CN103247018A - Expanding conversion shaking watermark modulating method based on logarithm domain visual model - Google Patents

Expanding conversion shaking watermark modulating method based on logarithm domain visual model Download PDF

Info

Publication number
CN103247018A
CN103247018A CN201310188433XA CN201310188433A CN103247018A CN 103247018 A CN103247018 A CN 103247018A CN 201310188433X A CN201310188433X A CN 201310188433XA CN 201310188433 A CN201310188433 A CN 201310188433A CN 103247018 A CN103247018 A CN 103247018A
Authority
CN
China
Prior art keywords
watermark
vector
log
domain
modulating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310188433XA
Other languages
Chinese (zh)
Inventor
刘琚
万文博
孙建德
田敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong University
Original Assignee
Shandong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong University filed Critical Shandong University
Priority to CN201310188433XA priority Critical patent/CN103247018A/en
Publication of CN103247018A publication Critical patent/CN103247018A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention provides an expanding conversion shaking watermark modulating method based on a logarithm domain visual model. The method comprises a watermark embedding step and a watermark detecting step, and comprises the concrete steps of firstly performing block dividing operation on a carrier image, extracting a coefficient vector of each to-be-embedded watermark from each sub block, performing logarithm domain conversion on the projection of each vector in random direction, computing the quantified step size corresponding to each coefficient vector according to the visual model of the logarithm domain at the same time, utilizing shaking modulating watermark to embed watermark information into each sub block, and finally reestablishing to obtain the image with the embedded watermark. During watermark detecting, the watermark information is extracted by the logarithm domain conversion and quantified step size according to the same method. The expanding conversion shaking watermark modulating method based on the logarithm domain visual model can greatly improve the robustness and the invisibility of the watermark.

Description

Method for expanding and transforming jitter and modulating watermark based on the log-domain vision mode
Technical field
The present invention relates to a kind of method for expanding and transforming jitter and modulating watermark based on the log-domain vision mode, belong to the multimedia signal processing technique field.
Background technology
Fast development along with multimedia messages treatment technology and computer networking technology, the storage of digital medium informations such as voice, image and video, copy and propagation becomes more and more easier, the legitimate rights and interests that this has greatly endangered the copyright owner, the problem of piracy that causes thus and dispute over copyright problem become the factor that influences social stability.Under this background, digital watermark technology arises at the historic moment, and as a kind of emerging copyright protection technology, is widely used in a plurality of fields such as copyright protection, issue tracking and authentication of digital product.
Digital watermark technology has been obtained very big development in recent years, Chen etc. have proposed quantization index modulation (QIM:Quantization Index Modulation) water mark method, as the blind watermarking algorithm of a quasi-representative, the significant advantage on algorithm application and computation complexity has obtained paying close attention to widely.Yet owing to adopted the embedding criterion of uniform quantization, the assailant can be by averaging operation at watermark signal, thereby be easy to estimate the watermark signal of embedding, therefore causes this method to the fragility of collusion attack.
P.Gonzalez etc. are subjected to the inspiration of Weber's law, propose watermark signal is embedded into the log-domain of carrier signal, and to passing through the embedding of the signal of number conversion being carried out watermark, the method has effectively solved the weakness of QIM at the fragility of collusion attack then.But at log-domain, along with reducing of carrier signal amplitude, quantization step reduces thereupon, has seriously reduced the robustness of the method.
Nima K.K etc. has proposed a kind of improved logarithm quantization function, and this method efficiently solves the problems referred to above, has improved the robustness of algorithm.But the method adopts fixed quantization step, therefore greatly reduces the method robustness that multiplication is attacked for brightness of image.And more seriously, improved logarithm transfer function can cause that the signal of embed watermark may fall between minus zone in the method, thereby causes the mistake that sign symbol is put upside down, and when not receiving malicious attack, the extraction mistake of watermark signal also can occur thus.
Summary of the invention
At the defective that exists in the prior art, the invention provides a kind of method for expanding and transforming jitter and modulating watermark based on the log-domain vision mode, this method proposes a kind of new logarithm quantization function, can when guaranteeing the watermark invisibility, significantly improve the robustness of watermark according to the quantization step of the adaptive adjustment watermark embedding of log-domain signal model.
The method for expanding and transforming jitter and modulating watermark of log-domain vision mode of the present invention, comprise to the projection of burst to be embedded and to number conversion the processing stage and by log-domain vision mode self-adaptation calculate quantization step the processing stage, the specific implementation step is:
(1) to the projection of burst to be embedded and to number conversion the processing stage, comprising:
A. from carrier, extract the coefficient of the watermark to be embedded of carrier transform domain, composition of vector x, the compute vector x projection x on random vector u TU.
B. construct new logarithm transfer function, the formula of employing is as follows
y = F ( x T u ) = ln ( 1 + μ x T u C 0 ) ln ( 1 + μ ) - - - ( 1 )
Wherein, y is the numerical value after changing, x TU is the projection of vector x on random vector u, and μ is key parameter, C 0Mean flow rate for carrier image.
(2) by log-domain vision mode self-adaptation calculate quantization step the processing stage, comprising:
A. at the maximum invisible changes delta of log-domain vision mode structure vector x on random direction, adopt formula as follows:
Δ = 2 s T u × x + ( C 0 / μ ) ( C 0 / μ ) - - - ( 2 )
Wherein, s TU is the projection of visual redundancy vector s on random vector u.
B. construct the maximum invisible changing value Δ to the signal after the number conversion y, the formula of employing is as follows:
Δ y = ln ( 1 + 2 s T u × μ C 0 ) ln ( 1 + μ ) - - - ( 3 )
Wherein, with Δ yQuantization step as the watermark embedding.
Among the substep a of described step (1), what transform domain adopted is discrete cosine transform.
Among the substep a of described step (1), u is the random vector that is generated by key K, and length is identical with x.
Among the substep a of described step (1), the vector of pending log-domain conversion is the projection of DCT coefficient vector on the random direction that certain key generates of watermark to be embedded.
Among the substep b of described step (1), parameter μ need satisfy condition:
Figure BDA00003217511200031
Guarantee that the numerical value of log-transformation is in positive interval.
Among the substep a of described step (2), visual redundancy vector s shelters structure according to the brightness in the Watson vision mode of revising, and obtains the maximum invisible changes delta of vector x on random direction at the log-domain correction with this.
Among the substep b of described step (2), the Δ and the formula that obtain among the substep a according to step (2)
Figure BDA00003217511200032
) obtain the maximum invisible changes delta of signal y y
Description of drawings
Fig. 1 is the schematic block diagram of watermark embedding of the present invention and detection method.
Fig. 2 the present invention is directed to the simulation comparison experiment that the brightness of image multiplication is attacked.
Fig. 3 the present invention is directed to the simulation comparison experiment that Gaussian noise is attacked.
Fig. 4 the present invention is directed to the simulation comparison experiment that salt-pepper noise is attacked.
Fig. 5 is the simulation comparison experiment that the present invention is directed to the JPEG compression attack.
Embodiment
Fig. 1 has provided the expanding and transforming jitter and modulating watermark embedding of log-domain vision mode of the present invention and the principle steps that detects.Following l-G simulation test is an object lesson of the inventive method, can verify the performance of the inventive method by this example.One 256 * 256 image is used in emulation, and it is embedded one 32 * 32 binary bitmap.Concrete watermark embed process is as follows:
(1) image is carried out 8 * 8 piecemeal DCT(discrete cosine transforms) conversion, each piecemeal DCT coefficient is carried out zig-zag scanning, and choose the AC(interchange of 3-10 position) coefficient composition vector x, the corresponding vector of each 8 * 8 piecemeal amounts to 1024.By the random vector u of key K generation with the vector x equal length.
(2) shelter the visual redundancy vector s that formula calculates each piecemeal coefficient correspondence to be embedded, the projection x of compute vector x and visual redundancy vector s on random vector u respectively according to the brightness in the Watson vision mode of revising TU and s TU.
(3) calculate the mean flow rate C of carrier image 0, choose qualified parameter μ according to formula (4), wherein parameter μ saves as key.By formula (1), with the projection x of each piecemeal correspondence TU is converted to y.
(4) calculate watermark according to formula (3) and embed required quantization step λ * Δ y, wherein parameter lambda is as the intensity of intensity factor control watermark embedding, and wherein parameter lambda saves as key.
(5) according to calculating quantization step λ * Δ y, each piece calculated among the y by jitter modulation embeds a watermark information, treat all piecemeals embed finish after, replace original coefficient with the DCT coefficient after changing, and by inverse dct transform, obtain the image of embed watermark.
Image behind the embed watermark in the process of transmission, may experience the operation that some signal is handled, such as brightness enhancing, Gaussian noise, salt-pepper noise and JPEG compression etc., experiment shows that the watermark of embedding still can quite good detecting be come out, shown in Fig. 2 to 5.Concrete testing process is as follows:
(1) treat detected image and carry out 8 * 8 piecemeal dct transforms, each piecemeal DCT coefficient is carried out zig-zag scanning, and choose the AC(interchange of 3-10 position) the coefficient composition of vector
Figure BDA00003217511200041
The corresponding vector of each 8 * 8 piecemeal amounts to 1024.Generated and vector by key K
Figure BDA00003217511200042
The random vector of equal length
(2) shelter the visual redundancy vector that formula calculates each piecemeal coefficient correspondence to be embedded according to the brightness in the Watson vision mode of revising
Figure BDA00003217511200044
The difference compute vector
Figure BDA00003217511200045
With the visual redundancy vector
Figure BDA00003217511200046
Projection on random vector u
Figure BDA00003217511200047
With
Figure BDA00003217511200048
(3) calculate the mean flow rate of carrier image
Figure BDA00003217511200049
The key parameter μ that the input watermark embedding stage preserves is by formula (1), with the projection of each piecemeal correspondence
Figure BDA000032175112000410
Be converted to
(4) the key parameter λ of input watermark embedding stage preservation calculates the required quantization step of watermark extracting according to formula (3)
Figure BDA000032175112000412
In each piecemeal, go out watermark information according to dithering modulation of watermarking detecting device independent detection.After treating that all piecemeals extractions are finished, detected watermark sequence is reassembled into 32 * 32 watermarking images.
In order to show the robustness of water mark method among the present invention, adopt common image processing method formula that watermarking images is handled, comprise the brightness of image multiplication attack under the various different brightness multiplication factors, average is that the different Gaussian noise of 0 standard deviation is attacked, salt-pepper noise is attacked under the different densities, the JPEG compression attack under the different JPEG compression qualities.Simultaneously for purpose relatively, provided the test result of the present invention's (abbreviating LSTDM-WM as) with several correlation techniques, comprise LQIM method (list of references Nima Khademi Kalantari and Seyed Mohammad Ahadi, " A logarithmic quantization index modulation for perceptually better data hiding; " IEEE Transaction on Image Processing, vol.19, no.6, pp.1504 – 1517, Jun.2010.), STDM-WM method (list of references Li Q and Cox I.J, " Improved spread transform dither modulation by using a perceptual model:robustness to amplitude scaling and jpeg compression; " Proceedings of IEEEICASSP., pp.185 – 188, Apr.2007.), and STDM-AdpWM (list of references Liong Ma, " Adaptive spread-transform modulation using a new perceptual model for color image; " IEICE Trans.Info.Sys., vol.E93-D, no.4, pp.843 – 856, Apr.2010.).In all emulation, by adjusting watermark embed strength with the unified 42dB that is taken as of PSNR, accompanying drawing 2 to 5 has provided above method is extracted the bit error rate of watermark under various attack test result contrast.

Claims (7)

1. the method for expanding and transforming jitter and modulating watermark of a log-domain vision mode, comprise to the projection of burst to be embedded and to number conversion the processing stage and by log-domain vision mode self-adaptation calculate quantization step the processing stage, the specific implementation step is:
(1) to the projection of burst to be embedded and to number conversion the processing stage, comprising:
A. from carrier, extract the coefficient of the watermark to be embedded of carrier transform domain, composition of vector x, the compute vector x projection x on random vector u TU;
B. construct new logarithm transfer function, the formula of employing is:
y = F ( x T u ) = ln ( 1 + μ x T u C 0 ) ln ( 1 + μ )
Wherein, y is the numerical value after changing, x TU is the projection of vector x on random vector u, and μ is key parameter, C 0Mean flow rate for carrier image;
(2) by log-domain vision mode self-adaptation calculate quantization step the processing stage, comprising:
A. at the maximum invisible changes delta of log-domain vision mode structure vector x on random direction, adopt formula as follows:
Δ = 2 s T u × x + ( C 0 / μ ) ( C 0 / μ )
Wherein, s TU is the projection of visual redundancy vector s on random vector u;
B. construct the maximum invisible changing value Δ to the signal after the number conversion y, the formula of employing is as follows:
Δ y = ln ( 1 + 2 s T u × μ C 0 ) ln ( 1 + μ )
Wherein, with Δ yQuantization step as the watermark embedding.
2. the method for expanding and transforming jitter and modulating watermark of log-domain vision mode as claimed in claim 1 is characterized in that: among the substep a of described step (1), what transform domain adopted is discrete cosine transform.
3. the method for expanding and transforming jitter and modulating watermark of log-domain vision mode as claimed in claim 1 is characterized in that: among the substep a of described step (1), u is the random vector that is generated by key K, and length is identical with x.
4. the method for expanding and transforming jitter and modulating watermark of log-domain vision mode as claimed in claim 1, it is characterized in that: among the substep a of described step (1), the vector of pending log-domain conversion is the projection of DCT coefficient vector on the random direction that certain key generates of watermark to be embedded.
5. the method for expanding and transforming jitter and modulating watermark of log-domain vision mode as claimed in claim 1, it is characterized in that: among the substep b of described step (1), parameter μ need satisfy condition:
Figure FDA00003217511100021
Guarantee that the numerical value of log-transformation is in positive interval.
6. the method for expanding and transforming jitter and modulating watermark of log-domain vision mode as claimed in claim 1, it is characterized in that: among the middle substep a of described step (2), visual redundancy vector s shelters structure according to the brightness in the Watson vision mode of revising, and obtains the maximum invisible changes delta of vector x on random direction at the log-domain correction with this.
7. the method for expanding and transforming jitter and modulating watermark of log-domain vision mode as claimed in claim 1 is characterized in that: among the substep b of described step (2), and the Δ and the formula that obtain among the substep a according to step (2)
Figure FDA00003217511100022
) to the maximum invisible changes delta of signal y y
CN201310188433XA 2013-05-20 2013-05-20 Expanding conversion shaking watermark modulating method based on logarithm domain visual model Pending CN103247018A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310188433XA CN103247018A (en) 2013-05-20 2013-05-20 Expanding conversion shaking watermark modulating method based on logarithm domain visual model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310188433XA CN103247018A (en) 2013-05-20 2013-05-20 Expanding conversion shaking watermark modulating method based on logarithm domain visual model

Publications (1)

Publication Number Publication Date
CN103247018A true CN103247018A (en) 2013-08-14

Family

ID=48926523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310188433XA Pending CN103247018A (en) 2013-05-20 2013-05-20 Expanding conversion shaking watermark modulating method based on logarithm domain visual model

Country Status (1)

Country Link
CN (1) CN103247018A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104217388A (en) * 2014-01-22 2014-12-17 河南师范大学 Method and device of embedding and extracting image watermark based on FSSVM (Fuzzy Smooth Support Vector Machine)
CN104361548A (en) * 2014-10-28 2015-02-18 河南师范大学 BP neural network digital image compression based image watermark embedding and extracting method
CN104766269A (en) * 2015-04-16 2015-07-08 山东大学 Spread transform dither modulation watermarking method based on JND brightness model
CN110232650A (en) * 2019-06-06 2019-09-13 山东师范大学 A kind of Color digital watermarking embedding grammar, detection method and system
CN111127291A (en) * 2019-12-30 2020-05-08 山东师范大学 Image watermark embedding and extracting method and system based on spatial frequency domain JND conversion
CN111325651A (en) * 2018-12-14 2020-06-23 中国移动通信集团山东有限公司 Quantitative watermarking method and device based on perception JND model
CN112132731A (en) * 2020-09-10 2020-12-25 郑州轻工业大学 DWT-SVD domain adaptive robust watermarking algorithm adopting preset PSNR

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007013357A (en) * 2005-06-29 2007-01-18 Hitachi Ltd Watermark information embedding device, watermark information embedding method and printing management system
CN1967594A (en) * 2006-10-16 2007-05-23 北京大学 An adaptive method for extending, transforming and dithering modulation of watermarking
CN101452563A (en) * 2008-06-20 2009-06-10 扬州大学 Improved method for expanding and transforming jitter and modulating watermark

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007013357A (en) * 2005-06-29 2007-01-18 Hitachi Ltd Watermark information embedding device, watermark information embedding method and printing management system
CN1967594A (en) * 2006-10-16 2007-05-23 北京大学 An adaptive method for extending, transforming and dithering modulation of watermarking
CN101452563A (en) * 2008-06-20 2009-06-10 扬州大学 Improved method for expanding and transforming jitter and modulating watermark

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NIMA KHADEMI KALANTARI等: "A logarithmic quantization index modulation for perceptually better data hiding", 《IEEE TRANSACTIONS ON IMAGE PROCESSING》 *
李鑫超: "基于扩展变换抖动调制的数字水印方法", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104217388A (en) * 2014-01-22 2014-12-17 河南师范大学 Method and device of embedding and extracting image watermark based on FSSVM (Fuzzy Smooth Support Vector Machine)
CN104217388B (en) * 2014-01-22 2017-10-24 河南师范大学 A kind of image watermark insertion based on FSSVM, the method and apparatus extracted
CN104361548A (en) * 2014-10-28 2015-02-18 河南师范大学 BP neural network digital image compression based image watermark embedding and extracting method
CN104361548B (en) * 2014-10-28 2017-10-20 河南师范大学 Image watermark insertion and extracting method based on BP neural network digital image compression
CN104766269A (en) * 2015-04-16 2015-07-08 山东大学 Spread transform dither modulation watermarking method based on JND brightness model
CN111325651A (en) * 2018-12-14 2020-06-23 中国移动通信集团山东有限公司 Quantitative watermarking method and device based on perception JND model
CN111325651B (en) * 2018-12-14 2023-09-05 中国移动通信集团山东有限公司 Quantization watermarking method and device based on perceptual JND model
CN110232650A (en) * 2019-06-06 2019-09-13 山东师范大学 A kind of Color digital watermarking embedding grammar, detection method and system
CN110232650B (en) * 2019-06-06 2024-02-27 山东师范大学 Color image watermark embedding method, detection method and system
CN111127291A (en) * 2019-12-30 2020-05-08 山东师范大学 Image watermark embedding and extracting method and system based on spatial frequency domain JND conversion
CN112132731A (en) * 2020-09-10 2020-12-25 郑州轻工业大学 DWT-SVD domain adaptive robust watermarking algorithm adopting preset PSNR
CN112132731B (en) * 2020-09-10 2023-12-05 郑州轻工业大学 DWT-SVD domain self-adaptive robust watermark extraction method adopting preset PSNR

Similar Documents

Publication Publication Date Title
CN103247018A (en) Expanding conversion shaking watermark modulating method based on logarithm domain visual model
Malik et al. Recovery based high capacity reversible data hiding scheme using even-odd embedding
Sari et al. Robust and imperceptible image watermarking by DC coefficients using singular value decomposition
CN110232650B (en) Color image watermark embedding method, detection method and system
CN104766269A (en) Spread transform dither modulation watermarking method based on JND brightness model
CN111932432A (en) Blind watermark implanting method, blind watermark detecting method, blind watermark implanting device, blind watermark detecting equipment and storage medium
Behnia et al. Watermarking based on discrete wavelet transform and q-deformed chaotic map
CN102956025B (en) Image watermark detection method and system
Ying et al. From image to imuge: Immunized image generation
Bukharmetov et al. Robust method for protecting electronic document on waterway transport with steganographic means by embedding digital watermarks into images
Ma et al. Adaptive spread-transform dither modulation using a new perceptual model for color image watermarking
Zhou et al. Geometric correction code‐based robust image watermarking
Yang et al. Block-based colour image steganography using smart pixel-adjustment
KR102302485B1 (en) Method for embeding and extracting watermark in biomedical image, device and computer readable medium for performing the method
Guo et al. A color image watermarking algorithm resistant to print-scan
Parameswaran et al. Content-based watermarking for image authentication using independent component analysis
CN112529756A (en) Digital image watermark embedding method, digital image watermark extracting device and storage medium
CN103559677B (en) Based on the adapting to image watermark embedding method of wavelet transformation and visual characteristic
Mirza et al. A new hybrid domain based print-scan resilient image watermarking technique
Kumar et al. Image Transformation Technique Using Steganography Methods Using LWT Technique Image Transformation Technique Using Steganography Methods Using LWT Technique
Lv et al. Enhancing Feature Point‐Based Video Watermarking against Geometric Attacks with Template
Kaur et al. Digital watermarking in neural networks models
Qin et al. A new JPEG image watermarking method exploiting spatial JND model
CN111145070B (en) Safe and robust watermarking algorithm
CN106373077B (en) Digital watermark method based on relative ratio

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130814