CN103854250A - Self-synchronizing image watermarking method applied to wireless multimedia sensor network - Google Patents
Self-synchronizing image watermarking method applied to wireless multimedia sensor network Download PDFInfo
- Publication number
- CN103854250A CN103854250A CN201410098748.XA CN201410098748A CN103854250A CN 103854250 A CN103854250 A CN 103854250A CN 201410098748 A CN201410098748 A CN 201410098748A CN 103854250 A CN103854250 A CN 103854250A
- Authority
- CN
- China
- Prior art keywords
- watermark
- sequence
- algorithm
- signal
- synchronizing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention discloses a self-synchronizing image watermarking method applied to a wireless multimedia sensor network. Watermarking information and synchronizing signals are embedded into an observation domain formed after original image sparse treatment is carried out to make watermarks have the self-synchronizing ability. Local characteristics of observation values are utilized, the efficiency of searching the observation domain for the synchronizing signals is effectively improved, and the contradiction between synchronizing signal robustness and the search range is well solved. Furthermore, because original images are not needed when the watermarks need extracting, the method is a blind watermark method. In this way, the algorithm has strong practicability and has certain application value.
Description
Technical field
The invention belongs to digital image watermarking technology field, relate to a kind of motor synchronizing image watermark method that is applied to wireless multimedia sensor network.
Background technology
In recent years, along with a kind of proposition and development of new data acquisition technology-compressed sensing theory, it has obtained a series of important achievements in research in analog information conversion, the field such as picture, bio-sensing that is compressed into.Compressed sensing theory is utilized the sparse property priori of signal, by constructing suitable measurement matrix, signal is carried out to linear random projection, obtains the compression measured value of minute quantity.Because measured value has retained the prototype structure of signal, therefore can be by applicable optimized algorithm Exact Reconstruction original signal.
In digital figure watermark field, compressed sensing theory has also obtained preliminary application.Someone has proposed a kind of watermarking algorithm based on compressed sensing and LPDC code.Algorithm is by carrying out linear random projection to original image, and the compression measured value obtaining, through LDPC coding, is embedded in original image in watermark mode; When watermark detection, tampered image is carried out to linear random projection equally, the measured value obtaining is as side information and carry out LDPC decoding.Distort detection by the compression measured value realization of comparing between original image and tampered image, experimental result shows that this algorithm has stronger anti-attack ability and distorts preferably detectability.Afterwards, all swallows propose again a kind of compressed sensing watermarking algorithm based on hash message authentication code.Someone proposes fragile zero watermarking algorithm of a kind of image half based on piecemeal compressed sensing again.Algorithm is first divided into image some piecemeals, and point block size can be adjusted according to watermark data amount and tampering location precision.According to compressive sensing theory, each image block is observed again, and observed reading is preserved as zero watermark information registration.Experimental result shows, this algorithm can accurately be located and illegally distorted and recover the region being tampered by watermark information.Someone proposed a kind of video based on compressed sensing and distorted detection watermarking algorithm afterwards.Algorithm adopts compressed sensing generate half fragile authenticating water-mark of I two field picture and be embedded in the medium-high frequency coefficient of I two field picture, adopt Hash operation generate the Watermarking for Integrity of P frame number and be embedded in the motion vector of P frame, experimental result show this algorithm between frame of video, distort with frame in distort and all there is good detectability, can be accurate to the sub-block of picture frame.
Summary of the invention
In order to overcome the defect existing in prior art, the invention provides a kind of motor synchronizing image watermark method that is applied to wireless multimedia sensor network, algorithm embeds watermark information and synchronizing signal in the observation territory after original image rarefaction, makes watermark have self-synchronization.Utilize observed reading local characteristics simultaneously, effectively improved the efficiency of searching for synchronizing signal in observation territory, solved preferably the contradiction between synchronizing signal robustness and volumes of searches.Its technical scheme is as follows:
Be applied to a motor synchronizing image watermark method for wireless multimedia sensor network,
Comprise the following steps:
A watermark embeds
Original image I is carried out wavelet decomposition by a1, obtains sparse coefficient of wavelet decomposition matrix A
1;
A2 is to the coefficient of wavelet decomposition A after sparse
1be multiplied by the observing matrix that user key generates, obtain observing territory compressed signal A
2;
A3 will observe territory compressed signal A
2of one-dimensional, carries out watermark embedding according to following formula;
mod(A
i,S)=
A4) be reconstructed into 2 dimension matrixes by what obtain containing watermark sequence, adopt OMP algorithm to recover to obtain sparse signal A with watermarked information
3;
A5) to A
3carry out wavelet inverse transformation, obtain containing watermarking images I
w;
B. watermark extracting
Algorithm of the present invention does not need original image in the time carrying out watermark extracting, is a kind of blind watermarking algorithm, and watermark extraction process is as described below in detail:
B1) will be containing watermarking images I
wcarry out wavelet decomposition, obtain coefficient of wavelet decomposition sparse matrix B
1;
B2) to the coefficient of wavelet decomposition B after sparse
1be multiplied by observing matrix, obtain observing territory compressed signal B
2;
B3) will observe territory compressed signal B
2of one-dimensional, carries out watermark extracting according to following formula;
B4) sequence { w from extracting
iin determine after synchronizing signal, then carry out the extraction of watermark signal.
Can obtain from above formula, at A
iwhile changing d,
as long as d ∈ (nS-S/4, nS+S/4) interval, can both be from
correctly extract m
i.
Further preferably, this method adopts m sequence as synchronizing signal.If { a
nand { b
ntwo m sequences with same period T, a
n, b
n∈ { 1,1}, sequence { a
nand { b
nbetween cross correlation function be defined as
M sequence { a
nautocorrelation function there is following character:
If τ=0 o'clock, m sequence { a
nand { b
ncross-correlation coefficient
ρ
a,b(0)≥h/T
Wherein h is threshold value, gets odd number.The implication of threshold value h is as infructescence { b
nonly have at most (T-h)/2 bit and { a
nnot identical, think { b
nit is a synchronizing signal.
Compared with prior art, beneficial effect of the present invention:
The present invention embeds watermark information and synchronizing signal in the observation territory after original image rarefaction, makes watermark have self-synchronization; The present invention utilizes observed reading local characteristics, has effectively improved the efficiency of searching for synchronizing signal in observation territory, has solved preferably the contradiction between synchronizing signal robustness and volumes of searches.In addition, this algorithm without original image, is a kind of blind watermarking algorithm in the time extracting watermark, and therefore algorithm of the present invention has stronger practicality, has certain using value.
Accompanying drawing explanation
Fig. 1 is hiding data structure;
Fig. 2 is that watermark embeds process flow diagram;
Fig. 3 is the test of the algorithm transparency, wherein, and Fig. 3 (a) original image Lena; Fig. 3 (b) original image Baboon; Fig. 3 (c) original image Peppers; Fig. 3 (d) original image Barbara; Fig. 3 (e) is containing watermarking images Lena, PSNR=34.09; Fig. 3 (f) is containing watermarking images Baboon, PSNR=32.76; Fig. 3 (g) is containing watermarking images Peppers, PSNR=33.55; Fig. 3 (h) is containing watermarking images Barbara, PSNR=32.95;
Fig. 4 is safety analysis test result.
Embodiment
Further illustrate technical scheme of the present invention below in conjunction with the drawings and specific embodiments.
Compressed sensing (CompressiveSensing, CS) core concept is a signal class to sparse prior, obtain fraction observed reading through nonlinear sampling, as long as observed reading comprises enough good approximation signals, original signal can be by the linearity of certain type or non-linear decoded mechanism high probability Exact Reconstruction.CS theory is made up of the sparse conversion of signal, three elements such as incoherent measurement and the reconstruction of sparse signal of sparse signal.Wherein the reconstruction algorithm of fast and stable is the main research of CS, is also that CS moves towards practical key.
If x ∈ is R
nfor original signal, obtain accidental projection signal y ∈ R by y=Φ x
m, wherein Φ ∈ R
m × nbe called measurement matrix, meet the appearance conditions (RestrictedIsometryProperty, RIP) such as restriction.If original signal x is k-sparse (having n nonzero element of k < <), the target of compressed sensing is the measured value y Exact Reconstruction original sparse signal x by accidental projection.This target can be equivalent to following optimization problem:
x=argmin||x||
0s.t.y=Φx (1)
Be that signal x is the solution of formula (1) minimization problem.
Conventionally, the demoder based on linear programming solves needs cK projection, wherein c ≈ log
2(1+N/K), rebuilding complexity is O (N
3).Cands and Tao prove to have obtained the sparse recovery theorem under the appearance conditions such as restriction: have parameter (2n if measure matrix Φ, 0.2) restrictive condition is held in wait, and the unique solution that each n-sparse vector x can be served as protruding optimization problem is measured Φ x by Exact Reconstruction from it.
Watermarking algorithm
Synchronizing signal
The present invention adopts m sequence as synchronizing signal.If { a
nand { b
ntwo m sequences with same period T, a
n, b
n∈ { 1,1}, sequence { a
nand { b
nbetween cross correlation function be defined as
M sequence the autocorrelation function of an} has following character:
If τ=0 o'clock, m sequence { a
nand { b
ncross-correlation coefficient
ρ
a,b(0)≥h/T (4)
Wherein h is threshold value, gets odd number.The implication of threshold value h is as infructescence { b
nonly have at most (T-h)/2 bit and { a
nnot identical, think { b
nit is a synchronizing signal.
Watermark embeds
Watermark sequence and synchronous m sequence are all converted to 1,1} sequence, and according to Fig. 1 mode tectonic sequence { m
i| m
i{ 1,1}}, wherein synchronous m sequence is placed on { m to ∈
ifront portion, watermark sequence is placed on { m
irear portion.
Algorithm watermark of the present invention embeds process flow diagram as shown in Figure 2.
Watermark embed process is as described below in detail:
1) original image I is carried out to wavelet decomposition, obtain sparse coefficient of wavelet decomposition matrix A
1;
2) to the coefficient of wavelet decomposition A after sparse
1be multiplied by the observing matrix that user key generates, obtain observing territory compressed signal A
2;
3) will observe territory compressed signal A
2of one-dimensional, carries out watermark embedding according to formula (5);
mod(A
i,S)=
4) be reconstructed into 2 dimension matrixes by what obtain containing watermark sequence, adopt OMP algorithm to recover to obtain sparse signal A with watermarked information
3;
5) to A
3carry out wavelet inverse transformation, obtain containing watermarking images I
w.
Watermark extracting
Algorithm of the present invention does not need original image in the time carrying out watermark extracting, is a kind of blind watermarking algorithm, and watermark extraction process is as described below in detail:
1) will be containing watermarking images I
wcarry out wavelet decomposition, obtain coefficient of wavelet decomposition sparse matrix B
1;
2) to the coefficient of wavelet decomposition B after sparse
1be multiplied by observing matrix, obtain observing territory compressed signal B
2;
3) will observe territory compressed signal B
2of one-dimensional, carries out watermark extracting according to formula (7)
[12];
4) sequence { w from extracting
iin determine after synchronizing signal, then carry out the extraction of watermark signal.
Can obtain from above formula, at A
iwhile changing d,
as long as d ∈ (nS-S/4, nS+S/4) interval, can both be from
correctly extract m
i.
Experiment simulation
In experiment, use WindowsXP operating system and MATLAB7.0 as experiment simulation platform, select Lena, Baboon, Peppers etc. as test pattern, synchronizing sequence is to be 63 m sequence in the cycle, watermark sequence is that length is 1024 random series, in detail experimental result and be analyzed as follows described in:
Transparency test
Algorithm of the present invention uses the transparency of PSNR measure algorithm, is defined as:
Wherein, X is original image, and X' is the image after embed watermark.
Fig. 3 (a~d) is primary standard test pattern, Fig. 3 (e~h) under algorithm of the present invention containing watermarking images.From the experimental result of Fig. 3, algorithm of the present invention is 33.21dB containing the mean P SNR of watermarking images, meets invisibility requirement.
Robustness test
Table 1 has provided algorithm of the present invention and has processed the robustness under attacking at common image, and in order to compare the performance of algorithm of the present invention, table 1 has listed file names with the experimental result of prior art under same experimental conditions.As seen from the table, in algorithm of the present invention and prior art, algorithm is processed under attack and is all had stronger robustness common image, and the performance of algorithm of the present invention under the attacks such as Gaussian noise, JPEG compression, gaussian filtering is better than prior art simultaneously.
Table 1
Table 2 has been listed the ability of algorithm opposing geometric attack of the present invention, and for the ease of comparing, table 2 has listed file names with the experimental result of prior art under same experimental conditions.As seen from Table 2, no matter be single geometric attack or associating geometric attack, the performance of algorithm of the present invention is all better than documents algorithm.Because algorithm of the present invention is carrying out when watermark embeds having used synchronous code m sequence, effectively improve the performance that algorithm is resisted various geometric attacks.
Table 2
Extract test
The observing matrix that user key generates is depended in the security of algorithm of the present invention, and different user keys produces different gaussian random matrixes, and the watermark sequence extracting is not identical yet.For the security of verification algorithm, generate at random 1000 groups of user's detection key and carry out watermark extracting, and to arrange the 500th group be original user key, user key and extract related coefficient NC relation between watermark as shown in Figure 4.
Related coefficient NC is defined as follows:
In formula, x (i) and x'(i) be respectively the watermark sequence of original watermark sequence and extraction.Algorithm of the present invention, to user key sensitivity, is a kind of safe digital watermarking algorithm as seen from Figure 3.
The above, be only best mode for carrying out the invention, any be familiar with those skilled in the art the present invention disclose technical scope in, the simple change of the technical scheme that can obtain apparently or equivalence replace all fall within the scope of protection of the present invention.
Claims (2)
1. a motor synchronizing image watermark method that is applied to wireless multimedia sensor network, is characterized in that,
Comprise the following steps:
A watermark embeds
Original image I is carried out wavelet decomposition by a1, obtains sparse coefficient of wavelet decomposition matrix A
1;
A2 is to the coefficient of wavelet decomposition A after sparse
1be multiplied by the observing matrix that user key generates, obtain observing territory compressed signal A
2;
A3 will observe territory compressed signal A
2of one-dimensional, carries out watermark embedding according to following formula;
mod(A
i,S)=
A4) be reconstructed into 2 dimension matrixes by what obtain containing watermark sequence, adopt OMP algorithm to recover to obtain sparse signal A with watermarked information
3;
A5) to A
3carry out wavelet inverse transformation, obtain containing watermarking images I
w;
B. watermark extracting
Algorithm of the present invention does not need original image in the time carrying out watermark extracting, is a kind of blind watermarking algorithm, and watermark extraction process is as described below in detail:
B1) will be containing watermarking images I
wcarry out wavelet decomposition, obtain coefficient of wavelet decomposition sparse matrix B
1;
B2) to the coefficient of wavelet decomposition B after sparse
1be multiplied by observing matrix, obtain observing territory compressed signal B
2;
B3) will observe territory compressed signal B
2of one-dimensional, carries out watermark extracting according to following formula;
B4) sequence { w from extracting
iin determine after synchronizing signal, then carry out the extraction of watermark signal,
2. the motor synchronizing image watermark method that is applied to wireless multimedia sensor network according to claim 1, is characterized in that, adopts m sequence as synchronizing signal, establishes { a
nand { b
ntwo m sequences with same period T, a
n, b
n∈ { 1,1}, sequence { a
nand { b
nbetween cross correlation function be defined as
M sequence { a
nautocorrelation function there is following character:
If τ=0 o'clock, m sequence { a
nand { b
ncross-correlation coefficient
ρ
a,b(0)≥h/T
Wherein h is threshold value, gets odd number, and the implication of threshold value h is as infructescence { b
nonly have at most (T-h)/2 bit and { a
nnot identical, think { b
nit is a synchronizing signal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410098748.XA CN103854250A (en) | 2014-03-17 | 2014-03-17 | Self-synchronizing image watermarking method applied to wireless multimedia sensor network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410098748.XA CN103854250A (en) | 2014-03-17 | 2014-03-17 | Self-synchronizing image watermarking method applied to wireless multimedia sensor network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103854250A true CN103854250A (en) | 2014-06-11 |
Family
ID=50861870
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410098748.XA Pending CN103854250A (en) | 2014-03-17 | 2014-03-17 | Self-synchronizing image watermarking method applied to wireless multimedia sensor network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103854250A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108537853A (en) * | 2018-03-09 | 2018-09-14 | 天津大学 | A kind of compression transmitting method of underwater sonar image |
CN111681662A (en) * | 2020-06-01 | 2020-09-18 | 科大讯飞股份有限公司 | In-vehicle interactive audio encryption method, device and equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1377180A (en) * | 2002-04-19 | 2002-10-30 | 中山大学 | Method for protecting multimedia video data |
CN1527257A (en) * | 2003-09-18 | 2004-09-08 | 上海交通大学 | Object-oriented self-synchronizing water mark detecting method for multimedia product |
CN1585020A (en) * | 2004-05-28 | 2005-02-23 | 中山大学 | Digital audio-frequency anti-distorting method |
TW200948010A (en) * | 2004-03-12 | 2009-11-16 | Interdigital Tech Corp | Watermarking of recordings |
WO2012010947A1 (en) * | 2010-07-19 | 2012-01-26 | Instituto Nacional De Astrofisica, Optica Y Electronica | Video watermarking method resistant to temporal desynchronization attacks |
-
2014
- 2014-03-17 CN CN201410098748.XA patent/CN103854250A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1377180A (en) * | 2002-04-19 | 2002-10-30 | 中山大学 | Method for protecting multimedia video data |
CN1527257A (en) * | 2003-09-18 | 2004-09-08 | 上海交通大学 | Object-oriented self-synchronizing water mark detecting method for multimedia product |
TW200948010A (en) * | 2004-03-12 | 2009-11-16 | Interdigital Tech Corp | Watermarking of recordings |
CN1585020A (en) * | 2004-05-28 | 2005-02-23 | 中山大学 | Digital audio-frequency anti-distorting method |
WO2012010947A1 (en) * | 2010-07-19 | 2012-01-26 | Instituto Nacional De Astrofisica, Optica Y Electronica | Video watermarking method resistant to temporal desynchronization attacks |
Non-Patent Citations (5)
Title |
---|
刘云如,蔡少杰,易叶青,蔡立军: "传感器网络中多节点协商可逆的数字水印算法", 《计算机工程与应用》 * |
周玲静,张正道: "基于数字水印的无线传感器网络数据安全融合方案", 《江南大学学报(自然科学版)》 * |
崔得龙,弓云峰,左敬龙: "基于压缩传感的自同步图像水印算法", 《电视技术》 * |
崔得龙: "基于离散小波变换和图像分存的数字水印算法", 《茂名学院学报》 * |
彭志娟,王汝传,王海艳: "《基于数字水印技术的无线传感器网络安全机制研究》", 《南京邮电大学学报(自然科学版)》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108537853A (en) * | 2018-03-09 | 2018-09-14 | 天津大学 | A kind of compression transmitting method of underwater sonar image |
CN108537853B (en) * | 2018-03-09 | 2021-10-12 | 天津大学 | Underwater sonar image compression transmission method |
CN111681662A (en) * | 2020-06-01 | 2020-09-18 | 科大讯飞股份有限公司 | In-vehicle interactive audio encryption method, device and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kang et al. | A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression | |
CN103177413B (en) | The method that localization blind watermatking generates, detect and device | |
CN102156952B (en) | Copyright-protection-service-oriented remote sensing image digital watermarking method | |
CN101458810A (en) | Vector map watermark method based on object property characteristic | |
CN102194208B (en) | Image falsification detecting and falsification positioning method based on image signature | |
CN103996165A (en) | Digital image zero watermark embedding and extracting method based on compressed sensing characteristics | |
CN104268823A (en) | Digital watermark algorithm based on image content | |
CN104063731A (en) | Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology | |
CN103377457B (en) | A kind of vector geographic data Hard Authentication vulnerable watermark method | |
Xijin et al. | The application research of MD5 encryption algorithm in DCT digital watermarking | |
CN104794677A (en) | Vector map watermark method based on space geometric features | |
CN101901470A (en) | Image-tampering detection and recovery method based on energy-domain semi-fragile watermarking | |
CN103123719B (en) | The Zero watermarking method of a kind of image authentication and tampering location | |
CN102509257B (en) | Human visual characteristic compressive sensing-based grayscale image tampering and detection method | |
CN107067363A (en) | A kind of non-blind robust Spatial Domain Image Watermark method constant based on pixel order relation | |
Moreno et al. | Multi-dimensional arrays for watermarking | |
CN106780287A (en) | Based on vectorial geographical line number according to tissue signature lossless water mark method | |
CN106127668A (en) | GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information | |
CN102117474B (en) | Digital picture watermark embedding and detecting method and device | |
CN102523535B (en) | Video stream and global positioning system (GPS) real-time registration and synchronous transmission method based on digital watermarking technology | |
CN103500350B (en) | A kind of method for anti-counterfeit based on Chinese letter co and digital watermarking | |
CN103854250A (en) | Self-synchronizing image watermarking method applied to wireless multimedia sensor network | |
CN102646259A (en) | Anti-attack robustness multiple zero watermark method | |
CN106339978A (en) | Color digital image watermark embedding and extracting method based on compressed sensing | |
CN103971322B (en) | Watermark embedding method for host image and watermark extracting method for image including watermark |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140611 |