CN103700059A - Cloud storage image data ownership verifying method based on multifunction digital watermark - Google Patents

Cloud storage image data ownership verifying method based on multifunction digital watermark Download PDF

Info

Publication number
CN103700059A
CN103700059A CN201310703640.4A CN201310703640A CN103700059A CN 103700059 A CN103700059 A CN 103700059A CN 201310703640 A CN201310703640 A CN 201310703640A CN 103700059 A CN103700059 A CN 103700059A
Authority
CN
China
Prior art keywords
watermark
block
data
sub
image data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310703640.4A
Other languages
Chinese (zh)
Other versions
CN103700059B (en
Inventor
任勇军
沈剑
成亚萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nord Network Technology Co ltd
Original Assignee
Nanjing University of Information Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Information Science and Technology filed Critical Nanjing University of Information Science and Technology
Priority to CN201310703640.4A priority Critical patent/CN103700059B/en
Publication of CN103700059A publication Critical patent/CN103700059A/en
Application granted granted Critical
Publication of CN103700059B publication Critical patent/CN103700059B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a cloud storage image data ownership verifying method based on a multifunctional digital watermark. The method comprises the following steps that A, a data owner embeds a multifunction digital watermark into image data; B, the data owner transmits the image data embedded with the watermark to a cloud server so as to store the image data; C, the data owner verifies the image data stored in the cloud server by virtue of detecting the watermark embedded into the image data. D, if detecting that the fragile/semi-fragile watermark is in good condition, indicating that the data integrity is protected; if detecting that data content is damaged, repairing relevant information by virtue of the content restorable watermark; if requiring the data owner to provide the copyright and a user tracing function, verifying by virtue of detecting a Robust watermark. According to the method, the multifunctional watermark is adopted for performing data verification, so that an effect of achieving multiple purposes by use of one technology is achieved, and the method is beneficial to the deployment and implementation of a cloud storage safety system.

Description

The cloud storing image data property held method of proof based on multifunction digital watermark
Technical field
The invention belongs to digital watermark technology field, the especially a kind of cloud storage data property held method of proof based on multifunction digital watermark.
Background technology
2007, on ACM Computers and Communication security conference (CCS ' 07), the people such as Ateniese have proposed data existence proof (PDP under cloud environment, ProvableDataPossession) concept, based on rsa cryptosystem system, (RSA is conventional cipher mechanism in employing, the conventional cipher mechanism of information security field) homomorphism identifying algorithm, the public audit technology that a kind of data exist has been proposed.But at this algorithm, realize in the process of audit, same user data block, through repeatedly verification, can solve out by linear combination equation, thereby may cause the leakage of user data.Ateniese and Curtmola etc. had carried out some improvement for their definition and the defect of scheme afterwards.After this data storage method of proof starts towards future development with better function, emerge many achievements in research: from only supporting static store data to develop into, support to develop into dynamic memory data and support third party's public audit from a supported data owner individual audit.
The existing method addressing these problems is all to utilize the cryptographic techniques such as hash function, encryption and digital signature, and the information that can prove data owner's rights and interests is attached to data subject storage and propagates as a mark (Tag).The greatest problem of doing like this has two; one is the potential safety hazards such as data existence separated with mark is forged; another is that what need to use respectively during for data proof of possession, data ownership proof and copyright protection is different mark and diverse ways, is unfavorable for that system disposes and implement.
Digital watermarking can be divided into fragile watermark, semi-fragile watermarking and robust watermarking according to the characteristic of watermark.Fragile watermark is very responsive to the change of carrier, can not stand any change and processing, even if the minor alteration of carrier also should be detected.But often under many circumstances, carrier more or less can be subject to some and process, and has therefore proposed semi-fragile watermarking, and fragile watermark and semi-fragile watermarking are mainly used in authentication, such as distorting of carrier pointed out and integrity detection.Robust watermarking is mainly used in the copyright protection of digital product and follows the trail of, and it requires the watermark that embeds carrier can stand the attack of various operations, and can be from destroyed extracting containing watermark carrier.
Summary of the invention
Technical matters to be solved by this invention is to overcome the deficiencies in the prior art, designs a kind of cloud storing image data property held method of proof based on digital watermarking.
The present invention is for solving the problems of the technologies described above specifically by the following technical solutions:
The present invention proposes a kind of cloud storing image data property held method of proof based on multifunction digital watermark, comprises the following steps:
A. data owner is in multifunction digital watermark embedded images data, and described multifunction digital watermark comprises that fragility/semi-fragile watermarking, content can recover two or more the watermark in watermark, robust watermarking;
B. data owner sends the view data of embed watermark to Cloud Server and stores;
C. data verification person, by detecting the watermark in embedded images data, verifies the view data of Cloud Server storage;
If D. detected, find that fragility/semi-fragile watermarking is intact, data integrity protected is described; If detected, find that data content is damaged, by content, can recover watermark relevant information is repaired; If need to provide copyright and user tracking function to data owner, by detecting robust watermarking, verify.
Further, the cloud storing image data property the held method of proof based on multifunction digital watermark of the present invention, data owner will comprise the following steps in multifunction digital watermark embedded images data described in steps A:
A1. first embed robust watermarking, specific as follows:
101, the original image that is M * M by size is divided into the sub-block that the size of non-overlapping copies is m * m; M, m are natural number;
102, each sub-block is carried out to svd computing, take out the maximum singular value of each sub-block, be designated as S i, the sequence number that i is sub-block, i=1,2 ..., (M/m) 2;
103, the average of calculating all sub-block maximum singular values, is designated as S av,
S av = S 1 + S 2 + . . . + S ( M / m ) 2 ( M / m ) 2 ;
104, by contrast S iand S avbetween numerical values recited produce original watermark sequence W, if S i>S av, W i=1, otherwise W i=0; Original watermark sequence W is embedded in all sub-blocks, complete the embedding of robust watermarking;
A2. secondly embed fragility/semi-fragile watermarking, realize embedding content simultaneously and can recover watermark, realize the dual-use function being integrated for distorting detection and recovery information set; Specific as follows:
201, by embedding size after robust watermarking, be divided into the sub-block that the size of non-overlapping copies is m * m for the image of M * M;
202, each sub-block is carried out to discrete cosine transform, obtain piece matrix of coefficients C i,j, i, j represents respectively this sub-block coordinate position in partitioned matrix, to each piece matrix of coefficients C i,jwith Joint Photographic Experts Group quantization table Q, quantize to obtain quantizing rear matrix of coefficients QC i,j, QC i,jcomprise discrete cosine transform direct current and low frequency coefficient after quantification, reflected the main contents of image; Matrix of coefficients QC after this is quantized i,jbe embedded into not quantize block matrix of coefficients C i,jfrequency domain in, complete the embedding of fragility/semi-fragile watermarking;
203, establishing current block is I i,j, its successor block is I i ', j ', each piece in image has unique separately forerunner and successor block, forms a circular linked list, the mapping of piece position is shone upon by diagonally opposing corner, make to distort continuously when becoming piece cutting meeting with, the watermark information being kept in successor block is intact, makes to recover distorting piece;
Choose current block and successor block, calculate its relation vector R=QC i,j-QC i ', j ', then this is related to vector is embedded into not quantize block matrix of coefficients C i,jfrequency domain in; Complete embedding content and can recover watermark;
By above-mentioned A1 and A2 step, completing multifunctional watermark is embedded in original digital image data.
Further, the cloud storing image data property the held method of proof based on multifunction digital watermark of the present invention, for fragility/semi-fragile watermarking, proves that the method for data integrity is:
If I i,j' be current image block to be detected, its successor block is I i ', j '', C i,j' be piece I i,j' the matrix of coefficients of not quantized-dct, QC i,j' and QC i ', j '' being respectively the content vector of corresponding current image block to be detected, successor block, the error that is related between two is:
δ ( I i , j ' , I i ' , j ' ' ) = Σ k = 1 m | R ( i ' , j ' ) ' - R ( i ' , j ' ) ' | ;
R ' (i, j), R ' (i ', j ')be respectively the relation vector of current image block to be detected, successor block;
If current block I i,j' be tampered or malicious operation, compose JM (i, j)=0, JM judges matrix, if be not tampered or malicious operation, composes JM (i, j)=1, and obtains thus the integrated authentication function of view data content.
Further, the cloud storing image data property held method of proof based on multifunction digital watermark of the present invention, when the content of view data is subject to distorting, by content, can recovers the method that watermark repairs relevant information and be: by the relation vector R ' being stored in successor block, carry out extensive restored data: I i,j' for being distorted piece or uncertain, its successor block is I i ', j '', calculate R '+QC i ', j ''=QC i,j'.
Further, the cloud storing image data property the held method of proof based on multifunction digital watermark of the present invention, for the detection method of the robust watermarking embedding is:
By image or under fire image be divided into the sub-block that the size of non-overlapping copies is m * m, each sub-block is carried out to svd computing, take out the maximum singular value of each sub-block, be designated as S i';
The average of calculating all sub-block maximum singular values, is designated as S av',
S av ' = S 1 ' + S 2 ' + . . . + S ( M / m ) 2 ' ( M / m ) 2 ;
By contrast S i' and S av' the watermark sequence W ' of numerical values recited after producing under fire, if S i' >S av', W i'=1, otherwise W i'=0;
The similarity of between zero watermark sequence W ' of calculating original zero watermark sequence W and under fire extracting afterwards, definition similarity is
Figure BDA0000441419790000041
according to predefined threshold value th, adjudicate copyright ownership: if s>=th adjudicates so view data holder and has legal copyright; Otherwise judgement does not have legal copyright.
The present invention adopts above technical scheme, compared with prior art has following beneficial effect:
Cloud storing image data the holding property method of proof of utilization of the present invention based on multifunction digital watermark; the function of data content Integrity Verification not only can be provided; and can recover damaged data content; and can provide to data content the functions such as copyright protection by robust watermarking; realize the effect that adopts a kind of technology to reach plurality of target, be conducive to deployment and the enforcement of cloud storage security system.
Accompanying drawing explanation
Fig. 1 is the cloud storing image data property the held method of proof schematic diagram based on multifunction digital watermark.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described in detail:
Multifunctional watermark proposed by the invention refers to and in numerical information, embeds watermark of different nature, reach different objects, for example in piece image, embed a visible watermark and an invisible watermark, the former is for copyright notice simultaneously, and the latter is for copyright protection; And for example in piece image, embed a fragile watermark and a robust watermarking, the former can be for distorting prompting simultaneously, and the latter can be for copyright protection.
As shown in Figure 1; the present invention proposes the cloud storing image data property the held method of proof based on multifunction digital watermark: adopt fragile watermark/semi-fragile watermarking that the integrated authentication function of data content is provided; adopting content can recover watermark can restore funcitons to what data content was provided when damaging appears in data content, and employing robust watermarking provides the copyright protection function of data.Specifically comprise the following steps:
A. data owner is in multifunction digital watermark embedded images data, and described multifunction digital watermark comprises that fragile watermark/semi-fragile watermarking, content can recover watermark, robust watermarking;
B. data owner sends the view data of embed watermark to Cloud Server and stores;
C. data verification person, by detecting the watermark in embedded images data, verifies the view data of Cloud Server storage;
If D. detected, find that fragility/semi-fragile watermarking is intact, data integrity protected is described; If detected, find that data content is damaged, by content, can recover watermark relevant information is repaired; If need to provide copyright and user tracking function to data owner, by detecting robust watermarking, verify.
The present embodiment be take multifunction digital watermark and is used object to be example as image, specific as follows:
Steps A, data owner are by multifunction digital watermark embedding data, and fragile watermark, because its fragility easily goes to pot, so embedding is sequentially to embed fragile watermark after first embedding robust watermarking, specifically comprises the following steps:
A1. first embed robust watermarking:
The original image that is M * M by size is divided into the sub-block that the size of non-overlapping copies is m * m;
Each sub-block is carried out svd computing, takes out the maximum singular value of each sub-block, is designated as S i, the sequence number that i is sub-block, i=1,2 ..., (M/m) 2;
The average of calculating all sub-block maximum singular values, is designated as S av,
S av = S 1 + S 2 + . . . + S ( M / m ) 2 ( M / m ) 2 ;
Original watermark sequence W is by contrast S iand S avbetween numerical values recited produce, if S i>S av, W i=1, otherwise W i=0; Original watermark sequence W is embedded in all sub-blocks, complete the embedding of robust watermarking.
A2. secondly embed fragile watermark, by the feature meeting the demands is carried out enable after coding spread spectrum and main contents between directly form a kind of original function and the two-way like this mapping relations one to one of inverse function, realized the dual-use function being integrated for distorting the information set that detects and recover:
The original image that is M * M by size is divided into the sub-block that the size of non-overlapping copies is m * m;
Again each piece is carried out to discrete cosine transform, obtain piece matrix of coefficients C i,j, i, j represents this piece coordinate position in partitioned matrix, to each piece C i,jwith Joint Photographic Experts Group quantization table Q, quantize to obtain quantizing rear matrix of coefficients QC i,j, QC i,jcomprise discrete cosine transform direct current and low frequency coefficient after quantification, reflected the main contents of image;
Current block is I i,j, its successor block is I i ', j ', each piece in image has unique separately forerunner and successor block, forms a circular linked list, the mapping of piece position is shone upon by diagonally opposing corner, make to distort continuously when becoming piece cutting meeting with, the watermark information being kept in successor block is intact as far as possible, is convenient to these to distort the recovery of piece;
Choose current block and successor block, calculate it and be related to R=QC i,j-QC i ', j ', then this relation is embedded into not quantize block matrix of coefficients C i,jfrequency domain in, realize to embed content and can recover watermark:
By above-mentioned steps, realizing multifunctional watermark is embedded in original digital image data.
Further, when the multifunctional watermark of embedding is fragile watermark, prove that the method for data integrity is:
I i,j' be current image block to be detected, its successor block is I i ', j '', C i,j' be piece I i,j' the matrix of coefficients of not quantized-dct, QC i,j' and QC i ', j '' be the content vector of corresponding blocks, the error that is related between two is
δ ( I i , j ' , I i ' , j ' ' ) = Σ k = 1 m | R ( i ' , j ' ) ' - R ( i ' , j ' ) ' | ;
If current block I i,j' be tampered or malicious operation, compose JM (i, j)=0, JM judges matrix, if be not tampered or malicious operation, composes JM (i, j)=1, and obtains thus the integrated authentication function of view data content.
Further, when the content of view data is subject to distorting, by content, can recovers the method that watermark repairs relevant information and be:
In previous step, the content of view data is distorted, and by the relation vector being stored in successor block, carrys out extensive restored data: I i,j' for being distorted piece or uncertain, its successor block is I i ', j '', calculate R '+QC i ', j ''=QC i,j'.
Detection method when further, the multifunctional watermark of embedding is robust watermarking is:
By image or under fire image be divided into the sub-block that the size of non-overlapping copies is m * m, each sub-block is carried out svd computing, takes out the maximum singular value of each sub-block, is designated as S i';
The average of calculating all sub-block maximum singular values, is designated as S av',
S av ' = S 1 ' + S 2 ' + . . . + S ( M / m ) 2 ' ( M / m ) 2 ;
Watermark sequence W ' is under fire by contrast S i' and S av' numerical values recited produce, if S i' >S av',
W i'=1, otherwise W i'=0;
The similarity of between zero watermark sequence W ' of calculating original zero watermark sequence W and under fire extracting afterwards, definition similarity is
Figure BDA0000441419790000063
according to predefined threshold value, adjudicate copyright ownership: if s>=th, th is threshold value, adjudicates so view data holder and has legal copyright; Otherwise judgement does not have legal copyright.This threshold value th arranges according to the General Requirement of image, those skilled in the art all should know, such as can reference: the < < of < < Journal of Computer Research and Development > > interim publication of calendar year 2001 05 is Research on threshold selection > > mono-literary composition apart from tolerance based on image difference.
Although the present invention describes by specific embodiment, it will be appreciated by those skilled in the art that, in the situation that not departing from minute invention scope, can also carry out various conversion and be equal to alternative the present invention.In addition, for particular condition, can make various modifications to the present invention, and not depart from the scope of the present invention.Therefore, the present invention is not limited to disclosed specific embodiment, and should comprise the whole embodiments that fall within the scope of the claims in the present invention.

Claims (5)

1. the cloud storing image data property the held method of proof based on multifunction digital watermark, is characterized in that: comprise the following steps:
A. data owner is in multifunction digital watermark embedded images data, and described multifunction digital watermark comprises that fragility/semi-fragile watermarking, content can recover two or more the watermark in watermark, robust watermarking;
B. data owner sends the view data of embed watermark to Cloud Server and stores;
C. data verification person, by detecting the watermark in embedded images data, verifies the view data of Cloud Server storage;
If D. detected, find that fragility/semi-fragile watermarking is intact, data integrity protected is described; If detected, find that data content is damaged, by content, can recover watermark relevant information is repaired; If need to provide copyright and user tracking function to data owner, by detecting robust watermarking, verify.
2. the cloud storing image data property the held method of proof based on multifunction digital watermark according to claim 1, is characterized in that: described in steps A, data owner will comprise the following steps in multifunction digital watermark embedded images data:
A1. first embed robust watermarking, specific as follows:
101, the original image that is M * M by size is divided into the sub-block that the size of non-overlapping copies is m * m; M, m are natural number;
102, each sub-block is carried out to svd computing, take out the maximum singular value of each sub-block, be designated as S i, the sequence number that i is sub-block, i=1,2 ..., (M/m) 2;
103, the average of calculating all sub-block maximum singular values, is designated as S av,
S av = S 1 + S 2 + . . . + S ( M / m ) 2 ( M / m ) 2 ;
104, by contrast S iand S avbetween numerical values recited produce original watermark sequence W, if S i>S av, W i=1, otherwise W i=0; Original watermark sequence W is embedded in all sub-blocks, complete the embedding of robust watermarking;
A2. secondly embed fragility/semi-fragile watermarking, realize embedding content simultaneously and can recover watermark, realize the dual-use function being integrated for distorting detection and recovery information set; Specific as follows:
201, by embedding size after robust watermarking, be divided into the sub-block that the size of non-overlapping copies is m * m for the image of M * M;
202, each sub-block is carried out to discrete cosine transform, obtain piece matrix of coefficients C i,j, i, j represents respectively this sub-block coordinate position in partitioned matrix, to each piece matrix of coefficients C i,jwith Joint Photographic Experts Group quantization table Q, quantize to obtain quantizing rear matrix of coefficients QC i,j, QC i,jcomprise discrete cosine transform direct current and low frequency coefficient after quantification, reflected the main contents of image; Matrix of coefficients QC after this is quantized i,jbe embedded into not quantize block matrix of coefficients C i,jfrequency domain in, complete the embedding of fragility/semi-fragile watermarking;
203, establishing current block is I i,j, its successor block is I i ', j ', each piece in image has unique separately forerunner and successor block, forms a circular linked list, the mapping of piece position is shone upon by diagonally opposing corner, make to distort continuously when becoming piece cutting meeting with, the watermark information being kept in successor block is intact, makes to recover distorting piece;
Choose current block and successor block, calculate its relation vector R=QC i,j-QC i ', j ', then this is related to vector is embedded into not quantize block matrix of coefficients C i,jfrequency domain in, complete embedding content and can recover watermark;
By above-mentioned A1 and A2 step, completing multifunctional watermark is embedded in original digital image data.
3. the cloud storing image data property the held method of proof based on multifunction digital watermark according to claim 2, is characterized in that: for fragility/semi-fragile watermarking, prove that the method for data integrity is:
If I i,j' be current image block to be detected, its successor block is I i ', j '', C i,j' be piece I i,j' the matrix of coefficients of not quantized-dct, QC i,j' and QC i ', j '' being respectively the content vector of corresponding current image block to be detected, successor block, the error that is related between two is:
&delta; ( I i , j ' , I i ' , j ' ' ) = &Sigma; k = 1 m | R ( i ' , j ' ) ' - R ( i ' , j ' ) ' | ;
R ' (i, j), R ' (i ', j ')be respectively the relation vector of current image block to be detected, successor block;
If current block I i,j' be tampered or malicious operation, compose JM (i, j)=0, JM judges matrix, if be not tampered or malicious operation, composes JM (i, j)=1, and obtains thus the integrated authentication function of view data content.
4. the cloud storing image data property the held method of proof based on multifunction digital watermark according to claim 3, it is characterized in that: when the content of view data is subject to distorting, by content, can recovers the method that watermark repairs relevant information and be: by the relation vector R ' being stored in successor block, carry out extensive restored data: I i,j' for being distorted piece or uncertain, its successor block is I i ', j '', calculate R '+QC i ', j ''=QC i,j'.
5. the cloud storing image data property the held method of proof based on multifunction digital watermark according to claim 2, is characterized in that: the detection method for the robust watermarking embedding is:
By image or under fire image be divided into the sub-block that the size of non-overlapping copies is m * m, each sub-block is carried out to svd computing, take out the maximum singular value of each sub-block, be designated as S i';
The average of calculating all sub-block maximum singular values, is designated as S av',
S av ' = S 1 ' + S 2 ' + . . . + S ( M / m ) 2 ' ( M / m ) 2 ;
By contrast S i' and S av' the watermark sequence W ' of numerical values recited after producing under fire, if S i' >S av', W i'=1,
Otherwise W i'=0;
The similarity of between zero watermark sequence W ' of calculating original zero watermark sequence W and under fire extracting afterwards, definition similarity is
Figure FDA0000441419780000031
according to predefined threshold value th, adjudicate copyright ownership: if s>=th adjudicates so view data holder and has legal copyright; Otherwise judgement does not have legal copyright.
CN201310703640.4A 2013-12-19 2013-12-19 The cloud storage view data property held method of proof based on multifunction digital watermark Active CN103700059B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310703640.4A CN103700059B (en) 2013-12-19 2013-12-19 The cloud storage view data property held method of proof based on multifunction digital watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310703640.4A CN103700059B (en) 2013-12-19 2013-12-19 The cloud storage view data property held method of proof based on multifunction digital watermark

Publications (2)

Publication Number Publication Date
CN103700059A true CN103700059A (en) 2014-04-02
CN103700059B CN103700059B (en) 2016-08-17

Family

ID=50361578

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310703640.4A Active CN103700059B (en) 2013-12-19 2013-12-19 The cloud storage view data property held method of proof based on multifunction digital watermark

Country Status (1)

Country Link
CN (1) CN103700059B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104361284A (en) * 2014-10-26 2015-02-18 重庆智韬信息技术中心 Third-party intrusion monitoring method for cloud storage data packet
CN105139335A (en) * 2015-10-13 2015-12-09 蒋铭 Image copyright identification and tampering detection system
CN109285106A (en) * 2018-10-11 2019-01-29 中南大学 A kind of reversible reduction method of the medical image based on SLT-SVD
CN110134647A (en) * 2019-04-01 2019-08-16 中国科学院信息工程研究所 A kind of digital watermark method that supporting cloud data deduplication and system
CN111104694A (en) * 2019-12-02 2020-05-05 华中科技大学 Data encoding method and system supporting data support sexual certification and data repair
CN115225278A (en) * 2022-06-07 2022-10-21 西安电子科技大学 Data-perception-hash-based data possession proving method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101021941A (en) * 2007-03-23 2007-08-22 北京理工大学 Multi-channel filter group-based multifunction digital watermark method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101021941A (en) * 2007-03-23 2007-08-22 北京理工大学 Multi-channel filter group-based multifunction digital watermark method

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
李国良等: ""多小波域可恢复半脆弱数字水印算法"", 《计算机工程》 *
李文等: ""一种用于图像篡改定位与恢复的双水印算法"", 《电子科技》 *
王祖喜等: ""用于图像认证的可恢复半脆弱数字水印"", 《中国图象图形学报》 *
蒋慧钧: ""多功能数字水印技术的研究与实现"", 《中国优秀硕士学位论文全文数据库(电子期刊).信息科技辑》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104361284A (en) * 2014-10-26 2015-02-18 重庆智韬信息技术中心 Third-party intrusion monitoring method for cloud storage data packet
CN105139335A (en) * 2015-10-13 2015-12-09 蒋铭 Image copyright identification and tampering detection system
CN109285106A (en) * 2018-10-11 2019-01-29 中南大学 A kind of reversible reduction method of the medical image based on SLT-SVD
CN110134647A (en) * 2019-04-01 2019-08-16 中国科学院信息工程研究所 A kind of digital watermark method that supporting cloud data deduplication and system
CN110134647B (en) * 2019-04-01 2021-08-06 中国科学院信息工程研究所 Digital watermarking method and system supporting cloud data deduplication
CN111104694A (en) * 2019-12-02 2020-05-05 华中科技大学 Data encoding method and system supporting data support sexual certification and data repair
CN111104694B (en) * 2019-12-02 2021-12-31 华中科技大学 Data encoding method and system supporting data support sexual certification and data repair
CN115225278A (en) * 2022-06-07 2022-10-21 西安电子科技大学 Data-perception-hash-based data possession proving method
CN115225278B (en) * 2022-06-07 2024-06-04 西安电子科技大学 Data-holding proving method based on data-aware hash

Also Published As

Publication number Publication date
CN103700059B (en) 2016-08-17

Similar Documents

Publication Publication Date Title
Qi et al. A robust content-based digital image watermarking scheme
Farfoura et al. A novel blind reversible method for watermarking relational databases
Wang et al. Reversible fragile watermarking for 2-D vector map authentication with localization
CN103700059A (en) Cloud storage image data ownership verifying method based on multifunction digital watermark
Hsu et al. Image tamper detection and recovery using adaptive embedding rules
Wang et al. Reversible fragile watermarking for locating tampered blocks in 2D vector maps
CN104077624A (en) Methods and systems for generating and checking electronic note with anti-counterfeiting two-dimension code
CN100547608C (en) The method of digital figure watermark and related device and the digital camera that can add watermark
CN104063731A (en) Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology
CN102142129B (en) Visual secret sharing-based image content tampering detection method
Hsu et al. DIGITAL WATERMARKING SCHEME FOR COPYRIGHT PROTECTION AND TAMPERING DETECTION.
CN102013088B (en) Digital watermark generation and embedding method based on comprehensive characteristics of digital archival resources
CN103123719A (en) Zero watermark method for image authentication and tamper localization
Huang et al. A spherical coordinate based fragile watermarking scheme for 3D models
CN106599727B (en) A kind of map vector completeness certification method
Muttoo et al. Watermarking digital vector map using graph theoretic approach
JP5913041B2 (en) Secret information concealment device, secret information restoration device, secret information concealment program, and secret information restoration program
CN113989089B (en) Invisible picture watermark processing method, invisible picture watermark processing system, invisible picture watermark processing computer equipment and intelligent terminal
CN104866737B (en) A kind of DEM fragile watermark completeness certification methods for taking features of terrain into account
Shivani et al. An effective pixel-wise fragile watermarking scheme based on ARA bits
Fang et al. Image tampering location and restoration watermarking based on blockchain technology
Manjunatha et al. A survey on image forgery detection techniques
Al-Taay et al. Multimedia Data Hiding Evaluation Metrics
Zope-Chaudhari et al. Robust watermarking for protection of geospatial data
Shivani et al. A dual watermarking scheme for ownership verification and pixel level authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190307

Address after: No. 1, Mount Everest Road, emun Avenue, Zhenjiang, Jiangsu

Patentee after: Nord Logistics Co.,Ltd.

Address before: Room 1302, No. 1, Lane 2277, Zuchong Road, China (Shanghai) Free Trade Pilot Area, Pudong New Area, Shanghai, 200120

Patentee before: Shanghai Airlines Intellectual Property Services Ltd.

Effective date of registration: 20190307

Address after: Room 1302, No. 1, Lane 2277, Zuchong Road, China (Shanghai) Free Trade Pilot Area, Pudong New Area, Shanghai, 200120

Patentee after: Shanghai Airlines Intellectual Property Services Ltd.

Address before: Room 2310, Building 2, Wuzhong Science and Technology Pioneering Park, 70 Zhongshan East Road, Mudu Town, Wuzhong District, Suzhou City, Jiangsu Province

Patentee before: Nanjing University of Information Science and Technology

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: No. 1 Zhufeng Road, Jinrun Avenue, Zhenjiang City, Jiangsu Province, 212300

Patentee after: Nord Network Technology Co.,Ltd.

Country or region after: Zhong Guo

Address before: No. 1, Mount Everest Road, emun Avenue, Zhenjiang, Jiangsu

Patentee before: Nord Logistics Co.,Ltd.

Country or region before: Zhong Guo