CN103593590B - Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment - Google Patents

Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment Download PDF

Info

Publication number
CN103593590B
CN103593590B CN201310573125.9A CN201310573125A CN103593590B CN 103593590 B CN103593590 B CN 103593590B CN 201310573125 A CN201310573125 A CN 201310573125A CN 103593590 B CN103593590 B CN 103593590B
Authority
CN
China
Prior art keywords
watermark
repeatedly
additivity
mixing
cloud environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310573125.9A
Other languages
Chinese (zh)
Other versions
CN103593590A (en
Inventor
王金伟
沈剑
王进
郑钰辉
刘琦
孙星明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Fenghuang Xueyi Education Technology Co., Ltd.
Original Assignee
Nanjing University of Information Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Information Science and Technology filed Critical Nanjing University of Information Science and Technology
Priority to CN201310573125.9A priority Critical patent/CN103593590B/en
Publication of CN103593590A publication Critical patent/CN103593590A/en
Application granted granted Critical
Publication of CN103593590B publication Critical patent/CN103593590B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0071Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention provides the mixing additivity repeatedly watermark embedding method based on cloud environment, the cross-reference of two kinds of different additivity rules is controlled by key, realize the repeatedly embedding of digital watermarking, because embedding method controls by algorithm control key, the security of therefore more traditional additive watermarks system is higher, and robustness is good.The digital watermarking of embedding is decoded to application two kinds different additive insertion rule to present invention also offers same decoding algorithm of the present invention.Owing to employing two class keys, algorithm control key, watermark information encryption key and watermark embedment repeatedly, therefore the present invention to can be implemented in cloud environment many people to the control of system.

Description

Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment
Technical field
The invention belongs to computer information safety technique field, especially relate to and a kind ofly mix additivity repeatedly embed watermark method and corresponding coding/decoding method.
Background technology
Along with popularizing of the arrival of information age, particularly Internet, the safety protection problem of information becomes increasingly conspicuous.Current information security technology is substantially all based on cryptography theory, and no matter be adopt traditional cipher key system or public key cryptosyst, its protected mode is all the access of control documents, becomes ciphertext by file encryption, and disabled user can not be understood.But along with the quick raising of computer process ability, this method improving system level of confidentiality by constantly increasing key length becomes more and more dangerous.On the other hand, multimedia technology is widely used, needs to be encrypted, the audio-visual-data of certification and copyright protection also gets more and more.Digitized audio-visual-data is exactly digital signal in essence, if also adopt password encryption mode to this kind of data, then the signal attribute of itself has just been left in the basket.Recent years, many researchists abandon the technology path of traditional cryptography, attempt carrying out concealed encrypted with various signal processing method to audio-visual-data, and this technology are used for making multimedia " digital watermarking ".
The proposition of digital watermark method is the problem such as copyright protection, traitor tracing in order to solve multi-medium data, not only needs the safety of copyright information but also comprises the safety of watermarking algorithm itself.At present, although a large amount of Digital Watermark Schemes is suggested, the security of the embedded mobile GIS of these conventional digital watermarking projects itself needs to improve further, and especially additive watermarks algorithm, itself is also subject to cipher controlled, and therefore its security also has problems.Traditional additivity digital watermarking system is made up of two parts such as general additive watermarks embedding and general additive watermarks decodings usually, and as shown in Figure 1, being embedded by general additive watermarks will by key K wthe watermark information W of encryption is embedded in initial carrier C, exports the carrier containing watermark.The carrier received, namely may be under attack containing watermark carrier, encrypts the watermark information W produced to combine to detect in carrier whether embed watermark information by general additive watermarks decoding and key K w.We find, traditional additivity digital watermark method has many defects: general additive watermarks embedded mobile GIS does not receive cipher controlled due to itself, and therefore algorithm itself lacks security, and this just brings potential safety hazard to watermark information; In addition, because traditional additive watermarks scheme only uses single key K w, be therefore difficult to realize in cloud environment many people to the co-controlling of scheme.
Summary of the invention
For solving the problem, the invention discloses a kind of digital watermark method using two kinds of regular repeatedly embed watermark informations of different additive insertion and the coding/decoding method corresponded, there is higher security.
In order to achieve the above object, the invention provides following technical scheme:
Based on a mixing additivity repeatedly watermark embedding method for cloud environment, comprise the steps:
The transform method that steps A adopts conversion coefficient to meet generalized Gaussian distribution converts initial carrier;
Step B is by algorithm control key K aproduce the algorithm be made up of 1 and 0 and control random series B, algorithm controls the figure place × embedding number of times of the length=digital watermark information of random series B;
Watermark information is embedded in the carrier after being converted by steps A by following formula by step C:
y i = x i + Σ j = 1 K α ij sign ( x i ) b ij s t w ij
Wherein, w ij∈ P represents by encryption key K wthe pseudo-random sequence of encryption, b ij∈ B represents by algorithm control key K athe algorithm control sequence produced, the number of times of K representative digit watermark embedment, x i∈ X represents the conversion coefficient of initial carrier, y i∈ Y represents the conversion coefficient containing watermark carrier, α ijthe embedment strength of ∈ α representative digit watermark, s t∈ S represents copyright information.
As a kind of preferred version of embed watermark method, described transform method is discrete small wave converting method.
Based on a mixing additivity repeatedly watermark decoding method for cloud environment, comprise the steps:
Steps A receives the image of the mixing additivity repeatedly watermark embedding method embed watermark utilized based on cloud environment;
The transform method that step B adopts conversion coefficient to meet generalized Gaussian distribution converts image, and described transform method is identical with the transform method adopted in watermark embedding method;
Step C adopts following formula to be watermark decode:
Λ ( y ) = Σ i = 1 L Σ j = 1 K c i | y i | ( c i - 1 ) β c i α ij sign ( y i ) ( b ij + 1 ) w ij ;
Wherein, l is the spread spectrum dimension of copyright information, c ibe the form parameter of generalized Gaussian distribution, σ is the standard variance of generalized Gaussian distribution function, and Γ (x) is gamma function;
In step D step C, formula is decoded as following formula:
s t = 1 , &Lambda; ( y ) > 0 0 , &Lambda; ( y ) < 0 .
As a kind of preferred version of coding/decoding method, described transform method is discrete small wave converting method.
The invention has the advantages that: provide the mixing additivity repeatedly watermark embedding method based on cloud environment, the cross-reference of two kinds of different additivity rules is controlled by key, realize the repeatedly embedding of digital watermarking, because embedding method controls by algorithm control key, the security of therefore more traditional additive watermarks system is higher, and robustness is good.The digital watermarking of embedding is decoded to application two kinds different additive insertion rule to present invention also offers same decoding algorithm of the present invention.Owing to employing two class keys, algorithm control key, watermark information encryption key and watermark embedment repeatedly, therefore the present invention to can be implemented in cloud environment many people to the control of system.
Accompanying drawing explanation
Fig. 1 is that traditional additive watermarks embeds and decoding process;
Fig. 2 is mixing additivity provided by the invention repeatedly watermark embedment and decoding process;
Fig. 3 is two kinds of initial carriers not containing watermark;
Fig. 4 is that traditional general additive watermarks embeds, the security performance contrast schematic diagram of coding/decoding method and mixing additivity repeatedly watermark embedment, coding/decoding method;
Fig. 5 is that traditional general additive watermarks embeds, the robustness contrast schematic diagram of coding/decoding method and mixing additivity repeatedly watermark embedment, coding/decoding method.
Embodiment
Below with reference to specific embodiment, technical scheme provided by the invention is described in detail, following embodiment should be understood and be only not used in for illustration of the present invention and limit the scope of the invention.
The invention provides a kind of mixing additivity based on cloud environment repeatedly watermark embedding method and corresponding watermark decoding method, employ two class keys: algorithm control key and watermark information encryption key, and carry out repeatedly watermark embedment, its flow process as shown in Figure 2.
Wherein, mixing additivity repeatedly watermark embedding method uses two kinds of different additive insertion rules simultaneously, i.e. conventional additivity rule and symbol additivity rule, and the cross-reference of control law is carried out by key, thus not homotactic digital watermarking is repeatedly embedded in initial carrier.Specifically, comprise the steps:
The transform method that steps A adopts conversion coefficient to meet generalized Gaussian distribution converts initial carrier, and in this example, we use discrete small wave converting method, and namely DWT converts initial carrier, and its conversion coefficient meets generalized Gaussian distribution (GGD).
Step B is by algorithm control key K aproduce the algorithm be made up of 1 and 0 and control random series B, algorithm controls the figure place × embedding number of times of the length=digital watermark information of random series B; Wherein digital watermark information is by copyright protection information or digital finger-print information S and encryption key K wformed after the pseudo-random sequence P spread spectrum of encryption, therefore the figure place of digital watermark information is exactly the figure place after copyright protection information or digital finger-print information S spread spectrum.Embed number of times and can determine such as have three copyright persons namely to embed three times according to the quantity of copyright owner; Number of times can certainly be embedded by sets itself as required.
Watermark information is embedded in the carrier after being converted by steps A by step C.Two kinds of keys are employed: by encryption key K in this step wthe digital watermark information that encryption embeds, and by algorithm control key K athe additive insertion rule that employing two kinds in control telescopiny is different, concrete embedding formula is as follows:
y i = x i + &Sigma; j = 1 K &alpha; ij sign ( x i ) b ij s t w ij
Wherein, w ij∈ P represents by encryption key K wthe pseudo-random sequence of encryption, this pseudo-random sequence meets and is uniformly distributed; The number of times of K representative digit watermark embedment; x i∈ X represents the conversion coefficient of initial carrier; y i∈ Y represents the conversion coefficient containing watermark carrier; α ijthe embedment strength of ∈ α representative digit watermark; s t∈ S represents that value is the copyright information of 0 or 1; b ij∈ B represents by algorithm control key K athe algorithm control sequence produced.Due to B to be value be 0 or 1 random algorithm control sequence, work as b ijwhen value is 1, i.e. is-symbol additive insertion rule; Work as b ijwhen value is 0, it is namely conventional additive insertion rule.
Said method is at algorithm control key K acontrol under two kinds of different additivity rules are controlled, will by encryption key K wthe digital watermark information of encryption is embedded in the initial carrier of input, thus obtain exporting containing watermark carrier.
Accordingly, present invention also offers a kind of mixing additivity repeatedly watermark decoding method based on cloud environment, comprise the steps:
First steps A receives the image of the mixing additivity repeatedly watermark embedding method embed watermark utilized based on cloud environment;
The transform method that step B adopts conversion coefficient to meet generalized Gaussian distribution converts image, and because the transform method in aforementioned watermark embedding method uses discrete small wave converting method, therefore during decoding, we adopt discrete small wave converting method too.
Step C adopts detection algorithm to be watermark decode, and formula is as follows:
&Lambda; ( y ) = &Sigma; i = 1 L &Sigma; j = 1 K c i | y i | ( c i - 1 ) &beta; c i &alpha; ij sign ( y i ) ( b ij + 1 ) w ij ;
Wherein, l is the spread spectrum dimension of copyright information, c ibe the form parameter of generalized Gaussian distribution, the difference of carrier can cause the different σ of c to be the standard variance of generalized Gaussian distribution function, gamma function.In step D step C, formula is decoded as following formula:
s t = 1 , &Lambda; ( y ) > 0 0 , &Lambda; ( y ) < 0 .
Coding/decoding method is by algorithm control key K a, and utilize detecting device and encryption key K wwhether the digital watermark information W of encryption combines, to carry out watermark decode to the carrier received, thus judge in carrier containing copyright information S.
In order to illustrate advantage of the present invention, we adopt respectively traditional general additive watermarks embedding grammar and mixing additivity provided by the invention repeatedly watermark embedding method carry out watermark embedding operation with for identical carrier (as shown in Figure 3), and adopt corresponding demoder (namely to adopt general additive watermarks coding/decoding method to decode by the carrier of general additive watermarks embedding grammar embed watermark respectively, by mixing additivity repeatedly watermark embedding method embed watermark carrier adopt mixing additivity repeatedly watermark decoding method decode) carry out watermark decode, carry out robustness for decoded result and compare (as shown in Figure 4) and security contrast (as shown in Figure 5).Clearly, the security of watermark embedment is high, robustness good, is obviously better than classic method to adopt the inventive method to carry out.
Technological means disclosed in the present invention program is not limited only to the technological means disclosed in above-mentioned embodiment, also comprises the technical scheme be made up of above technical characteristic combination in any.It should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention, can also make some improvements and modifications, these improvements and modifications are also considered as protection scope of the present invention.

Claims (4)

1., based on a mixing additivity repeatedly watermark embedding method for cloud environment, it is characterized in that, comprise the steps:
The transform method that steps A adopts conversion coefficient to meet generalized Gaussian distribution converts initial carrier;
Step B is by algorithm control key K aproduce the algorithm be made up of 1 and 0 and control random series B, algorithm controls the figure place × embedding number of times of the length=digital watermark information of random series B;
Watermark information is embedded in the carrier after being converted by steps A by following formula by step C:
y i = x i + &Sigma; j = 1 K &alpha; i j s i g n ( x i ) b i j s t w i j
Wherein, w ij∈ P represents by encryption key K wthe pseudo-random sequence of encryption, b ij∈ B represents by algorithm control key K athe algorithm control sequence produced, the number of times of K representative digit watermark embedment, x i∈ X represents the conversion coefficient of initial carrier, y i∈ Y represents the conversion coefficient containing watermark carrier, α ijthe embedment strength of ∈ α representative digit watermark, s t∈ S represents copyright information.
2. the mixing additivity repeatedly watermark embedding method based on cloud environment according to claim 1, is characterized in that: the transform method in described steps A is discrete small wave converting method.
3., based on a mixing additivity repeatedly watermark decoding method for cloud environment, it is characterized in that, comprise the steps:
Step 1 receives the image of the utilization described in claim 1 or 2 based on the mixing additivity repeatedly watermark embedding method embed watermark of cloud environment;
The transform method that step 2 adopts conversion coefficient to meet generalized Gaussian distribution converts image, and described transform method is identical with the transform method adopted in watermark embedding method;
Step 3 adopts following formula to be watermark decode:
&Lambda; ( y ) = &Sigma; i = 1 L &Sigma; j = 1 K c i | y i | ( c i - 1 ) &beta; c i &alpha; i j s i g n ( y i ) ( b i j + 1 ) w i j ;
Wherein, l is the spread spectrum dimension of copyright information, c ibe the form parameter of generalized Gaussian distribution, σ is the standard variance of generalized Gaussian distribution function, and Γ (x) is gamma function;
In step 4 step 3, formula is decoded as following formula:
s t = 1 , &Lambda; ( y ) > 0 0 , &Lambda; ( y ) < 0 .
4. the mixing additivity repeatedly watermark decoding method based on cloud environment according to claim 3, is characterized in that: described transform method is discrete small wave converting method.
CN201310573125.9A 2013-11-18 2013-11-18 Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment Active CN103593590B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310573125.9A CN103593590B (en) 2013-11-18 2013-11-18 Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310573125.9A CN103593590B (en) 2013-11-18 2013-11-18 Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment

Publications (2)

Publication Number Publication Date
CN103593590A CN103593590A (en) 2014-02-19
CN103593590B true CN103593590B (en) 2016-03-30

Family

ID=50083727

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310573125.9A Active CN103593590B (en) 2013-11-18 2013-11-18 Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment

Country Status (1)

Country Link
CN (1) CN103593590B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104917989A (en) * 2014-03-11 2015-09-16 移康智能科技(上海)有限公司 Hierarchical watermark adding method and system
CN103971323B (en) * 2014-05-22 2017-02-15 复旦大学 Digital watermark steganography method based on scrambling transformation and morphological component analysis
CN106599630A (en) * 2016-12-12 2017-04-26 中国矿业大学 Improved additive spread spectrum watermarking method
CN109752017B (en) * 2018-12-29 2021-02-02 同济大学 Travel route track generation system for unmanned low-speed vehicle
CN109561107B (en) * 2019-01-04 2021-01-26 广东电网有限责任公司 Secret conference system based on WIFI
CN109981290A (en) * 2019-03-26 2019-07-05 南京信息工程大学 The communication system and method close based on no certificate label under a kind of intelligent medical environment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101464995A (en) * 2008-12-22 2009-06-24 武汉大学 Digital watermarking method for two-dimension vector space data based on spacing topological
CN101968878A (en) * 2010-11-18 2011-02-09 南京师范大学 Multiple digital watermarking method for geographic information system (GIS) vector data
CN102142131A (en) * 2011-05-12 2011-08-03 北京大学 Encrypted kinoform based digital image watermarking embedding and extracting methods and systems
CN103971323A (en) * 2014-05-22 2014-08-06 复旦大学 Digital watermark steganography method based on scrambling transformation and morphological component analysis

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101464995A (en) * 2008-12-22 2009-06-24 武汉大学 Digital watermarking method for two-dimension vector space data based on spacing topological
CN101968878A (en) * 2010-11-18 2011-02-09 南京师范大学 Multiple digital watermarking method for geographic information system (GIS) vector data
CN102142131A (en) * 2011-05-12 2011-08-03 北京大学 Encrypted kinoform based digital image watermarking embedding and extracting methods and systems
CN103971323A (en) * 2014-05-22 2014-08-06 复旦大学 Digital watermark steganography method based on scrambling transformation and morphological component analysis

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于DWT的数字水印改进算法;陈力等;《信息系统工程》;20110920;第18-20页 *

Also Published As

Publication number Publication date
CN103593590A (en) 2014-02-19

Similar Documents

Publication Publication Date Title
CN103593590B (en) Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment
Lee et al. Reversible data hiding scheme based on dual stegano-images using orientation combinations
CN103310407A (en) Vector geographic space data totally blind watermarking method based on QR code
Saeed A new technique based on chaotic steganography and encryption text in DCT domain for color image
CN109547663B (en) Improved LSB image steganography method combined with cryptography
CN103854652A (en) Robust blind audio frequency watermarking algorithm based on SVD (Singular Value Decomposition) and ANN (Artificial Neural Network)
Sharma et al. Impementation of QR code based secure system for information sharing using Matlab
Wu Joint security and robustness enhancement for quantization based data embedding
Zhu et al. An image authentication technology based on digital watermarking
CN104376236A (en) Scheme self-adaptive digital watermark embedding and extracting method based on camouflage technology
Kumar et al. Image steganography using index based chaotic mapping
CN104144277B (en) Multi-path image lossless hidden transmission method
Zhi et al. Detection of random LSB image steganography
CN113609506B (en) NLP technology-based text digital watermark tampering monitoring method
Chomphoosang et al. Survey of trust based communications in social networks
Dewangan et al. Development and analysis of stego image using discrete wavelet transform
CN115883744A (en) Watermark method, device and storage medium based on fractional order chaotic mapping
Jiang et al. A new comprehensive security protection for remote sensing image based on the integration of encryption and watermarking
Rao et al. A novel information security scheme using cryptic steganography
Singla et al. A Hash Based Approach for secure image stegnograpgy using canny edge detection method
CN107169913A (en) A kind of digital picture steganography method based on the optimal key of search
Stanescu et al. Steganography on embedded devices
Geetha et al. Image steganography by variable embedding and multiple edge detection using canny operator
Azizifard et al. Information steganography within 3D images using residue number system
Qi et al. An adaptive DCT-based mod-4 steganographic method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190822

Address after: 223600 Tenth Floor of Building A of Shuyang Software Industrial Park, Suqian City, Jiangsu Province

Patentee after: Jiangsu Fenghuang Xueyi Education Technology Co., Ltd.

Address before: 210044 Nanjing Ning Road, Jiangsu, No. six, No. 219

Patentee before: Nanjing University of Information Science and Technology