd bit is 0, calculating the redundancy code to be 110, and if the redundancy code is consistent with the redundancy code set in the step S3, considering the video frame as a valid information frame.
S77: determining the number of effective information frames, if the number of effective information frames is greater than K frames (K is an odd number), executing step S78; if the window size is smaller than the K frame, the new window size is set to 2 times the original window size, and step S75 is repeatedly performed.
S78: invoking an image watermark extraction method to extract full code information in the obtained effective information frame, taking 31 bits of the obtained full code information after interception as unique identification codes, and adopting a voting strategy to select a real unique identification code from a plurality of unique identification codes;
in this step, the true unique identification code election rules are as follows: comparing the 1 st bit of the K unique identification codes, voting to select the 1 st bit of the true codes, then comparing the 2 nd bit of the K unique identification codes, voting to select the 2 nd bit of the true codes, and so on until the 31 st bit of the K unique identification codes is compared, voting to select the 31 st bit of the true codes, and forming the true unique identification codes by the 31 selected true codes.
S79: invoking a database driver query function, transmitting the acquired real unique identification code, querying a copyright information database, judging whether the unique identification code of watermark information exists in the database, and ending the flow if the unique identification code of watermark information does not exist in the database; if so, the suspicious video can be judged to be an infringement video.
Therefore, a multiple fault-tolerant strategy is provided, the problems that digital video watermark information is tampered, deleted and the like can be effectively solved by overlapping redundant codes and combining voting strategies, and the robustness of the method is improved.
In summary, the digital video watermarking method for copyright protection provides a watermarking information transfer technology, so that high-capacity embedding of watermarking information is realized. The binary conversion compression mechanism is provided, so that the embedding and extraction of the cross-mode digital video watermark can be effectively realized, and the generalization of the watermark information media type by the method is improved.
Furthermore, the method provides a variation window dynamic scanning algorithm, which can rapidly and effectively position the storage position of the digital video watermark and extract the watermark, thereby improving the watermark information extraction efficiency. The multithread parallel scanning measure is provided, a plurality of scanning tasks are executed concurrently, the thread resources can be effectively utilized, and the video watermarking processing speed is increased. The multi-fault-tolerant strategy is provided, so that the problems of tampering, deleting and the like of digital video watermark information can be effectively solved, and the robustness of the method is improved.
The present application also provides a digital video watermarking system for copyright protection, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the above method when executing the computer program. The digital video watermarking system for copyright protection can realize each embodiment of the digital video watermarking method for copyright protection and can achieve the same effect, and the description is omitted here.
The foregoing describes in detail preferred embodiments of the present invention. It should be understood that numerous modifications and variations can be made in accordance with the concepts of the invention by one of ordinary skill in the art without undue burden. Therefore, all technical solutions which can be obtained by logic analysis, reasoning or limited experiments based on the prior art by the person skilled in the art according to the inventive concept shall be within the scope of protection defined by the claims.

Claims (9)

1. A digital video watermarking method for copyright protection, comprising:
s1: calculating the video frame number of the video file;
s2: generating a unique identification code of watermark information by using an incremental strategy, wherein the identification code is a binary number;
s3: complementing the identification code to obtain a full code;
s4: generating a pseudo-random number sequence based on the number of video frames;
s5: embedding the full code into the video frame by adopting a multithreading technology of pseudo random numbers;
s6: storing related data such as the video according to the watermark media type;
the step S6 comprises the following steps:
judging the watermark media type, if the watermark media type is text content, calling a database driver insertion function, and writing related data into a copyright information database, wherein the related data comprises a watermark information unique identifier, the watermark information media type and the text content; if the watermark information is the binary file, continuously judging the size of the binary file, if the watermark information is less than 1MB, adopting a Base64 compression technology to compress the file into a binary character string, otherwise, directly uploading the binary file to a file server, returning a download address, writing a watermark information unique identifier, a watermark information media type and the binary character string or the download address into a copyright information database, and finally uploading and storing the video file embedded with the watermark information to the file server.
2. The digital video watermarking method for copyright protection according to claim 1, wherein S1 includes:
initializing an opencv video object, calling an opencv video capturing function, taking a video file as a parameter, returning the video parameter, and analyzing a video frame rate fps and a video duration d;
according to the frame rate fps and the duration d, calculating the video frame number fn according to the following calculation formula:
fn = d × fps。
3. the digital video watermarking method for copyright protection according to claim 1, wherein the S3 includes:
and complementing the unique identification code by using the overlapped redundancy code to obtain a 64-bit full code.
4. The digital video watermarking method for copyright protection according to claim 1, wherein S4 includes:
calling a first setting function and transmitting a parameter 0; and calling a second setting function, transmitting the second setting function into the video frame number to generate M pseudo-random numbers which are not more than the video frame number to obtain a pseudo-random number sequence, and sequencing the pseudo-random number sequence from small to large according to the pseudo-random number.
5. The digital video watermarking method for copyright protection according to claim 1, wherein S5 includes:
the multi-thread technology and the image watermark embedding method are used for embedding the built full codes into video image frames according to the pseudo-random number sequence and the time sequence from front to back.
6. The digital video watermarking method for copyright protection according to claim 5, wherein the multi-threading technique includes the steps of:
defining a scanning embedding job and creating a scanning embedding class function;
introducing a multithreading component executor service package and an executor tool package into the class to which the class function belongs, creating a thread pool in the class function body by calling an executor tool class static function, and setting the maximum thread number, the minimum thread number and the optimal thread number to be executed, wherein the creation thread Chi Jingtai function represents that an executor object is instantiated in a fixed thread number manner;
and calling a submitting function of the instantiation executor object, submitting a defined scanning embedding job, creating a plurality of threads by the program, executing the scanning embedding job concurrently, and setting a strategy to ensure that video frames embedded by each thread are not overlapped.
7. The digital video watermarking method for copyright protection according to claim 1, wherein the method further comprises:
s7: if the suspected infringed video is found, extracting watermark information of the video, and executing an authentication step based on the watermark information.
8. The digital video watermarking method for copyright protection according to claim 7, wherein S7 includes:
s71: inputting a suspected infringement video file, initializing an opencv video object, calling an opencv video capturing function, taking the input video file as a parameter, returning the video parameter, and analyzing video frame rate fps and video duration d;
s72: calculating the video frame number fn according to the acquired frame rate fps and the duration d, wherein a calculation formula is fn=d×fps;
s73: calling a first setting function and transmitting a parameter 0; calling a second setting function, transmitting the second setting function into the video frame number to generate M pseudo-random numbers which are not more than the video frame number to obtain a pseudo-random number sequence, and sequencing the pseudo-random number sequence from small to large according to the pseudo-random number sequence;
s74: setting the size of a scanning window;
s75: using a multithreading technology to concurrently scan all video image frames in a window to two sides according to the set window size from a video time center point according to the pseudo-random number sequence generated in the step S73;
s76: invoking an image watermark extraction method to extract full-code information in a video frame in a scanning process, and directly ignoring the video frame if the video frame does not have 64-bit full-code information; if the video frame has 64-bit full-code information, the first 33 bits in the full-code information are intercepted, the video frame is segmented into 11 sections according to every 3 bits, then a voting strategy is adopted to elect out effective information frames and the number of the effective information frames is counted;
s77: judging the number of the effective information frames, if the number of the effective information frames is larger than K frames, and if K is an odd number, executing a step S78; if the window size is smaller than the K frame, changing the window size, setting the new window size to be 2 times of the original window size, and repeating the step S75;
s78: invoking an image watermark extraction method to extract full-code information in an effective information frame, intercepting 31 bits of the acquired full-code information as unique identification codes, and adopting a voting strategy to select a real unique identification code from a plurality of unique identifiers;
s79: invoking a database driver query function, transmitting the acquired real unique identification code, querying a copyright information database, judging whether the unique identification code of watermark information exists in the database, and ending the flow if the unique identification code of watermark information does not exist in the database; if so, the suspicious video can be judged to be an infringement video.
9. A digital video watermarking system for copyright protection comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of the preceding claims 1 to 8 when executing the computer program.
CN202311753362.3A 2023-12-20 2023-12-20 Digital video watermarking method and system aiming at copyright protection Active CN117459650B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311753362.3A CN117459650B (en) 2023-12-20 2023-12-20 Digital video watermarking method and system aiming at copyright protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311753362.3A CN117459650B (en) 2023-12-20 2023-12-20 Digital video watermarking method and system aiming at copyright protection

Publications (2)

Publication Number Publication Date
CN117459650A true CN117459650A (en) 2024-01-26
CN117459650B CN117459650B (en) 2024-03-22

Family

ID=89585751

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311753362.3A Active CN117459650B (en) 2023-12-20 2023-12-20 Digital video watermarking method and system aiming at copyright protection

Country Status (1)

Country Link
CN (1) CN117459650B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020120849A1 (en) * 2000-02-14 2002-08-29 Mckinley Tyler J. Parallel processing of digital watermarking operations
US20100077219A1 (en) * 1996-07-02 2010-03-25 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
US7738676B1 (en) * 2006-11-02 2010-06-15 Qurio Holdings, Inc. Client-side watermarking using hybrid I-frames
CN102665100A (en) * 2012-05-07 2012-09-12 苏州工业职业技术学院 Method for applying digital watermarks in streaming media
CN102663600A (en) * 2012-01-17 2012-09-12 付强 Anti-counterfeiting system based on digital watermarks and barcodes, anti-counterfeiting method for anti-counterfeiting system and application of anti-counterfeiting system
CN102760221A (en) * 2011-04-27 2012-10-31 航天信息股份有限公司 IPTV (Internet Protocol Television) digital rights management (DRM) method and device based on digital watermarking and encryption
US20130223671A1 (en) * 2012-02-28 2013-08-29 Rogers Communications Inc. Method and system for dynamically watermarking media
US20130318550A1 (en) * 2011-03-16 2013-11-28 Zeev Geyzel Adding Watermarks to Video Content
US20170334234A1 (en) * 2016-05-19 2017-11-23 Atlanta DTH, Inc. System and Method for Identifying the Source of Counterfeit Copies of Multimedia Works Using Layered Simple Digital Watermarks
US20200221112A1 (en) * 2019-01-03 2020-07-09 International Business Machines Corporation Digitally watermarked compressed video image sequences
US20210076104A1 (en) * 2019-09-07 2021-03-11 Mitsuru Okura Digital watermark embeded into images on surface of sports ball and system for detecting thereof
CN115826492A (en) * 2022-11-23 2023-03-21 长沙矿冶研究院有限责任公司 Universal PLC data processing method and device
CN116962851A (en) * 2022-12-08 2023-10-27 中国移动通信有限公司研究院 Multimedia copyright protection method and device

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100077219A1 (en) * 1996-07-02 2010-03-25 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
US20020120849A1 (en) * 2000-02-14 2002-08-29 Mckinley Tyler J. Parallel processing of digital watermarking operations
US7738676B1 (en) * 2006-11-02 2010-06-15 Qurio Holdings, Inc. Client-side watermarking using hybrid I-frames
US20130318550A1 (en) * 2011-03-16 2013-11-28 Zeev Geyzel Adding Watermarks to Video Content
CN102760221A (en) * 2011-04-27 2012-10-31 航天信息股份有限公司 IPTV (Internet Protocol Television) digital rights management (DRM) method and device based on digital watermarking and encryption
CN102663600A (en) * 2012-01-17 2012-09-12 付强 Anti-counterfeiting system based on digital watermarks and barcodes, anti-counterfeiting method for anti-counterfeiting system and application of anti-counterfeiting system
US20130223671A1 (en) * 2012-02-28 2013-08-29 Rogers Communications Inc. Method and system for dynamically watermarking media
CN102665100A (en) * 2012-05-07 2012-09-12 苏州工业职业技术学院 Method for applying digital watermarks in streaming media
US20170334234A1 (en) * 2016-05-19 2017-11-23 Atlanta DTH, Inc. System and Method for Identifying the Source of Counterfeit Copies of Multimedia Works Using Layered Simple Digital Watermarks
US20200221112A1 (en) * 2019-01-03 2020-07-09 International Business Machines Corporation Digitally watermarked compressed video image sequences
US20210076104A1 (en) * 2019-09-07 2021-03-11 Mitsuru Okura Digital watermark embeded into images on surface of sports ball and system for detecting thereof
CN115826492A (en) * 2022-11-23 2023-03-21 长沙矿冶研究院有限责任公司 Universal PLC data processing method and device
CN116962851A (en) * 2022-12-08 2023-10-27 中国移动通信有限公司研究院 Multimedia copyright protection method and device

Also Published As

Publication number Publication date
CN117459650B (en) 2024-03-22

Similar Documents

Publication Publication Date Title
AU2010201199B2 (en) Desynchronized fingerprinting method and system for digital multimedia data
Collberg et al. On the limits of software watermarking
US6868405B1 (en) Copy detection for digitally-formatted works
Chan et al. An efficient image authentication method based on Hamming code
Skoric et al. Tardos fingerprinting codes in the combined digit model
US7760903B2 (en) Tamper-resistant text stream watermarking
CN111241576B (en) Zero watermark method for distribution protection of database
CN110619197B (en) Digital asset right-confirming registration information processing system and method
Wu et al. A novel zero-watermarking scheme based on NSCT-SVD and blockchain for video copyright
Wang et al. Data hiding with deep learning: a survey unifying digital watermarking and steganography
Wu et al. Sepmark: Deep separable watermarking for unified source tracing and deepfake detection
Lederer et al. Identifying appropriate intellectual property protection mechanisms for machine learning models: A systematization of watermarking, fingerprinting, model access, and attacks
CN117459650B (en) Digital video watermarking method and system aiming at copyright protection
Schaathun The Boneh-Shaw fingerprinting scheme is better than we thought
US20140023225A1 (en) Digital watermarking
Dittmann et al. Copyright-copywrong
Wang et al. Detecting the fingerprint of video data hiding tool OpenPuff
CN112579994A (en) Digital product content protection system and method based on artificial intelligence
Moneim et al. Video Data Authentication Using a Smart Contract Published on the Blockchain
Abdelhedi et al. Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video
CN117633728B (en) Video cartoon digital copyright trading platform and copyright right-determining method based on blockchain
Desoubeaux et al. Fast detection of Tardos codes with boneh-shaw types
Zhou et al. Performance analysis and evaluation of text watermarking
CN115134142B (en) Information hiding method and system based on file segmentation
Bilan et al. Research of Methods of Steganographic Protection of Audio Information Based on Video Containers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant