CN103593590B - Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment - Google Patents
Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment Download PDFInfo
- Publication number
- CN103593590B CN103593590B CN201310573125.9A CN201310573125A CN103593590B CN 103593590 B CN103593590 B CN 103593590B CN 201310573125 A CN201310573125 A CN 201310573125A CN 103593590 B CN103593590 B CN 103593590B
- Authority
- CN
- China
- Prior art keywords
- watermark
- repeatedly
- additivity
- mixing
- cloud environment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 72
- 238000006243 chemical reaction Methods 0.000 claims description 13
- 238000001228 spectrum Methods 0.000 claims description 5
- 238000005315 distribution function Methods 0.000 claims description 3
- 239000000654 additive Substances 0.000 abstract description 22
- 230000000996 additive effect Effects 0.000 abstract description 22
- 238000003780 insertion Methods 0.000 abstract description 7
- 230000037431 insertion Effects 0.000 abstract description 7
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000000969 carrier Substances 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1063—Personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention provides the mixing additivity repeatedly watermark embedding method based on cloud environment, the cross-reference of two kinds of different additivity rules is controlled by key, realize the repeatedly embedding of digital watermarking, because embedding method controls by algorithm control key, the security of therefore more traditional additive watermarks system is higher, and robustness is good.The digital watermarking of embedding is decoded to application two kinds different additive insertion rule to present invention also offers same decoding algorithm of the present invention.Owing to employing two class keys, algorithm control key, watermark information encryption key and watermark embedment repeatedly, therefore the present invention to can be implemented in cloud environment many people to the control of system.
Description
Technical field
The invention belongs to computer information safety technique field, especially relate to and a kind ofly mix additivity repeatedly embed watermark method and corresponding coding/decoding method.
Background technology
Along with popularizing of the arrival of information age, particularly Internet, the safety protection problem of information becomes increasingly conspicuous.Current information security technology is substantially all based on cryptography theory, and no matter be adopt traditional cipher key system or public key cryptosyst, its protected mode is all the access of control documents, becomes ciphertext by file encryption, and disabled user can not be understood.But along with the quick raising of computer process ability, this method improving system level of confidentiality by constantly increasing key length becomes more and more dangerous.On the other hand, multimedia technology is widely used, needs to be encrypted, the audio-visual-data of certification and copyright protection also gets more and more.Digitized audio-visual-data is exactly digital signal in essence, if also adopt password encryption mode to this kind of data, then the signal attribute of itself has just been left in the basket.Recent years, many researchists abandon the technology path of traditional cryptography, attempt carrying out concealed encrypted with various signal processing method to audio-visual-data, and this technology are used for making multimedia " digital watermarking ".
The proposition of digital watermark method is the problem such as copyright protection, traitor tracing in order to solve multi-medium data, not only needs the safety of copyright information but also comprises the safety of watermarking algorithm itself.At present, although a large amount of Digital Watermark Schemes is suggested, the security of the embedded mobile GIS of these conventional digital watermarking projects itself needs to improve further, and especially additive watermarks algorithm, itself is also subject to cipher controlled, and therefore its security also has problems.Traditional additivity digital watermarking system is made up of two parts such as general additive watermarks embedding and general additive watermarks decodings usually, and as shown in Figure 1, being embedded by general additive watermarks will by key K
wthe watermark information W of encryption is embedded in initial carrier C, exports the carrier containing watermark.The carrier received, namely may be under attack containing watermark carrier, encrypts the watermark information W produced to combine to detect in carrier whether embed watermark information by general additive watermarks decoding and key K w.We find, traditional additivity digital watermark method has many defects: general additive watermarks embedded mobile GIS does not receive cipher controlled due to itself, and therefore algorithm itself lacks security, and this just brings potential safety hazard to watermark information; In addition, because traditional additive watermarks scheme only uses single key K w, be therefore difficult to realize in cloud environment many people to the co-controlling of scheme.
Summary of the invention
For solving the problem, the invention discloses a kind of digital watermark method using two kinds of regular repeatedly embed watermark informations of different additive insertion and the coding/decoding method corresponded, there is higher security.
In order to achieve the above object, the invention provides following technical scheme:
Based on a mixing additivity repeatedly watermark embedding method for cloud environment, comprise the steps:
The transform method that steps A adopts conversion coefficient to meet generalized Gaussian distribution converts initial carrier;
Step B is by algorithm control key K
aproduce the algorithm be made up of 1 and 0 and control random series B, algorithm controls the figure place × embedding number of times of the length=digital watermark information of random series B;
Watermark information is embedded in the carrier after being converted by steps A by following formula by step C:
Wherein, w
ij∈ P represents by encryption key K
wthe pseudo-random sequence of encryption, b
ij∈ B represents by algorithm control key K
athe algorithm control sequence produced, the number of times of K representative digit watermark embedment, x
i∈ X represents the conversion coefficient of initial carrier, y
i∈ Y represents the conversion coefficient containing watermark carrier, α
ijthe embedment strength of ∈ α representative digit watermark, s
t∈ S represents copyright information.
As a kind of preferred version of embed watermark method, described transform method is discrete small wave converting method.
Based on a mixing additivity repeatedly watermark decoding method for cloud environment, comprise the steps:
Steps A receives the image of the mixing additivity repeatedly watermark embedding method embed watermark utilized based on cloud environment;
The transform method that step B adopts conversion coefficient to meet generalized Gaussian distribution converts image, and described transform method is identical with the transform method adopted in watermark embedding method;
Step C adopts following formula to be watermark decode:
Wherein,
l is the spread spectrum dimension of copyright information, c
ibe the form parameter of generalized Gaussian distribution, σ is the standard variance of generalized Gaussian distribution function, and Γ (x) is gamma function;
In step D step C, formula is decoded as following formula:
As a kind of preferred version of coding/decoding method, described transform method is discrete small wave converting method.
The invention has the advantages that: provide the mixing additivity repeatedly watermark embedding method based on cloud environment, the cross-reference of two kinds of different additivity rules is controlled by key, realize the repeatedly embedding of digital watermarking, because embedding method controls by algorithm control key, the security of therefore more traditional additive watermarks system is higher, and robustness is good.The digital watermarking of embedding is decoded to application two kinds different additive insertion rule to present invention also offers same decoding algorithm of the present invention.Owing to employing two class keys, algorithm control key, watermark information encryption key and watermark embedment repeatedly, therefore the present invention to can be implemented in cloud environment many people to the control of system.
Accompanying drawing explanation
Fig. 1 is that traditional additive watermarks embeds and decoding process;
Fig. 2 is mixing additivity provided by the invention repeatedly watermark embedment and decoding process;
Fig. 3 is two kinds of initial carriers not containing watermark;
Fig. 4 is that traditional general additive watermarks embeds, the security performance contrast schematic diagram of coding/decoding method and mixing additivity repeatedly watermark embedment, coding/decoding method;
Fig. 5 is that traditional general additive watermarks embeds, the robustness contrast schematic diagram of coding/decoding method and mixing additivity repeatedly watermark embedment, coding/decoding method.
Embodiment
Below with reference to specific embodiment, technical scheme provided by the invention is described in detail, following embodiment should be understood and be only not used in for illustration of the present invention and limit the scope of the invention.
The invention provides a kind of mixing additivity based on cloud environment repeatedly watermark embedding method and corresponding watermark decoding method, employ two class keys: algorithm control key and watermark information encryption key, and carry out repeatedly watermark embedment, its flow process as shown in Figure 2.
Wherein, mixing additivity repeatedly watermark embedding method uses two kinds of different additive insertion rules simultaneously, i.e. conventional additivity rule and symbol additivity rule, and the cross-reference of control law is carried out by key, thus not homotactic digital watermarking is repeatedly embedded in initial carrier.Specifically, comprise the steps:
The transform method that steps A adopts conversion coefficient to meet generalized Gaussian distribution converts initial carrier, and in this example, we use discrete small wave converting method, and namely DWT converts initial carrier, and its conversion coefficient meets generalized Gaussian distribution (GGD).
Step B is by algorithm control key K
aproduce the algorithm be made up of 1 and 0 and control random series B, algorithm controls the figure place × embedding number of times of the length=digital watermark information of random series B; Wherein digital watermark information is by copyright protection information or digital finger-print information S and encryption key K
wformed after the pseudo-random sequence P spread spectrum of encryption, therefore the figure place of digital watermark information is exactly the figure place after copyright protection information or digital finger-print information S spread spectrum.Embed number of times and can determine such as have three copyright persons namely to embed three times according to the quantity of copyright owner; Number of times can certainly be embedded by sets itself as required.
Watermark information is embedded in the carrier after being converted by steps A by step C.Two kinds of keys are employed: by encryption key K in this step
wthe digital watermark information that encryption embeds, and by algorithm control key K
athe additive insertion rule that employing two kinds in control telescopiny is different, concrete embedding formula is as follows:
Wherein, w
ij∈ P represents by encryption key K
wthe pseudo-random sequence of encryption, this pseudo-random sequence meets and is uniformly distributed; The number of times of K representative digit watermark embedment; x
i∈ X represents the conversion coefficient of initial carrier; y
i∈ Y represents the conversion coefficient containing watermark carrier; α
ijthe embedment strength of ∈ α representative digit watermark; s
t∈ S represents that value is the copyright information of 0 or 1; b
ij∈ B represents by algorithm control key K
athe algorithm control sequence produced.Due to B to be value be 0 or 1 random algorithm control sequence, work as b
ijwhen value is 1, i.e. is-symbol additive insertion rule; Work as b
ijwhen value is 0, it is namely conventional additive insertion rule.
Said method is at algorithm control key K
acontrol under two kinds of different additivity rules are controlled, will by encryption key K
wthe digital watermark information of encryption is embedded in the initial carrier of input, thus obtain exporting containing watermark carrier.
Accordingly, present invention also offers a kind of mixing additivity repeatedly watermark decoding method based on cloud environment, comprise the steps:
First steps A receives the image of the mixing additivity repeatedly watermark embedding method embed watermark utilized based on cloud environment;
The transform method that step B adopts conversion coefficient to meet generalized Gaussian distribution converts image, and because the transform method in aforementioned watermark embedding method uses discrete small wave converting method, therefore during decoding, we adopt discrete small wave converting method too.
Step C adopts detection algorithm to be watermark decode, and formula is as follows:
Wherein,
l is the spread spectrum dimension of copyright information, c
ibe the form parameter of generalized Gaussian distribution, the difference of carrier can cause the different σ of c to be the standard variance of generalized Gaussian distribution function,
gamma function.In step D step C, formula is decoded as following formula:
Coding/decoding method is by algorithm control key K
a, and utilize detecting device and encryption key K
wwhether the digital watermark information W of encryption combines, to carry out watermark decode to the carrier received, thus judge in carrier containing copyright information S.
In order to illustrate advantage of the present invention, we adopt respectively traditional general additive watermarks embedding grammar and mixing additivity provided by the invention repeatedly watermark embedding method carry out watermark embedding operation with for identical carrier (as shown in Figure 3), and adopt corresponding demoder (namely to adopt general additive watermarks coding/decoding method to decode by the carrier of general additive watermarks embedding grammar embed watermark respectively, by mixing additivity repeatedly watermark embedding method embed watermark carrier adopt mixing additivity repeatedly watermark decoding method decode) carry out watermark decode, carry out robustness for decoded result and compare (as shown in Figure 4) and security contrast (as shown in Figure 5).Clearly, the security of watermark embedment is high, robustness good, is obviously better than classic method to adopt the inventive method to carry out.
Technological means disclosed in the present invention program is not limited only to the technological means disclosed in above-mentioned embodiment, also comprises the technical scheme be made up of above technical characteristic combination in any.It should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention, can also make some improvements and modifications, these improvements and modifications are also considered as protection scope of the present invention.
Claims (4)
1., based on a mixing additivity repeatedly watermark embedding method for cloud environment, it is characterized in that, comprise the steps:
The transform method that steps A adopts conversion coefficient to meet generalized Gaussian distribution converts initial carrier;
Step B is by algorithm control key K
aproduce the algorithm be made up of 1 and 0 and control random series B, algorithm controls the figure place × embedding number of times of the length=digital watermark information of random series B;
Watermark information is embedded in the carrier after being converted by steps A by following formula by step C:
Wherein, w
ij∈ P represents by encryption key K
wthe pseudo-random sequence of encryption, b
ij∈ B represents by algorithm control key K
athe algorithm control sequence produced, the number of times of K representative digit watermark embedment, x
i∈ X represents the conversion coefficient of initial carrier, y
i∈ Y represents the conversion coefficient containing watermark carrier, α
ijthe embedment strength of ∈ α representative digit watermark, s
t∈ S represents copyright information.
2. the mixing additivity repeatedly watermark embedding method based on cloud environment according to claim 1, is characterized in that: the transform method in described steps A is discrete small wave converting method.
3., based on a mixing additivity repeatedly watermark decoding method for cloud environment, it is characterized in that, comprise the steps:
Step 1 receives the image of the utilization described in claim 1 or 2 based on the mixing additivity repeatedly watermark embedding method embed watermark of cloud environment;
The transform method that step 2 adopts conversion coefficient to meet generalized Gaussian distribution converts image, and described transform method is identical with the transform method adopted in watermark embedding method;
Step 3 adopts following formula to be watermark decode:
Wherein,
l is the spread spectrum dimension of copyright information, c
ibe the form parameter of generalized Gaussian distribution, σ is the standard variance of generalized Gaussian distribution function, and Γ (x) is gamma function;
In step 4 step 3, formula is decoded as following formula:
4. the mixing additivity repeatedly watermark decoding method based on cloud environment according to claim 3, is characterized in that: described transform method is discrete small wave converting method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310573125.9A CN103593590B (en) | 2013-11-18 | 2013-11-18 | Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310573125.9A CN103593590B (en) | 2013-11-18 | 2013-11-18 | Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103593590A CN103593590A (en) | 2014-02-19 |
CN103593590B true CN103593590B (en) | 2016-03-30 |
Family
ID=50083727
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310573125.9A Active CN103593590B (en) | 2013-11-18 | 2013-11-18 | Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103593590B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104917989A (en) * | 2014-03-11 | 2015-09-16 | 移康智能科技(上海)有限公司 | Hierarchical watermark adding method and system |
CN103971323B (en) * | 2014-05-22 | 2017-02-15 | 复旦大学 | Digital watermark steganography method based on scrambling transformation and morphological component analysis |
CN106599630A (en) * | 2016-12-12 | 2017-04-26 | 中国矿业大学 | Improved additive spread spectrum watermarking method |
CN109752017B (en) * | 2018-12-29 | 2021-02-02 | 同济大学 | Travel route track generation system for unmanned low-speed vehicle |
CN109561107B (en) * | 2019-01-04 | 2021-01-26 | 广东电网有限责任公司 | Secret conference system based on WIFI |
CN109981290A (en) * | 2019-03-26 | 2019-07-05 | 南京信息工程大学 | The communication system and method close based on no certificate label under a kind of intelligent medical environment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101464995A (en) * | 2008-12-22 | 2009-06-24 | 武汉大学 | Digital watermarking method for two-dimension vector space data based on spacing topological |
CN101968878A (en) * | 2010-11-18 | 2011-02-09 | 南京师范大学 | Multiple digital watermarking method for geographic information system (GIS) vector data |
CN102142131A (en) * | 2011-05-12 | 2011-08-03 | 北京大学 | Encrypted kinoform based digital image watermarking embedding and extracting methods and systems |
CN103971323A (en) * | 2014-05-22 | 2014-08-06 | 复旦大学 | Digital watermark steganography method based on scrambling transformation and morphological component analysis |
-
2013
- 2013-11-18 CN CN201310573125.9A patent/CN103593590B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101464995A (en) * | 2008-12-22 | 2009-06-24 | 武汉大学 | Digital watermarking method for two-dimension vector space data based on spacing topological |
CN101968878A (en) * | 2010-11-18 | 2011-02-09 | 南京师范大学 | Multiple digital watermarking method for geographic information system (GIS) vector data |
CN102142131A (en) * | 2011-05-12 | 2011-08-03 | 北京大学 | Encrypted kinoform based digital image watermarking embedding and extracting methods and systems |
CN103971323A (en) * | 2014-05-22 | 2014-08-06 | 复旦大学 | Digital watermark steganography method based on scrambling transformation and morphological component analysis |
Non-Patent Citations (1)
Title |
---|
基于DWT的数字水印改进算法;陈力等;《信息系统工程》;20110920;第18-20页 * |
Also Published As
Publication number | Publication date |
---|---|
CN103593590A (en) | 2014-02-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103593590B (en) | Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment | |
Lee et al. | Reversible data hiding scheme based on dual stegano-images using orientation combinations | |
CN103310407A (en) | Vector geographic space data totally blind watermarking method based on QR code | |
Saeed | A new technique based on chaotic steganography and encryption text in DCT domain for color image | |
CN109547663B (en) | Improved LSB image steganography method combined with cryptography | |
CN103854652A (en) | Robust blind audio frequency watermarking algorithm based on SVD (Singular Value Decomposition) and ANN (Artificial Neural Network) | |
Sharma et al. | Impementation of QR code based secure system for information sharing using Matlab | |
Wu | Joint security and robustness enhancement for quantization based data embedding | |
Zhu et al. | An image authentication technology based on digital watermarking | |
CN104376236A (en) | Scheme self-adaptive digital watermark embedding and extracting method based on camouflage technology | |
Kumar et al. | Image steganography using index based chaotic mapping | |
CN104144277B (en) | Multi-path image lossless hidden transmission method | |
Zhi et al. | Detection of random LSB image steganography | |
CN113609506B (en) | NLP technology-based text digital watermark tampering monitoring method | |
Chomphoosang et al. | Survey of trust based communications in social networks | |
Dewangan et al. | Development and analysis of stego image using discrete wavelet transform | |
CN115883744A (en) | Watermark method, device and storage medium based on fractional order chaotic mapping | |
Jiang et al. | A new comprehensive security protection for remote sensing image based on the integration of encryption and watermarking | |
Rao et al. | A novel information security scheme using cryptic steganography | |
Singla et al. | A Hash Based Approach for secure image stegnograpgy using canny edge detection method | |
CN107169913A (en) | A kind of digital picture steganography method based on the optimal key of search | |
Stanescu et al. | Steganography on embedded devices | |
Geetha et al. | Image steganography by variable embedding and multiple edge detection using canny operator | |
Azizifard et al. | Information steganography within 3D images using residue number system | |
Qi et al. | An adaptive DCT-based mod-4 steganographic method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190822 Address after: 223600 Tenth Floor of Building A of Shuyang Software Industrial Park, Suqian City, Jiangsu Province Patentee after: Jiangsu Fenghuang Xueyi Education Technology Co., Ltd. Address before: 210044 Nanjing Ning Road, Jiangsu, No. six, No. 219 Patentee before: Nanjing University of Information Science and Technology |