CN102208097B - Network image copyright real-time distinguishing method - Google Patents
Network image copyright real-time distinguishing method Download PDFInfo
- Publication number
- CN102208097B CN102208097B CN2011101410724A CN201110141072A CN102208097B CN 102208097 B CN102208097 B CN 102208097B CN 2011101410724 A CN2011101410724 A CN 2011101410724A CN 201110141072 A CN201110141072 A CN 201110141072A CN 102208097 B CN102208097 B CN 102208097B
- Authority
- CN
- China
- Prior art keywords
- sub
- block
- watermark
- feature
- coefficient
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The invention provides a network image copyright real-time distinguishing method. Copyright protection is necessary for digital images during network communication, but the existing robust digital watermarking technology can not achieve the real-time copyright distinguishing. The method comprises the following steps: partitioning an original image to sub-blocks which are not overlapped with each other at an embedded end; processing each sub-block by discrete cosine transformation; generating a feature watermark by comparing the DC coefficient of each sub-block with the average DC coefficient of all sub-blocks; encrypting the Logistic chaotic sequence of the feature watermark; adjusting the magnitudes of two low-frequency coefficients of the discrete cosine transformation of each sub-block and self-embedding the encrypted feature watermark; and processing each sub-block by inverse discrete cosine transformation to obtain images with watermarks. The method has high robustness to attack. Substantially, the method provided by the invention can achieve complete blind detection by combining the self-embedding encrypted feature watermark with watermark blind extraction and authentication, thereby achieving real-time copyright distinguishing of network images.
Description
Technical field
The present invention relates to information security field.The present invention designs a kind of network image copyright real-time distinguishing method, and the copyright of the digital picture of transmission over networks is differentiated in real time.
Background technology
Digital picture is propagated in network and is easily caused dispute over copyright, need to carry out copyright protection.The robust digital watermark technology can be used for the digital picture of transmission over networks is carried out copyright protection.
Classify according to the content of watermark, watermark can be divided into meaningful watermark and meaningless watermark.The content that meaningful watermark refers generally to watermark has concrete implication, such as bianry image, gray level image, trade mark, author's personal information etc.; The general corresponding pseudo-random sequence that there is no concrete meaning of meaningless watermark.In addition, hot spring etc.
[1]Also propose " zero watermark ", zero watermark represents in fact certain feature of initial carrier.Therefore, zero watermark can be regarded as a kind of meaningful watermark of special shape.
Whether needs are by initial carrier according to the test side, and digital watermark technology can be divided into blind digital watermark technology and non-blind digital watermark technology.Often need to be by the information relevant to initial carrier when non-blind digital watermark technology detects watermark in the test side, blind digital watermark technology need to be by any information relevant to initial carrier in the test side.In some application scenarios, be subject to the restrictions such as transmission, storage, security, the test side often can't obtain the information relevant to initial carrier, and therefore blind digital watermark technology has more practicality than non-blind digital watermark technology.
The robust digital watermark algorithm judges copyright by the degree of correlation between the watermark of calculating original watermark and extraction usually in the test side.According to the test side whether needs by to initial carrier, information that original watermark is relevant, the detection behavior of present robust digital watermark algorithm can be divided into 4 classes: (1) the 1st class: the test side both need to be by the relevant information of initial carrier, again need to be by the relevant information of original watermark.(2) the 2nd classes: the test side need to be by the relevant information of initial carrier, but does not need the relevant information of original watermark.(3) the 3rd classes: the test side need to be by the relevant information of initial carrier, but need to be by the relevant information of original watermark.(4) the 4th classes: the test side neither need to be by the relevant information of initial carrier, also need to be by the relevant information of original watermark.Traditional non-blind robust watermarking algorithm has the 1st class or the 2nd class detects behavior, and practicality is poor.Blind meaningless robust watermarking algorithm with the 3rd class detection behavior
[2]The relevant information by any initial carrier does not extract watermark from attacking carrier in the test side, but will produce original pseudorandom watermark sequence by key, then calculates both degree of correlation judgement copyrights.Blind meaningful robust watermarking algorithm with the 3rd class detection behavior
[3-10]Do not extract watermark by the relevant information of any initial carrier from attacking carrier in the test side, the degree of correlation of then calculating between the watermark of the original watermark that transmits from built-in end and extraction judges copyright.Zero watermarking algorithm
[1,11]Also to have the 3rd class to detect behavior.This be because: in the test side, zero watermarking algorithm need to take out being stored in notarize original zero watermark at center of third party, then calculate with the zero watermark of extracting between the degree of correlation judge copyright.Robust watermarking algorithm with the 4th class detection behavior does not almost occur, and the present invention claims that this class robust algorithm is complete blind detection robust watermarking algorithm.
Present blind robust watermarking algorithm has the 3rd class and detects behavior, still can't reach copyright and differentiate in real time, and its practical sexual needs further improve.This be because: need to be by the relevant information of any initial carrier in the test side although have blind robust watermarking algorithm that the 3rd class detects behavior, but need to weigh the degree of correlation between the watermark of original watermark and extraction to judge copyright by the partial information of original watermark or original watermark.So, built-in end transmission original watermark or its partial information to the test side (or third party notarize center) store and just need certain transmission cost and carrying cost, and the process of transmission is very difficult prevents ubiquitous passive attack on the internet fully.For example, the original watermark that assailant's success " eavesdropping " is transmitted or the partial information of original watermark, obtain embedded watermark and further forge watermark passing to the test side by analysis, can make real original watermark can't be used for differentiating copyright, reach the purpose of disturbing copyright to differentiate, thereby make watermarking algorithm can't resist interpretation Attack
[12]
The self-embedding Fragile Watermarking Technique
[13-17]Distinguishing feature be that feature that built-in end extracts initial carrier produces watermark and self-embedding authenticates to reach content integrity to initial carrier.At present, " self-embedding " thought only is applied to the Fragile Watermarking Technique field basically.
Comprehensive above the analysis, the present invention attempts " self-embedding " thought with the self-embedding Fragile Watermark Algorithm and is incorporated into the robust digital watermark field, design has the complete blind detection robust watermarking algorithm that the 4th class detects behavior, thereby a kind of network image copyright real-time distinguishing method is provided, reaches the copyright of the digital picture of transmission over networks is differentiated in real time.
List of references
[1] hot spring, grandson's lance cutting edge of a knife or a sword, Wang Shuxun. concept and the application [J] of zero watermark. electronic letters, vol, 2003,31 (2): 214-216.
[2]Wang Xiang-yang,Hou Li-min,and Wu Jun.A feature-based robust digital image watermarking against geometric attacks[J].Image and Vision Computing,2008,26:980-989.
[3] Niu Shaozhang, button heart Xin, Yang Yixian, Hu Wenqing. Data Hiding Algorithm for Halftone Images [J]. electronic letters, vol, 2004,32 (7): 1180-1183.
[4]Wang Xiang-yang and Cui Chang-ying.A novel image watermarking scheme against desynchronization attacks by SVR revision[J].Journal of Visual Communication and Image Representation,2008,19(5):334-342.
[5] Li Xudong, Zhang Zhen jumps. the digital watermarking algorithm [J] of the double-deck division of image and svd. and journal of Zhejiang university (engineering version), 2006,40 (12): 2088-2092.
[6] Yuan Dayang, Xiao Jun, Wang Ying. digital figure watermark algorithm anti-geometry attack robust Journal of Sex Research [J]. electronics and information journal, 2008,30 (5): 1251-1256.
[7] Li Xudong. the spatial domain Arithmetic on Digital Watermarking of Image [J] of resist geometric attacks. robotization journal, 2008,34 (7): 832-837.
[8] Xu Wenli, Li Lei, Wang Yumin. the Robust Digital Watermarking Scheme [J] of antinoise, geometric distortion and JPEG compression attack. electronics and information journal, 2008,30 (4): 933-936.
[9] Li Leida, Guo Baolong, table Jin Feng. based on the spatial domain resist geometric attacks watermarking algorithm [J] of odd-even quantization. electronics and information journal, 2009,31 (1): 134-138.
[10]Leida Li,Jiansheng Qian,Jeng-Shyang Pan.Characteristic region based watermark embedding with RST invariance and high capacity.International Journal of Electronics and communications,2011,65:435-442.
[11] Ye Tianyu. the anti-secondary print and scan of discrete cosine transform domain Robust Zero watermarking algorithm [J]. photon journal, 2011,40 (1): 142-148.
[12] Li Qingcheng, Dou Yi. the interpretation Attack of digital watermarking and Relating Characteristic [J]. computer utility, 2005 (5): 115-117.
[13] Zhang Hongbin, poplar becomes. the self-embedding of image and the detection of altering and recovery algorithms [J]. and electronic letters, vol, 2004,32 (2): 196-199.
[14] and red outstanding person, Zhang Jiashu. based on the piecemeal Self-Embedding Watermarking Scheme [J] of Chaotic Scrambling. communication journal, 2006,27 (7): 80-86,93.
[15] Zhang Xianhai, Yang Yongtian. based on the image authentication algorithm research [J] of fragile watermark. electronic letters, vol, 2007,35 (1): 34-39.
[16] Wang Guodong, Liu Fenlin, Liu Yuan, Yao Gang. a kind of Fragile Watermark Algorithm [J] that can distinguish watermark or content tampering. electronic letters, vol, 2008,36 (7): 1349-1354.
[17] and red outstanding person, Zhang Jiashu. watermark information is distorted the Self-Embedding Watermarking Scheme [J] of robust. Journal of Software, 2009,20 (2): 437-450.
Summary of the invention
The objective of the invention is to design a kind of network image copyright real-time distinguishing method, the copyright of the digital picture of transmission over networks is differentiated in real time.
A kind of network image copyright real-time distinguishing method comprises following five processes:
A, feature watermark produce;
B, feature watermark are encrypted;
The feature watermark self-embedding of C, encryption;
D, feature watermark extract;
E, the blind extraction of authenticating water-mark and deciphering.
Steps A further comprises following content:
A1: the original image that is M * M with size is divided into the big or small not overlapping sub-block of m * m that is;
A2: each sub-block is carried out discrete cosine transform (Discrete Cosine Transformation, DCT), B
i(0,0) represents direct current (Direct Current, the DC) coefficient of i sub-block, B
Average(0,0) represents the average of all sub-block DC coefficients,
A3: feature watermark W is by each sub-block DC coefficient B of contrast
i(0,0) and all sub-block DC Coefficient Mean B
AverageThe magnitude relationship of (0,0) produces.That is:
if B
i(0,0)>B
average(0,0)
w
i=1;
else
w
i=0
end
Step B further comprises following content:
B1: select a real number as initial value x in (1,1)
0, select a real number as γ in [0,2], then shine upon by Logistic
Carry out iteration and produce chaos random number sequence { x
1, x
2, x
3....With initial value x
0With the first two key of parameter γ as the Logistic mapping.
B2: cast out front κ random number of chaos sequence, because initial random number is unstable.With κ+1 to
Individual random number
By
Two-value turn to GF (2) territory { 0,1} sequence L, sgn () they are sign function, l
iBe the ibit of L,
Logistic mapping average is 0, so select 0 to carry out binaryzation as threshold value.With three key of parameter κ as the Logistic mapping.
B3: utilize sequence L that feature watermark W is encrypted.Encryption method is:
Wherein
Be XOR,
Be the feature watermark W that encrypts
eIbit,
Step C further comprises following content:
C1: original image is divided into size and is the not overlapping sub-block of m * m;
C2: each sub-block is carried out DCT;
C3: the feature watermark that self-embedding is encrypted is in the DCT medium and low frequency coefficient of each sub-block of original image:
if
if B
i(r
1,s
1)<B
i(r
2,s
2)
else
if B
i(r
1,s
1)≥B
i(r
2,s
2)
end
η
i=μ×B
i(0,0);
if B
i(r
1,s
1)>B
i(r
2,s
2)
if (B
i(r
1,s
1)-B
i(r
2,s
2))<η
i
else
Wherein, symbol
The size of expression exchange left and right two numbers; μ is
The scale factor that self-adaptation embeds, according to practical application to the requirement of invisibility and the robustness selection of compromising; B
i(r
j, s
j) represent that i sub-block DCT matrix is at (r
j, s
j) coefficient located, j=1,2, require to satisfy r
1=r
2And s
1=s
2Can not set up simultaneously, and r
1=0 and s
1=0 can not set up simultaneously, r
2=0 and s
2=0 can not set up simultaneously.
C4: each sub-block is carried out inverse discrete cosine transform (Inverse Discrete Cosine Transformation, IDCT), obtains containing watermarking images after restructuring.
Step D further comprises following content:
D1: attack graph looks like to be divided into size and is the not overlapping sub-block of m * m;
D2: each sub-block is carried out DCT,
Represent the DC coefficient of i sub-block,
Represent the average of all sub-block DC coefficients,
D3: feature watermark W
aBy contrasting each sub-block DC coefficient
With all sub-block DC Coefficient Means
Magnitude relationship extract.That is:
Wherein,
Represent W
aIb it.
Step e further comprises following content:
E1: attack graph looks like to be divided into size and is the not overlapping sub-block of m * m;
E2: each sub-block is carried out DCT;
E3: extract authenticating water-mark W from each sub-block DCT matrix by the following method
a':
if B
i(r
1,s
1)>B
i(r
2,s
2)
else
end
E4: utilize x
0Produce Logistic Map Chaotic { x with two keys of γ
1, x
2, x
3..., give up a front κ random number, with κ+1 to
Individual random number
By
Two-value turns to { 0, the 1} sequence L in GF (2) territory.
E5: by
To the authenticating water-mark W that extracts
a' be decrypted, wherein
Authenticating water-mark W after the representative deciphering
a" ibit.
E6: calculate the feature watermark W that extracts after attacking
aWith the authenticating water-mark W after deciphering
a" between the normalization degree of correlation (Normalized Correlation, NC) estimate anti-attack robust with the judgement copyright.The NC value is defined as:
The present invention provides a real-time novel identification method of copyright for the digital picture of transmission over networks.At first the present invention is divided into original image the sub-block of non-overlapping copies at built-in end, each sub-block is carried out DCT, magnitude relationship generation feature watermark between DC coefficient by each sub-block relatively and the average of all sub-block DC coefficients, feature watermark is carried out the Logistic encrypted chaotic array, then adjust the feature watermark that the big or small self-embedding of two DCT medium and low frequency coefficients of each sub-block is encrypted, each sub-block is carried out IDCT and is obtained containing watermarking images at last.In the test side, extract feature watermark and authenticating water-mark from the attack graph picture respectively.Process and built-in end feature watermark production process that feature watermark extracts are similar, and the blind leaching process of authenticating water-mark is the inverse process of the feature watermark self-embedding process of built-in end encryption.Experimental result shows: the feature watermark self-embedding algorithm that feature watermark produces algorithm and encryption all has very strong robustness to various attack.Therefore, algorithm of the present invention has the robustness of very strong opposing various attack.The present invention realizes complete blind Detecting in conjunction with feature watermark and blind extraction authenticating water-mark that self-embedding is encrypted in fact, realizes the copyright of network image is differentiated in real time.
Description of drawings
Fig. 1 is the algorithm flow chart that feature watermark produces.
Fig. 2 is the algorithm flow chart that feature watermark is encrypted.
Fig. 3 is the algorithm flow chart of the feature watermark self-embedding of encryption.
Fig. 4 is the algorithm flow chart that feature watermark extracts.
Fig. 5 is the algorithm flow chart of the blind extraction of authenticating water-mark and deciphering.
Fig. 6 is original Lena image, and Fig. 7 is original Barbara image, and Fig. 8 is original Elain image, and Fig. 9 contains watermark Lena image, and Figure 10 contains watermark Barbara image, and Figure 11 contains watermark Elain image.
Embodiment
Below in conjunction with drawings and Examples, technical scheme of the present invention is described further.
1 feature watermark produces
Fig. 1 is the algorithm flow chart that feature watermark produces, and comprises following process
[11]:
A1: the original image that is M * M with size is divided into the big or small not overlapping sub-block of m * m that is;
A2: each sub-block is carried out DCT, B
i(0,0) represents the DC coefficient of i sub-block, B
Average(0,0) represents the average of all sub-block DC coefficients,
A3: feature watermark W is by each sub-block DC coefficient B of contrast
i(0,0) and all sub-block DC Coefficient Mean B
AverageThe magnitude relationship of (0,0) produces.That is:
if B
i(0,0)>B
average(0,0)
w
i=1;
else
w
i=0
end (1)
Can be known by above process, W produces by the DC coefficient characteristics of extracting original image, and this process is not made any modification to original image in fact.Therefore, the present invention calls feature watermark to W.
2 feature watermarks are encrypted
In nonlinear dynamic system, chaos phenomenon is deterministic, similar random process, does not restrain and does not have periodically, and is very responsive to initial value.The Logistic chaotic maps is the nonlinear dynamic system of a widespread use, is defined as:
x
n+1Span be (1,1), n=0,1,2,3 ...If γ is in [0,2] interior value, this mapping is in chaos state.The present invention utilizes the initial value susceptibility of Logistic mapping that the feature watermark that produces is encrypted.The process of Logistic mapping encrypting feature watermark is seen Fig. 2, comprises following process:
B1: select a real number as initial value x in (1,1)
0, select a real number as γ in [0,2], then carry out iteration by (2) formula and produce chaos random number sequence { x
1, x
2, x
3....With initial value x
0With the first two key of parameter γ as the Logistic mapping.
B2: cast out front κ random number of chaos sequence, because initial random number is unstable.With κ+1 to
Individual random number
Through type (3) two-value turn to GF (2) territory 0,1} sequence L, namely
Wherein sgn () is sign function, l
iBe the ibit of L,
Logistic mapping average is 0, so select 0 to carry out binaryzation as threshold value.With three key of parameter κ as the Logistic mapping.
B3: utilize that binaryzation obtains { 0,1} sequence L is encrypted feature watermark W.Encryption method is:
The 3 feature watermark self-embeddings of encrypting
Fig. 3 is the algorithm flow chart of the feature watermark self-embedding of encryption, comprises following process:
C1: original image is divided into size and is the not overlapping sub-block of m * m;
C2: each sub-block is carried out DCT;
C3: the feature watermark that self-embedding is encrypted is in the DCT medium and low frequency coefficient of each sub-block of original image:
if
if B
i(r
1,s
1)<B
i(r
2,s
2)
else
Wherein, symbol
The size of expression exchange left and right two numbers; μ is
The scale factor that self-adaptation embeds, according to practical application to the requirement of invisibility and the robustness selection of compromising; B
i(r
j, s
j) represent that i sub-block DCT matrix is at (r
j, s
j) coefficient located, j=1,2, require to satisfy r
1=r
2And s
1=s
2Can not set up simultaneously, and r
1=0 and s
1=0 can not set up simultaneously, r
2=0 and s
2=0 can not set up simultaneously.
C4: each sub-block is carried out IDCT, obtains containing watermarking images after restructuring.
The feature watermark that the present invention selects DCT medium and low frequency coefficient to adjust self-embedding to encrypt in (5) formula.This is often not have very strong robustness to attacking because revise the DCT high frequency coefficient.
4 feature watermarks extract
Test side feature watermark leaching process and built-in end feature watermark production process are similar.Fig. 4 is the algorithm flow chart that feature watermark extracts, and comprises following process
[11]:
D1: attack graph looks like to be divided into size and is the not overlapping sub-block of m * m;
D2: each sub-block is carried out DCT,
Represent the DC coefficient of i sub-block,
Represent the average of all sub-block DC coefficients,
D3: feature watermark W
aBy contrasting each sub-block DC coefficient
With all sub-block DC Coefficient Means
Magnitude relationship extract.That is:
if
else
end (6)
Wherein,
Represent W
aIbit.
The 5 blind extraction of authenticating water-mark and deciphering
The leaching process of test side authenticating water-mark is the inverse process of the feature watermark self-embedding process of built-in end encryption.Fig. 5 is the algorithm flow chart of the blind extraction of authenticating water-mark and deciphering, comprises following process:
E1: attack graph looks like to be divided into size and is the not overlapping sub-block of m * m;
E2: each sub-block is carried out DCT;
E3: extract authenticating water-mark W from each sub-block DCT matrix by the following method
a':
if B
i(r
1,s
1)>B
i(r
2,s
2)
else
end (7)
E4: utilize x
0Produce Logistic Map Chaotic { x with two keys of γ
1, x
2, x
3..., give up a front κ random number, with κ+1 to
Individual random number
Through type (3) two-value turns to { 0, the 1} sequence L in GF (2) territory.
E5: the authenticating water-mark W of decryption method to extracting that through type (4) is corresponding
a' be decrypted, namely
Wherein,
Authenticating water-mark W after the representative deciphering
a" ibit.
E6: calculate the feature watermark W that extracts after attacking
aWith the authenticating water-mark W after deciphering
a" between NC estimate anti-attack robust with the judgement copyright.The NC value is defined as:
Reach blind extraction when obviously, authenticating water-mark is extracted in the test side.The present invention is W
a' the reason that is called authenticating water-mark is that the test side is to W
a' be decrypted rear for carrying out copyright authentication.By the 4th part and the 5th part as can be known, the test side only need to utilize the attack graph picture just can extract feature watermark respectively and authenticating water-mark calculates NC, need to be by the relevant information of any original image and original watermark.Therefore, the present invention can realize complete blind Detecting, realizes the copyright of network image is differentiated in real time.
Embodiment:
1 experiment parameter explanation
Selecting 256 grades of sizes is that 512 * 512 Lena, Barbara and Elain three width gray level images are as experimental image, respectively as shown in Fig. 6,7 and 8.The size of sub-block is all 16 * 16, so the length of feature watermark W is 1024bit.Logistic chaotic maps initial value x
0Value is 0.28, casts out front κ=200 random number when parameter γ value is 1.5, Logistic encrypted chaotic array feature watermark W.The feature watermark W that encrypts
eThe original Lena of self-adaptation self-embedding, Barbara and each sub-block of Elain image are in the DCT coefficient of (3,5) and (4,4) position.
The scale factor μ value that self-adaptation embeds is 0.028.Obtain contain watermark Lena, Barbara and the Elain image is seen respectively Fig. 9,10 and 11, and the PSNR between original Lena, Barbara and Elain image is 35.9595,36.1211 and 35.7637.Therefore, three width test patterns all had good invisibility.
2 anti-attack robust experiments
Weigh the robustness of opposing various attack with the NC value.Middle random erasure capable finger, begin to move up line by line from the following the first row of deleted row, and vacant row completion is black.Downward bias is divided a word with a hyphen at the end of a line and is referred to that whole image moves down several row, above a few row completions black, last several row shift out loss.Offset column refers to that whole image moves to right to the right, and several row completions in front are black, and last several row shift out loss.Resample and adopt the nearest method of interpolation.In each table, "/" below contains PSNR between watermarking images and original image for three width after attacking, and "/" top is two NC values between watermark sequence.
(1) the feature watermark W that extracts
aWith the authenticating water-mark W after deciphering
a" between the NC value
Do not exist when attacking, contain the feature watermark W that watermark Lena, Barbara and Elain image extract separately
aWith the authenticating water-mark W after deciphering
a" between the NC value be all 1.0000.Three width after attack contain the feature watermark W that watermarking images extracts separately
aWith the authenticating water-mark W after deciphering
a" between the NC value see Table 1.As can be seen from Table 1, algorithm of the present invention all shows very strong robustness to various attack.
(2) the feature watermark W that extracts
aAnd the NC value between primitive character watermark W
Do not exist when attacking, contain the feature watermark W that watermark Lena, Barbara and Elain image extract separately
aAnd the NC value between primitive character watermark W is all 1.0000.Three width after attack contain the feature watermark W that watermarking images extracts separately
aAnd the NC value between primitive character watermark W sees Table 2.Therefore, feature watermark generation algorithm of the present invention all has very strong robustness to various attack.In addition, the data of contrast table 1 and table 2 can find, the anti-attack robust that feature watermark produces algorithm slightly is better than algorithm of the present invention.
(3) the authenticating water-mark W after the deciphering
a" and the NC value between primitive character watermark W
Do not exist when attacking, contain the authenticating water-mark W after watermark Lena, Barbara and Elain image are deciphered separately
a" and the NC value between primitive character watermark W is all 1.0000.The authenticating water-mark W that three width after attack contain watermarking images after deciphering separately
a" and the NC value between primitive character watermark W sees Table 3.Therefore, the feature watermark self-embedding algorithm of encryption of the present invention all has very strong robustness to various attack.In addition, the data of contrast table 1 and table 3 can find, the anti-attack robust of the feature watermark self-embedding algorithm of encryption slightly is better than algorithm of the present invention.
Three width after table 1 is attacked contain the feature watermark W that watermarking images extracts separately
aWith the authenticating water-mark W after deciphering
a" between the NC value
3 analyze and discuss
Algorithm of the present invention can be realized complete blind Detecting, its reason is to reach simultaneously following 2 points: (1) produces feature watermark from original image by feature extraction, original image is arrived in self-embedding after encrypting, rather than extra watermark form is embedded into original image; (2) the feature watermark self-embedding algorithm of encrypting itself just can reach blind extraction authenticating water-mark in the test side.
Three width after table 2 is attacked contain the feature watermark W that watermarking images extracts separately
aAnd the NC value between primitive character watermark W
The authenticating water-mark W that three width after table 3 is attacked contain watermarking images after deciphering separately
a" and the NC value between primitive character watermark W
Algorithm of the present invention has strong robustness to various attack, and its reason is to reach simultaneously following 2 points: (1) feature watermark produces algorithm itself and just has very strong anti-attack robust, can come as seen from Table 2.(2) the feature watermark self-embedding algorithm itself of encrypting just has very strong anti-attack robust, can come as seen from Table 3.In addition, the anti-attack robust of algorithm of the present invention slightly is worse than the reason that feature watermark produces the feature watermark self-embedding algorithm of algorithm and encryption and is that the feature watermark self-embedding meeting of encrypting has certain impact to the DC coefficient that produces feature watermark.
4 sum up
Present blind robust watermarking algorithm still need to be by the partial information of original image or original watermark in the test side, thereby can't really realize complete blind Detecting, thereby can't reach, the copyright of the digital picture of transmission over networks is differentiated in real time.For this problem, the present invention is incorporated into the robust watermarking field with " self-embedding " thought of Fragile Watermark Algorithm, proposes the complete blind detection robust watermarking algorithm of a kind of self-embedding, realizes the copyright of the digital picture of transmission over networks is differentiated in real time.Algorithm of the present invention possesses following 4 characteristics simultaneously:
(1) " self-embedding " characteristic: produce feature watermark by feature extracting method from original image, then the feature watermark self-embedding of encrypting is contained watermarking images to the original image generation.
(2) " complete blind extraction " characteristic: neither need to be by any information relevant to initial carrier during detection, again need to be by any information relevant to original watermark.In the test side, at first extract feature watermark from attacking the imagery exploitation feature extracting method identical with built-in end; Then blindly extract authenticating water-mark from the inverse process of attacking the feature watermark self-embedding algorithm that the imagery exploitation built-in end encrypts; Calculate at last the feature watermark of extraction and the NC between authenticating water-mark and judge copyright.Therefore, the test side only need to utilize the attack graph picture.
(3) robustness: the feature watermark self-embedding algorithm that feature watermark produces algorithm and encryption all has very strong robustness to various attack, and further, algorithm of the present invention has the robustness of very strong opposing various attack.
(4) security: first will carry out the Logistic encrypted chaotic array before feature watermark self-embedding original image, not know that the assailant of encryption key can't accurately decrypt feature watermark.
The complete blind detection robust digital watermark of self-embedding that the present invention proposes has very important Research Significance.This is embodied in:
(1) save transmission cost and carrying cost.Any information that built-in end need not to transmit initial carrier and original watermark to the test side (or third party notarize center) store, thereby save transmission cost and carrying cost.
(2) blocking-up interpretation Attack.Any information that built-in end need not to transmit original watermark can effectively be blocked interpretation Attack to the test side (or third party notarize center).
Therefore, the complete blind detection robust watermarking algorithm of self-embedding that the present invention proposes provides a kind of network image copyright real-time distinguishing method, and realization is differentiated in real time to the copyright of the digital picture of transmission over networks.
Claims (1)
1. network image copyright real-time distinguishing method, " self-embedding " thought of self-embedding Fragile Watermark Algorithm is incorporated into the robust digital watermark field, the test side neither need to be by the relevant information of initial carrier, need to be by the relevant information of original watermark yet, only need image to be detected, realize complete blind Detecting, the copyright of the digital picture of transmission over networks differentiated in real time, comprise following five processes:
A, feature watermark produce: the original image that (1) is M * M with size is divided into size and is the not overlapping sub-block of m * m; (2) each sub-block is carried out discrete cosine transform (Discrete Cosine Transformation, DCT), B
i(0,0) represents direct current (Direct Current, the DC) coefficient of i sub-block, B
Average(0,0) represents the average of all sub-block DC coefficients,
(3) feature watermark W is by each sub-block DC coefficient B of contrast
i(0,0) and all sub-block DC Coefficient Mean B
AverageThe magnitude relationship of (0,0) produces, that is:
if B
i(0,0)>B
average(0,0)
w
i=1;
else
w
i=0
end
Wherein, w
iRepresent the i bit of W;
B, feature watermark are encrypted: (1) selects a real number as initial value x in (1,1)
0, select a real number as γ in [0,2], then shine upon by Logistic
Carry out iteration and produce chaos random number sequence { x
1, x
2, x
3..., with initial value x
0With the first two key of parameter γ as the Logistic mapping; (2) cast out front κ random number of chaos sequence, because initial random number is unstable; With κ+1 to
Individual random number
By
Two-value turn to GF (2) territory { 0,1} sequence L, sgn () they are sign function, l
iBe the ibit of L,
Logistic mapping average is 0, so select 0 to carry out binaryzation as threshold value; With three key of parameter κ as the Logistic mapping; (3) utilize sequence L that feature watermark W is encrypted, encryption method is:
Wherein
Be XOR,
Be the ibit of the feature watermark We that encrypts,
The feature watermark self-embedding of C, encryption: (1) original image is divided into size and is the not overlapping sub-block of m * m; (2) each sub-block is carried out DCT; (3) feature watermark of self-embedding encryption is in the DCT medium and low frequency coefficient of each sub-block of original image:
if B
i(r
1,s
1)<B
i(r
2,s
2)
else
if B
i(r
1,s
1)≥B
i(r
2,s
2)
end
η
i=μ×B
i(0,0);
if B
i(r
1,s
1)>B
i(r
2,s
2)
if (B
i(r
1,s
1)-B
i(r
2,s
2))<η
i
else
if (B
i(r
2,s
2)-B
i(r
1,s
1))<η
i
end
Wherein, symbol
The size of expression exchange left and right two numbers; μ is
The scale factor that self-adaptation embeds, according to practical application to the requirement of invisibility and the robustness selection of compromising; B
i(r
j, s
j) represent that i sub-block DCT matrix is at (r
j, s
j) coefficient located, j=1,2, require to satisfy r
1=r
2And s
1=s
2Can not set up simultaneously, and r
1=0 and s
1=0 can not set up simultaneously, r
2=0 and s
2=0 can not set up simultaneously; (4) each sub-block is carried out inverse discrete cosine transform (Inverse Discrete Cosine Transformation, IDCT), obtains containing watermarking images after restructuring;
D, feature watermark extract: (1) attack graph looks like to be divided into size and is the not overlapping sub-block of m * m; (2) each sub-block is carried out DCT,
Represent the DC coefficient of i sub-block,
Represent the average of all sub-block DC coefficients,
(3) feature watermark W
aBy contrasting each sub-block DC coefficient
With all sub-block DC Coefficient Means
Magnitude relationship extract, that is:
else
E, the blind extraction of authenticating water-mark and deciphering: (1) attack graph looks like to be divided into size and is the not overlapping sub-block of m * m; (2) each sub-block is carried out DCT; (3) extract authenticating water-mark W from each sub-block DCT matrix by the following method
a':
Wherein,
Represent W
a' ibit; (4) utilize x
0Produce Logistic Map Chaotic { x with two keys of γ
1, x
2, x
3..., give up a front κ random number, with κ+1 to
Individual random number x
κ+1, x
κ+2...,
By
Two-value turns to { 0, the 1} sequence L in GF (2) territory; (5) pass through
To the authenticating water-mark W that extracts
a' be decrypted, wherein
Authenticating water-mark W after the representative deciphering
a" ibit; (6) calculate the feature watermark W that extracts after attack
aWith the authenticating water-mark W after deciphering
a" between the normalization degree of correlation (Normalized Correlation, NC) estimate anti-attack robust with the judgement copyright, the NC value is defined as:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011101410724A CN102208097B (en) | 2011-05-26 | 2011-05-26 | Network image copyright real-time distinguishing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011101410724A CN102208097B (en) | 2011-05-26 | 2011-05-26 | Network image copyright real-time distinguishing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102208097A CN102208097A (en) | 2011-10-05 |
CN102208097B true CN102208097B (en) | 2013-06-19 |
Family
ID=44696913
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011101410724A Expired - Fee Related CN102208097B (en) | 2011-05-26 | 2011-05-26 | Network image copyright real-time distinguishing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102208097B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108399593A (en) * | 2018-03-23 | 2018-08-14 | 李嘉 | It is a kind of for IoT without intrusion watermark extracting and embedding grammar |
CN110032839A (en) * | 2019-04-04 | 2019-07-19 | 深圳大通实业股份有限公司 | The digital media content infringement detection system of high security digital watermarking |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102547297B (en) * | 2012-02-28 | 2014-12-03 | 中国传媒大学 | MPEG2 (Moving Picture Experts Group 2) video watermarking realization method based on DC (Discrete Cosine) coefficient |
CN103093127B (en) * | 2013-01-21 | 2015-07-15 | 深圳大学 | Method and system of dynamic copyright protection based on sudoku and multiple digital watermarks |
CN104063834B (en) * | 2013-03-22 | 2017-05-10 | 中国水利水电科学研究院 | Watermark embedding method, watermark detecting method and device thereof |
CN103455971B (en) * | 2013-09-04 | 2016-06-08 | 上海理工大学 | The image encryption method that three-dimensional Arnold conversion and chaos sequence combine |
CN104021580B (en) * | 2014-06-22 | 2017-03-15 | 华中师范大学 | A kind of jpeg compressed image encryption method for being applied to smart mobile phone |
CN105427231B (en) * | 2015-11-26 | 2018-11-06 | 南京林业大学 | A kind of SVD double-layer digital water mark methods avoiding false alarm |
CN108648130B (en) * | 2018-04-04 | 2022-05-27 | 宁波大学 | Totally-blind digital watermarking method with copyright protection and tampering positioning functions |
CN108416727B (en) * | 2018-04-04 | 2021-09-14 | 宁波大学 | Color image full-blind robust digital watermarking method based on self-embedding technology |
CN109740318A (en) * | 2019-01-04 | 2019-05-10 | 杭州拾贝知识产权服务有限公司 | A kind of electric business commodity copyright infringement evidence-obtaining system and method |
CN109872267A (en) * | 2019-02-19 | 2019-06-11 | 哈尔滨工业大学(深圳) | A kind of packet-based digital watermark method of robustness |
CN111583088B (en) * | 2020-05-06 | 2022-07-01 | 中国民航大学 | Self-embedding totally-blind color image robust watermarking method based on multiple transform domains |
CN115311119B (en) * | 2022-10-09 | 2022-12-23 | 中国民航大学 | Three-dimensional image zero watermark embedding and extracting method capable of resisting geometric attack |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101976428A (en) * | 2010-07-30 | 2011-02-16 | 南开大学 | Binary image fragile watermark embedding and extraction method based on topology structure |
-
2011
- 2011-05-26 CN CN2011101410724A patent/CN102208097B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101976428A (en) * | 2010-07-30 | 2011-02-16 | 南开大学 | Binary image fragile watermark embedding and extraction method based on topology structure |
Non-Patent Citations (8)
Title |
---|
Shinfeng D.Lin,Chin-Feng Chen.A ROBUST DCT-BASED WATERMARKING FOR COPYRIGHT PROTECTION.《Consumer Electronic,IEEE Transaction on》.2000,第46卷(第3期),415-421. * |
叶天语.基于奇异值分解和混沌映射的脆弱认证水印.《光电工程》.2008,第35卷(第9期), * |
叶天语.离散余弦变换域抗二次打印-扫描鲁棒零水印算法.《光子学报》.2011,第40卷(第1期), * |
宁国强 等.一种基于DWT-DCT变换强鲁棒性的数字水印算法.《电子设计工程》.2009,第17卷(第11期), * |
宁国强 等.一种基于DWT-DCT变换强鲁棒性的数字水印算法.《电子设计工程》.2009,第17卷(第11期),67-69. * |
张九华 等.基于扩频编码的图像数字水印算法.《计算机工程》.2009,第35卷(第21期), * |
王银花 等.基于分数傅里叶变换的混沌图像加密方法.《计算机工程》.2007,第33卷(第12期), * |
马军海 等.动力系统实测数据的非线性混沌特性的判定.《应用数学和力学》.重庆出版社,1998,第19卷(第6期), * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108399593A (en) * | 2018-03-23 | 2018-08-14 | 李嘉 | It is a kind of for IoT without intrusion watermark extracting and embedding grammar |
CN108399593B (en) * | 2018-03-23 | 2021-12-10 | 李嘉 | Non-intrusive watermark extraction and embedding method for IoT |
CN110032839A (en) * | 2019-04-04 | 2019-07-19 | 深圳大通实业股份有限公司 | The digital media content infringement detection system of high security digital watermarking |
Also Published As
Publication number | Publication date |
---|---|
CN102208097A (en) | 2011-10-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102208097B (en) | Network image copyright real-time distinguishing method | |
Kusuma et al. | An imperceptible LSB image hiding on edge region using DES encryption | |
Astuti et al. | Simple and secure image steganography using LSB and triple XOR operation on MSB | |
Rani et al. | A zero-watermarking scheme using discrete wavelet transform | |
Ren-Er et al. | Image steganography combined with DES encryption pre-processing | |
CN107103577A (en) | Half fragile uniqueness image watermark insertion and extracting method for integrity protection | |
CN107240061A (en) | A kind of watermark insertion, extracting method and device based on Dynamic BP neural | |
CN103955880A (en) | DWT-SVD robust blind watermark method based on Zernike moments | |
CN107846530A (en) | Digital watermarking algorithm | |
CN108629728A (en) | A kind of high power capacity bianry image information concealing method | |
Chen et al. | Cryptanalysis and improvement of a chaos-based watermarking scheme | |
CN111882477A (en) | Self-adaptive zero-watermarking method combining visual password and enhanced singular value decomposition | |
Tuncer et al. | A novel image watermarking method based on center symmetric local binary pattern with minimum distortion | |
CN103020496A (en) | Digital watermark encryption realization method | |
Saturwar et al. | Secure visual secret sharing scheme for color images using visual cryptography and digital watermarking | |
Ye et al. | Application of the chaotic ergodicity of standard map in image encryption and watermarking | |
CN102142129B (en) | Visual secret sharing-based image content tampering detection method | |
Atee et al. | Cryptography and image steganography using dynamic encryption on LSB and color image based data hiding | |
Garg et al. | Fingerprint watermarking and steganography for ATM transaction using LSB-RSA and 3-DWT algorithm | |
Czaplewski et al. | Digital fingerprinting for color images based on the quaternion encryption scheme | |
Alam et al. | A lossless digital watermarking scheme based on a new 3D-hyper chaotic map | |
Agarwal et al. | Robust and secure watermarking for propagation of digital multimedia by paillier homomorphic cryptosystem with arnold transformation | |
Srivastava et al. | Digital watermarking using spatial domain and triple DES | |
Roy et al. | A robust reversible image watermarking scheme in DCT domain using Arnold scrambling and histogram modification | |
Al-Dabbas et al. | Digital Watermarking, Methodology, Techniques, and Attacks: A Review |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20130619 Termination date: 20170526 |