CN104103031B - Based on normalized Vector spatial data blind watermark method - Google Patents

Based on normalized Vector spatial data blind watermark method Download PDF

Info

Publication number
CN104103031B
CN104103031B CN201410376222.3A CN201410376222A CN104103031B CN 104103031 B CN104103031 B CN 104103031B CN 201410376222 A CN201410376222 A CN 201410376222A CN 104103031 B CN104103031 B CN 104103031B
Authority
CN
China
Prior art keywords
watermark
embedded
data
spatial data
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410376222.3A
Other languages
Chinese (zh)
Other versions
CN104103031A (en
Inventor
张黎明
闫浩文
齐建勋
张永忠
李文德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lanzhou Jiaotong University
Original Assignee
Lanzhou Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lanzhou Jiaotong University filed Critical Lanzhou Jiaotong University
Priority to CN201410376222.3A priority Critical patent/CN104103031B/en
Publication of CN104103031A publication Critical patent/CN104103031A/en
Application granted granted Critical
Publication of CN104103031B publication Critical patent/CN104103031B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

For robust Vector spatial data digital watermark, Geometrical attack is a kind of more ticklish attack.The algorithm of existing anti-Geometrical attack is difficult to the attack of resistance summit again.Borrow the thought of data normalization, it is proposed that one kind is based on normalized Vector spatial data blind watermarking algorithm.The coordinate value of spatial data is normalized before embedded watermark for the algorithm, and to realize the consistency to Pan and Zoom, watermark is embedded in by changing the normalized value of vertex coordinates data.Watermark is repeatedly embedded in, and realizes the Blind extracting of watermark.Result of the test shows that this method has preferable robustness to the attack such as translation, scaling, additions and deletions point, cutting, compression, key element sequence, Data Format Transform, while watermark can be controlled to be embedded in the size for causing spatial data error.

Description

Based on normalized Vector spatial data blind watermark method
Technical field
It is a kind of vectorial geographical based on method for normalizing the invention belongs to cartography and Geographical Information Sciences technical field Spatial data blind watermarking algorithm.
Background technology
Vectorial geographical spatial data is the important strategic information resource of country, is economic, military, national defense construction and society The basic data of development, acquisition generally by means of expensive professional equipment and will spend substantial amounts of human and material resources, so, its version Power protection is most important.Vectorial geographical spatial data is preserved in digitized form, while data copy and propagation is facilitated, Also piracy is made to become extremely easy.At present, in the urgent need to the safety of reliable technical guarantee geographical spatial data.
With the development of computer techno-stress technology, copyright protection of digital product causes people widely to study and pay close attention to. Digital watermark is in digital content security, copyright protection and authenticated connection, it is considered to be current most promising technology.Digital watermark Video watermark, audio frequency watermark, Text Watermarking, database water mark, spatial data watermark etc. are developed into from initial image watermark.Phase For other digital watermarks, the development of Vector spatial data digital watermark relatively lags behind.
In general, according to the embedded location of watermark, Vector spatial data watermarking algorithm can be divided into:Spatial domain watermark algorithm With frequency domain water mark algorithm.However, the usual algorithm of spatial-domain algorithm is simple, easy to operate, watermark capacity is larger, can resist increase Effect is poor in terms of point, deletion point, cutting and attacked by noise, but resistance geometric attack;Although and frequency domain algorithm can resist several What is attacked, the poor robustness in terms of summit increase, deletion.So, existing algorithm is difficult to attack with geometry while resisting summit attack Hit.
The content of the invention
For above-mentioned situation, the present invention proposes a kind of " being based on normalized Vector spatial data blind watermark method ", should The coordinate value of spatial data is normalized before embedded watermark for algorithm, to realize the consistency to Pan and Zoom, Watermark is embedded in by changing the normalized value of vertex coordinates data.Watermark is repeatedly embedded in, and realizes the Blind extracting of watermark;Solution Vector spatial data watermarking algorithm determined while the problem of being attacked by geometric attack and summit, improves the robust of watermarking algorithm Property.
The apex coordinate insertion watermark of Vector spatial data geometric figure is chosen herein.In order to be embedded in watermark information All Vector spatial datas, with resisting cropping attack, watermark information should be uniformly embedded into X, the Y on all summits of Vector spatial data Coordinate, to ensure the anti-attack ability of watermark.Before watermark insertion, place first is normalized to the coordinate value on Drawing Object summit Manage, then the embedded watermark information in normalized value.So, after spatial data containing watermark implements geometric transformation, it is not necessary to right Geometric transformation is corrected, it is possible to extract watermark.At the same time, in order to eliminate the correlation between watermarking images pixel, strengthen The security of watermark, using Logistic chaos algorithm scrambles in watermarking images before embedding.The initial value of chaos transformation can Using the key extracted as watermark information.
The inventive method includes:The insertion of watermark information and the extraction of watermark information.
Watermark information insertion, which refers to watermark information to be embedded into original vector geographical spatial data, obtains with watermarked information Vectorial geographical spatial data.Step is as follows:First, Vector spatial data is read, all coordinate points of Drawing Object, structure are extracted Produce X0, Y0Set;Secondly, to X0, Y0Data normalization and amplification 10 are carried out respectivelynTimes;Secondly, in coordinate points after amplification Watermark is embedded in quantization method;Finally, 10 are reduced to the coordinate points after embedded watermarknTimes, and renormalization, afterwards containing water The spatial data of print preserves output.
The extraction process of watermark is the inverse process of telescopiny.First, testing data is read, data are normalized simultaneously Amplification 10nTimes, n takes and identical n values when being embedded in watermark;Secondly, by Hash () function, calculating i, (i is the position of watermark Put);Secondly, watermark bit W (i) value, quantized value when R water intaking prints are embedded are extracted by QIM quantization methods;Finally, to extracting The one-dimensional watermark sequence arrived, carries out rising dimension processing and inverts unrest, obtain final watermarking images.
Brief description of the drawings
Fig. 1 is watermark insertion flow chart
Fig. 2 is watermark extraction process
Fig. 3 (a) is original watermark
Fig. 3 (b) is watermark after scramble
Fig. 4 is error distribution histogram
Fig. 5 (a) is superposition before and after embedded watermark
Fig. 5 (b) is partial enlarged drawing after superposition
Fig. 6 (a) is data after cutting
Fig. 6 (b) is the watermark extracted
Table 1 is n values and worst error, RMSE relations
Table 2 is the robustness of geometric attack
Table 3 be increase, delete a little and modifying point attack robustness
Table 4 is compression, the robustness of key element deletion attack
Embodiment
In order to describe technology contents, construction feature, the purpose realized and the effect reached of the present invention in detail, below Described in detail with reference to embodiment.
The implementation steps of the present invention may be summarized to be two parts:Watermark information is embedded in and watermark information is extracted.It is right below Each implementation steps are further elaborated.
Watermark information insertion, which refers to watermark information to be embedded into original vector geographical spatial data, obtains with watermarked information Vectorial geographical spatial data.
The embedded watermark in units of vector graphic object of this algorithm.The summit of Drawing Object set V0It is expressed as:
V0={vi}; vi=(xi,yi) i=1,2,…,N
X0={xi}; Y0={yi} i=1,2,…,N
Wherein viRepresent each summit, (xi,yi) represent summit two coordinate values, X0The set of abscissa value is represented, Y0The set of ordinate value is represented, N is the number on summit.
The idiographic flow of watermark insertion is as follows:
(1) Vector spatial data is read, all coordinate points of Drawing Object is extracted, constructs X0, Y0Set;
(2) to X0, Y0Data normalization and amplification 10 are carried out respectivelynTimes, it is designated as
(3) existIn quantization method insertion watermark is respectively adopted, specific embedding grammar is as follows:
1. the value i, x for calculating Hash (x) are watermark data to be embedded, and Hash (x) functions are between x values and watermark bit Hash mapping function;
2. watermark bit w [i] (1 to be embedded is extracted), w is the watermark after scramble, and M is the length of watermark;
3. QIM methods are applied, the embedded watermark in x calculates data x ', R after embedded watermark to quantify by formula (3) Value;
(3)
(4) after to embedded watermarkReduce 10nTimes, and renormalization;
(5) the output preservation of watermark spatial data will finally be contained.
In watermark telescopiny, setting up higher effective bit position of normalized value using Hash functions, (this part will not Embedded watermark), with the mapping relations between watermark bit (1 ~ M).By to normalization data amplification 10nAfter times, water will be made Print is embedded into the relatively low order part of numerical value, can thus greatly reduce error caused by watermark insertion.After embedded watermark Data also need to use extreme value renormalization, in order to reduce data error as far as possible, the extraction of watermark are not influenceed, in extreme value data In can not be embedded in watermark.
The extraction process of watermark is the inverse process of telescopiny, as shown in Figure 3.Watermark extracting detailed process is as follows:
1) testing data is read, data are normalized and amplify 10nTimes, n takes and identical n when being embedded in watermark Value;
2) by Hash () function, calculate i (i is the position of watermark);
3) watermark bit W (i) value, quantized value when R water intaking prints are embedded are extracted by QIM quantization methods;
4) to the one-dimensional watermark sequence extracted, carry out rising dimension processing and invert unrest, obtain final watermarking images.
In watermark insertion, watermark may be repeatedly embedded in, therefore determine watermark information using Voting principle.Calculate Method is:An integer sequence { B (i)=0, i=1 ..., M } isometric with watermark sequence is defined, M is watermark length.Single water Print position={ 1, -1 }, same watermark position extraction process in, using formula B (i)=B (i)+To count watermark information The majority of value -1 and 1, such as " 1 " are majority, then;Then binary bitmap is reconstructed according to formula (4).
(4)。

Claims (1)

1. one kind is based on normalized Vector spatial data blind watermark method, its feature comprises the following steps:
This method embedded watermark in units of vector graphic object, the summit set V of Drawing Object0It is expressed as:
V0={vi}; vi=(xi,yi) i=1,2,…,N
X0={xi}; Y0={yi} i=1,2,…,N
Wherein viRepresent each summit, (xi,yi) represent summit two coordinate values, X0Represent the set of abscissa value, Y0Table Show the set of ordinate value, N is the number on summit;
The specific steps content of watermark insertion is as follows:
Step one:Vector spatial data is read, all coordinate points of Drawing Object is extracted, constructs X0, Y0Set;
Step 2:To X0, Y0Data normalization and amplification 10 are carried out respectivelynTimes, it is designated as
Step 3:In quantization method insertion watermark is respectively adopted, specific embedding grammar is as follows:
Step a:The value i, x for calculating Hash (x) are watermark data to be embedded, and Hash (x) functions are between x values and watermark bit Hash mapping function;
Step b:Extract watermark bit w [i] to be embedded, 1, w is the watermark after scramble, and M is the length of watermark;
Step c:Using QIM methods, the embedded watermark in x, data x ', R after embedded watermark are calculated by below equation is Quantized value;
Step 4:After embedded watermarkReduce 10nTimes, and renormalization;
Step 5:The output preservation of watermark spatial data will finally be contained;
The extraction of watermark information and its step content:
Step one:Testing data is read, data are normalized and amplify 10nTimes, n takes and identical n when being embedded in watermark Value;
Step 2:By Hash () function, i is calculated, i is the position of watermark;
Step 3:Watermark bit w [i] value, quantized value when R water intaking prints are embedded are extracted by QIM quantization methods;
Step 4:To the one-dimensional watermark sequence extracted, carry out rising dimension processing and invert unrest, obtain final watermarking images.
CN201410376222.3A 2014-08-03 2014-08-03 Based on normalized Vector spatial data blind watermark method Active CN104103031B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410376222.3A CN104103031B (en) 2014-08-03 2014-08-03 Based on normalized Vector spatial data blind watermark method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410376222.3A CN104103031B (en) 2014-08-03 2014-08-03 Based on normalized Vector spatial data blind watermark method

Publications (2)

Publication Number Publication Date
CN104103031A CN104103031A (en) 2014-10-15
CN104103031B true CN104103031B (en) 2017-07-25

Family

ID=51671159

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410376222.3A Active CN104103031B (en) 2014-08-03 2014-08-03 Based on normalized Vector spatial data blind watermark method

Country Status (1)

Country Link
CN (1) CN104103031B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110222481B (en) * 2019-06-14 2022-07-29 兰州交通大学 BIM model copyright protection spatial domain digital watermarking method
CN110933161B (en) * 2019-11-27 2022-06-28 北京拓普丰联信息科技股份有限公司 Information anti-theft management method, device, server and readable storage medium
CN116362952B (en) * 2023-04-18 2024-04-12 兰州交通大学 Three-dimensional point cloud data digital watermarking method using grid division

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101039371A (en) * 2006-03-18 2007-09-19 辽宁师范大学 Novel method of digital watermarking for protecting literary property of presswork
CN101556686A (en) * 2009-03-30 2009-10-14 西安电子科技大学 Robust image watermark method based on local Tchebichef moment
CN103034970A (en) * 2012-12-10 2013-04-10 大连大学 Multiple information hiding method based on combination of image normalization and principal component analysis (PCA)
CN103366335A (en) * 2013-07-17 2013-10-23 兰州交通大学 Vector point spatial data full-blind watermarking method based on grid dividing

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067159B (en) * 2012-12-28 2016-03-02 南京师范大学 A kind of reversible DecryptDecryption method of GIS vector data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101039371A (en) * 2006-03-18 2007-09-19 辽宁师范大学 Novel method of digital watermarking for protecting literary property of presswork
CN101556686A (en) * 2009-03-30 2009-10-14 西安电子科技大学 Robust image watermark method based on local Tchebichef moment
CN103034970A (en) * 2012-12-10 2013-04-10 大连大学 Multiple information hiding method based on combination of image normalization and principal component analysis (PCA)
CN103366335A (en) * 2013-07-17 2013-10-23 兰州交通大学 Vector point spatial data full-blind watermarking method based on grid dividing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
利用QIM的DFT矢量空间数据盲水印模型;许德合等;《武汉大学学报.信息科学版》;20100930;第35卷(第9期);第1100-1103页 *
数字水印抗几何攻击理论及应用研究;李雷达;《中国博士学位论文全文数据库 信息科技辑(月刊)》;20091215;第2009年卷(第12期);参见正文第2.3节,图2.18、图2.20 *

Also Published As

Publication number Publication date
CN104103031A (en) 2014-10-15

Similar Documents

Publication Publication Date Title
Khan et al. A recent survey of reversible watermarking techniques
Benhocine et al. New images watermarking scheme based on singular value decomposition.
Wang et al. A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates
CN104680472B (en) The multiple blind watermark method of Vector spatial data that spatial domain and frequency domain are combined
CN104794671B (en) The Vector spatial data blind watermark method of anti-projection attack
Liu et al. Robust blind image watermarking based on chaotic mixtures
Munib et al. Robust image watermarking technique using triangular regions and Zernike moments for quantization based embedding
CN104103031B (en) Based on normalized Vector spatial data blind watermark method
Gupta et al. Image Watermarking using IWT-SVD and its Comparative Analysis with DWT-SVD
Parah et al. StegNmark: a joint Stego-watermark approach for early tamper detection
Kamble et al. DWT-SVD based robust image watermarking using Arnold map
Thilagavathi et al. A survey of reversible watermarking techniques, application and attacks
CN104766263A (en) Color image watermark embedding and detecting method based on quaternion Legendre moment correction
CN103428503A (en) Method and device for watermark extraction in digital medium
CN104091304A (en) Vector spatial data blind watermarking method based on feature point
CN106373079A (en) Android photo position and time digital watermark embedding and extraction method
CN111275602A (en) Face image security protection method, system and storage medium
Roy et al. A robust reversible image watermarking scheme in DCT domain using Arnold scrambling and histogram modification
CN103390261A (en) Vector geographic space data total blindness watermarking method based on error reduction
He-Jing A DCT domain image watermarking method based on Matlab
Shady et al. Local features-based watermarking for image security in social media
Li et al. The Medical Image Watermarking Using Arnold Scrambling and DFT
Bhatnagar Robust covert communication using high capacity watermarking
Uludag et al. Robust watermarking of busy images
Kumar Towards robust reference image watermarking using DWT-SVD and edge detection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant