CN103310403A - Handwriting characteristic and digital document visible watermark fusion method - Google Patents

Handwriting characteristic and digital document visible watermark fusion method Download PDF

Info

Publication number
CN103310403A
CN103310403A CN2013101771967A CN201310177196A CN103310403A CN 103310403 A CN103310403 A CN 103310403A CN 2013101771967 A CN2013101771967 A CN 2013101771967A CN 201310177196 A CN201310177196 A CN 201310177196A CN 103310403 A CN103310403 A CN 103310403A
Authority
CN
China
Prior art keywords
watermark
data
signature
user
embedded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013101771967A
Other languages
Chinese (zh)
Other versions
CN103310403B (en
Inventor
陈昭宏
曾国坤
张少林
贺夏龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Wave Multimedia Co Ltd
Original Assignee
Shenzhen Wave Multimedia Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Wave Multimedia Co Ltd filed Critical Shenzhen Wave Multimedia Co Ltd
Priority to CN201310177196.7A priority Critical patent/CN103310403B/en
Publication of CN103310403A publication Critical patent/CN103310403A/en
Application granted granted Critical
Publication of CN103310403B publication Critical patent/CN103310403B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention is suitable for the technical field of the digital watermark, and provides a handwriting characteristic and digital document visible watermark fusion method and a computer. The method comprises the following steps of receiving the signature of a first user; regulating the format of the signature of the first user into a picture format to serve as the data of the signature of the first user; scrambling the data of the signature of the first user; taking the scrambled data as first watermark data; regulating the first watermark data to enable the first watermark to occupy one part of the total space of the digital watermark; obtaining an image added with the watermark through a watermark embedding algorithm; scrambling data each time after the signature of a subsequent user is received; taking the scrambled data as the current watermark data; regulating the current watermark data to enable the current watermark data to occupy one part of the total space of the digital watermark; and embedding the current watermark data into the previous image through the watermark embedding algorithm. According to the invention, the problem of the multi-people multi-layer watermark is solved.

Description

Hand-written feature and digital document watermark fusion method
Technical field
The invention belongs to the digital watermarking field, relate in particular to a kind of hand-written feature and digital document watermark fusion method.
Background technology
1954, first and the similar technical examples of " digital watermarking " method appearred.At that time, the email hem Brooke of U.S. Muzac company had applied for the patent of a key name for " Identification of Sound and Video Singles ".This patent has been described and a kind ofly has been embedded in the music and the method for proof of possession identification code is non.This is the eletric watermark technology the earliest known to up to now.The people such as trike in 1994 have delivered the article of exercise question for first piece of relevant digital watermarking of " A Digital Watermark " in international Important Academic meeting once, propose the concept of digital watermarking and possible application, and proposed the algorithm of two kinds of embed watermarks in the image least significant bit (LSB) for gray level image.Held first international information at the Britain Camb Newtonian study in 1996 and hidden scientific seminar, indicated the birth of Information hiding, and also obtained developing rapidly as the research of the digital watermark technology of one of Information hiding Main Branches.Hide scientific seminar to the 3rd international information in 1999, digital watermarking becomes theme.
Digital watermarking refers to specific information is embedded in the digital signal, and digital signal may be audio frequency, picture or film etc.If copy the signal of digital watermarking, embedded information also can be copied in the lump.Digital watermarking can be divided into appears formula and concealed two kinds in one's mind, the watermark that can be seen (Visible watermarking), and its information that comprises can be seen when watching picture or film simultaneously.Characteristic by watermark can be divided into digital watermarking robust digital watermark and rapid wear digital watermarking two classes.Robust watermarking (Robust Watermarking) is mainly used in identifying Copyright Information in copyright, utilize this digital watermark in the data of content of multimedia, to embed founder, possessory beacon information, perhaps embed buyer's sign (being sequence number).When dispute over copyright occured, founder or possessory information were used for the copyright owner of unlabeled data, and sequence number is used for following the trail of and violates the agreement and the user of multi-medium data is provided for piracy.The digital watermarking that is used for copyright protection requires to have very strong robustness and security, except require the existence, also to need to resist some malicious attacks in general pattern processing (as: filtering, plus noise, replacement, compression etc.).Fragile watermark (Fragile Watermarking), opposite with the requirement of robust watermarking, the rapid wear digital watermarking is mainly used in integrity protection, and this watermark is the sightless information that embeds in content-data equally.When content changed, corresponding change can occur in these watermark informations, thereby can identify whether raw data is tampered.Fragile watermark reply general pattern is processed (as: filtering, plus noise, replacement, compression etc.) stronger immunocompetence (robustness), require to have again simultaneously stronger susceptibility, that is: both allowed to a certain degree distortion, and the distortion situation can have been detected again.Must be very sensitive to the change of signal, people just can judge according to the state of fragile watermark whether data were tampered.
The development of infotech is so that a lot of traditional archive files all becomes with no paper at all electronization.Yet because that electronic document comes compared with paper document is more easily modified, a lot of important documents still use traditional papery to preserve scheme.People think that the document that signature authentication is crossed on paper can be subject to corresponding the attention and protection.This has produced some contradictions with the electronic information that reaches its maturity.At this, also slightly introduce the characteristics of digital watermark technology:
The ability that robustness---index word watermark can not cause hiding Info and lose because of certain " change " (comprising interchannel noise, filtering operation, D/A or A/D conversion etc. in the transmission course) of digital document.
The transparency---point in the works embed watermark and should not cause the protected works phenomenon that significantly degrades.
Undetectability---refer to that hidden carrier and initial carrier have consistent characteristic, make illicit interception person can't judge whether hidden carrier is loaded with digital watermarking.
Vindicability---watermarking algorithm can be identified and be embedded in for information about possessory in the protected object; Subscriber Number, product marking or significant literal etc. such as registration; and can in needs, it be extracted; whether be protected thereby differentiate object, and can monitor propagation, the true and false and the illegal copies control etc. of protected data.
Security---refer to that it must bear to a certain degree artificial attack, hide Info can be not destroyed and make.
Adjustable and compossibility---still can adjust it after referring in many concrete application, insert watermark, allow simultaneously a plurality of watermarks to coexist as in the hidden object.
Self-reparability---refer to that information hiding system can recover to hide signal the fragment data that be destroyed after being operated conversion, and not needing the performance of host signal.
Aspect image watermark, we have carried out the investigation of related content, the basis the Image Watermarking Technique algorithm classification as shown in Figure 2, in the back of classification tree, we are introduced existing Image Watermarking Technique algorithm.
Typical Watermark-adding algorithm is divided into two large classes.A kind of when being/the spatial domain algorithm, such as least significant bit (LSB) (LSB) algorithm, Patchwork algorithm.Another large class is the transform domain watermarking algorithm, and classic is discrete cosine transform (DCT), also has in addition wavelet transformation (DWT) and these two kinds of conversion mainly are based on Fourier transform (DFT).Except the time/spatial transform algorithm and frequency domain mapping algorithm, other also have various interpolation algorithms such as compression and algorithm, NEC algorithm, physiological models algorithm.
<1〉spatial domain algorithm
Digital watermarking algorithm early all is on the spatial domain from essence, and digital watermarking directly is carried on the raw data, can also be subdivided into following several method:
(1) least significant bit (LSB) method (LSB) this be a kind of typical spatial domain data hidden algorithm, be the first digit watermarking algorithm that the people such as L.F.Turner and R.G.van Schyndel propose, be a kind of typical Information-Hiding Algorithm in Spatial Domain.The LSB algorithm uses specific key to produce random signal by the m sequencer, then by certain 2 dimension watermark signals that are regularly arranged into, and is inserted into one by one minimum several of original image respective pixel values.Because watermark signal is hidden in lowest order, the signal that energy is faint that has been equivalent to superpose, thereby in vision with acoustically be difficult to discover.Although the LSB algorithm can be hidden more information, the information of hiding can be removed easily, can't satisfy the robustness requirement of digital watermarking, and therefore present digital watermarking software has seldom adopted the LSB algorithm.But, as a kind of information concealing method of big data quantity, LSB in covert communications still in occupation of considerable status.
(2) these two kinds of methods of Patchwork method and texture block mapping code method all are the propositions such as Bender.Patchwork is a kind of digital watermarking based on statistics, and its embedding grammar is to select arbitrarily N to picture point, when increasing some brightness, reduces the brightness value of another point.The hiding of this algorithm is better, and JPEG and the operations such as filtering, compression and rotation that diminish are had resistivity, but is only applicable to have a large amount of arbitrarily images of texture region, and can not fully automatically finish.
(3) people such as file structure microwave method Brassil has at first proposed three kinds of technology of hiding specific binary messages in the general file image, digital watermark information is finished coding by the following structure in the slight adjustment document, comprises vertical mobile line-spacing, horizontal adjustment character-spacing, adjusts text feature (such as font).Digital watermarking based on the method can be resisted some document functions, copies such as photocopying and scanning, but also is easy to destroyedly, and is only applicable to the file and picture class.
<2〉transform-domain algorithm
Technology based on transform domain can embed a large amount of Bit datas and can not cause perceptible defective, often adopts the technology of similar spread spectrum image to hide digital watermark information.This class technology is generally based on image conversion commonly used, based on local or whole conversion, these conversion comprise discrete cosine transform (DCT), wavelet transformation (WT), Fourier transform (FT or FFT) and Hadamard transform (Hadamard transform) etc.Wherein the DCT based on piecemeal is one of the most frequently used conversion.
(1) the earliest a kind of digital watermark technology scheme based on piecemeal DCT is to be selected randomly some piecemeals of image by a key, changes slightly a tlv triple to hide binary sequence information on the intermediate frequency of frequency domain.Being chosen in intermediate frequency component coding is because be easy to be destroyed by various signal processing method at high-frequency coding,, then because people's vision is very sensitive to low frequency component the change of low frequency component is easy to be discovered at the low frequency coding.This digital watermarking algorithm is sane to lossy compression method and low-pass filtering.
(2) another kind of DCT digital watermarking algorithm is at first image to be divided into 8 * 8 not overlaid pixel piece, behind the process block DCT transform, namely obtain the frequency chunks that formed by the DCT coefficient, then choose at random some frequency chunks, with watermark signal embedding people in some DCT coefficients of being selected by cipher controlled.This algorithm is by selected DCT coefficient being carried out small conversion to satisfy specific relation, representing the information of a bit with this.When watermark information extracts, then choose identical DCT coefficient, and according to the Relation extraction bit information between the coefficient.
(3) the image overall dct algorithm is first whole image I to be carried out discrete cosine transform, then watermark is loaded on front k the coefficient of amplitude maximum in the DCT territory (removing DC component), is generally the low frequency component of image.This algorithm not only visually has the imperceptibility of digital watermarking, and robustness is good, can stand to diminish out EG compression, filtering, D/A and the signals such as A/D conversion and weight and process, also can stand the operations [17] such as general geometric transformation such as shearing, convergent-divergent, translation and rotation.The algorithm implementation procedure is: the discrete cosine transform of first computed image (DCT) on the front k-factor of amplitude maximum (not comprising DC component), is generally the low frequency component of image in the DCT territory that then watermark is added to.If front k largest component of DCT coefficient is expressed as D=, i=1 ..., k, watermark is the random sequence of real numbers W=of Gaussian distributed, i=1 ..., k, the embedding algorithm of watermark is di=di (1+awi) so, and wherein constant a is scale factor, the intensity of control Watermark-adding.Then do inverse transformation with new coefficient and obtain watermarking images I.Decoding functions then calculates respectively the discrete cosine transform of original image I and watermarking images I*, and extracts the watermark W* that embeds, and does related check to determine whether existing of watermark again.
(4) DWT is the abbreviation of discrete wavelet territory transform method, its main thought is that signal decomposition is become original small echo through a series of small echos after displacement and the convergent-divergent, come the reconstruct original signal by these small echos, therefore small echo is the basis function of wavelet transformation, the wavelet coefficient reflection be the wavelet basis function of different zoom yardstick and translation parameters shared proportion when the reconstruct original function.It and DCT method all are the methods that belongs to transform domain.
(5) except above-mentioned representational transform-domain algorithm, also have some Digital Watermarking System in Transform Domain methods, quite a few is arranged in the middle of them all is improvement and the development of above-mentioned algorithm, this wherein representational algorithm be the algorithm that Podichuk I. and Zeng Wen-Jun propose.Their method is based on dct transform or the wavelet transformation of rest image, research vision mode module is returned digital watermarking and should be carried in JND (the Just Noticeable Difference that where reaches every place and can bear, lucky discernable difference) value (loading the intensity upper limit of digital watermarking), this watermarking algorithm is adaptive.
(6) be quantizing process in the enterprising row data of dct transform domain based on the core of the compression algorithms such as JPEG, MPEG.A kind of Digital Watermark Scheme for the MPEG-2 compressed video data stream such as the Hartung proposition.
<3〉spread-spectrum watermark algorithm
Usually spread spectrum is used for communication, and low string, the jamproof means of communication of detecting mainly is provided, and Tirkel introduces spread spectrum after the Information hiding, and spread spectrum develops into an important field gradually in the Information hiding field.The spread spectrum information hidden algorithm uses direct sequence and frequency hop sequences spectrum spreading method usually, and ultimate principle is that secret information is directly expanded with the sheet rate, modulates with pseudo random signal, joins in the concealed carrier.
<4〉physiological models algorithm
The physiological models algorithm mainly utilizes human visual system HVS and human auditory system HAS to the masking effect of information change, in conjunction with other algorithm for example the digital watermarking system realized of piecemeal DCT, wavelet decomposition and spatial domain carry out Information hiding and embed digital watermark.The algorithm of considering physiological models has the better transparency and robustness.
<5〉NEC algorithm
This algorithm is proposed by the people such as Cox in NEC laboratory, this algorithm occupies critical role in digital watermarking algorithm, its implementation is: at first produce pseudo-random sequence take key as seed, this sequence has Gauss N(0,1) distributes, secondly image is done dct transform, modulate at last the DCT coefficient of 1000 maximums of this image except DC component with the pseudorandom gaussian sequence.This algorithm has stronger robustness, security, the transparency etc.Owing to adopting special key, therefore can prevent IBM attacks, and this algorithm has also proposed to strengthen the cardinal principle of watermark robustness and anti-attack algorithm, be that watermark signal should embed in the source data people is felt most important part, this watermark signal is made of the random sequence of real numbers of independent same distribution, and this sequence of real numbers should have Gaussian distribution N(0,1) feature.Podilchuk etc. utilizes visual model again this algorithm to be improved subsequently, thereby has improved robustness, the transparency of this algorithm etc.
Weigh the major parameter of watermark quality
The most important performance of various watermaking system is robustness (resisting the various abilities that are not intended to or have a mind to remove embed watermark), and its robustness mainly relies on following important parameter:
(1) quantity of embedding information: this is an important parameter, because it directly affects the robustness of watermark.For the same water mark method, the information that embed is more, and the robustness of watermark is poorer.
(2) watermark embed strength: exist between the observability of watermark embed strength (corresponding to the robustness of watermark) and watermark and trade off, increase robustness and will increase watermark embed strength, correspondingly can increase the observability of watermark.
(3) size of data and characteristic: data size is proportional to robustness.The few of commercial value of the works that contain watermark that data size is little.The embed watermark characteristic is apparent especially on the impact of robustness.The just the sort of watermaking system that is widely used in dissimilar different size carrier that we pursue.
(4) secret information (such as key): although the quantity of secret information does not directly affect observability and the robustness of watermark, it has play a part important to Security of the system.The same with other security system, watermaking system key space (secret information allows the scope of value) must be enough large, so that the exhaustive attack method lost efficacy.
Existing digital watermark generally all is based on single-layer watermark, perhaps a watermark.Single-layer watermark as the term suggests only add one deck watermark exactly on image, is come additional information according to different embedment strengths.Certainly, the intensity of embedding is larger, also can be larger on the impact of original image.And to watermark, although can embed multilayer watermark, existing isolation technics thing for multilayer watermark is less-than-ideal, and easily watermark damages to low layer in high-rise watermark.And this dual mode all can not carry out repeatedly watermark, namely in the different time image is carried out repeatedly watermark.So prior art can't solve the problem of many person-times of multi-level watermarks.
Summary of the invention
The purpose of the embodiment of the invention is to provide a kind of hand-written feature and digital document watermark fusion method, is intended to solve the problem that can't solve many person-times of multi-level watermarks of prior art.
The embodiment of the invention is achieved in that a kind of hand-written feature and digital document watermark fusion method, and described method comprises:
Obtain the document of digital watermarking to be embedded, and the format conversion of the document become picture format, with the conversion after picture format as original document;
Receive the signature of first user, the Format adjusting that first user is signed is that picture format is as the data of first user signature;
With the data disorder of this first user signature, the data behind the scramble as the first watermark data, are adjusted the size of described the first watermark data so that described the first watermark data size occupies the part of described digital watermarking gross space;
By watermarking algorithm described the first watermark data is embedded into image after described original document obtains adding watermark;
Receiving the second user's signature, is that picture format is as the data of the second user's signature with the Format adjusting of the second user's signature; With the data disorder of the second user's signature, the data behind the scramble as the second watermark data, are adjusted the size of described the second watermark data so that described the second watermark data size occupies the part in described digital watermarking space;
By watermarking algorithm with described the second watermark data be embedded into the image that adds after the watermark obtain the intermediate water watermark image;
Carry out follow-up embedding operation, described follow-up embedding operation comprises: the signature that at every turn receives a user in the subsequent user, be that picture format is as the data of this user's signature with this user's signature Format adjusting, data disorder with this user's signature, data behind the scramble as this watermark data, are adjusted the size of described this watermark data so that described this watermark data size occupies the part of described digital watermarking gross space; By watermarking algorithm this watermark data is embedded in image last time;
Repeat described follow-up embedding operation until all user's signatures are complete or embed quantity when reaching setting threshold end operation.
Optionally, described method also comprises when being embedded into watermarking images in image last time:
Obtain coordinate figure, force value and the signature speed of user's signature corresponding to this watermarking images, by described embedding algorithm described coordinate figure, force value and signature speed are embedded in image last time as key.
Optionally, described method also comprises after being embedded into watermarking images in image last time: the signature image that this watermarking images is corresponding adds in this watermarking images with visible demonstration.
On the other hand, provide a kind of computing machine, described computing machine comprises:
Obtain converting unit, be used for obtaining the document of digital watermarking to be embedded, and the format conversion of the document is become picture format, with the picture format after the conversion as original document; Receive the signature of first user, the Format adjusting that first user is signed is that picture format is as the data of first user signature;
The scramble adjustment unit is used for the data disorder with this first user signature, and the data behind the scramble as the first watermark data, are adjusted the size of described the first watermark data so that described the first watermark data size occupies the part of described digital watermarking gross space;
Embedded unit is used for by watermarking algorithm described the first watermark data being embedded into image after described original document obtains adding watermark;
The described converting unit of obtaining also be used for to receive the second user's signature, is that picture format is as the data of the second user's signature with the Format adjusting of the second user's signature;
Described scramble adjustment unit also is used for the data disorder with the second user's signature, and the data behind the scramble as the second watermark data, are adjusted the size of described the second watermark data so that described the second watermark data size occupies the part in described digital watermarking space;
Described embedded unit also is used for by watermarking algorithm described the second watermark data being embedded into the image that is added after the watermark and obtains the intermediate water watermark image;
This embedded unit, be used for each signature that receives a user of subsequent user, be that picture format is as the data of this user's signature with this user's signature Format adjusting, data disorder with this user's signature, data behind the scramble as this watermark data, are adjusted the size of described this watermark data so that described this watermark data size occupies the part of described digital watermarking gross space; By watermarking algorithm this watermark data is embedded in image last time;
Cycling element is used for controlling described this embedded unit cycling until all user's signatures are complete or embed quantity when reaching setting threshold end operation.
Optionally, the described converting unit of obtaining is also for coordinate figure, force value and the signature speed of obtaining user's signature corresponding to this watermarking images; Described embedded unit also is used for by this embedding algorithm this coordinate figure, force value and signature speed being embedded into image last time as key.
Optionally, described embedded unit also is used for the signature image that this watermarking images is corresponding and adds this watermarking images to visible demonstration.
The embodiment of the invention compared with prior art, beneficial effect is: technical scheme of the present invention by adjusting size of data it is existed in the data space of a digital watermarking a plurality of digital watermarkings, do not affect between a plurality of like this digital watermarkings, so it has guaranteed the authenticity and integrity of each watermark, so it solves the problem of many person-times of multi-level watermarks, and technical scheme provided by the invention is directly used, and signature carries out the watermark data embedding on the line, it is true that it has embedding data, verifies simple advantage.
Description of drawings
Fig. 1 is a kind of hand-written feature that provides of the embodiment of the invention and the process flow diagram of digital document watermark fusion method;
Fig. 2 is a kind of document watermark Verification System framework map based on hand-written feature that the embodiment of the invention provides;
Fig. 3 is the process flow diagram that the watermark that provides of the embodiment of the invention embeds;
Fig. 4 is the structural drawing of the computing machine that provides of the embodiment of the invention.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
The specific embodiment of the invention provides a kind of hand-written feature and digital document watermark fusion method, and the method is finished by computing machine, and the method comprises as shown in Figure 1:
101, obtain the document of digital watermarking to be embedded, and the format conversion of the document become picture format, with the conversion after picture format as original document;
102, receive the signature of first user, the Format adjusting that first user is signed is that picture format is as the data of first user signature;
103, with the data disorder of this first user signature, the data behind the scramble as the first watermark data, are adjusted the size of described the first watermark data so that described the first watermark data size occupies the part of described digital watermarking gross space;
104, by watermarking algorithm described the first watermark data is embedded into image after described original document obtains adding watermark;
105, receiving the second user's signature, is that picture format is as the data of the second user's signature with the Format adjusting of the second user's signature; With the data disorder of the second user's signature, the data behind the scramble as the second watermark data, are adjusted the size of described the second watermark data so that described the second watermark data size occupies the part in described digital watermarking space;
106, by watermarking algorithm with described the second watermark data be embedded into the image that adds after the watermark obtain the intermediate water watermark image;
107, receive the signature of a user in the subsequent user at every turn, be that picture format is as the data of this user's signature with this user's signature Format adjusting, data disorder with this user's signature, data behind the scramble as this watermark data, are adjusted the size of described this watermark data so that described this watermark data size occupies the part of described digital watermarking remaining space; By watermarking algorithm this watermark data is embedded in image last time;
108, repeat 107 operation until all user's signatures are complete or embed quantity when reaching setting threshold end operation.
There is it in technical scheme provided by the invention by adjusting size of data a plurality of digital watermarkings in the data space of a digital watermarking, do not affect between a plurality of like this digital watermarkings, so it has guaranteed the authenticity and integrity of each watermark, so it solves the problem of many person-times of multi-level watermarks, and technical scheme provided by the invention is directly used, and signature carries out the watermark data embedding on the line, it is true that it has embedding data, verifies simple advantage.
Optionally, an above-mentioned part is specifically as follows 1/2nd, 1/3rd, 1/4th, 1/5th or sixth etc.
Need to prove, above-mentioned embedding algorithm can be any one algorithm of introducing in the prior art, also can be the Digital Watermarking Embedded Algorithm of introducing in the non-prior art in actual applications certainly.
Optionally, said method also comprises when being embedded into watermarking images in image last time:
Obtain coordinate figure, force value and the signature speed of user's signature corresponding to this watermarking images, by this embedding algorithm this coordinate figure, force value and signature speed are embedded in image last time as key.This kind technical scheme can be guaranteed the authenticity of each signature.
Optionally, said method also comprises after being embedded into watermarking images in image last time: the signature image that this watermarking images is corresponding adds in this watermarking images with visible demonstration.This kind mode has added the signature of visible form, obtains double protection.
Above-mentioned document watermark Verification System framework map based on hand-written feature as shown in Figure 2, the flow process that above-mentioned watermark embeds is as shown in Figure 3.
Optionally, said method can also arrange the embedding amount threshold, ID of each user's signature configuration, and each new user's signature once embeds quantity and adds 1, reaches the embedding amount threshold such as embedding data, directly end operation.
The specific embodiment of the invention also provides a kind of computing machine 400, and computing machine 400 comprises as shown in Figure 4:
Obtain converting unit 401, be used for obtaining the document of digital watermarking to be embedded, and the format conversion of the document is become picture format, with the picture format after the conversion as original document; Receive the signature of first user, the Format adjusting that first user is signed is that picture format is as the data of first user signature;
Scramble adjustment unit 402, be used for the data disorder with this first user signature, data behind the scramble as the first watermark data, are adjusted the size of described the first watermark data so that described the first watermark data size occupies the part of described digital watermarking gross space;
Embedded unit 403 is used for by watermarking algorithm described the first watermark data being embedded into image after described original document obtains adding watermark;
Obtaining converting unit 401, also be used for to receive the second user's signature, is that picture format is as the data of the second user's signature with the Format adjusting of the second user's signature;
Scramble adjustment unit 402 also is used for the data disorder with the second user's signature, and the data behind the scramble as the second watermark data, are adjusted the size of described the second watermark data so that described the second watermark data size occupies the part in described digital watermarking space;
Embedded unit 403 also is used for by watermarking algorithm described the second watermark data being embedded into the image that is added after the watermark and obtains the intermediate water watermark image;
This embedded unit 404, be used for each signature that receives a user of subsequent user, be that picture format is as the data of this user's signature with this user's signature Format adjusting, data disorder with this user's signature, data behind the scramble as this watermark data, are adjusted the size of described this watermark data so that described this watermark data size occupies the part of described digital watermarking; By watermarking algorithm this watermark data is embedded in image last time;
Cycling element 405 is used for these embedded unit 404 cyclings of control until all user's signatures are complete or embed quantity when reaching setting threshold end operation.
Optionally, obtain converting unit 401, also be used for obtaining coordinate figure, force value and the signature speed of user's signature corresponding to this watermarking images; Embedded unit 402 also is used for by this embedding algorithm this coordinate figure, force value and signature speed being embedded into image last time as key.
Optionally, embedded unit 402 also is used for the signature image that this watermarking images is corresponding and adds this watermarking images to visible demonstration.
In said units and the system embodiment, included unit is just divided according to function logic, but is not limited to above-mentioned division, as long as can realize corresponding function; In addition, the concrete title of each functional unit also just for the ease of mutual differentiation, is not limited to protection scope of the present invention.
It will be understood by those skilled in the art that all or part of step of technical scheme that the embodiment of the invention provides is to finish by the relevant hardware of programmed instruction.Such as finishing by the computer run journey.This program can be stored in read/write memory medium, for example, and random access memory, disk, CD etc.
The above only is preferred embodiment of the present invention, not in order to limiting the present invention, all any modifications of doing within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (6)

1. a hand-written feature and digital document watermark fusion method is characterized in that, described method comprises:
Obtain the document of digital watermarking to be embedded, and the format conversion of the document become picture format, with the conversion after picture format as original document;
Receive the signature of first user, the Format adjusting that first user is signed is that picture format is as the data of first user signature;
With the data disorder of this first user signature, the data behind the scramble as the first watermark data, are adjusted the size of described the first watermark data so that described the first watermark data size occupies the part of described digital watermarking gross space;
By watermarking algorithm described the first watermark data is embedded into image after described original document obtains adding watermark;
Receiving the second user's signature, is that picture format is as the data of the second user's signature with the Format adjusting of the second user's signature; With the data disorder of the second user's signature, the data behind the scramble as the second watermark data, are adjusted the size of described the second watermark data so that described the second watermark data size occupies the part in described digital watermarking space;
By watermarking algorithm with described the second watermark data be embedded into the image that adds after the watermark obtain the intermediate water watermark image;
Carry out follow-up embedding operation, described follow-up embedding operation comprises: the signature that at every turn receives a user in the subsequent user, be that picture format is as the data of this user's signature with this user's signature Format adjusting, data disorder with this user's signature, data behind the scramble as this watermark data, are adjusted the size of described this watermark data so that described this watermark data size occupies the part of described digital watermarking gross space; By watermarking algorithm this watermark data is embedded in image last time;
Repeat described follow-up embedding operation until all user's signatures are complete or embed quantity when reaching setting threshold end operation.
2. method according to claim 1 is characterized in that, described method also comprises when being embedded into watermarking images in image last time:
Obtain coordinate figure, force value and the signature speed of user's signature corresponding to this watermarking images, by described embedding algorithm described coordinate figure, force value and signature speed are embedded in image last time as key.
3. method according to claim 1 and 2 is characterized in that, described method also comprises after being embedded into watermarking images in image last time: the signature image that this watermarking images is corresponding adds in this watermarking images with visible demonstration.
4. a computing machine is characterized in that, described computing machine comprises:
Obtain converting unit, be used for obtaining the document of digital watermarking to be embedded, and the format conversion of the document is become picture format, with the picture format after the conversion as original document; Receive the signature of first user, the Format adjusting that first user is signed is that picture format is as the data of first user signature;
The scramble adjustment unit is used for the data disorder with this first user signature, and the data behind the scramble as the first watermark data, are adjusted the size of described the first watermark data so that described the first watermark data size occupies the part of described digital watermarking gross space;
Embedded unit is used for by watermarking algorithm described the first watermark data being embedded into image after described original document obtains adding watermark;
The described converting unit of obtaining also be used for to receive the second user's signature, is that picture format is as the data of the second user's signature with the Format adjusting of the second user's signature;
Described scramble adjustment unit also is used for the data disorder with the second user's signature, and the data behind the scramble as the second watermark data, are adjusted the size of described the second watermark data so that described the second watermark data size occupies the part in described digital watermarking space;
Described embedded unit also is used for by watermarking algorithm described the second watermark data being embedded into the image that is added after the watermark and obtains the intermediate water watermark image;
This embedded unit, be used for each signature that receives a user of subsequent user, be that picture format is as the data of this user's signature with this user's signature Format adjusting, data disorder with this user's signature, data behind the scramble as this watermark data, are adjusted the size of described this watermark data so that described this watermark data size occupies the part of described digital watermarking gross space; By watermarking algorithm this watermark data is embedded in image last time;
Cycling element is used for controlling described this embedded unit cycling until all user's signatures are complete or embed quantity when reaching setting threshold end operation.
5. computing machine according to claim 4 is characterized in that, the described converting unit of obtaining is also for coordinate figure, force value and the signature speed of obtaining user's signature corresponding to this watermarking images; Described embedded unit also is used for by this embedding algorithm this coordinate figure, force value and signature speed being embedded into image last time as key.
6. computing machine according to claim 4 is characterized in that, described embedded unit also is used for the signature image that this watermarking images is corresponding and adds this watermarking images to visible demonstration.
CN201310177196.7A 2013-05-14 2013-05-14 Hand-written feature and digital document visible watermark fusion method Active CN103310403B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310177196.7A CN103310403B (en) 2013-05-14 2013-05-14 Hand-written feature and digital document visible watermark fusion method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310177196.7A CN103310403B (en) 2013-05-14 2013-05-14 Hand-written feature and digital document visible watermark fusion method

Publications (2)

Publication Number Publication Date
CN103310403A true CN103310403A (en) 2013-09-18
CN103310403B CN103310403B (en) 2016-03-09

Family

ID=49135581

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310177196.7A Active CN103310403B (en) 2013-05-14 2013-05-14 Hand-written feature and digital document visible watermark fusion method

Country Status (1)

Country Link
CN (1) CN103310403B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105405091A (en) * 2015-11-03 2016-03-16 浪潮(北京)电子信息产业有限公司 Digital watermark realization method and device under cloud environment
TWI668594B (en) * 2018-05-11 2019-08-11 雲想科技股份有限公司 Electronic signature generation and verification method with digital watermark and electronic device
CN111160335A (en) * 2020-01-02 2020-05-15 腾讯科技(深圳)有限公司 Image watermarking processing method and device based on artificial intelligence and electronic equipment
TWI716037B (en) * 2018-09-30 2021-01-11 開曼群島商創新先進技術有限公司 Method and device for writing and reading digital watermark
CN112434319A (en) * 2020-11-27 2021-03-02 无锡卡尔曼导航技术有限公司 Data encryption method and device for electronic file
CN112579994A (en) * 2020-12-23 2021-03-30 陈子祺 Digital product content protection system and method based on artificial intelligence

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010001613A1 (en) * 1997-02-24 2001-05-24 Masahiro Hashimoto Video-data encoder and recording media wherein a video-data encode program is recorded
CN101661608A (en) * 2009-08-31 2010-03-03 重庆大学 Diginal image blind watermark adding, extracting and removing method suitable for internet
CN102122385A (en) * 2011-02-28 2011-07-13 北京工业大学 Digital watermark method capable of simultaneously resisting various attacks
CN102156956A (en) * 2011-04-19 2011-08-17 南京航空航天大学 High robustness watermark method based on singular value decomposition and discrete cosine transform

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010001613A1 (en) * 1997-02-24 2001-05-24 Masahiro Hashimoto Video-data encoder and recording media wherein a video-data encode program is recorded
CN101661608A (en) * 2009-08-31 2010-03-03 重庆大学 Diginal image blind watermark adding, extracting and removing method suitable for internet
CN102122385A (en) * 2011-02-28 2011-07-13 北京工业大学 Digital watermark method capable of simultaneously resisting various attacks
CN102156956A (en) * 2011-04-19 2011-08-17 南京航空航天大学 High robustness watermark method based on singular value decomposition and discrete cosine transform

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105405091A (en) * 2015-11-03 2016-03-16 浪潮(北京)电子信息产业有限公司 Digital watermark realization method and device under cloud environment
TWI668594B (en) * 2018-05-11 2019-08-11 雲想科技股份有限公司 Electronic signature generation and verification method with digital watermark and electronic device
TWI716037B (en) * 2018-09-30 2021-01-11 開曼群島商創新先進技術有限公司 Method and device for writing and reading digital watermark
CN111160335A (en) * 2020-01-02 2020-05-15 腾讯科技(深圳)有限公司 Image watermarking processing method and device based on artificial intelligence and electronic equipment
CN111160335B (en) * 2020-01-02 2023-07-04 腾讯科技(深圳)有限公司 Image watermark processing method and device based on artificial intelligence and electronic equipment
CN112434319A (en) * 2020-11-27 2021-03-02 无锡卡尔曼导航技术有限公司 Data encryption method and device for electronic file
CN112579994A (en) * 2020-12-23 2021-03-30 陈子祺 Digital product content protection system and method based on artificial intelligence

Also Published As

Publication number Publication date
CN103310403B (en) 2016-03-09

Similar Documents

Publication Publication Date Title
Xuehua Digital watermarking and its application in image copyright protection
Paquet et al. Wavelet packets-based digital watermarking for image verification and authentication
CN103310403B (en) Hand-written feature and digital document visible watermark fusion method
Hadmi et al. Perceptual image hashing
Ramakrishnan et al. Svd based robust digital watermarking for still images using wavelet transform
CN104063834A (en) Watermark embedding method, watermark detecting method and device thereof
Vasudev A review on digital image watermarking and its techniques
AC et al. An overview on research trends, challenges, applications and future direction in digital image watermarking
Su Color image watermarking: algorithms and technologies
Rao et al. R,“Digital watermarking: applications, techniques and attacks”
Parameswaran et al. Content-based watermarking for image authentication using independent component analysis
Verma Review of steganography techniques
Jamal et al. Digital watermarking techniques and its application towards digital halal certificate: A survey
Hu et al. A blind watermarking algorithm for color image based on wavelet transform and Fourier transform
Rajoriya et al. SVD and Frequency Domain based Composite Robust Data hiding scheme for image watermarking
Kammoun et al. New scheme of digital watermarking using an adaptive embedding strength applied on multiresolution filed by 9/7 wavelet
Liao et al. A novel digital image watermarking approach based on image blocks similarity
Adimoolam et al. Anti-piracy for movies using forensic watermarking
Jiang et al. Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing.
Ma Research on Information Hiding Technology Based on Digital Watermarking
Kavadia et al. A literature review on water marking techniques
Zhang et al. Watermarking scheme capable of resisting attacks based on availability of inserter
Belkacem et al. A masking model of hvs for image watermaking in the dct domain
Soni et al. Digital watermarking of wavelet transforms based on coding and decoding techniques
Zeki et al. Investigating Digital Watermark Dynamics on Carrier File by Feed-Forward Neural Network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: 518000, 2nd Floor, Building B2, Zhanfeng Industrial Park, Hangcheng Industrial Zone, Taoyuan Community, Xixiang Street, Bao'an District, Shenzhen City, Guangdong Province

Patentee after: SHENZHEN WAVE MULTIMEDIA Co.,Ltd.

Address before: 518102 Guangdong Shenzhen Baoan District Xixiang Street Fenggang community Xitong 2 plant four floor

Patentee before: SHENZHEN WAVE MULTIMEDIA Co.,Ltd.