CN101556686A - Robust image watermark method based on local Tchebichef moment - Google Patents

Robust image watermark method based on local Tchebichef moment Download PDF

Info

Publication number
CN101556686A
CN101556686A CNA2009100217440A CN200910021744A CN101556686A CN 101556686 A CN101556686 A CN 101556686A CN A2009100217440 A CNA2009100217440 A CN A2009100217440A CN 200910021744 A CN200910021744 A CN 200910021744A CN 101556686 A CN101556686 A CN 101556686A
Authority
CN
China
Prior art keywords
watermark
square
tchebichef
image
prime
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2009100217440A
Other languages
Chinese (zh)
Other versions
CN101556686B (en
Inventor
高新波
邓成
李洁
田春娜
肖冰
路文
安玲玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN2009100217440A priority Critical patent/CN101556686B/en
Publication of CN101556686A publication Critical patent/CN101556686A/en
Application granted granted Critical
Publication of CN101556686B publication Critical patent/CN101556686B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a robust image watermark new method based on a local Tchebichef moment, mainly solving the problem that a watermark arithmetic based on image characteristic at present can not effectively resist general image processing and geometry attack simultaneously. The method comprises the steps as follows: firstly, extracting characteristic points of an original image by utilizing a Harris-Laplace detection operator, and obtaining a group of stable and mutually independent round characteristic areas through characteristic selection; then obtaining a geometrically unchanged round characteristic area through principle direction alignment; and finally, calculating the Tchebichef moment in an inscribed square image block of the round characteristic area, and embedding a watermark through dithering quantized modulation to modify an amplitude value with low-level Tchebichef moment. In detection, the modified low-level Tchebichef moment is obtained through the dithering quantized modulation, and a minimum distance is utilized to realize the blind extraction of the watermark. The invention has favorable nonvisibility, excellent robust performance for general image processing, geometry attach and combined attach and superior performance to similar methods and can be used for copyright protection for different images.

Description

Robust image watermark method based on local Tchebichef moment
Technical field
The present invention relates to field of information security technology; specifically a kind of digital figure watermark embeds and blind checking method; this method is highly resistant to geometric attack and normal image is handled, and can be used for copyright protection, entitlement checking, the copy control field of digital picture works on the internet.
Background technology
The access that is digitized as multimedia messages of multi-medium data such as image, video, audio frequency etc. provides very big facility, has also greatly improved the efficient and the accuracy of information representation simultaneously.Universal day by day along with the internet, the interchange of multimedia messages has reached the unprecedented degree of depth and range especially, and its issue form is also more and more abundanter.People can carry out copy, download and the issue of Digital Media easily by the internet.This gives people's the live and work condition of providing convenience on the one hand, has improved work efficiency, also provides convenience for the piracy of Digital Media on the other hand.Some lawless persons arbitrarily copy and propagate the Digital Media publication of copyright protection under the situation that does not obtain the copyright owner of Digital Media mandate, therefrom speculate.In addition, public document, bank statement and personal credit data are maliciously tampered on the internet, make E-Government, ecommerce can not obtain smooth promotion and application.Therefore, how to protect the copyright problem of Digital Media and information security to become an extremely urgent realistic problem on the internet.Digital watermarking becomes the common focus of paying close attention to of business circles and academia recent years as a very potential solution.Digital watermark technology has remedied the defective of cryptographic technique on the one hand, because it can provide further protection for the data after the deciphering; On the other hand, digital watermark technology has also remedied the defective of digital signature technology because it can be in raw data a large amount of secret information of disposable embedding.
The basic thought of digital watermark technology is to embed secret information in multi-medium data, so that the true and reliable property of the copyright of protection digital product, proof product, follow the tracks of copy right piracy or the additional information of product is provided.The Image Watermarking Technique of robust must possess the ability that the multiple watermark of opposing is attacked.Handle as noise, filtering, compression etc. with respect to normal image, geometric attack such as translation, rotation, convergent-divergent etc. are difficult to resist more.Geometric attack does not destroy image watermark itself, but has destroyed the synchronized relation between watermarking images to be detected and the embed watermark information, causes watermark detector can't detect watermark information.
The image watermark method of resist geometric attacks can be divided into non-blind Detecting water mark method and blind Detecting water mark method.Non-blind Detecting water mark method need be used and be subjected to bigger restriction by original image or under fire watermarking images not.The blind Detecting water mark method roughly is divided into based on how much fields of invariants, based on supplementary with based on the water mark method of characteristics of image.Wherein, preceding two kinds of methods are only to global change---and rotation, convergent-divergent and translation are effective, can't resist comparatively complicated geometric attack such as local bending, shearing and combination attacks.By contrast, water mark method based on characteristics of image belongs to second generation digital watermark technology, its basic thought is to utilize that metastable unique point identifies the watermark embedded location in the image, and in the regional area corresponding with each unique point embed watermark independently, still utilize unique point to locate and detect watermark during detection, thereby reach the purpose of opposing geometric attack.
Have the characteristics of image of geometric invariance by structure, identify the accurate position that watermark embeds and detects then, can offset the watermark synchronization error that geometric attack causes.Characteristics of image can be overall, also can be local.In the resist geometric attacks water mark method based on global characteristics, general method is to utilize square that image is carried out normalized, and watermark is embedded in the image after the normalization.Document M.Alghoniemy and A.H.Tewfik.Geometric invariance inimage watermarking.IEEE Trans.Image Process. for example, 2004,13 (2), 145-153. utilize geometric moment that image is carried out normalization, carry out watermark in the image after normalization and embed and detect and to resist attacks such as convergent-divergent, rotation.Yet the maximum deficiency of these class methods is to resist shearing attack, and this is that the image section contents lost will inevitably cause the calculating of square value very mistake to occur because the calculating of square depends on all pixel values of entire image.
In resist geometric attacks image watermark method based on local feature, by the location of space characteristics point, with the unique corresponding sub-image area of unique point in to embed and extract watermark be common method.Because the unique point of choosing in the image has enough stability and distribution is more even, thereby these class methods can effectively be resisted shearing attack.Document J.S.Jeo and C.D.Yoo.Localized image watermarking based on feature points of scale-space representation.Pattern Recognit. for example, 2004,37 (7): 1365-1375. adopts Harris-Laplace to detect the operator extraction unique point, with the unique point is central configuration circular feature zone, and the two-dimensional circular watermark is directly embedded in the characteristic area.Water mark method based on the local feature zone is being obtained effect preferably aspect the resist geometric attacks, but has following problem: (1) geometric attack causes the extraction of image characteristic point skew to occur; (2) interpolation error of geometric attack process generation can change the pixel value of image.These problems will influence the performance of watermark detector, cause the verification and measurement ratio of watermark lower.
Summary of the invention
The object of the present invention is to provide a kind of based on local Tchebichef moment (Local Techebichef Moments, LTMs) robust image watermark method, can not resist shearing attack and the water mark method watermark detection rate problem on the low side of utilizing local feature to overcome the above-mentioned water mark method of global characteristics that utilizes, improve robustness geometric attack and normal image processing.
Realize that technical scheme of the present invention is: the advantage of above two class water mark methods is organically combined.When watermark embeds, at first utilize Harris-Laplace to detect the operator extraction image characteristic point, obtain one group of stable and circular feature independent of each other zone by the feature selecting strategy; Each circular feature zone direction of passage alignment is obtained geometric invariance; Utilize the Tchebichef square to extract the global characteristics in each circular feature zone, range value by jitter quantisation modulation low order Tchebichef square is realized embed watermark, and the range value by jitter quantisation low order Tchebichef square, adopt the mode of minor increment decoding to detect watermark.Detailed process is as follows:
One, based on the robust image watermark embedding grammar of local Tchebichef moment, comprises the steps:
A. generate the pseudorandom watermark sequence b={b of a two-value by key 1, b 2..., b L, b i∈ 0,1};
B. utilize Harris-Laplace to detect operator extraction image primitive character point, the unique point that will belong in the intermediate features range scale according to the characteristic dimension of primitive character point chooses, and is central configuration candidate circles characteristic area with these unique points;
C. by feature selecting strategy the candidate circles characteristic area is carried out cluster according to the distance restraint condition based on the minimum spanning tree clustering algorithm, to each category feature zone, only select the zone of intensity maximum, obtain stable and circular feature independent of each other zone thus;
D. utilize the single order local derviation to calculate the main gradient direction in each circular feature zone, and these main gradient directions are alignd by rotation;
E. get from postrotational circular feature zone and connect square in it, calculating connects foursquare Tchebichef square in being somebody's turn to do, and utilizes the mode of jitter quantisation modulation watermark to be embedded in the range value of low order Tchebichef square;
F. to the Tchebichef square be reconstructed obtain to contain watermark in connect square, and with these contain watermark in connect square image block and replace one by one and connect square image block in original, obtain containing watermarking images.
In the above-mentioned image watermark embedding grammar, step B described " is central configuration candidate circles characteristic area with these unique points ", carry out as follows:
B1. utilize Harris-Laplace to detect the primitive character point of operator extraction image, be designated as set omega 1
B2. put pairing characteristic dimension according to primitive character, select the unique point in the medium scale scope, be designated as set omega 2
B3. with set omega 2In each unique point be the center, be radius structure circular feature zone with the τ of each unique point characteristic dimension doubly, its radius is expressed as:
Figure A20091002174400071
Here, the characteristic dimension of σ presentation video unique point,
Figure A20091002174400072
Expression rounds operation, and τ is a positive integer.
In the above-mentioned image watermark embedding grammar, step e described " utilizing the mode of jitter quantisation modulation that watermark is embedded in the range value of low order Tchebichef square ", carry out as follows:
The maximum order of E1. establishing low order Tchebichef square is O Max, the set that these Tchebichef squares are formed is expressed as:
S={T pq,p+q<O max,p,q≠0}, (2)
Wherein, p+q represents exponent number, T PqThe Tchebichef square of representing the p+q rank;
E2. pass through key K 1From S set, select L low order Tchebichef square at random: T = ( T p 1 q 1 , . . . , T p L q L ) ;
E3. for watermark sequence b={b 1, b 2..., b LIn every watermark b i, the mode that adopts jitter quantisation to modulate is revised the range value of low order Tchebichef square, to realize the embedding of watermark, to revise rule is:
| T ~ p i q i | = [ | T p i q i | - d i ( b i ) Δ ] Δ + d i ( b i ) , - - - ( 3 )
Wherein, [] is the operation that rounds up, and Δ is a quantization step, d i() is i quantization function, and satisfies d i(1)=Δ/2+d i(0); Vector (d 1(0) ..., d L(0)) passes through key K 2Produce, and upward obey even the distribution in interval [0, Δ].
Above-mentioned image watermark embedding grammar, step F described " to the Tchebichef square be reconstructed obtain to contain watermark in connect square ", carry out as follows:
F1. the range value by L amended low order Tchebichef square obtains L amended Tchebichef square, and it is expressed as:
T p i q i = | T ~ p i q i | | T p i q i | T p i q i , i=1,...,L, (4)
Wherein,
Figure A20091002174400083
Be the range value of amended i low order Tchebichef square,
Figure A20091002174400084
Range value for i original low order Tchebichef square;
F2. in S set, utilize in first group of the Tchebichef square reconstruct that be not modified and meet square image block f Rest(x, y):
f rest(x,y)=f(x,y)-f T(x,y), (5)
Wherein, (x is to connect square image block, f in original y) to f T(x, y) be by Tchebichef square to be revised reconstruct in connect square image block;
F3. in S set, utilize in second group of L the amended Tchebichef square reconstruct and connect square image block
F4. in first group, meet square image block f Rest(x y) He in second group connects square image block
Figure A20091002174400086
Merge, obtain containing watermark in connect square image block
Figure A20091002174400087
f ~ ( x , y ) = f rest ( x , y ) + f T ~ ( x , y ) . - - - ( 6 )
Two, based on the robust image watermark detection method of local Tchebichef moment, comprise the steps:
G. utilize Harris-Laplace to detect operator and from image to be detected, extract image characteristic point,, obtain stable and circular feature independent of each other zone through after the feature selecting;
H. each circular feature zone is calculated its main gradient direction and is carried out main gradient direction alignment by rotation, in postrotational circular feature zone, get and connect square in it, and calculate should in connect foursquare Tchebichef square;
I. select L low order Tchebichef square, by minor increment decoding extract watermark b '=b ' 1, b ' 2..., b ' L;
J. compare original watermark b={b 1, b 2..., b LWith the watermark b ' that extracts=b ' 1, b ' 2..., b ' L, whether the watermark figure place r that obtains mating, and compare with predefined matching detection threshold value T judges in this circular feature zone embed watermark, when r 〉=T, then this circular feature zone has embedded watermark; As r<T, then this circular feature zone does not have embed watermark.In the above-mentioned image watermark detection method, step I carries out as follows:
I1. use the key K identical with telescopiny 1, select L low order Tchebichef square in the square image block interior connecing: T ′ = ( T p 1 q 1 ′ , . . . , T p L q l ′ ) ;
I2. utilize identical key K 2Produce quantization vector (d 1(0) ..., d LAnd (d (0)) 1(1) ..., d L(1));
I3. utilize the jitter quantisation modulation system identical, to each low order Tchebichef square with watermark embed process
Figure A20091002174400092
Range value make amendment:
| T p i q i ′ | j = [ | T p i q i ′ | - d i ( j ) Δ ] Δ + d i ( j ) , - - - ( 7 )
Wherein, Δ is a quantization step, and [] is rounding operation, i=1 ..., L, j=0,1;
I4. by comparing
Figure A20091002174400094
With its two groups quantification formulas
Figure A20091002174400095
With
Figure A20091002174400096
Between distance, extract L position watermark information:
b i ′ = arg min j ∈ { 0,1 } ( | T p i q i ′ | j - | T p i q i ′ | ) 2 , i = 1,2 , . . . , L - - - ( 8 )
Wherein, will
Figure A20091002174400098
And two groups of distances that quantize formula are defined as respectively dist 0 = ( | T p i q i ′ | 0 - | T p i q i ′ | ) 2 With dist 1 = ( | T p i q i ′ | 1 - | T p i q i ′ | ) 2 , And calculate t=dist0-dist1, if t<0, then b ' i=0, otherwise b ' i=1.
The present invention is because the local feature of combining image is regional and global characteristics is represented, utilize Harris-Laplace to detect operator and the feature selecting strategy obtains one group of stable and circular feature independent of each other zone, effectively improved system the geometric attack robustness of shearing attack particularly; Simultaneously owing to utilize the Tchebichef square to represent the global statistics characteristic in circular feature zone, not only overcome because of the low problem of watermark detection rate that unique point is offset and interpolation error causes, and utilized good noise immunity of Tchebichef square and resistance to compression to strengthen the resistivity that normal image is handled; Adopt the method for jitter quantisation modulation when embedding and detecting owing to watermark in addition, both realized the blind Detecting of watermark, improved the accuracy of detection of watermark again.
Description of drawings
Fig. 1 is a The general frame of the present invention;
Fig. 2 is that watermark of the present invention embeds FB(flow block);
Fig. 3 is the synoptic diagram of the present invention's circular feature zone selection course in watermark embed process, wherein Fig. 3 (a) is an original image, 3 (b) are original circular feature areal map, Fig. 3 (c) is the circular feature areal map in the medium scale scope, and Fig. 3 (d) is the circular feature areal map after selecting through the minimum spanning tree clustering method;
Fig. 4 is the synoptic diagram of the embedding zone forming process of the present invention in watermark embed process, wherein Fig. 4 (a) is that desirable watermark embeds the zone, Fig. 4 (b) is original external square image block, and Fig. 4 (c) is the image block that " zero padding " forms, and Fig. 4 (d) connects square image block in being;
Fig. 5 is a watermark detection FB(flow block) of the present invention;
Fig. 6 is the synoptic diagram that concerns between PSNR value of the present invention, quantization step and the watermark length three;
Fig. 7 is that watermark of the present invention embeds the effect synoptic diagram, and wherein Fig. 7 (a) is an original image, and Fig. 7 (b) is for containing watermarking images, and Fig. 7 (c) is an error image;
Fig. 8 is that detection threshold of the present invention and false-alarm probability concern synoptic diagram.
Specific embodiments
With reference to The general frame shown in Figure 1, the present invention at first utilizes the unique point of Harris-Laplace detection operator extraction original image, and obtains one group of stable and circular feature independent of each other zone by feature selecting; Obtain constant circular feature zone how much by the principal direction alignment then; At last, in the circular feature zone, connect and calculate the Tchebichef square in the square image block, and realize that by the range value of jitter quantisation modulation modification low order Tchebichef square watermark embeds; During detection, obtain amended low order Tchebichef square and utilize the minor increment decoding to extract watermark by the jitter quantisation modulation, and compare to judge whether to exist watermark with predefined detection threshold.It is following that the present invention is described in further detail with reference to accompanying drawing.
See figures.1.and.2, watermark embed step of the present invention is as follows:
Step 1: utilize Harris-Laplace to detect the operator extraction image characteristic point.
To original image Fig. 3 (a), utilize Harris-Laplace to detect operator extraction circular feature zone, the initial circular characteristic area is shown in Fig. 3 (b).Harris-Laplace detects operator and comprises dimension self-adaption Harris operator and automatic yardstick selection technology two parts, and the unique point of extraction has robustness preferably to rotation, convergent-divergent, translation and noise etc., and concrete steps are:
At first, given metric space, σ I ( n ) = 1.4 n · σ 0 , σ D ( n ) = 0.7 · σ I ( n ) (n=1,2 ..., 15) and threshold value 1000, wherein σ 0The expression initial gauges utilizes dimension self-adaption Harris operator to calculate the candidate feature point of image, and the autocorrelation matrix M of dimension self-adaption Harris operator is expressed as:
M ( x , y , σ I , σ D ) = σ D 2 · g ( σ I ) ⊗ L x 2 ( x , y , σ D ) L x L y ( x , y , σ D ) L x L y ( x , y , σ D ) L y 2 ( x , y , σ D ) - - - ( 1 )
L ( x , y , σ D ) = g ( σ D ) ⊗ I , - - - ( 2 )
Wherein, σ IAnd σ DRepresent integral scale and differential yardstick respectively; G (σ) expression average is that 0 variance is the Gaussian function of σ; L is that Gauss's metric space of image is represented; L sThe partial derivative of expression L on the s direction; I is an input picture;
Figure A20091002174400105
The expression linear convolution.Given σ IAnd σ D, can determine point (x, characteristic strength R y):
R(x,y,σ I,σ D)=Det(M(x,y,σ I,σ D))-κ·Tr 2(M(x,y,σ I,σ D)), (3)
Here, the determinant and the mark of Det () and Tr () difference representing matrix; κ is a constant, gets 0.04 usually.On each yardstick plane, unique point can be according to following Rule Extraction:
R ( x , y , σ I , σ D ) > R ( x , y , σ I , σ D ) ∀ ( x ^ , y ^ ) ∈ A , (4)
R(x,y,σ I,σ D?)≥Th
Wherein, A remarked pixel point (x, a certain neighborhood y); Th represents threshold value.
Then, to each candidate feature point, adopt process of iteration to determine unique point and characteristic dimension thereof:
Step 1: establish x kBe the candidate image unique point, whether check LoG operator can obtain local extremum at this some place in whole yardstick hunting zone, if can not obtain extreme value, then give up this point, and the yardstick hunting zone is defined as σ I ( k + 1 ) = t · σ I ( k ) , T=0.7 ..., 1.4, the LoG operator representation is:
| LoG ( x , y , σ I ) | = σ I 2 | L xx ( x , y , σ I ) + L yy ( x , y , σ I ) | , - - - ( 5 )
Here, L XxThe second-order partial differential coefficient of expression L on the x direction, L YyThe second-order partial differential coefficient of expression L on the y direction;
Step 2: the image characteristic point x that can obtain extreme value for the LoG operator k, the unique point x of search characteristics intensity maximum in this neighborhood of a point K+1, if x K+1Exist and then give up x k
Step 3: repeat Step1~Step2, up to σ I ( k + 1 ) = σ I ( k ) Or x K+1=x kTill.
Step 2: the structure of part-circular characteristic area and selection.
Unique point only comprises positional information and characteristic dimension information, can not carry out the embedding and the extraction of watermark, need be central configuration suitable feature zone with the unique point therefore.Here, be the center of circle with the unique point, and be radius with the multiple of the pairing characteristic dimension of unique point, structure circular feature zone, the radius in this circular feature zone is:
Figure A20091002174400115
Wherein, the characteristic dimension of σ presentation video unique point;
Figure A20091002174400116
Expression rounds operation; τ is a positive integer, is used to regulate the size in circular feature zone.Because characteristic dimension can reflect the variation of picture size, thereby the circular feature of structure zone can covariant change in the convergent-divergent of image.
Harris-Laplace detects operator and is used for images match and Target Recognition at first, and detected unique point is very intensive, and the characteristic area of formation overlaps serious.In order to strengthen robustness of the present invention, need to select one group of stable and circular feature independent of each other zone to be used for watermark and embed and detect, this selection course is as follows:
Step 1: utilize Harris-Laplace to detect the initial characteristics point of the original image of operator extraction shown in Fig. 3 (a), be designated as set omega 1, shown in Fig. 3 (b);
Step 2: the unique point that characteristic dimension is little, and its stability is lower, and the characteristic area that the big unique point of characteristic dimension forms overlaps seriously, therefore at first selects the unique point in the medium scale scope, is designated as set omega 2, shown in Fig. 3 (c);
Step 3: with set omega 2Interior unique point is the center, τ with its characteristic dimension doubly is radius structure circular feature zone, less zone can increase the robustness of watermark, but can limit watermark capacity, though and bigger zone can increase the embedding capacity but can reduce the robustness of watermark, so τ should the compromise robustness and the watermark capacity of watermark;
Step 4: in order to obtain characteristic area independent of each other, distance between the unique point also needs to consider: characteristic distance is little, region overlapping is serious, characteristic distance is big, regional number deficiency, and the present invention introduces distance restraint D, utilize the minimum spanning tree clustering method that unique point is carried out cluster, to same category feature point, select the unique point of characteristic strength maximum and form the circular feature zone, shown in Fig. 3 (d).
Step 3: the circular feature zone that constructive geometry is constant
Through after the above-mentioned steps, obtained one group of stable and circular feature independent of each other zone, these zones have unchangeability to translation, convergent-divergent.In order to realize the unchangeability of circular feature zone to rotation, the present invention calculates each circular feature zone principal direction by the gradient direction distribution character of unique point neighborhood territory pixel, and alignment realizes rotational invariance through principal direction.During actual computation, in the neighborhood window that with the unique point is the center, sample, and with the gradient direction of statistics with histogram neighborhood territory pixel, histogrammic peak value has been represented the principal direction of this unique point, also as the principal direction in corresponding circular feature zone.Image I mid point (x 0, y 0) gradient located is:
▿ I ( x 0 , y 0 ) = [ ( ∂ I / ∂ x ) , ( ∂ I / ∂ y ) ] | ( x 0 , y 0 ) , - - - ( 7 )
Here, the amplitude of gradient is
Figure A20091002174400122
The direction of gradient is
Step 4: choose the circular feature zone in connect square image block and calculate the Tchebichef square
For embed watermark in the circular feature zone shown in Fig. 4 (a), during actual treatment, at first obtain comprising the external square image block in circular feature zone, shown in Fig. 4 (b); The image block of " zero padding " acquisition shown in Fig. 4 (c) around passing through then.Consider that " zero padding " zone should keep the covariant characteristic to the influence of calculating Tchebichef square and the zone of final embed watermark, get in the circular feature zone of the present invention after the principal direction alignment and connect square region in it, shown in Fig. 4 (d).Consider that Tchebichef has good feature representation ability and stronger noise inhibiting ability, the present invention calculates the Tchebichef square interior connecing in the square region.
Step 5: embed watermark in low order Tchebichef square
Step 1. generates the pseudorandom watermark sequence b={b of a two-value by key 1, b 2..., b L, b i∈ 0,1};
The maximum square exponent number of Step 2. low order Tchebichef squares is O Max, then the set of these Tchebichef squares formations is expressed as:
S={T pq,p+q<O max,p,q≠0}, (8)
For invisibility and the robustness of compromising, should select suitable low order Tchebichef square embed watermark;
Step 3. passes through key K 1From S set, select L low order Tchebichef square at random: T = ( T p 1 q 1 , . . . , T p L q L ) Be used for embed watermark;
Step 4. is for each watermark bit b i, adopt the method for jitter quantisation modulation low order Tchebichef square range value to realize that watermark embeds, its embedding rule is:
| T ~ p i q i | = [ | T p i q i | - d i ( b i ) Δ ] Δ + d i ( b i ) , - - - ( 9 )
In the formula, [] is the operation that rounds up; Δ is a quantization step; d i() is i quantization function, and satisfies d i(1)=Δ/2+d i(0); Vector (d 1(0) ..., d L(0)) passes through key K 2Produce, and upward obey even the distribution in interval [0, Δ];
Step 5. is expressed as amended Tchebichef square:
T ~ p i q i = | T ~ p i q i | | T p i q i | T p i q i , i=1,...,L, (10)
Wherein,
Figure A20091002174400133
Be the range value of amended i low order Tchebichef square, Range value for i original low order Tchebichef square.
Step 6: will contain watermark circular feature zone and replace original circular feature zone one by one, and obtain to contain watermarking images.
At first, will contain watermark in connect square image block and be divided into two groups: first group of Tchebichef square reconstruct of not being modified of serving as reasons obtain in meet square image block f Rest(x, y):
f rest(x,y)=f(x,y)-f T(x,y), (11)
Here, (x is to connect square image block in original y) to f; f T(x is by connecing square image block in the Tchebichef square reconstruct to be revised y).Second group connects square image block in being obtained by the reconstruct of amended Tchebichef square
Figure A20091002174400135
Then, merge connecing square image block in above two groups, obtain containing watermark in connect square image block
Figure A20091002174400136
f ~ ( x , y ) = f rest ( x , y ) + f T ~ ( x , y ) . - - - ( 12 )
At last, with all contain watermark in connect square image block and replace and connect square image block in original, and " zero-suppressing " obtains containing watermark circular feature zone around will containing the external square image block of watermark, recover through principal direction and replace all original circular feature zones after can obtain containing watermarking images.
With reference to Fig. 1 and Fig. 5, watermark detection step of the present invention is as follows:
Step 1: utilize Harris-Laplace to detect operator and from image to be detected, extract image characteristic point and carry out feature selecting.
Utilize Harris-Laplace to detect operator and from image to be detected, extract image characteristic point.Because image may suffer certain attack, the unique point that extracts when therefore unique point of extracting and not sum embed is in full accord.Through after the identical feature selecting strategy, obtain one group of stable and circular feature independent of each other zone.Test verifiedly, the characteristic area that obtains through the feature selecting strategy has re-detection rate preferably, even image has suffered certain geometric attack, the circular feature zone that major part contains watermark still can be detected.
Step 2: the circular feature zone is carried out the principal direction alignment and calculated the Tchebichef square.
In order to realize the unchangeability of circular feature zone to rotation, the gradient direction distribution character by the unique point neighborhood territory pixel calculates each circular feature zone principal direction, and alignment realizes rotational invariance through principal direction.Get in the circular feature zone after each principal direction alignment and connect square image block in it and calculate the Tchebichef square.
Step 3: watermark detection
Step 1. uses the key K identical with telescopiny 1, select L low order Tchebichef square T ′ = ( T p 1 q 1 ′ , . . . , T p L q l ′ ) Be used for watermark extracting;
Step 2. utilizes the key key K identical with telescopiny 2Produce quantization vector (d 1(0) ..., d LAnd (d (0)) 1(1) ..., d L(1));
Step 3. adopts the jitter quantisation modulation formula identical with telescopiny, to each low order Tchebichef square The amount of carrying out is revised:
| T p i q i ′ | j = [ | T p i q i ′ | - d i ( j ) Δ ] Δ + d i ( j ) , - - - ( 6 )
Wherein, [] is rounding operation, i=1 ..., L, j=0,1;
Step 4. relatively
Figure A20091002174400144
And two groups of quantification formulas
Figure A20091002174400145
With Between distance, extract watermark information:
b i ′ = arg min j ∈ { 0,1 } ( | T p i q i ′ | j - | T p i q i ′ | ) 2 , i=1,2,...,L, (7)
Wherein, will
Figure A20091002174400148
And two groups of distances that quantize formula are defined as respectively dist 0 = ( | T p i q i ′ | 0 - | T p i q i ′ | ) 2 With dist 1 = ( | T p i q i ′ | 1 - | T p i q i ′ | ) 2 , And calculate t=dist0-dist1, if t<0, then b ' i=0, otherwise b ' i=1.
Step 4: compare original watermark b={b 1, b 2..., b LWith the watermark b ' that extracts=b ' 1, b ' 2..., b ' L, obtain match bit array r, and compare with predefined detection threshold T, whether judge in this circular feature zone embed watermark, when r 〉=T, then this circular feature zone has embedded watermark; As r<T, then this circular feature zone does not have embed watermark.The step of detection threshold T is as follows:
Step 1. is for the image of embed watermark not, the leaching process of watermark can be regarded the Bernoulli test as, therefore, the watermark bit of extracting is the pseudo-random variable of matching probability p=0.5, watermark sequence and the original watermark sequence extracted are compared, when coupling number during greater than certain detection threshold, just can think to have watermark information in the product to be detected, so the false-alarm error probability in each circular feature zone is:
P FP = Σ r = T h L ( 1 2 ) L ( L ! r ! ( L - r ) ! ) , - - - ( 8 )
Wherein, T hThe expression detection threshold, L represents watermark length, r represents the bit number of watermark matches;
Step 2. by law of great numbers as can be known, when L was very big, it was that m=Lp, variance are that the probability distribution of binary random variable is approximately average σ ^ = Lp ( 1 - p ) Gaussian distribution, therefore, formula (8) approximate representation is:
P FP &cong; 1 - 1 2 &pi; e - T &prime; 2 / 2 ( a - 1 ) T &prime; + a T &prime; 2 + b T h < pL 0.5 T h = pL 1 2 &pi; e - T &prime; 2 / 2 ( 1 - a ) T &prime; + a T &prime; 2 + b T h > pL - - - ( 9 )
Here, T &prime; = ( T h - m ) / &sigma; ^ , a=1/π,b=2π;
Step 3. is according to formula (9), can draw as shown in Figure 8 detection threshold and the relation curve of false-alarm probability, by this curve as can be known, as detection threshold T h=140 o'clock, false-alarm probability P Fp=9.13 * 10 -5, when promptly the coupling number of watermark of Ti Quing and original watermark reached 140, the false-alarm probability in each circular feature zone was P Fp=9.13 * 10 -5
Advantage of the present invention can further specify by following experiment:
The present invention has carried out test experiments on a large amount of standard grayscale images, comprising benchmark test image B aboon, Lena, Peppers.Baboon comprises smooth region and complex texture zone; Lena has the characteristics of image of number of different types; On behalf of brightness, Peppers change.With invisibility and robustness evaluation and test foundation as performance quality of the present invention.
(1) invisibility
The present invention is with the foundation of objective indicator PSNR as the evaluation invisibility.By analyzing as can be known, the PSNR value among the present invention mainly is subjected to the influence of two factors.When watermark length fixedly the time, the quantization step Δ in the jitter modulation influences the PSNR value, and the big more watermark strength of Δ is just big more, but the PSNR value on the contrary can be more little; When fixedly Δ or watermark strength, the watermark figure place is long more, and PSNR will be low more.
Fig. 6 has provided the relation between mean P SNR value, quantization step Δ and the watermark figure place three of image.When quantizing step delta=18, watermark length L=224 o'clock, whole PSNR value is all greater than 50dB.
Fig. 7 (a) is the original image of Baboon, Lena and Peppers three width of cloth images; Fig. 7 (b) is for containing watermarking images; Fig. 7 (c) is original image and the error image that contains watermarking images, the i.e. influence that watermark produces original image.Fig. 7 further illustrates the present invention and has good invisibility.
(2) robustness
Utilize 4.0 couples of evaluating tool Stirmark to contain watermarking images and carry out a series of attack experiments, to test robustness of the present invention.Table 1 and table 2 have provided the watermarking detecting results of the present invention to normal image processing and geometric attack respectively.As the index of estimating robustness of the present invention, the mark in the form is verification and measurement ratio with verification and measurement ratio for we.
DR = # det ected _ number # original _ number - - - ( 10 )
Here, #detected_number represents successfully to detect in the attack graph picture characteristic area number of watermark information; #original_number represents the characteristic area number of original image embed watermark.
The resistivity that table 1 digital watermarking is handled normal image
Figure A20091002174400161
Table 2 digital watermarking is to the resistivity of geometric attack
Figure A20091002174400162
Method 1 is a test result of the present invention in table 1 and the table 2, the result that method 2 obtains according to method in " C.W.Wang; H.M.Hang.Afeature-based robust digital image watermarking scheme.IEEE Trans.Signal Processing.; 2003; 51 (4): 950-959. ", the result that method 3 obtains according to method in " J.S.Seo; C.D.Yoo.Image watermarkingbased on invariant regions of scale-space representation.IEEE Trans.Signal Processing; 2006,54 (4): 1537-1549. ".
As can be seen from Table 1, the present invention is highly resistant to normal image and handles, and especially adds to make an uproar and the JPEG compression.This be because: the unique point that extract (1) has good stability, and after handling through normal image, the embedded location of watermark does not change, and has guaranteed that watermark information can correctly extract; (2) local Tchebichef moment itself is made an uproar and JPEG compression has good resistibility to adding.By contrast, need to carry out normalized before method 2 embed watermarks, will cause watermark information energy greater loss, reduced the recall rate of method.Method 3 is by the spatial domain direct embed watermark that superposes, thereby the resistibility that normal image is handled is relatively poor.
As can be seen from Table 2, this method has robustness preferably to geometric attack (particularly aspect ratio changes, ranks remove and random bend) and combination attacks, has all obtained higher recall rate under all situations.Method 2 is used fixing local feature area size, does not have covariance, greatly reduces the robustness of this method to wide-angle rotation, convergent-divergent and aspect ratio change and combination attacks.Though method 3 can be resisted most of geometric attack, but embed the recall rate that the tactful deficiency that exists has reduced this method, and change do not have robustness to aspect ratio.

Claims (6)

1. the robust image watermark embedding grammar based on local Tchebichef moment comprises the steps:
A. generate the pseudorandom watermark sequence b={b of a two-value by key 1, b 2..., b L, b i∈ 0,1};
B. utilize Harris-Laplace to detect operator extraction image primitive character point, the unique point that will belong in the intermediate features range scale according to the characteristic dimension of primitive character point chooses, and is central configuration candidate circles characteristic area with these unique points;
C. by feature selecting strategy the candidate circles characteristic area is carried out cluster according to the distance restraint condition based on the minimum spanning tree clustering algorithm, to each category feature zone, only select the zone of intensity maximum, obtain stable and circular feature independent of each other zone thus;
D. utilize the single order local derviation to calculate the main gradient direction in each circular feature zone, and these main gradient directions are alignd by rotation;
E. get from postrotational circular feature zone and connect square in it, calculating connects foursquare Tchebichef square in being somebody's turn to do, and utilizes the mode of jitter quantisation modulation watermark to be embedded in the range value of low order Tchebichef square;
F. to the Tchebichef square be reconstructed obtain to contain watermark in connect square, and with these contain watermark in connect square image block and replace one by one and connect square image block in original, obtain containing watermarking images.
2. robust image watermark embedding grammar according to claim 1, step B described " is central configuration candidate circles characteristic area with these unique points " wherein, carry out as follows:
B1. utilize Harris-Laplace to detect the primitive character point of operator extraction image, be designated as set omega 1
B2. put pairing characteristic dimension according to primitive character, select the unique point in the medium scale scope, be designated as set omega 2
B3. with set omega 2In each unique point be the center, be radius structure circular feature zone with the τ of each unique point characteristic dimension doubly, its radius is expressed as:
Figure A2009100217440002C1
Here, the characteristic dimension of σ presentation video unique point,
Figure A2009100217440002C2
Expression rounds operation, and τ is a positive integer.
3. robust image watermark embedding grammar according to claim 1, step e described " utilizing the mode of jitter quantisation modulation that watermark is embedded in the range value of low order Tchebichef square " wherein, carry out as follows:
The maximum order of E1. establishing low order Tchebichef square is O Max, these Tchebichef squares are constituted set:
S={T pq,p+q<O max,p,q≠0},
Wherein, p+q represents exponent number, T PqThe Tchebichef square of representing the p+q rank;
E2. pass through key K 1From S set, select L low order Tchebichef square at random: T = ( T p 1 q 1 , . . . , T p L q L ) ;
E1. for watermark sequence b={b 1, b 2..., b LIn every watermark b i, the mode that adopts jitter quantisation to modulate is revised the range value of low order Tchebichef square, to realize the embedding of watermark, to revise rule is:
| T ~ p i q i | = [ | T p i q i | - d i ( b i ) &Delta; ] &Delta; + d i ( b i ) ,
Wherein, [] is the operation that rounds up, and Δ is a quantization step, d i() is i quantization function, and satisfies d i(1)=Δ/2+d i(0), vector (d 1(0) ..., d L(0)) passes through key K 2Produce, and upward obey even the distribution in interval [0, Δ].
4. robust image watermark embedding grammar according to claim 1, wherein step F described " to the Tchebichef square be reconstructed obtain to contain watermark in connect square ", carry out as follows:
F1. the range value by L amended low order Tchebichef square obtains L amended Tchebichef square, and it is expressed as:
T ~ p i q i = | T ~ p i q i | | T p i q i | T p i q i , i = 1 , . . . , L ,
Wherein,
Figure A2009100217440003C4
Be the range value of amended i low order Tchebichef square,
Figure A2009100217440003C5
Range value for i original low order Tchebichef square;
F2. in S set, utilize the Tchebichef square reconstruct that is not modified to obtain connecing in first group square image blocks f Rest(x, y):
f rest(x,y)=f(x,y)-f T(x,y),
Wherein, (x is to connect square image blocks, f in original y) to f T(x, y) be by Tchebichef square to be revised reconstruct in connect square image blocks;
F3. in S set, utilize L amended Tchebichef square reconstruct to obtain connecing square image blocks in second group
F4. in first group, meet square image blocks f Rest(x y) He in second group connects square image blocks
Figure A2009100217440003C7
Merge, obtain containing watermark in connect square image blocks
Figure A2009100217440003C8
f ~ ( x , y ) = f rest ( x , y ) + f T ~ ( x , y ) .
5. the robust image watermark detection method based on local Tchebichef moment comprises the steps:
G. utilize Harris-Laplace to detect operator and from image to be detected, extract image characteristic point,, obtain stable and circular feature independent of each other zone through after the feature selecting;
H. each circular feature zone is calculated its main gradient direction and is carried out main gradient direction alignment by rotation, in postrotational circular feature zone, get and connect square in it, and calculate should in connect foursquare Tchebichef square;
I. select L low order Tchebichef square, by minor increment decoding extract watermark b '=b ' 1, b ' 2..., b ' L;
J. compare original watermark b={b 1, b 2..., b LWith the watermark b ' that extracts=b ' 1, b ' 2..., b ' L, whether the watermark figure place r that obtains mating, and compare with predefined detection threshold T judges in this circular feature zone embed watermark, when r 〉=T, then this circular feature zone has embedded watermark; As r<T, then this circular feature zone does not have embed watermark.
6. robust image watermark detection method according to claim 5, step I carries out as follows:
I1. use the key K identical with telescopiny 1, select L low order in the square image blocks interior connecing
The Tchebichef square: T &prime; = ( T p 1 q 1 &prime; , . . . , T p L p l &prime; ) ;
I2. utilize identical key K 2Produce quantization vector (d 1(0) ..., d LAnd (d (0)) 1(1) ..., d L(1));
I3. utilize the jitter quantisation modulation system identical, to each low order Tchebichef square with watermark embed process
Figure A2009100217440004C3
Range value make amendment:
| T p i q i &prime; | j = [ | T p i q i &prime; | - d i ( j ) &Delta; ] &Delta; + d i ( j ) ,
Wherein, Δ is a quantization step, and [] is rounding operation, i=1 ..., L, j=0,1;
I4. by comparing
Figure A2009100217440004C5
With its two groups quantification formulas
Figure A2009100217440004C6
With
Figure A2009100217440004C7
Between distance, extract L position watermark information:
b i &prime; = arg min j &Element; { 0,1 } ( | T p i q i &prime; | j - | T p i q i &prime; | ) 2 , i = 1,2 , . . . , L ,
Wherein, will
Figure A2009100217440004C9
And two groups of distances that quantize formula are defined as respectively dist 0 = ( | T p i q i &prime; | 0 - | T p i q i &prime; | ) 2 With dist 1 = ( | T p i q i &prime; | 1 - | T p i q i &prime; | ) 2 , And calculate t=dist0-dist1, if t<0, then b ' i=0, otherwise b ' i=1.
CN2009100217440A 2009-03-30 2009-03-30 Robust image watermark method based on local Tchebichef moment Expired - Fee Related CN101556686B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100217440A CN101556686B (en) 2009-03-30 2009-03-30 Robust image watermark method based on local Tchebichef moment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100217440A CN101556686B (en) 2009-03-30 2009-03-30 Robust image watermark method based on local Tchebichef moment

Publications (2)

Publication Number Publication Date
CN101556686A true CN101556686A (en) 2009-10-14
CN101556686B CN101556686B (en) 2011-06-01

Family

ID=41174791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100217440A Expired - Fee Related CN101556686B (en) 2009-03-30 2009-03-30 Robust image watermark method based on local Tchebichef moment

Country Status (1)

Country Link
CN (1) CN101556686B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497602A (en) * 2011-12-16 2012-06-13 海南杰福瑞网络科技有限公司 Digital watermarking processing method and device
CN102892048A (en) * 2012-09-18 2013-01-23 天津大学 Video watermark anti-counterfeiting method capable of resisting geometric attacks
CN102930497A (en) * 2012-10-19 2013-02-13 西安电子科技大学 Halftone watermarking method based on pixel block odd-even check and pixel block error dispersion
CN103974144A (en) * 2014-05-23 2014-08-06 华中师范大学 Video digital watermarking method based on characteristic scale variation invariant points and microscene detection
CN104103031A (en) * 2014-08-03 2014-10-15 兰州交通大学 Normalization-based vector spatial data blind watermark method
CN104156909A (en) * 2014-09-05 2014-11-19 西安电子科技大学 Robust reversible watermark embedding and detecting method on basis of image content
CN106097238A (en) * 2016-06-08 2016-11-09 武汉圆周率软件科技有限公司 The copy-right protection method of image data and system
CN103886541B (en) * 2014-03-14 2017-04-05 南京信息工程大学 Image watermark method based on Tchebichef square affine invarients
CN103927709B (en) * 2014-03-19 2017-06-06 西安电子科技大学昆山创新研究院 A kind of robust reversible watermark insertion of feature based region geometry optimization and extracting method
CN108090864A (en) * 2017-12-18 2018-05-29 辽宁师范大学 Quaternion wavelet area image method of detecting watermarks based on super-pixel

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497602A (en) * 2011-12-16 2012-06-13 海南杰福瑞网络科技有限公司 Digital watermarking processing method and device
CN102892048A (en) * 2012-09-18 2013-01-23 天津大学 Video watermark anti-counterfeiting method capable of resisting geometric attacks
CN102892048B (en) * 2012-09-18 2015-05-06 天津大学 Video watermark anti-counterfeiting method capable of resisting geometric attacks
CN102930497A (en) * 2012-10-19 2013-02-13 西安电子科技大学 Halftone watermarking method based on pixel block odd-even check and pixel block error dispersion
CN102930497B (en) * 2012-10-19 2015-05-20 西安电子科技大学 Halftone watermarking method based on pixel block odd-even check and pixel block error dispersion
CN103886541B (en) * 2014-03-14 2017-04-05 南京信息工程大学 Image watermark method based on Tchebichef square affine invarients
CN103927709B (en) * 2014-03-19 2017-06-06 西安电子科技大学昆山创新研究院 A kind of robust reversible watermark insertion of feature based region geometry optimization and extracting method
CN103974144A (en) * 2014-05-23 2014-08-06 华中师范大学 Video digital watermarking method based on characteristic scale variation invariant points and microscene detection
CN103974144B (en) * 2014-05-23 2017-07-18 华中师范大学 A kind of video digital watermark method of feature based change of scale invariant point and micro- scene detection
CN104103031A (en) * 2014-08-03 2014-10-15 兰州交通大学 Normalization-based vector spatial data blind watermark method
CN104103031B (en) * 2014-08-03 2017-07-25 兰州交通大学 Based on normalized Vector spatial data blind watermark method
CN104156909B (en) * 2014-09-05 2017-06-13 西安电子科技大学 The robust reversible watermark insertion of image content-based and detection method
CN104156909A (en) * 2014-09-05 2014-11-19 西安电子科技大学 Robust reversible watermark embedding and detecting method on basis of image content
CN106097238A (en) * 2016-06-08 2016-11-09 武汉圆周率软件科技有限公司 The copy-right protection method of image data and system
CN106097238B (en) * 2016-06-08 2019-04-05 武汉圆周率软件科技有限公司 The copy-right protection method and system of image data
CN108090864A (en) * 2017-12-18 2018-05-29 辽宁师范大学 Quaternion wavelet area image method of detecting watermarks based on super-pixel
CN108090864B (en) * 2017-12-18 2021-06-11 辽宁师范大学 Quaternion wavelet domain image watermark detection method based on super pixels

Also Published As

Publication number Publication date
CN101556686B (en) 2011-06-01

Similar Documents

Publication Publication Date Title
CN101556686B (en) Robust image watermark method based on local Tchebichef moment
Roy et al. Robust hash for detecting and localizing image tampering
CN102903075B (en) Robust watermarking method based on image feature point global correction
Zheng et al. A survey of RST invariant image watermarking algorithms
Wang et al. A robust blind color image watermarking in quaternion Fourier transform domain
CN103238159A (en) System and method for image authentication
Yuan et al. Local multi-watermarking method based on robust and adaptive feature extraction
US9147223B2 (en) Method and device for localized blind watermark generation and detection
CN104599225A (en) Image watermarking embedding and extracting method based on singular value decomposition and principal component analysis
CN104616244A (en) Image watermark embedding and extracting method based on back propagation (BP) neural network compressed domain
CN102892048B (en) Video watermark anti-counterfeiting method capable of resisting geometric attacks
CN106780281B (en) Digital image watermarking method based on Cauchy&#39;s statistical modeling
Zhang et al. An image watermarking method based on visual saliency and contourlet transform
CN104217388A (en) Method and device of embedding and extracting image watermark based on FSSVM (Fuzzy Smooth Support Vector Machine)
CN104217387A (en) Image watermark embedding and extracting method and device based on quantization embedding
CN104217389A (en) Image watermark embedding and extracting method and device based on improved Arnold transform
CN101887574B (en) Robust fingerprint embedding and extracting method capable of resisting geometric attacks
CN102521821A (en) Automatic identification and tampered area positioning method in digital image
Ji et al. Desynchronization attacks resilient image watermarking scheme based on global restoration and local embedding
Ouyang et al. A semi-fragile watermarking tamper localization method based on QDFT and multi-view fusion
CN102024244B (en) Method and device for embedding and detecting watermarks based on image characteristic region
Su Color image watermarking: algorithms and technologies
Dutta et al. An efficient and secure digital image watermarking using features from iris image
Keskinarkaus et al. Image watermarking with a directed periodic pattern to embed multibit messages resilient to print-scan and compound attacks
Tao et al. Robust digital image watermarking in curvelet domain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110601

Termination date: 20150330

EXPY Termination of patent right or utility model