CN103247018A - Expanding conversion shaking watermark modulating method based on logarithm domain visual model - Google Patents
Expanding conversion shaking watermark modulating method based on logarithm domain visual model Download PDFInfo
- Publication number
- CN103247018A CN103247018A CN201310188433XA CN201310188433A CN103247018A CN 103247018 A CN103247018 A CN 103247018A CN 201310188433X A CN201310188433X A CN 201310188433XA CN 201310188433 A CN201310188433 A CN 201310188433A CN 103247018 A CN103247018 A CN 103247018A
- Authority
- CN
- China
- Prior art keywords
- watermark
- vector
- log
- domain
- modulating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention provides an expanding conversion shaking watermark modulating method based on a logarithm domain visual model. The method comprises a watermark embedding step and a watermark detecting step, and comprises the concrete steps of firstly performing block dividing operation on a carrier image, extracting a coefficient vector of each to-be-embedded watermark from each sub block, performing logarithm domain conversion on the projection of each vector in random direction, computing the quantified step size corresponding to each coefficient vector according to the visual model of the logarithm domain at the same time, utilizing shaking modulating watermark to embed watermark information into each sub block, and finally reestablishing to obtain the image with the embedded watermark. During watermark detecting, the watermark information is extracted by the logarithm domain conversion and quantified step size according to the same method. The expanding conversion shaking watermark modulating method based on the logarithm domain visual model can greatly improve the robustness and the invisibility of the watermark.
Description
Technical field
The present invention relates to a kind of method for expanding and transforming jitter and modulating watermark based on the log-domain vision mode, belong to the multimedia signal processing technique field.
Background technology
Fast development along with multimedia messages treatment technology and computer networking technology, the storage of digital medium informations such as voice, image and video, copy and propagation becomes more and more easier, the legitimate rights and interests that this has greatly endangered the copyright owner, the problem of piracy that causes thus and dispute over copyright problem become the factor that influences social stability.Under this background, digital watermark technology arises at the historic moment, and as a kind of emerging copyright protection technology, is widely used in a plurality of fields such as copyright protection, issue tracking and authentication of digital product.
Digital watermark technology has been obtained very big development in recent years, Chen etc. have proposed quantization index modulation (QIM:Quantization Index Modulation) water mark method, as the blind watermarking algorithm of a quasi-representative, the significant advantage on algorithm application and computation complexity has obtained paying close attention to widely.Yet owing to adopted the embedding criterion of uniform quantization, the assailant can be by averaging operation at watermark signal, thereby be easy to estimate the watermark signal of embedding, therefore causes this method to the fragility of collusion attack.
P.Gonzalez etc. are subjected to the inspiration of Weber's law, propose watermark signal is embedded into the log-domain of carrier signal, and to passing through the embedding of the signal of number conversion being carried out watermark, the method has effectively solved the weakness of QIM at the fragility of collusion attack then.But at log-domain, along with reducing of carrier signal amplitude, quantization step reduces thereupon, has seriously reduced the robustness of the method.
Nima K.K etc. has proposed a kind of improved logarithm quantization function, and this method efficiently solves the problems referred to above, has improved the robustness of algorithm.But the method adopts fixed quantization step, therefore greatly reduces the method robustness that multiplication is attacked for brightness of image.And more seriously, improved logarithm transfer function can cause that the signal of embed watermark may fall between minus zone in the method, thereby causes the mistake that sign symbol is put upside down, and when not receiving malicious attack, the extraction mistake of watermark signal also can occur thus.
Summary of the invention
At the defective that exists in the prior art, the invention provides a kind of method for expanding and transforming jitter and modulating watermark based on the log-domain vision mode, this method proposes a kind of new logarithm quantization function, can when guaranteeing the watermark invisibility, significantly improve the robustness of watermark according to the quantization step of the adaptive adjustment watermark embedding of log-domain signal model.
The method for expanding and transforming jitter and modulating watermark of log-domain vision mode of the present invention, comprise to the projection of burst to be embedded and to number conversion the processing stage and by log-domain vision mode self-adaptation calculate quantization step the processing stage, the specific implementation step is:
(1) to the projection of burst to be embedded and to number conversion the processing stage, comprising:
A. from carrier, extract the coefficient of the watermark to be embedded of carrier transform domain, composition of vector x, the compute vector x projection x on random vector u
TU.
B. construct new logarithm transfer function, the formula of employing is as follows
Wherein, y is the numerical value after changing, x
TU is the projection of vector x on random vector u, and μ is key parameter, C
0Mean flow rate for carrier image.
(2) by log-domain vision mode self-adaptation calculate quantization step the processing stage, comprising:
A. at the maximum invisible changes delta of log-domain vision mode structure vector x on random direction, adopt formula as follows:
Wherein, s
TU is the projection of visual redundancy vector s on random vector u.
B. construct the maximum invisible changing value Δ to the signal after the number conversion
y, the formula of employing is as follows:
Wherein, with Δ
yQuantization step as the watermark embedding.
Among the substep a of described step (1), what transform domain adopted is discrete cosine transform.
Among the substep a of described step (1), u is the random vector that is generated by key K, and length is identical with x.
Among the substep a of described step (1), the vector of pending log-domain conversion is the projection of DCT coefficient vector on the random direction that certain key generates of watermark to be embedded.
Among the substep b of described step (1), parameter μ need satisfy condition:
Guarantee that the numerical value of log-transformation is in positive interval.
Among the substep a of described step (2), visual redundancy vector s shelters structure according to the brightness in the Watson vision mode of revising, and obtains the maximum invisible changes delta of vector x on random direction at the log-domain correction with this.
Description of drawings
Fig. 1 is the schematic block diagram of watermark embedding of the present invention and detection method.
Fig. 2 the present invention is directed to the simulation comparison experiment that the brightness of image multiplication is attacked.
Fig. 3 the present invention is directed to the simulation comparison experiment that Gaussian noise is attacked.
Fig. 4 the present invention is directed to the simulation comparison experiment that salt-pepper noise is attacked.
Fig. 5 is the simulation comparison experiment that the present invention is directed to the JPEG compression attack.
Embodiment
Fig. 1 has provided the expanding and transforming jitter and modulating watermark embedding of log-domain vision mode of the present invention and the principle steps that detects.Following l-G simulation test is an object lesson of the inventive method, can verify the performance of the inventive method by this example.One 256 * 256 image is used in emulation, and it is embedded one 32 * 32 binary bitmap.Concrete watermark embed process is as follows:
(1) image is carried out 8 * 8 piecemeal DCT(discrete cosine transforms) conversion, each piecemeal DCT coefficient is carried out zig-zag scanning, and choose the AC(interchange of 3-10 position) coefficient composition vector x, the corresponding vector of each 8 * 8 piecemeal amounts to 1024.By the random vector u of key K generation with the vector x equal length.
(2) shelter the visual redundancy vector s that formula calculates each piecemeal coefficient correspondence to be embedded, the projection x of compute vector x and visual redundancy vector s on random vector u respectively according to the brightness in the Watson vision mode of revising
TU and s
TU.
(3) calculate the mean flow rate C of carrier image
0, choose qualified parameter μ according to formula (4), wherein parameter μ saves as key.By formula (1), with the projection x of each piecemeal correspondence
TU is converted to y.
(4) calculate watermark according to formula (3) and embed required quantization step λ * Δ
y, wherein parameter lambda is as the intensity of intensity factor control watermark embedding, and wherein parameter lambda saves as key.
(5) according to calculating quantization step λ * Δ
y, each piece calculated among the y by jitter modulation embeds a watermark information, treat all piecemeals embed finish after, replace original coefficient with the DCT coefficient after changing, and by inverse dct transform, obtain the image of embed watermark.
Image behind the embed watermark in the process of transmission, may experience the operation that some signal is handled, such as brightness enhancing, Gaussian noise, salt-pepper noise and JPEG compression etc., experiment shows that the watermark of embedding still can quite good detecting be come out, shown in Fig. 2 to 5.Concrete testing process is as follows:
(1) treat detected image and carry out 8 * 8 piecemeal dct transforms, each piecemeal DCT coefficient is carried out zig-zag scanning, and choose the AC(interchange of 3-10 position) the coefficient composition of vector
The corresponding vector of each 8 * 8 piecemeal amounts to 1024.Generated and vector by key K
The random vector of equal length
(2) shelter the visual redundancy vector that formula calculates each piecemeal coefficient correspondence to be embedded according to the brightness in the Watson vision mode of revising
The difference compute vector
With the visual redundancy vector
Projection on random vector u
With
(3) calculate the mean flow rate of carrier image
The key parameter μ that the input watermark embedding stage preserves is by formula (1), with the projection of each piecemeal correspondence
Be converted to
(4) the key parameter λ of input watermark embedding stage preservation calculates the required quantization step of watermark extracting according to formula (3)
In each piecemeal, go out watermark information according to dithering modulation of watermarking detecting device independent detection.After treating that all piecemeals extractions are finished, detected watermark sequence is reassembled into 32 * 32 watermarking images.
In order to show the robustness of water mark method among the present invention, adopt common image processing method formula that watermarking images is handled, comprise the brightness of image multiplication attack under the various different brightness multiplication factors, average is that the different Gaussian noise of 0 standard deviation is attacked, salt-pepper noise is attacked under the different densities, the JPEG compression attack under the different JPEG compression qualities.Simultaneously for purpose relatively, provided the test result of the present invention's (abbreviating LSTDM-WM as) with several correlation techniques, comprise LQIM method (list of references Nima Khademi Kalantari and Seyed Mohammad Ahadi, " A logarithmic quantization index modulation for perceptually better data hiding; " IEEE Transaction on Image Processing, vol.19, no.6, pp.1504 – 1517, Jun.2010.), STDM-WM method (list of references Li Q and Cox I.J, " Improved spread transform dither modulation by using a perceptual model:robustness to amplitude scaling and jpeg compression; " Proceedings of IEEEICASSP., pp.185 – 188, Apr.2007.), and STDM-AdpWM (list of references Liong Ma, " Adaptive spread-transform modulation using a new perceptual model for color image; " IEICE Trans.Info.Sys., vol.E93-D, no.4, pp.843 – 856, Apr.2010.).In all emulation, by adjusting watermark embed strength with the unified 42dB that is taken as of PSNR, accompanying drawing 2 to 5 has provided above method is extracted the bit error rate of watermark under various attack test result contrast.
Claims (7)
1. the method for expanding and transforming jitter and modulating watermark of a log-domain vision mode, comprise to the projection of burst to be embedded and to number conversion the processing stage and by log-domain vision mode self-adaptation calculate quantization step the processing stage, the specific implementation step is:
(1) to the projection of burst to be embedded and to number conversion the processing stage, comprising:
A. from carrier, extract the coefficient of the watermark to be embedded of carrier transform domain, composition of vector x, the compute vector x projection x on random vector u
TU;
B. construct new logarithm transfer function, the formula of employing is:
Wherein, y is the numerical value after changing, x
TU is the projection of vector x on random vector u, and μ is key parameter, C
0Mean flow rate for carrier image;
(2) by log-domain vision mode self-adaptation calculate quantization step the processing stage, comprising:
A. at the maximum invisible changes delta of log-domain vision mode structure vector x on random direction, adopt formula as follows:
Wherein, s
TU is the projection of visual redundancy vector s on random vector u;
B. construct the maximum invisible changing value Δ to the signal after the number conversion
y, the formula of employing is as follows:
Wherein, with Δ
yQuantization step as the watermark embedding.
2. the method for expanding and transforming jitter and modulating watermark of log-domain vision mode as claimed in claim 1 is characterized in that: among the substep a of described step (1), what transform domain adopted is discrete cosine transform.
3. the method for expanding and transforming jitter and modulating watermark of log-domain vision mode as claimed in claim 1 is characterized in that: among the substep a of described step (1), u is the random vector that is generated by key K, and length is identical with x.
4. the method for expanding and transforming jitter and modulating watermark of log-domain vision mode as claimed in claim 1, it is characterized in that: among the substep a of described step (1), the vector of pending log-domain conversion is the projection of DCT coefficient vector on the random direction that certain key generates of watermark to be embedded.
5. the method for expanding and transforming jitter and modulating watermark of log-domain vision mode as claimed in claim 1, it is characterized in that: among the substep b of described step (1), parameter μ need satisfy condition:
Guarantee that the numerical value of log-transformation is in positive interval.
6. the method for expanding and transforming jitter and modulating watermark of log-domain vision mode as claimed in claim 1, it is characterized in that: among the middle substep a of described step (2), visual redundancy vector s shelters structure according to the brightness in the Watson vision mode of revising, and obtains the maximum invisible changes delta of vector x on random direction at the log-domain correction with this.
7. the method for expanding and transforming jitter and modulating watermark of log-domain vision mode as claimed in claim 1 is characterized in that: among the substep b of described step (2), and the Δ and the formula that obtain among the substep a according to step (2)
) to the maximum invisible changes delta of signal y
y
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310188433XA CN103247018A (en) | 2013-05-20 | 2013-05-20 | Expanding conversion shaking watermark modulating method based on logarithm domain visual model |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310188433XA CN103247018A (en) | 2013-05-20 | 2013-05-20 | Expanding conversion shaking watermark modulating method based on logarithm domain visual model |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103247018A true CN103247018A (en) | 2013-08-14 |
Family
ID=48926523
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310188433XA Pending CN103247018A (en) | 2013-05-20 | 2013-05-20 | Expanding conversion shaking watermark modulating method based on logarithm domain visual model |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103247018A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104217388A (en) * | 2014-01-22 | 2014-12-17 | 河南师范大学 | Method and device of embedding and extracting image watermark based on FSSVM (Fuzzy Smooth Support Vector Machine) |
CN104361548A (en) * | 2014-10-28 | 2015-02-18 | 河南师范大学 | BP neural network digital image compression based image watermark embedding and extracting method |
CN104766269A (en) * | 2015-04-16 | 2015-07-08 | 山东大学 | Spread transform dither modulation watermarking method based on JND brightness model |
CN110232650A (en) * | 2019-06-06 | 2019-09-13 | 山东师范大学 | A kind of Color digital watermarking embedding grammar, detection method and system |
CN111127291A (en) * | 2019-12-30 | 2020-05-08 | 山东师范大学 | Image watermark embedding and extracting method and system based on spatial frequency domain JND conversion |
CN111325651A (en) * | 2018-12-14 | 2020-06-23 | 中国移动通信集团山东有限公司 | Quantitative watermarking method and device based on perception JND model |
CN112132731A (en) * | 2020-09-10 | 2020-12-25 | 郑州轻工业大学 | DWT-SVD domain adaptive robust watermarking algorithm adopting preset PSNR |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007013357A (en) * | 2005-06-29 | 2007-01-18 | Hitachi Ltd | Watermark information embedding device, watermark information embedding method and printing management system |
CN1967594A (en) * | 2006-10-16 | 2007-05-23 | 北京大学 | An adaptive method for extending, transforming and dithering modulation of watermarking |
CN101452563A (en) * | 2008-06-20 | 2009-06-10 | 扬州大学 | Improved method for expanding and transforming jitter and modulating watermark |
-
2013
- 2013-05-20 CN CN201310188433XA patent/CN103247018A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007013357A (en) * | 2005-06-29 | 2007-01-18 | Hitachi Ltd | Watermark information embedding device, watermark information embedding method and printing management system |
CN1967594A (en) * | 2006-10-16 | 2007-05-23 | 北京大学 | An adaptive method for extending, transforming and dithering modulation of watermarking |
CN101452563A (en) * | 2008-06-20 | 2009-06-10 | 扬州大学 | Improved method for expanding and transforming jitter and modulating watermark |
Non-Patent Citations (2)
Title |
---|
NIMA KHADEMI KALANTARI等: "A logarithmic quantization index modulation for perceptually better data hiding", 《IEEE TRANSACTIONS ON IMAGE PROCESSING》 * |
李鑫超: "基于扩展变换抖动调制的数字水印方法", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104217388A (en) * | 2014-01-22 | 2014-12-17 | 河南师范大学 | Method and device of embedding and extracting image watermark based on FSSVM (Fuzzy Smooth Support Vector Machine) |
CN104217388B (en) * | 2014-01-22 | 2017-10-24 | 河南师范大学 | A kind of image watermark insertion based on FSSVM, the method and apparatus extracted |
CN104361548A (en) * | 2014-10-28 | 2015-02-18 | 河南师范大学 | BP neural network digital image compression based image watermark embedding and extracting method |
CN104361548B (en) * | 2014-10-28 | 2017-10-20 | 河南师范大学 | Image watermark insertion and extracting method based on BP neural network digital image compression |
CN104766269A (en) * | 2015-04-16 | 2015-07-08 | 山东大学 | Spread transform dither modulation watermarking method based on JND brightness model |
CN111325651A (en) * | 2018-12-14 | 2020-06-23 | 中国移动通信集团山东有限公司 | Quantitative watermarking method and device based on perception JND model |
CN111325651B (en) * | 2018-12-14 | 2023-09-05 | 中国移动通信集团山东有限公司 | Quantization watermarking method and device based on perceptual JND model |
CN110232650A (en) * | 2019-06-06 | 2019-09-13 | 山东师范大学 | A kind of Color digital watermarking embedding grammar, detection method and system |
CN110232650B (en) * | 2019-06-06 | 2024-02-27 | 山东师范大学 | Color image watermark embedding method, detection method and system |
CN111127291A (en) * | 2019-12-30 | 2020-05-08 | 山东师范大学 | Image watermark embedding and extracting method and system based on spatial frequency domain JND conversion |
CN112132731A (en) * | 2020-09-10 | 2020-12-25 | 郑州轻工业大学 | DWT-SVD domain adaptive robust watermarking algorithm adopting preset PSNR |
CN112132731B (en) * | 2020-09-10 | 2023-12-05 | 郑州轻工业大学 | DWT-SVD domain self-adaptive robust watermark extraction method adopting preset PSNR |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103247018A (en) | Expanding conversion shaking watermark modulating method based on logarithm domain visual model | |
Malik et al. | Recovery based high capacity reversible data hiding scheme using even-odd embedding | |
Sari et al. | Robust and imperceptible image watermarking by DC coefficients using singular value decomposition | |
CN110232650B (en) | Color image watermark embedding method, detection method and system | |
CN104766269A (en) | Spread transform dither modulation watermarking method based on JND brightness model | |
CN111932432A (en) | Blind watermark implanting method, blind watermark detecting method, blind watermark implanting device, blind watermark detecting equipment and storage medium | |
Behnia et al. | Watermarking based on discrete wavelet transform and q-deformed chaotic map | |
CN102956025B (en) | Image watermark detection method and system | |
Ying et al. | From image to imuge: Immunized image generation | |
Bukharmetov et al. | Robust method for protecting electronic document on waterway transport with steganographic means by embedding digital watermarks into images | |
Ma et al. | Adaptive spread-transform dither modulation using a new perceptual model for color image watermarking | |
Zhou et al. | Geometric correction code‐based robust image watermarking | |
Yang et al. | Block-based colour image steganography using smart pixel-adjustment | |
KR102302485B1 (en) | Method for embeding and extracting watermark in biomedical image, device and computer readable medium for performing the method | |
Guo et al. | A color image watermarking algorithm resistant to print-scan | |
Parameswaran et al. | Content-based watermarking for image authentication using independent component analysis | |
CN112529756A (en) | Digital image watermark embedding method, digital image watermark extracting device and storage medium | |
CN103559677B (en) | Based on the adapting to image watermark embedding method of wavelet transformation and visual characteristic | |
Mirza et al. | A new hybrid domain based print-scan resilient image watermarking technique | |
Kumar et al. | Image Transformation Technique Using Steganography Methods Using LWT Technique Image Transformation Technique Using Steganography Methods Using LWT Technique | |
Lv et al. | Enhancing Feature Point‐Based Video Watermarking against Geometric Attacks with Template | |
Kaur et al. | Digital watermarking in neural networks models | |
Qin et al. | A new JPEG image watermarking method exploiting spatial JND model | |
CN111145070B (en) | Safe and robust watermarking algorithm | |
CN106373077B (en) | Digital watermark method based on relative ratio |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20130814 |