CN101489016A - Scanner having digital copyright protection function and scanning method thereof - Google Patents

Scanner having digital copyright protection function and scanning method thereof Download PDF

Info

Publication number
CN101489016A
CN101489016A CNA2009100370154A CN200910037015A CN101489016A CN 101489016 A CN101489016 A CN 101489016A CN A2009100370154 A CNA2009100370154 A CN A2009100370154A CN 200910037015 A CN200910037015 A CN 200910037015A CN 101489016 A CN101489016 A CN 101489016A
Authority
CN
China
Prior art keywords
digital watermarking
module
discrete cosine
scan
digital
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2009100370154A
Other languages
Chinese (zh)
Inventor
史建平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Silitek Electronic Guangzhou Co Ltd
Lite On Technology Corp
Original Assignee
Silitek Electronic Guangzhou Co Ltd
Lite On Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Silitek Electronic Guangzhou Co Ltd, Lite On Technology Corp filed Critical Silitek Electronic Guangzhou Co Ltd
Priority to CNA2009100370154A priority Critical patent/CN101489016A/en
Publication of CN101489016A publication Critical patent/CN101489016A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention relates to a scanner having functions of digital copyright protection and scan source tracing, comprising: a digital watermark creating module for creating a digital watermark; a discrete cosine transform module for processing scan data to prepare for subsequent watermark embedding; a digital watermark embedding module for embedding the digital watermark into a scan data; and a discrete cosine inverse transform module for hiding the digital watermark. The scan method comprises the following steps of: creating a digital watermark based on the scan associated information as a resource mark; calling the scan data of the discrete cosine transform process, adding the digital watermark into a discrete cosine transform frequency domain space; embedding the digital watermark after the chaotic process into a scan data; and calling a discrete cosine inverse transform to hide the digital watermark.

Description

Scanner and scan method thereof with digital copyright protection function
Technical field
The present invention relates to a kind of scanner, particularly a kind of scanner and scan method thereof with digital copyright protecting and scan source tracking function.
Background technology
Along with the continual renovation and the development of information technology, various traditional publications no matter be that photographic work, billboard or books manuscript have all used this media of network to expand the spread scope of product, are accelerated propagation velocity.
In the past, information is to be that the mode of carrier was preserved and in epoch of transmitting with the physical media, and the physical media that is awarded copyright is also more cheap than duplicating voluntarily, save time, high-quality, and this makes that copyright problem was not very outstanding in the past.Yet along with popularizing of computer and network application, piracy has become very serious problem.General today like this in the Internet, no matter be big media companies or individual author, can easily the numerical digit content be put on the Internet and share with everybody, make increasing high-quality digital media file begin to issue on the internet and spread, but but having many is that unwarranted media file appears at the Internet, hurt copyright holder's interests greatly, added that again these files have and the positive the same quality of version content, and have huge menace.
Scanner is most widely used model, uses microcomputer image input device the most efficiently, can be input to microcomputer from picture, photo, film with scanner to all kinds of drawing figures and all kinds of manuscript data.For preventing piracy, be necessary in scanner, to utilize modern Information Hiding Techniques, with a kind of special sightless mark (digital watermarking), be hidden in the scan image with the embedded method of numeral, in order to the ownership of proof authorship to its works, and as the evidence of identifying, prosecuting illegal infringement.Also be necessary simultaneously in the information that embeds, to add scanning device hardware information and scanning user profile (if the user allows), be used for following the trail of the scan image source, illegally propagate by restriction scan-image on the root.
Summary of the invention
The technical problem to be solved in the present invention is that a kind of scanner and scan method thereof with digital copyright protection function is provided.
For solving the problems of the technologies described above, the invention provides a kind of scanner with digital copyright protection function, it is characterized in that this scanner comprises: a digital watermarking makes up module, in order to making up a digital watermarking, with as origin marking; One discrete cosine transform module is in order to processing scan data; One digital watermarking merge module is in the digital watermarking embedding one scan data in order to the out of order processing of chaos; And a discrete cosine inverse transform module, in order to hide this digital watermarking.
Wherein, this digital watermarking makes up module and also comprises the out of order module of a chaos, produces chaos sequence during in order to encryption in making up the digital watermarking process.
Further, this discrete cosine transform module and this discrete cosine inverse transform module are embedded software module or peripheral hardware hardware module.
The present invention also provides a kind of scan method, and it comprises step: the association information based on related scans makes up a digital watermarking, with as origin marking; Call this digital watermarking of the out of order processing of chaos, digital watermarking is joined discrete cosine transform frequency domain space; This digital watermarking of the out of order processing of chaos is embedded in the one scan data; Call an inverse discrete cosine transform and hide this digital watermarking.
Wherein, the step of this structure digital watermarking further comprises: obtain hardware information; Encrypt; And Base64 code construction watermark.
Further, the step of this structure digital watermarking also comprises: obtain copyright information; Encrypt; And Base64 code construction watermark.
Further, the step of this structure digital watermarking also comprises: obtain scanning user profile; Encrypt; And Base64 code construction watermark.
Concrete, this encrypting step comprises: generate chaos sequence; Create the magic square matrix; The scramble watermark.
Scanner provided by the invention makes up module, digital watermarking merge module and discrete cosine transform, inverse transform module owing to have digital watermarking, can make up digital watermarking and digital watermarking hidden and embed in the scan-data, the material that wherein makes up digital watermarking comprises hardware information, copyright information or scanning user profile etc., but the mark archival source has the anti-piracy and scan source tracking function of numeral.In addition, encryption technology in the digital watermarking building process can make digital watermarking have robustness preferably, promptly tamper-proof, anti-aggressive, even that is to say the consciously or unconsciously destroyed or distortion of scan image, this digital watermarking can both keep integrality preferably, thereby provides higher reliability for recognition image source.In addition, watermark has been hidden in the employing of discrete cosine transform, inverse transform module better, when strengthening robustness, does not also influence the quality problem such as definition of scan image.
Description of drawings
Fig. 1 is the main work flow figure of the scan method that provides of a preferred embodiment of the present invention;
Fig. 2 is the workflow diagram that step S2 makes up digital watermarking among Fig. 1;
Fig. 3 is the another kind of workflow diagram that step S2 makes up digital watermarking among Fig. 1;
Fig. 4 is the concrete workflow diagram of encrypting step among Fig. 2; And
Fig. 5 is the scanner functions modular structure figure that a preferred embodiment of the present invention provides.
Embodiment
Below with reference to illustrating scanner and the scan method thereof with digital copyright protection function provided by the invention.
See also Fig. 1, the workflow diagram of scanner provided by the present invention, it comprises the following steps:
Step S1, the scanning beginning promptly starts scanner, and the one scan driver is provided, to drive subsequent step;
Step S2 makes up digital watermarking, and the material that wherein constitutes this digital watermarking comprises scanner hardware information, copyright information or scanning user profile etc., and this step comprises steps such as the information of obtaining, encryption and Base64 coding, and is as shown in Figure 2 concrete;
Step S3 obtains scan-data, and this step adopts common scanning technique means to obtain scan-data, does not repeat them here;
Step S4, to scan-data carry out discrete cosine transform (Discrete Cosine Transform, DCT),, also be about to scan-data and join discrete cosine transform frequency domain space and make out of order chaos and handle, in order to digital watermarking is hidden in the scan-data;
Step S5, the digital watermarking that embedding has been handled is to the scan-data that is obtained;
Step S6, (Inverse Discrete Cosine Transform IDCT) further handles this digital watermarking and hiding this digital watermarking to utilize inverse discrete cosine transform;
Step S7 outputs to data-interface, outputs to data-interface output scanning image thereby be about to embed the scan-data that is concealed with digital watermarking, and this data-interface can make Twain interface or Wia interface or USB interface etc.;
Step S8 withdraws from, and promptly scanning motion is finished.
The image that this scan method scans out is implied with the digital watermarking that indicates scanner hardware information or copyright information or scanning user profile, and promptly the mode of a digital watermarking has write down scan source.So, when this image file is uploaded sowing time at network, its this digital watermarking that includes can be in order to the source of proof image file, and as identify, the evidence of the illegal infringement of prosecution, and the scan source that can track this image, thereby from the illegal propagation of root restriction file.Just, altered, also need further to process at digital watermarking for fear of digital watermarking.
Concrete, as shown in Figure 2, this step S2 makes up digital watermarking and comprises:
Step S21 begins to make up digital watermarking, and promptly scanner driver calls a digital watermarking and makes up the step that module begins to carry out the structure digital watermarking;
Step S22 gets hardware information, and promptly the scanner driver ardware feature of obtaining scanner itself is described (generally comprising manufacturer's title, production code member of scanner etc.);
Step S23 judges whether also will obtain copyright information, if do not need, then enters step S24, if desired, then enters step S27;
Step S24 encrypts, and promptly the sign that step S22 is obtained has the information (copyright information that may increase in hardware information and the subsequent step or scanning user profile etc.) of scan source to carry out encryption, and its concrete steps also can be further with reference to figure 4;
Step S25, the Base64 coding promptly has the information of scan source to carry out encoding process to the sign after the encryption;
Step S26 finishes the structure watermark, promptly finishes the step that makes up digital watermarking, can withdraw from this program module and the next step S3 that enters previous scanning main program obtains scan-data.
Need obtain copyright information about judging in step S23 kind, for example when the scanning user is provided with key etc., then to enter step S27, to get copyright information, promptly scanner driver obtains the copyright information of scanning user setting, for example user key; Next enter step S28, judge whether also to need to obtain scanning user profile.If do not need to obtain scanning user profile, then enter step S24, S25 successively, S26 finishes the structure digital watermarking.Obtain scanning user profile if desired, then enter step S29, get scanning user profile, promptly obtain the identification data that for example scans the user, and then enter step S24, S25 successively, S26 finishes the structure digital watermarking.
Because hardware information normally can be disclosed, for example production code member generally is open and unique, and can need to encrypt, but also can indicate the source of image uniquely.
For this reason, as shown in Figure 3, in step 2 concrete grammar that makes up digital watermarking, can not do encryption at hardware information, only selectivity is done encryption at copyright information and scanning user profile.When entering step S23, after judging whether to need to add copyright information, if judge when not needing to add copyright information, directly execution in step S26 finishes digital watermarking and makes up.For copyright information with confidentiality or scanning user profile, then finish digital watermarking by step S24 encryption and S25 step Base64 coding successively respectively and make up.
In addition, consult Fig. 4, about step S24 encrypting step, its concrete grammar comprises:
Step S241, watermark encrypting, promptly to generating the information of digital watermarking, for example hardware information, copyright information and scanning user profile etc. begin to carry out encipheror;
Step S242 generates chaos sequence, promptly calls the out of order module of a chaos and produces a chaos sequence;
Step S243 creates the magic square matrix;
Step S244, the scramble watermark; And
Step S245 withdraws from, and promptly finishes encrypting step S24, can enter subsequent step S25.
The effect of this S24 encrypting step mainly is that watermark is encrypted again, increases the anti-aggressiveness of watermark, and watermark is converted to the noise signal of Gaussian Profile, reduces the influence that picture quality is produced because of watermarked.After generating watermark, carry out at once as this step 1.
For carrying out above-mentioned scan method, a scanner 100 with digital copyright protection function is provided, as shown in Figure 5, this scanner 100 need comprise: a digital watermarking makes up module 10, in order to making up a digital watermarking, with as origin marking; One discrete cosine transform module 20 is in order to join this digital watermarking in discrete cosine transform frequency domain space; One digital watermarking merge module 30 is in order to embed this digital watermarking in the one scan data; And a discrete cosine inverse transform module 40, in order to hide this digital watermarking.Wherein, this digital watermarking makes up module 10 and also comprises the out of order module 11 of a chaos, produces chaos sequence during in order to encryption in making up the digital watermarking process.In addition, this discrete cosine transform module 20 and this discrete cosine inverse transform module 40 can be embedded software module or peripheral hardware hardware module.
Scan method provided by the present invention can make up digital watermarking and digital watermarking hidden and embed in the scan-data, the material that wherein makes up digital watermarking comprises hardware information, copyright information or scanning user profile etc., but the mark archival source has the anti-piracy and scan source tracking function of numeral.In addition, encryption technology in the digital watermarking building process can make digital watermarking have robustness preferably, promptly tamper-proof, anti-aggressive, even that is to say the consciously or unconsciously destroyed or distortion of scan image, this digital watermarking can both keep integrality preferably, thereby provides higher reliability for recognition image source.In addition, watermark has been hidden in the employing of discrete cosine transform, inverse transform module better, when strengthening robustness, does not also influence the quality problem such as definition of scan image.
The above only is preferred embodiment of the present invention, and all equalizations of doing according to claim of the present invention change and modify, and all should belong to covering scope of the present invention.

Claims (8)

1. scan method comprises step:
Association information based on related scans makes up a digital watermarking, with as origin marking;
Call the discrete cosine transform processing scan data;
To embed through the digital watermarking of the out of order processing of chaos in the scan-data;
Call an inverse discrete cosine transform and hide this digital watermarking.
2. scan method as claimed in claim 1 is characterized in that the step of this structure digital watermarking further comprises: obtain hardware information; Encrypt; And Base64 code construction watermark.
3. scan method as claimed in claim 2 is characterized in that the step of this structure digital watermarking also comprises: obtain copyright information; Encrypt; And Base64 code construction watermark.
4. scan method as claimed in claim 3 is characterized in that, the step of this structure digital watermarking also comprises: obtain scanning user profile; Encrypt; And Base64 code construction watermark.
5. as any described scan method in the claim 2 to 4, it is characterized in that this encrypting step comprises: generate chaos sequence; Create the magic square matrix; The scramble watermark.
6. the scanner with digital copyright protection function is characterized in that, this scanner comprises:
One digital watermarking makes up module, in order to making up a digital watermarking, with as origin marking;
One discrete cosine transform module is in order to processing scan data;
One digital watermarking merge module is in these digital watermarking embedding one scan data that discrete cosine transform is handled; And
One discrete cosine inverse transform module is in order to hide this digital watermarking.
7. the scanner with digital copyright protection function as claimed in claim 6 is characterized in that, this digital watermarking makes up module and also comprises the out of order module of a chaos, produces chaos sequence during in order to encryption in making up the digital watermarking process.
8. the scanner with digital copyright protection function as claimed in claim 6 is characterized in that, this discrete cosine transform module and this discrete cosine inverse transform module are embedded software module or peripheral hardware hardware module.
CNA2009100370154A 2009-01-22 2009-01-22 Scanner having digital copyright protection function and scanning method thereof Pending CN101489016A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2009100370154A CN101489016A (en) 2009-01-22 2009-01-22 Scanner having digital copyright protection function and scanning method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2009100370154A CN101489016A (en) 2009-01-22 2009-01-22 Scanner having digital copyright protection function and scanning method thereof

Publications (1)

Publication Number Publication Date
CN101489016A true CN101489016A (en) 2009-07-22

Family

ID=40891680

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2009100370154A Pending CN101489016A (en) 2009-01-22 2009-01-22 Scanner having digital copyright protection function and scanning method thereof

Country Status (1)

Country Link
CN (1) CN101489016A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101989237A (en) * 2009-08-03 2011-03-23 成都宇飞信息工程有限责任公司 U disk information safety system based on information hiding and digital watermarking technology
CN102938132A (en) * 2012-11-20 2013-02-20 海南大学 Watermarking method for medical images on basis of DFT (discrete Fourier transform) and LogisticMap
CN106982309A (en) * 2017-03-30 2017-07-25 理光图像技术(上海)有限公司 Image transmission/reception device and image transmission/reception system
CN113325949A (en) * 2021-05-12 2021-08-31 车捷 XR product constitutes system
CN113593045A (en) * 2021-06-07 2021-11-02 兰州飞天网景信息产业有限公司 XR product constitutes system
CN113873216A (en) * 2021-08-13 2021-12-31 兰州飞天网景信息产业有限公司 XR product composition system applied to zoo industry

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101989237A (en) * 2009-08-03 2011-03-23 成都宇飞信息工程有限责任公司 U disk information safety system based on information hiding and digital watermarking technology
CN101989237B (en) * 2009-08-03 2014-12-17 成都宇飞信息工程有限责任公司 U disk information safety system based on information hiding and digital watermarking technology
CN102938132A (en) * 2012-11-20 2013-02-20 海南大学 Watermarking method for medical images on basis of DFT (discrete Fourier transform) and LogisticMap
CN106982309A (en) * 2017-03-30 2017-07-25 理光图像技术(上海)有限公司 Image transmission/reception device and image transmission/reception system
CN106982309B (en) * 2017-03-30 2020-04-21 理光图像技术(上海)有限公司 Image transmitting/receiving device and image transmitting/receiving system
CN113325949A (en) * 2021-05-12 2021-08-31 车捷 XR product constitutes system
CN113593045A (en) * 2021-06-07 2021-11-02 兰州飞天网景信息产业有限公司 XR product constitutes system
CN113873216A (en) * 2021-08-13 2021-12-31 兰州飞天网景信息产业有限公司 XR product composition system applied to zoo industry

Similar Documents

Publication Publication Date Title
Arnold et al. Techniques and applications of digital watermarking and content protection
US20080310629A1 (en) Multibit Forensic Watermark with Encrypted Detection Key
CN101489016A (en) Scanner having digital copyright protection function and scanning method thereof
US20080016365A1 (en) Data protection method and device
Nagra et al. A functional taxonomy for software watermarking
CN101102460A (en) A method for instantly adding hide information into digital TV programs
CN110288504A (en) It is a kind of to automatically add water impression method towards block chain digital education platform
Katariya Digital watermarking
JP2005137004A (en) System for post decode watermarking of media
JP2007207051A (en) Electronic watermark embedding/distributing method and device
Mathur et al. Unbreakable digital watermarking using combination of LSB and DCT
CN104917989A (en) Hierarchical watermark adding method and system
Natarajan et al. Safeguarding the digital contents: Digital watermarking
Rao et al. R,“Digital watermarking: applications, techniques and attacks”
Goyal et al. A robust method for integrity protection of digital data in text document watermarking
CN111385097B (en) Method for data signature authentication and storage medium
Sharma et al. Digital watermarking for secure e-government framework
Stallin et al. Hidden Image Watermarking based on Frequency Domain Technique
Arsenova Technical aspects of digital rights management
Cumplido et al. Implementing digital data hiding algorithms in reconfigurable hardware—experiences on teaching and research
JP2006237687A (en) Program and user tracing device
Hamrahi et al. Digital Watermarking Technology in Different Domains
Wang et al. Quadtrees-based image authentication technique
Kaur et al. Technicalities of digital watermarking: a review
Ab Rahman et al. A Digital Image Watermarking System: An Application of Dual Layer Watermarking Technique

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20090722