CN103700059B - The cloud storage view data property held method of proof based on multifunction digital watermark - Google Patents

The cloud storage view data property held method of proof based on multifunction digital watermark Download PDF

Info

Publication number
CN103700059B
CN103700059B CN201310703640.4A CN201310703640A CN103700059B CN 103700059 B CN103700059 B CN 103700059B CN 201310703640 A CN201310703640 A CN 201310703640A CN 103700059 B CN103700059 B CN 103700059B
Authority
CN
China
Prior art keywords
block
watermark
data
sub
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310703640.4A
Other languages
Chinese (zh)
Other versions
CN103700059A (en
Inventor
任勇军
沈剑
成亚萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nord Network Technology Co ltd
Original Assignee
Nanjing University of Information Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Information Science and Technology filed Critical Nanjing University of Information Science and Technology
Priority to CN201310703640.4A priority Critical patent/CN103700059B/en
Publication of CN103700059A publication Critical patent/CN103700059A/en
Application granted granted Critical
Publication of CN103700059B publication Critical patent/CN103700059B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a kind of cloud storage view data property held method of proof based on multifunction digital watermark, comprise the following steps: A. data owner is by multifunction digital watermark embedded images data;B. the view data embedding watermark is sent to Cloud Server and stores by data owner;C. data verification person is by the watermark in detection embedded images data, verifies the view data of Cloud Server storage;If D. detection finds that fragility/semi-fragile watermarking is intact, then explanation data integrity is protected;If detection finds that data content is destroyed, watermark can be recovered by content and relevant information is repaired;If needing data owner provides copyright and user tracking function, then verified by detection robust watermarking.The present invention uses multifunctional watermark to carry out data verification, it is achieved thereby that use a kind of technology to reach deployment and the enforcement of the effect of plurality of target, beneficially cloud storage security system.

Description

The cloud storage view data property held method of proof based on multifunction digital watermark
Technical field
The invention belongs to digital watermark technology field, a kind of cloud storage data based on multifunction digital watermark are held Property method of proof.
Background technology
2007, on ACM Computers and Communication security conference (CCS ' 07), Ateniese et al. proposed Yun Huan The concept of data existence proof (PDP, ProvableDataPossession) under border, uses based on rsa cryptosystem body The homomorphism identifying algorithm of system (RSA is conventional cipher mechanism, is that information security field commonly uses cipher mechanism), it is proposed that The public audit technology that a kind of data exist.But during this algorithm realizes audit, same user data block is through too much Secondary verification, can solve out by linear combination equation, consequently, it is possible to cause the leakage of user data.Ateniese later I and Curtmola etc. have carried out some for their definition and the defect of scheme to be improved.Hereafter data storage proves Method starts to develop towards direction with better function, emerges many achievements in research: from only supporting that static storage data develop To supporting dynamic memory data, from only supporting that data owner individual's audit develops into support third party's public audit.
The method of existing these problems of solution is all to utilize the cryptographic technique such as hash function, encrypted and digitally signed, demonstrate,proving The information of bright data owner's rights and interests is attached to data subject storage as a labelling (Tag) and propagates.Do so Greatest problem has two, and one is that data separate the potential safety hazards such as existence is forged with labelling, and another is to hold for data Need to use different labellings and different methods respectively, no when having proof, data ownership proof and copyright protection It is beneficial to system deployment and enforcement.
Digital watermarking can be divided into fragile watermark, semi-fragile watermarking and robust watermarking according to the characteristic of watermark.Fragile watermark pair The change of carrier is very sensitive, it is impossible to stand any change and process, even if the minor alteration of carrier also should be detected Out.But the most under many circumstances, carrier more or less can be processed by some, it is therefore proposed that semi-fragile watermarking, Fragile watermark and semi-fragile watermarking are mainly used in certification, and distorting of such as carrier is pointed out and integrity detection.Robust watermarking The copyright protection being mainly used in digital product is followed the trail of, and it requires that the watermark embedding carrier can stand attacking of various operation Hit, and can extract containing watermark carrier from destroyed.
Summary of the invention
The technical problem to be solved is to overcome the deficiencies in the prior art, designs a kind of cloud based on digital watermarking The storage view data property held method of proof.
The present invention solves that above-mentioned technical problem is concrete by the following technical solutions:
The present invention proposes a kind of cloud storage view data property held method of proof based on multifunction digital watermark, including following Step:
A. data owner is by multifunction digital watermark embedded images data, and described multifunction digital watermark includes fragility / semi-fragile watermarking, content can recover two or more the watermark in watermark, robust watermarking;
B. the view data embedding watermark is sent to Cloud Server and stores by data owner;
C. data verification person is by the watermark in detection embedded images data, tests the view data of Cloud Server storage Card;
If D. detection finds that fragility/semi-fragile watermarking is intact, then explanation data integrity is protected;If detection is sent out Existing data content is destroyed, and can recover watermark by content and repair relevant information;If needing data are had Person provides copyright and user tracking function, then verified by detection robust watermarking.
Further, the cloud storage view data property the held method of proof based on multifunction digital watermark of the present invention, step Data owner described in A will comprise the following steps in multifunction digital watermark embedded images data:
First robust watermarking is embedded, specific as follows:
101, the original image that size is M × M is divided into the sub-block that size is m × m of non-overlapping copies;M, m are equal For natural number;
102, each sub-block is carried out singular value decomposition computing, take out the maximum singular value of each sub-block, be designated as Si, i is son The sequence number of block, i=1,2 ..., (M/m)2
103, calculate the average of all sub-block maximum singular values, be designated as Sav, i.e.
S av = S 1 + S 2 + . . . + S ( M / m ) 2 ( M / m ) 2 ;
104, by contrast SiAnd SavBetween numerical values recited produce original watermark sequence W, if Si>Sav, then Wi=1, Otherwise Wi=0;Original watermark sequence W is embedded in all sub-blocks, completes the embedding of robust watermarking;
The most secondly embed fragility/semi-fragile watermarking, realize embedding content simultaneously and can recover watermark, it is achieved will be used for distorting The dual-use function that detection and the information of recovery integrate;Specific as follows:
201, after embedding robust watermarking, size is the sub-block that the size that image division is non-overlapping copies is m × m of M × M;
202, each sub-block is carried out discrete cosine transform, obtain block coefficient matrix Ci,j, i, j represent that this sub-block exists respectively Coordinate position in matrix in block form, to each piece of coefficient matrix Ci,jCarry out quantization with Joint Photographic Experts Group quantization table Q to be quantified Rear coefficient matrix QCi,j, QCi,jComprise the discrete cosine transform direct current after quantization and low frequency coefficient, reflect the main of image Content;By coefficient matrix QC after this quantizationi,jIt is embedded into and does not quantifies block coefficient matrix Ci,jFrequency domain in, complete fragility/half The embedding of fragile watermark;
203, current block is set as Ii,j, its successor block is Ii′,j′, each block in image have the most unique forerunner and Successor block, forms a circular linked list, and block position maps and maps by diagonally opposing corner so that distorts continuously meeting with and becomes During block cutting, the watermark information being saved in successor block is intact so that can recover distorting block;
Choose current block and successor block, calculate its relation vector R=QCi,j-QCi′,j′, then this relation vector is embedded into Do not quantify block coefficient matrix Ci,jFrequency domain in;Complete to embed content and can recover watermark;
Complete multifunctional watermark by above-mentioned A1 and A2 step to be embedded in original digital image data.
Further, the cloud storage view data property the held method of proof based on multifunction digital watermark of the present invention, for Fragility/semi-fragile watermarking, it was demonstrated that the method for data integrity is:
If Ii,j' for current image block to be detected, its successor block is Ii′,j′', Ci,j' for block Ii,j' non-quantized-dct Coefficient matrix, QCi,j' and QCi′,j′' the most corresponding current image block to be detected, the content vector of successor block, between two pieces Relationship error be:
δ ( I i , j ' , I i ' , j ' ' ) = Σ k = 1 m | R ( i ' , j ' ) ' - R ( i ' , j ' ) ' | ;
R′(i,j)、R′(i′,j′)It is respectively current image block to be detected, the relation vector of successor block;
If current block Ii,j' be tampered or malicious operation, then compose JM (i, j)=0, JM are trip current, without Be tampered or malicious operation, then compose JM (i, j)=1, and be derived from the integrated authentication function of picture data content.
Further, the cloud storage view data property the held method of proof based on multifunction digital watermark of the present invention, work as figure When being tampered with as the content of data, can recover, by content, the method that relevant information repaired by watermark is: by depositing Storage relation vector R ' in successor block carrys out extensive restored data: Ii,j' for distorted block or uncertain piece, its successor block is Ii′,j′', calculate R '+QCi′,j′′=QCi,j′。
Further, the cloud storage view data property the held method of proof based on multifunction digital watermark of the present invention, for The detection method of the robust watermarking embedded is:
By image or under fire image division be the sub-block that size is m × m of non-overlapping copies, each sub-block is carried out unusual Value decomposition operation, takes out the maximum singular value of each sub-block, is designated as Si′;
Calculate the average of all sub-block maximum singular values, be designated as Sav', i.e.
S av ' = S 1 ' + S 2 ' + . . . + S ( M / m ) 2 ' ( M / m ) 2 ;
By contrast Si' and Sav' numerical values recited produce under fire after watermark sequence W ', if Si′>Sav', then Wi'=1, otherwise Wi′=0;
Calculate original zero watermarking sequence W and the similarity of zero watermarking sequence between W ' extracted the most afterwards, define similarity ForAccording to threshold value th set in advance judgement copyright ownership: if s >=th, then decision diagram As data holder has legal copyright;Otherwise, judgement does not have legal copyright.
The present invention uses above technical scheme, compared with prior art has the advantages that
The present invention utilizes the cloud storage view data property held method of proof based on multifunction digital watermark, can not only provide The function of data content Integrity Verification, and damaged data content can be recovered, and by robust watermarking energy Enough to functions such as data content offer copyright protections, it is achieved that to use a kind of technology to reach the effect of plurality of target, be conducive to The deployment of cloud storage security system and enforcement.
Accompanying drawing explanation
Fig. 1 is the cloud storage view data property held method of proof schematic diagram based on multifunction digital watermark.
Detailed description of the invention
Below in conjunction with the accompanying drawings the detailed description of the invention of the present invention is described in detail:
Multifunctional watermark proposed by the invention refers to embed watermark of different nature in digital information, reaches different mesh , in piece image, such as it being simultaneously embedded in a visible watermark and an invisible watermark, the former is used for copyright notice, The latter is used for copyright protection;In piece image, and for example it is simultaneously embedded in a fragile watermark and a robust watermarking, Qian Zheke For distorting prompting, the latter may be used for copyright protection.
As it is shown in figure 1, the present invention proposes the cloud storage view data property held proof side based on multifunction digital watermark Method: use fragile watermark/semi-fragile watermarking to provide the integrated authentication function of data content, uses content can recover watermark To the function recovered of offer data content when damaging occurs in data content, robust watermarking is used to provide the copyright of data Defencive function.Specifically include following steps:
A. data owner is by multifunction digital watermark embedded images data, and described multifunction digital watermark includes fragility Watermark/semi-fragile watermarking, content can recover watermark, robust watermarking;
B. the view data embedding watermark is sent to Cloud Server and stores by data owner;
C. data verification person is by the watermark in detection embedded images data, tests the view data of Cloud Server storage Card;
If D. detection finds that fragility/semi-fragile watermarking is intact, then explanation data integrity is protected;If detection is sent out Existing data content is destroyed, and can recover watermark by content and repair relevant information;If needing data are had Person provides copyright and user tracking function, then verified by detection robust watermarking.
The present embodiment is as a example by multifunction digital watermark uses object as image, specific as follows:
Step A, data owner are by multifunction digital watermark embedding data, and fragile watermark is easily broken because of its vulnerability Bad, so embedding order is first to embed to embed fragile watermark after robust watermarking, specifically include following steps:
First robust watermarking is embedded:
The original image that size is M × M is divided into the sub-block that size is m × m of non-overlapping copies;
Each sub-block carries out singular value decomposition computing, takes out the maximum singular value of each sub-block, is designated as Si, i is the sequence number of sub-block, i=1,2,…,(M/m)2
Calculate the average of all sub-block maximum singular values, be designated as Sav, i.e.
S av = S 1 + S 2 + . . . + S ( M / m ) 2 ( M / m ) 2 ;
Original watermark sequence W is by contrast SiAnd SavBetween numerical values recited produce, if Si>Sav, then Wi=1, otherwise Wi=0;Original watermark sequence W is embedded in all sub-blocks, completes the embedding of robust watermarking.
The most secondly fragile watermark is embedded, interior with main by enabling after the feature of satisfied requirement is carried out coding spread spectrum A kind of original function and the most two-way mapping relations one to one of inverse function are directly formed, it is achieved that will be used for usurping between appearance Change detection and the dual-use function that integrates of information recovered:
The original image that size is M × M is divided into the sub-block that size is m × m of non-overlapping copies;
Carry out discrete cosine transform to each piece again, obtain block coefficient matrix Ci,j, i, j represent this block coordinate in matrix in block form Position, to each piece of Ci,jCoefficient matrix QC after quantization is quantified is carried out with Joint Photographic Experts Group quantization table Qi,j, QCi,jBag Containing the discrete cosine transform direct current after quantifying and low frequency coefficient, reflect the main contents of image;
Current block is Ii,j, its successor block is Ii′,j′, each block in image has the most unique forerunner and successor block, Forming a circular linked list, block position maps and maps by diagonally opposing corner so that when experience is distorted continuously with in bulk cutting, The watermark information being saved in successor block is the most intact, it is simple to these are distorted the recovery of block;
Choose current block and successor block, calculate its relation R=QCi,j-QCi′,j′, then this relation is embedded into and does not quantifies block Coefficient matrix Ci,jFrequency domain in, it is achieved embed content and can recover watermark:
Realize multifunctional watermark by above-mentioned steps to be embedded in original digital image data.
Further, when the multifunctional watermark of embedding is fragile watermark, it was demonstrated that the method for data integrity is:
Ii,j' for current image block to be detected, its successor block is Ii′,j′', Ci,j' for block Ii,j' non-quantized-dct be Matrix number, QCi,j' and QCi′,j′' vectorial for the content of corresponding blocks, the relationship error between two pieces is
δ ( I i , j ' , I i ' , j ' ' ) = Σ k = 1 m | R ( i ' , j ' ) ' - R ( i ' , j ' ) ' | ;
If current block Ii,j' be tampered or malicious operation, then compose JM (i, j)=0, JM are trip current, without Be tampered or malicious operation, then compose JM (i, j)=1, and be derived from the integrated authentication function of picture data content.
Further, when the content of view data is tampered with, watermark can be recovered by content and relevant information is repaiied Multiple method is:
When in previous step, the content of view data is tampered with, recover former number by the relation vector being stored in successor block According to: Ii,j' for distorted block or uncertain piece, its successor block is Ii′,j′', calculate R '+QCi′,j′′=QCi,j′。
Further, the detection method when multifunctional watermark of embedding is robust watermarking is:
By image or under fire image division be the sub-block that size is m × m of non-overlapping copies, each sub-block carries out singular value Decomposition operation, takes out the maximum singular value of each sub-block, is designated as Si′;
Calculate the average of all sub-block maximum singular values, be designated as Sav', i.e.
S av ' = S 1 ' + S 2 ' + . . . + S ( M / m ) 2 ' ( M / m ) 2 ;
Watermark sequence W ' after under fire is by contrast Si' and Sav' numerical values recited produce, if Si′>Sav', then
Wi'=1, otherwise Wi′=0;
Calculate original zero watermarking sequence W and the similarity of zero watermarking sequence between W ' extracted the most afterwards, define similarity ForCopyright ownership is adjudicated: if s >=th, th are threshold values according to threshold value set in advance, then Decision diagram has legal copyright as data holder;Otherwise, judgement does not have legal copyright.This threshold value th is according to image General Requirement is configured, those skilled in the art all it will be appreciated that, be such as referred to: " Journal of Computer Research and Development " " Research on threshold selection based on image distance metric " literary composition of calendar year 2001 05 interim publication.
Although the present invention is illustrated by specific embodiment, it will be appreciated by those skilled in the art that, bright without departing from distribution In the case of scope, it is also possible to the present invention is carried out various conversion and equivalent substitutes.It addition, for particular condition, permissible The present invention is made various amendment, without deviating from the scope of the present invention.Therefore, the present invention is not limited to disclosed concrete reality Execute example, and the whole embodiments fallen within the scope of the appended claims should be included.

Claims (1)

1. the cloud storage view data property held method of proof based on multifunction digital watermark, it is characterised in that: include Following steps:
A. data owner is by multifunction digital watermark embedded images data, and described multifunction digital watermark includes crisp Weak/semi-fragile watermarking, content can recover two or more the watermark in watermark, robust watermarking;
B. the view data embedding watermark is sent to Cloud Server and stores by data owner;
C. data verification person is by the watermark in detection embedded images data, carries out the view data of Cloud Server storage Checking;
If D. detection finds that fragility/semi-fragile watermarking is intact, then explanation data integrity is protected;If detection Find that data content is destroyed, watermark can be recovered by content and relevant information is repaired;If it is right to need Data owner provides copyright and user tracking function, then verified by detection robust watermarking;
Data owner described in step A will comprise the following steps in multifunction digital watermark embedded images data:
First robust watermarking is embedded, specific as follows:
101, the original image that size is M × M is divided into the sub-block that size is m × m of non-overlapping copies;M、m It is natural number;
102, each sub-block is carried out singular value decomposition computing, take out the maximum singular value of each sub-block, be designated as Si, i For the sequence number of sub-block, i=1,2, K, (M/m)2
103, calculate the average of all sub-block maximum singular values, be designated as Sav, i.e.
S a v = S 1 + S 2 + K + S ( M / m ) 2 ( M / m ) 2 ;
104, by contrast SiAnd SavBetween numerical values recited produce original watermark sequence W, if Si>Sav, then Wi=1, Otherwise Wi=0, WiIt it is the ith bit watermark of W;Original watermark sequence W is embedded in all sub-blocks, completes The embedding of robust watermarking;
The most secondly embed fragility/semi-fragile watermarking, realize embedding content simultaneously and can recover watermark, it is achieved will be used for usurping Change detection and the dual-use function that integrates of the information of recovery;Specific as follows:
201, after embedding robust watermarking, size is the son that the size that image division is non-overlapping copies is m × m of M × M Block;
202, each sub-block is carried out discrete cosine transform, obtain block coefficient matrix Ci,j, i, j represent this sub-block respectively Coordinate position in matrix in block form, to each piece of coefficient matrix Ci,jQuantify with Joint Photographic Experts Group quantization table Q Coefficient matrix QC after being quantifiedi,j, QCi,jComprise the discrete cosine transform direct current after quantization and low frequency coefficient, instead The main contents of image are reflected;By coefficient matrix QC after this quantizationi,jIt is embedded into and does not quantifies block coefficient matrix Ci,j's In frequency domain, complete the embedding of fragility/semi-fragile watermarking;
203, current block is set as Ii,j, its successor block is Ii′,j′, each block in image has the most unique forerunner And successor block, forming a circular linked list, block position maps and maps by diagonally opposing corner so that meet with continuously When distorting with in bulk cutting, the watermark information being saved in successor block is intact so that can recover distorting block; Choose current block and successor block, calculate its relation vector R=QCi,j-QCi′,j′, then this relation vector is embedded To not quantifying block coefficient matrix Ci,jFrequency domain in, complete embed content can recover watermark;
Complete multifunctional watermark by above-mentioned A1 and A2 step to be embedded in original digital image data;
For fragility/semi-fragile watermarking, it was demonstrated that the method for data integrity is:
If Ii,j' for current image block to be detected, its successor block is Ii′,j′', Ci,j' for block Ii,j' non-quantized-dct Coefficient matrix, QCi,j' and QCi′,j′' the most corresponding current image block to be detected, the content vector of successor block, Relationship error between two pieces is:
δ ( I i , j ′ , I i ′ , j ′ ′ ) = Σ k = 1 m | R ( i , j ) ′ - R ( i ′ , j ′ ) ′ | ;
R′(i,j)、R′(i′,j′)It is respectively current image block to be detected, the relation vector of successor block;
If current block Ii,j' be tampered or malicious operation, then (i, j)=0, JM are trip current, if do not had to compose JM Be tampered or malicious operation, then compose JM (i, j)=1, and be derived from the integrity of picture data content Authentication function;
When the content of view data is tampered with, can recover, by content, the method that relevant information is repaired by watermark For: carry out extensive restored data: ψ by the relation vector R ' being stored in successor blocki,j' for meeting with distorting block or uncertain Block, its successor block is ψi′,j′', calculate R '+QCi′,j′'=QCi,j′;
The detection method of the robust watermarking for embedding is:
By image or under fire image division be the sub-block that size is m × m of non-overlapping copies, each sub-block is carried out very Different value decomposition operation, takes out the maximum singular value of each sub-block, is designated as Si′;
Calculate the average of all sub-block maximum singular values, be designated as Sav', i.e.
S a v ′ = S 1 ′ + S 2 ′ + K + S ( M / m ) 2 ′ ( M / m ) 2 ;
By contrast Si' and Sav' numerical values recited produce under fire after watermark sequence W ', if Si′>Sav', then
Wi'=1, otherwise Wi'=0;
Wi' it is the ith bit watermark of W ', calculate original watermark sequence W and the watermark sequence between W ' extracted the most afterwards Similarity, definition similarity beReturn according to threshold value th set in advance judgement copyright Belong to: if s >=th, then decision diagram would have legal copyright as data holder;Otherwise, judgement does not have conjunction Method copyright.
CN201310703640.4A 2013-12-19 2013-12-19 The cloud storage view data property held method of proof based on multifunction digital watermark Active CN103700059B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310703640.4A CN103700059B (en) 2013-12-19 2013-12-19 The cloud storage view data property held method of proof based on multifunction digital watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310703640.4A CN103700059B (en) 2013-12-19 2013-12-19 The cloud storage view data property held method of proof based on multifunction digital watermark

Publications (2)

Publication Number Publication Date
CN103700059A CN103700059A (en) 2014-04-02
CN103700059B true CN103700059B (en) 2016-08-17

Family

ID=50361578

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310703640.4A Active CN103700059B (en) 2013-12-19 2013-12-19 The cloud storage view data property held method of proof based on multifunction digital watermark

Country Status (1)

Country Link
CN (1) CN103700059B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104361284B (en) * 2014-10-26 2018-02-13 深圳润迅数据通信有限公司 To third party's intrusion detection method of cloud storage packet
CN105139335A (en) * 2015-10-13 2015-12-09 蒋铭 Image copyright identification and tampering detection system
CN109285106B (en) * 2018-10-11 2021-12-14 中南大学 SLT-SVD-based reversible reduction method for medical images
CN110134647B (en) * 2019-04-01 2021-08-06 中国科学院信息工程研究所 Digital watermarking method and system supporting cloud data deduplication
CN111104694B (en) * 2019-12-02 2021-12-31 华中科技大学 Data encoding method and system supporting data support sexual certification and data repair
CN115225278B (en) * 2022-06-07 2024-06-04 西安电子科技大学 Data-holding proving method based on data-aware hash

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101021941A (en) * 2007-03-23 2007-08-22 北京理工大学 Multi-channel filter group-based multifunction digital watermark method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101021941A (en) * 2007-03-23 2007-08-22 北京理工大学 Multi-channel filter group-based multifunction digital watermark method

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"一种用于图像篡改定位与恢复的双水印算法";李文等;《电子科技》;20120315;第25卷(第3期);第8-10页 *
"多功能数字水印技术的研究与实现";蒋慧钧;《中国优秀硕士学位论文全文数据库(电子期刊).信息科技辑》;20080415;第2008年卷(第04期);第I138-26页 *
"多小波域可恢复半脆弱数字水印算法";李国良等;《计算机工程》;20110930;第37卷(第17期);第84-86页 *
"用于图像认证的可恢复半脆弱数字水印";王祖喜等;《中国图象图形学报》;20080731;第13卷(第7期);第1258-1264页 *

Also Published As

Publication number Publication date
CN103700059A (en) 2014-04-02

Similar Documents

Publication Publication Date Title
CN103700059B (en) The cloud storage view data property held method of proof based on multifunction digital watermark
Rawat et al. A chaotic system based fragile watermarking scheme for image tamper detection
Celik et al. Hierarchical watermarking for secure image authentication with localization
Chang et al. A secure fragile watermarking scheme based on chaos-and-hamming code
Chen et al. A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
CN100547608C (en) The method of digital figure watermark and related device and the digital camera that can add watermark
CN102622545B (en) Picture file tracking method
Wang et al. Reversible fragile watermarking for locating tampered blocks in 2D vector maps
CN104077624A (en) Methods and systems for generating and checking electronic note with anti-counterfeiting two-dimension code
CN107229850A (en) electronic signature method and device
CN102117476B (en) Signature watermark system used for CAD (Computer-Aided Design) documents
CN102467585A (en) Electronic signature, verification and revocation method of DWG document
CN102142129B (en) Visual secret sharing-based image content tampering detection method
AlAhmad et al. A new fragile digital watermarking technique for a PDF digital Holy Quran
CN103123719B (en) The Zero watermarking method of a kind of image authentication and tampering location
Hsu et al. DIGITAL WATERMARKING SCHEME FOR COPYRIGHT PROTECTION AND TAMPERING DETECTION.
Yuan et al. Gauss–Jordan elimination-based image tampering detection and self-recovery
Hussan et al. Hash-based image watermarking technique for tamper detection and localization
CN109040760A (en) The guard method of network image copyright information, device and storage medium
Ernawan et al. A blind recovery technique with integer wavelet transforms in image watermarking
Lazarov et al. A fragile watermarking algorithm for image tamper detection based on chaotic maps
CN106415588A (en) Data recording method, device and system, and computer storage medium
Liu et al. A Survey of Fragile Watermarking-based Image Authentication Techniques.
Shivani et al. An effective pixel-wise fragile watermarking scheme based on ARA bits
CN104866737B (en) A kind of DEM fragile watermark completeness certification methods for taking features of terrain into account

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190307

Address after: No. 1, Mount Everest Road, emun Avenue, Zhenjiang, Jiangsu

Patentee after: Nord Logistics Co.,Ltd.

Address before: Room 1302, No. 1, Lane 2277, Zuchong Road, China (Shanghai) Free Trade Pilot Area, Pudong New Area, Shanghai, 200120

Patentee before: Shanghai Airlines Intellectual Property Services Ltd.

Effective date of registration: 20190307

Address after: Room 1302, No. 1, Lane 2277, Zuchong Road, China (Shanghai) Free Trade Pilot Area, Pudong New Area, Shanghai, 200120

Patentee after: Shanghai Airlines Intellectual Property Services Ltd.

Address before: Room 2310, Building 2, Wuzhong Science and Technology Pioneering Park, 70 Zhongshan East Road, Mudu Town, Wuzhong District, Suzhou City, Jiangsu Province

Patentee before: Nanjing University of Information Science and Technology

TR01 Transfer of patent right
CP03 Change of name, title or address

Address after: No. 1 Zhufeng Road, Jinrun Avenue, Zhenjiang City, Jiangsu Province, 212300

Patentee after: Nord Network Technology Co.,Ltd.

Country or region after: Zhong Guo

Address before: No. 1, Mount Everest Road, emun Avenue, Zhenjiang, Jiangsu

Patentee before: Nord Logistics Co.,Ltd.

Country or region before: Zhong Guo

CP03 Change of name, title or address