CN104166957B - Method for embedding and extracting vector graph copyright images - Google Patents

Method for embedding and extracting vector graph copyright images Download PDF

Info

Publication number
CN104166957B
CN104166957B CN201410258893.XA CN201410258893A CN104166957B CN 104166957 B CN104166957 B CN 104166957B CN 201410258893 A CN201410258893 A CN 201410258893A CN 104166957 B CN104166957 B CN 104166957B
Authority
CN
China
Prior art keywords
pel
embedded
image
ratio
fragment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410258893.XA
Other languages
Chinese (zh)
Other versions
CN104166957A (en
Inventor
杜伟军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XIAMEN HORDOR ENGINEERING DESIGN GROUP Co Ltd
Original Assignee
XIAMEN HORDOR ENGINEERING DESIGN GROUP Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XIAMEN HORDOR ENGINEERING DESIGN GROUP Co Ltd filed Critical XIAMEN HORDOR ENGINEERING DESIGN GROUP Co Ltd
Priority to CN201410258893.XA priority Critical patent/CN104166957B/en
Publication of CN104166957A publication Critical patent/CN104166957A/en
Application granted granted Critical
Publication of CN104166957B publication Critical patent/CN104166957B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to a method for embedding and extracting a vector graph copyright images. A copyright image embedding method at present is difficult to resist geometrical attacks of translation, rotation, scaling and combination thereof, and is more difficult to resist interference attacks aimed at primitive addition, modification, deletion and combination thereof. The method for embedding and extracting the vector graph copyright images perform complex proportioning on a vector graph according to a handle value, copyright images are embedded in the complex proportion, resistance of the copyright images to geometrical attacks is guaranteed, a plurality of groups of copyright images are embedded in the vector graph, so that the method in the invention has robustness for interference attacks.

Description

The embedded and extracting method of vector graphics drm image
Technical field
The present invention relates to the encrypted copyright resist technology of vector graphics, more particularly, to a kind of vector graphics drm image embedding Enter and extracting method.The drm image representing copyright information can be embedded into vector graphics in sightless mode by the inventive method In file, and drm image can be extracted in a particular manner, to prove the owner of figure copyright.
Background technology
Vector graphics refers to that the geometric graphic element based on mathematical expression represents meter using point, line, curve, polygon etc. Calculation machine figure.Different from bitmap, because vector graphics is to be described with mathematical feature, be not in the horse of bit map type after its scaling Match korte's sign.Vector graphics is widely used in building, machinery, weaving, electricity due to its distortionless zoom feature and accuracy The fields such as gas, building, artistic creation.The needs of exactly its extensive utilization, vector graphics is as crystallization of wisdom, the heart of creator Blood, is even more the embodiment of everyone assets, and the protection problem of its copyright receives much concern always.
The not convenient property that the mode of password or digital certificate is had by it is it is difficult to be widely popularized.In recent years, by many matchmakers Body file embeds the impact of invisible copyright information technology, takes the mode of embedded invisible drm image to protect vector graphics Technology just very increasingly paid close attention to by people.On the one hand, embedded drm image is invisible, the recipient of file or expansion Scattered person is difficult to discover;On the other hand, the owner be sent to recipient definitive document also unnecessary do extra encryption, read Interpreting blueprints shape needs not move through decryption step, and the convenience of the disguise brought due to this copyright protection technology and reading makes institute The person of having and receiver are acceptant, are becoming increasingly popular.
But, the present situation of drm image embedded technology allows of no optimist, and can " be smeared " very much it is difficult to play evidence copyright easily Effect.Existing vector graphics copyright drm image embedded technology, can according to the difference of drm image embedding grammar working field To be divided into transform domain method and Space domain.
In transform domain, mainly realize by technology such as wavelet transformation, Fourier transformations, this conversion can resist the overall situation The geometric operation such as scaling, translation and rotation, but increase, the attack deleted and change can not be resisted.For example, documents 1 [Kang Jing Cyanines etc. the blind watermarking algorithm based on fractional fourier transform for the Two-dimensional Engineering in figure. computer utility .2009 (6)] a kind of base is proposed In the watermarking algorithm of fractional fourier transform, the method extracts the relative coordinates vector of vector graphics middle conductor, and structuring one-dimensional is multiple Number signals, obtain the conversion coefficient of complex signal by fractional fourier transform, the amplitude of conversion coefficient be could be adjusted to embedding Enter watermark, but cannot resist the interference attack such as interpolation, deletion, modification.
In the spatial domain, embed drm image mainly by means of attributes such as the apex coordinate of pel, radius and angles, according to The pel relying on, is broadly divided into two classes:The first kind, extracts the straight line in engineering drawing (typically containing more straight line in engineering drawing), The apex coordinate of modification straight line or straight line is transformed to multi-section-line realizes the embedded of drm image, but the method can not resist contracting The attack put, the attack such as more cannot resist increase, be deleted or modified;Equations of The Second Kind, extracts all summits of entity in engineering drawing, borrows The modification helping distance proportion between summit embeds drm image fragment, but cannot resist the attack increasing and deleting pel entity, Or carry out that polar coordinate transform obtains amplitude and phase place opposing rotation and scaling is attacked, but the combination of multiple geometric transformations can not be resisted Attack.For example, documents 2 [Wang Yashun etc. the digital watermarking proportional algorithm based on two-dimensional engineering graphic. University Of Nanchang's journal (work Section's version) .2003 (4)] propose a kind of calculation embedding watermark by the ratio changing distance between each entity summit in engineering drawing Method, but when increasing or delete pel entity, but accurate watermark sequence cannot be extracted it is impossible to prove copyright owner.
As above-mentioned, current vector graphics drm image embedded technology be difficult to resist to for whole figure translation, Rotation, the geometric attack of scaling are it is more difficult to opposing increases or deletes the interference attack of pel.Trace it to its cause, be primarily due to swear The inherent character of spirogram shape determines, these characteristics include:
(1) byte number shared by vector graphics file is few;
(2) the metastable transform domain of neither one is available for embedded drm image use;
(3) it is easy to carry out geometric operation and lead to lose drm image fragment;
Therefore, in vector graphics, embedded drm image is more embedded than in the files such as bitmap, video, audio frequency, grid Drm image is much more difficult, and especially characteristic (3) exacerbates the difficulty that drm image opposing is attacked.
In view of this, the present invention proposes a kind of the embedded of vector graphics copyright drm image and extracting method, existing to make up There is the deficiency of technology.
Content of the invention
First purpose of the present invention is:There is provided a kind of embedding grammar of vector graphics drm image, the method can Opposing geometric attack, has robustness to interference attack.
Second object of the present invention is:There is provided a kind of extracting method of vector graphics drm image, the method can Drm image is extracted from the vector graphics file suffering from interference attack.
In order to reach above-mentioned purpose, technical scheme is as follows:
The embedded and extracting method of vector graphics drm image, including with Embedded step and extraction step, Embedded step bag Include:
Step 1.1, constructs drm image sequence, would indicate that the image object discretization of copyright information, and by discrete picture Digitization, obtains image sequence;Segmentation of Image Sequences is continuous fragment, referred to as " images fragment ", the number of images fragment is It is the length of image sequence, the pel number comprising in vector graphics to be embedded is the length of this vector graphics, images fragment The length being shorter in length than vector graphics;
Step 1.2, is that the pel that vector graphics comprises builds complex vector operator;
Step 1.3, according to the complex vector operator of the generation order more adjacent order pel pair of pel, obtains pel pair Plural ratio, the mode comparing is taken and is made business's computing, and this step comparative result is referred to as " front plural number ratio ";
Step 1.4, is embedded into the position in the front plural number ratio mantissa bit of step 1.3 with character fragment, obtains embedded figure As the newly plural ratio of fragment, referred to as " middle plural number ratio ";
Step 1.5, the middle plural number ratio modification pel pair being obtained according to step 1.4, the complex ratio of this pel pair after modification Example is referred to as " plural ratio afterwards ", and after modification result should make, plural number ratio is equal to middle plural number ratio.
Step 1.6, according to pel generation order traversal step 1.1 to step 1.5, images fragment is embedded into one by one time The pel centering gone through;
Extraction step comprises the following steps:
Step 2.1, is that the pel that vector graphics comprises builds complex vector operator;
Step 2.2, according to the complex vector operator of the generation order more adjacent order pel of pel, obtains pel to multiple Number ratio, referred to as " extracts plural ratio ", reads images fragment from extracting plural ratio;
Step 2.3, according to pel to generating order traversal step 2.1 to step 2.2, obtains the sample of images fragment composition This;
Step 2.4, analyzes sample, determines correct images fragment and error image fragment;
Step 2.5, correct images fragment is reduced into image.
For Embedded step it is preferable that the length ratio of the length of vector graphics and image sequence is more than or equal to 2.
For Embedded step it is preferable that front plural number ratio and middle plural number ratio and afterwards plural ratio are stored as double precision Floating number.
For Embedded step it is preferable that drm image or images fragment do the encryption process before embedding.
For Embedded step it is preferable that specific part in drm image plural ratio before replacing.
For Embedded step it is preferable that when changing pel pair, only changing pel centering order pel formerly.
For Embedded step it is preferable that when changing pel pair, only changing the posterior pel of pel centering order.
For extraction step it is preferable that the traversal direction extracted and embedded traversal direction are contrary.
For extraction step it is preferable that the frequency that in analysis sample, each images fragment occurs, use threshold filtering error map As fragment, retain correct images fragment.
For extraction step it is preferable that be compared sample with correct images fragment, by figure consistent for comparative result As fragment is as correct images fragment.
Images fragment is embedded in the plural ratio of pel pair the present invention, rather than is directly embedded into the data knot of pel In structure, by changing the plural ratio of pel pair, make amended pel that plural ratio is equal to rear plural number ratio, realize copyright Images fragment embedded.Because pel is the ratio between vector-sensor array to plural ratio, not with scaling, translation, rotation or The geometric transformation of a combination thereof and change;Guarantee that the present invention has the beneficial effect that can resist geometric attack.
The present invention by the use of pel generation order (handle value) as comparison step foundation, be have opposing modification, add Plus, delete etc interference attack basis.During creation vector graphics, the time that Authoring program is created according to pel The handle value of order-assigned has uniqueness and non-alterability, by the use of the generation order of handle value as images fragment add and The traversal reference extracted, can guarantee that the directivity of traversal.When there is interference attack, destruction is the certain model in noise spot present position The succession of the pel pair in enclosing, does not affect the order of other pels pair, makes the present invention possess certain opposing interference attack Beneficial effect.
As described above, can be fully against using the images fragment after technical scheme, being added to vector graphics Geometric attack;To interference attack, there is robustness.By way of example the present invention is done below in conjunction with accompanying drawing and explain further State.
Brief description
Fig. 1 is that vector figure data deposits group texture schematic diagram;
Fig. 2 is that line segment type pel builds complex vector operator schematic diagram;
Fig. 3 is that multistage line style pel builds complex vector operator schematic diagram;
Fig. 4 is that SPL type pel builds complex vector operator schematic diagram;
Fig. 5 is that circular arc type pel builds complex vector operator schematic diagram;
Fig. 6 is the schematic diagram that images fragment is embedded in double-precision floating point data structure;
Fig. 7 is modification SPL pel schematic diagram;
Fig. 8 is modification arc pel schematic diagram;
Fig. 9 is contrast schematic diagram before and after the modification of embodiment one plan vector graphics;
Figure 10 is contrast schematic diagram before and after the modification of embodiment two plan vector graphics;
Figure 11 is drm image discretization schematic diagram.
Specific embodiment
Length due to byte may be different because of the job platform of computer and hardware condition, and its length is according to specifically Situation can adjust, below citing be related to data length statement cannot be used for limit the present invention spirit.
Just it has been observed that vector graphics refers to the geometric graph using point, line, curve, polygon etc. based on mathematical expression Unit is representing computer graphical.Its specific data organizational structure is different because of different mapping program, but without departing from shown in Fig. 1 Organizational factorses.The organizational structure of Fig. 1 signal is with the general storage structure of dwg form as prototype, selects this prototype conduct below The example of elaboration it is impossible to limit the spirit of the present invention with dwg form, the embodiment of the other vector graphics format outside dwg form, Can achieve with reference to the present embodiment.
Embodiment one
First, embed
Step 1.1
In the present embodiment, the vector graphics of drm image to be embedded comprises N number of pel, and its length is N.Discrete with Figure 11 Graphical representation copyright owner after change, the image after discretization comprises 42 × 42 picture points, and all of picture point is configured image Sequence.In order to prevent image sequence from illegally being identified, image sequence is done the encryption process, preferably existing AES is (such as Arnold conversion) using image sequence as input, obtain encrypted image sequence.In the present embodiment, the length of encrypted image sequence is not Become, the same long with encrypting, it is made up of 42 × 42 picture points.Image sequence after encryption is divided into L continuous numerical digit piece Section, i.e. images fragment e, obtain and comprise e1~eLImage sequence E, the digit of images fragment e is its length t.Examine for safety Amount, images fragment e also can make further encryption, omit in the present embodiment.Calculate length N and the image sequence of vector graphics The ratio of row length L, and round downwards
In the present embodiment, G > > 2, M represent and can be effectively embedded into G group image sequence in the present embodiment.
Step 1.2
Note, the essence of vector graphics is mathematical function image, whether line segment, multi-section-line, SPL, circular arc etc. Pel, is all the functional picture drawn with necessary parameter, so from the point of view of function, primitive types can be regarded as letter Several classes of type, the geometric properties of pel can be regarded as function parameter.
As shown in figure 1, handle value is given according to the time sequencing of primitive generating by mapping program, it is sequentially arranged, There is uniqueness, primitive attribute marked the type (i.e. type function) of the contained pel of this segment data, including but not limited to line segment, Multi-section-line, SPL, circular arc, polygon, ellipse, cloud line etc..
In Fig. 1, primitive information part describes the geometric properties (function parameter) of corresponding pel (type function), for Different primitive types, primitive information part describes the intrinsic call parameter of such type function, for example starting point, terminal, in Between point, node, the center of circle, start angle, termination point, radius, knot vector etc..
In Fig. 1, other information part describes the non-phasor function of the line style of corresponding pel, live width, color, figure layer etc. The information of geometric properties.
According to the present invention spirit, each pel of reply builds complex vector operator.Now with the figure shown in Fig. 2 to Fig. 5 Unit illustrates the structure example of vector-sensor array.
As shown in Fig. 2 for line segment ab, taking its starting point a and the coordinate of terminal b to build sign vector A1It is as follows,
A1=(xa-xb,ya-yb),
A1It is the vector that a point points to b point, for the ease of interpreting blueprints, Fig. 2 is specially by A1Removal.
As shown in figure 3, for multi-section-line cdefgh, ignoring intermediate point and only take its starting point c and terminal h coordinate to build and characterize arrow Amount A2It is as follows,
A2=(xc-xh,yc-yh),
A2It is the vector pointing to h point from c point.
Starting point i and terminal o is only taken to build and characterize vector A as shown in figure 4, ignoring intermediate point for SPL ijklmno3 It is as follows,
A3=(xi-xo,yi-yo),
A3It is the vector pointing to o point from i point.
As shown in figure 5, for circular arc pqr, ignoring the center of circle and only take initial angle θ1, end angle θ2, radius R build characterize vector A4It is as follows,
A4It is from p point in the center of circle points to, and phase angle isVector.
For circle, can be regarded as initial angle is 0, and end angle is the special circular arc of 2 π, and it characterizes the structure ginseng of vector According to circular arc.
As described above, characterize vector can be with the expression of following two formula
Ak=(xk1-xk2, yk1-yk2),
Formula is applied to the situation only taking coordinate points to build sign vector, and formula is applied to extraction angle and radius structure table Levy the situation of vector, need not enumerate as building the situation here characterizing vector using other geometric properties (function parameter), this Field those of ordinary skill can amplify from above-mentioned publicity and obtain.
Above-mentioned formula and formula can close and be written as
Ak=(xk, yk),
Its plural form can be made by formula
Ck=xk+i*yk,
Formula is complex vector operator.So, have
Formula is the euler form of complex vector operator, wherein,
Mould is long
Phase angle
θk=arctan (yk/xk).
Here, the pel of a pair adjacent order is referred to as " pel to ".
Step 1.3
Spirit according to the present invention it should according to pel generation order (handle value) relatively adjacent order pel to answering Number vector-sensor array, can compare according to handle value order from small to large it is also possible to according to handle value order from big to small.Its Mode relatively can take that work is poor, make the computings such as business, and the mode that the present embodiment makees business with complex vector operator is said for example Bright.The complex vector operator of adjacent order is obtained as business
I.e. the long ratio of mould is
vk=(rk+1/rk),
Phase contrast is
Δθkk+1k,
vkWith Δ θkPlural number ratio lambda before being referred to as, to then taking vkOr take Δ θkParticipate in follow-up computing and depend on meaning Figure;For example, can choose by the special result of front plural number ratio lambda, that is, as Δ θkWhen=0, choose vkBefore interpolation images fragment Plural ratio lambda, as Δ θkWhen ≠ 0, choose Δ θkAs the front plural number ratio lambda adding images fragment;Also such as, can be by front plural number The size of ratio lambda is chosen, that is, work as vk> > Δ θkWhen, choose vkAs the front plural number ratio lambda adding images fragment, vice versa. The present embodiment will choose v according to the size of front plural number ratio lambdakOr Δ θkParticipate in subsequent arithmetic.
Due to the limitation of computer resource, operation result can only be represented with limited digit, determines the limited of its precision.For Improve the precision of calculatings as far as possible, preferably select the data type storage calculating factor of high accuracy.Conventional double-precision floating pointses are A kind of high-precision data type, as shown in fig. 6, the double-precision floating pointses of IEEE-754 standard definition, its high 63 is symbol Position S, 62~52 is exponent bits E, and low 0~51 is mantissa bit M.According to the spirit of the present invention, in the present embodiment, front complex ratio Example, middle plural number ratio and plural ratio and extract plural ratio and all will save as double-precision floating point data afterwards.
Step 1.4
According to the spirit of the present invention, newly plural ratio can be obtained after plural number ratio lambda before images fragment e is embedded into, referred to as For middle plural number ratio lambdaw.Specific embedded mode has multiple, to determine including the first object of reference for images fragment e to be embedded into λ Position in mantissa bit M, such as chooses primitive types as reference, different primitive types are embedded into different positions;Including Two kinds in the way of using fixed position, images fragment e can be embedded in λ mantissa bit M.The present embodiment will be using side in second Formula carrys out illustrated example.As shown in fig. 6, choosing in λ mantissa bit M, the t position between W-t position for the W position is interval to be embedded as images fragment Interval T, the selection that images fragment embeds interval T location is advisable with the precision excessively not destroying λ with that is, with embedded images fragment e Vector graphics distortion within reason afterwards leads to interpret blueprints error for considering, and does not change the initial value of λ as far as possible it is ensured that marking the chi of pel Very little numerical value is not changed into bottom line.
Step 1.5
According to the present invention spirit it should according to λwModification pel pair, makes to answer after amended pel to plural ratio is Number ratio lambdaNEqual to middle plural number ratio lambdaw;The present invention points out preferably can only change pel centering order pel formerly simultaneously, The present embodiment is using modification pel centering order pel scheme formerly.
As shown in fig. 7, certain pel forms to by pel 20 and pel 30, it is assumed that pel 20 is order exists in terms of handle value First pel, now by certain images fragment eiIn embedded pel 20.As it was previously stated, calculating the complex vector of pel 30 and pel 20 The ratio C of operator30/C20, obtain v30-20With Δ θ3020.Assume v30-20> > Δ θ30-20, take v32For front plural number ratio lambda30-20, use image Fragment eiReplace λ32Image in mantissa bit M embeds interval T, obtainsThen, keep pel 20 each point constant, only change terminal O is owPoint, will characterize vector A20It is revised asSo thatAnd A30Meet
Complete images fragment eiEmbedded.
As shown in figure 8, certain pel forms to by pel 40 and pel 50, it is assumed that pel 40 is order exists in terms of handle value First pel, now by certain images fragment ejIn embedded pel 40.As it was previously stated, calculating the complex vector of pel 50 and pel 40 The ratio C of operator50/C40, obtain v50-40With Δ θ50-40.Assume Δ θ50-40> > v50-40, take Δ θ50-40For front plural number ratio lambda50-40, Use images fragment ejReplace λ50-40Image in mantissa bit M embeds interval T, obtainsThen, keep center of circle p, radius R, rise Beginning angle is constant, and only modification r point is rwPoint, will characterize vector A40It is revised asSo thatAnd A30Meet
Complete images fragment ejEmbedded.
Step 1.6
According to the spirit of invention, according to the elaboration of aforementioned Fig. 7 and Fig. 8 embedded images fragment, as long as pressing the order of handle value Travel through all pels pair, images fragment sequence E is comprised each fragment (e1~eL) be embedded into one by one in corresponding pel, first Secondary embed last images fragment eLAfterwards, then from first images fragment e1Start, place handle position of continuing is continued embedding Enter, so circulate, till all N number of pels all embedded in images fragment e, complete Embedded step.
All N number of pels described in the present embodiment are for referring to it is difficult to be illustrated expression by figure, in order to show embedded before and after The change of pel, now plan 12 pels of Fig. 9 count as N, and exaggerate embedded before and after change it is shown with image.
In Fig. 9, D is the vector graphics of images fragment to be added, DwIt is the vector graphics having added images fragment, vectogram All pels of shape D all embedded in images fragment e, obtains the vector graphics D comprising images fragmentw.Label 01~12 mark Pel is respectively:Line segment 01, SPL 02, line segment 03, line segment 04, circular arc 05, circle 06, line segment 07, line segment 08, line segment 09, Line segment 10, multi-section-line 11, multi-section-line 12.Label 01~12 is combined into vector graphics D, is represented with heavy line;The upper target figure of band " W " Tuple resultant vector D graphicsw, represented with thick dashed line.
2nd, extract
Step 2.1 is to step 2.3
According to the spirit of the present invention, extract images fragment and should be each pel structure complex vector operator.The present embodiment Use only modification order pel formerly when adding image, instantly (operate) pel centering order figure formerly First k be in back pel to order posterior pel, to the order of pel centering instantly pel k embedded images fragment formerly E obtainsWhile change back Ck/Ck-1In CkValue, if lead to when extracting according to suitable with identical traversal when embedding Sequence travels through, and calculate isRather thanSo, the traversal order that the present embodiment extracts images fragment should When contrary with the traversal order of embedded images (starting point extracted is embedded terminal), and inverse goes out Ck.
Taking Fig. 9 as a example, embedded be last pel traversing to being pel 11- pel 12, because multi-section-line 12 exists It is in the pel centering order posterior pel finally traversing when embedded, its value is not affected by embedding operation, extract traversal and work as From pel 12 and pel 11wStart, first calculateObtainCan be embedding from its image Enter and in interval T, read last images fragment em.
When extraction traverses second pel pair, Ying XianyouInverse goes out C11.First, eraseIn image embedding Enter interval T, obtain the newly plural ratio erasing images fragmentIt is referred to as " inverse plural number ratio ";Secondly, change multi-section-line 11w, the function parameter (the present embodiment is terminal) that it is modified is identical with embedded Modification growth function parameter, and after modification, inverse goes out multistage Line 11d, and make multi-section-line 11dMeet
Inverse terminates.
Due toIt isIn erase image embed interval T and obtain,Its corollary It is multi-section-line 11dMisaligned with multi-section-line 11, that is,Its errorIt is referred to as " natural distortion ", Natural distortion is inevitable but controlled.Length t of images fragment e is less, and after smearing, nature distortion Δ d is less, and image is embedding Enter the position lower (the closer to lowest order) at interval T, after smearing, the impact to initial value is less;So, control image The degree of refinement of fragment e segmentation and the position of image embedded interval T, can control the size of nature distortion Δ d.
Calculate 11dAfterwards, by pel 11dIt is regarded as pel 11, calculateDue to Δ d11Very little, that is,
Even if
It is not intended that their image embedded interval T is unequal.For specific image embed interval T position and The degree of refinement of images fragment segmentation, Δ d11When in the range of allowing at one,Image embed interval T be credible , read and complete the images fragment e to this pel pairm-1Extraction.
From extraction traverse the 3rd pel to starting after, traverse the operation of second pel pair with reference to extracting.Assume Instantly n-th pel and the pel pair of (n-1)th pel composition are traversed, upper one extracts pel to by the (n+1)th pel and the n-th figure Unit's composition, extracts in operation upper one and has calculatedErase it is only necessary to apply for instantly extracting operationImages fragment embed interval T, that is, obtain instantly inverse plural number ratioModification pel n instantly, Obtain amended pel nd, and make pel ndWith pel (n+1)dMeet
Again by pel ndIt is regarded as pel n, calculate
FromMiddle reading images fragment en.
As it was previously stated, extract traverse each pel to when all by a upper pel, Δ d can be affected, with extract travel through Carrying out, each pel to produce Δ d all can conduct downwards, so that Δ d is constantly amplified.When Δ d is amplified to a certain degree, So far will have influence on afterImage embed interval T credibility, willImage embed interval T for the first time When insincere, residing traversal is defined as " traversal of breaking one's promise (V) ", is extracted by first time and (includes end before traversing traversal of breaking one's promise Point) all traversal numbers be referred to as " credible traversal number (NV) ".
The present embodiment vector graphics refers to N number of pel, adds up to and completes N-1 embedded, embedded at least G complete image sequence Row E (G be round downwards and obtain), in order to ensureImage embed interval T always credible, the length of image sequence E It must is fulfilled between L and credible traversal number (NV)
L≤(NV),
Often complete a L extraction, that the next one extracts is the most end images fragment e of complete image sequence EL.By In eLIt is in most end in embedding at one group, extract eLShi Wuxu inverse can extracting directly, extracting mode referring to aforementioned last Individual images fragment emExtraction.Extract images fragment eL-1Until to images fragment e1It is necessary to be extracted using inverse, its extraction Mode is referring to aforementioned.
The present embodiment vector graphics refers to N number of pel, the most end images fragment e of G groupLTo whole Embedded step An images fragment e afterwardsmBetween pel number between [0~(L-1)] individual between it is difficult to determine from extract traversal starting point open Begin, the most end images fragment e just extracting G group several times will be extractedL, so L complete extraction traversal should be done;Each time Traversal travels through compared to last, from traversal starting point to the G group most end images fragment e supposingLBetween equal difference once extract; To ensure, in L complete extraction traversal, must there is the most end images fragment e to G group for the traversalLDetermination be correct , this traversal is referred to as " extract and just travel through ".In theory, extract just all over the most correct images fragment of number can be obtained; Δ d within the specific limits, other extract correct images fragment number that traversal obtains not necessarily be less than extract just traveling through arrive Correct images fragment number.The sum of the images fragment of L traversal acquisition constitutes sample.
Step 2.4
Analysis sample, each images fragment and correct image sequence is compared, can match, be in image sequence Correct images fragment, is retained;Can not match not retains.Count the images fragment frequency remaining into, if there being figure As the frequency of fragment is zero, illustrate that the interference attack suffering from is overweight, extract unsuccessfully, if the frequency of all images fragments is not Zero, can correctly restore drm image.
Step 2.5
Will be good for each images fragment string, by decryption processing, restore the drm image after discretization.
Embodiment two
First, embed
, compared to embodiment one, step 1.1~step 1.4 is identical for the present embodiment;From the beginning of step 1.5, except for the difference that,
Embodiment one is modification pel centering order pel formerly, and the present embodiment is then modification pel centering, and order exists Pel afterwards, and difference thus, the extraction step of the present embodiment and have difference.When the present embodiment embeds traversal, also according to figure As sequence E embeds one by one, continue embedded traversal point after having embedded one group of image ordered series of numbers E and continue to embed new one group of image sequence E, with Embodiment one, after the completion of the present embodiment embeds, comprises G complete image sequence E in whole vector graphics.
This enforcement plan 12 pels of Figure 10, to exaggerate it, illustrate change before and after embedded for the pel.The present embodiment is repaiied Change is the posterior pel of pel centering order, and compared to Fig. 9 of embodiment one, the present embodiment has lacked 01w, how 12w.
2nd, extract
Because the present embodiment have selected the modification posterior pel of pel centering order, compared with embodiment one, the present embodiment After completing to embed, the plural ratio directly calculating pel pair can extract images fragment, extracts without inverse, and it is suitable that extraction travels through Sequence identical with embedded traversal order (starting point extracting traversal is the starting point of embedded traversal), and unnecessary do L traversal.
After obtaining the sample of this enforcement, normally only need to count the frequency of each images fragment appearance, fallen with threshold filtering The images fragment of mistake, retains correct images fragment and organizes string.If knowing clearly encryption when embedded, restore after deciphering Drm image after discretization, if do not do the encryption process the drm image after directly obtaining discretization.
Embodiment three
The present embodiment does not lie in and enumerates embedded and extract, and the present embodiment mainly illustrates how the present invention resists geometry and attack Hit, why there is robustness to interference attack.
First, the opposing of geometric attack
Geometric attack refers to whole vector graphics is done with scaling of overall importance, rotation, translation or combinations thereof operation, with It is intended to destroy the images fragment being embedded in function parameter after modification pel function parameter;Due to scaling of overall importance, rotation, After translation or a combination thereof operation, although pel function parameter changes, figure is integrally constant, does not impact to reading, Therefore the method is first choice of attacker.
The present invention builds complex vector operator, calculate pel to plural number ratio, and plural after images fragment is embedded into In ratio, as long as the mould length of sign vector of each pel and phase angle are constant, the images fragment in plural ratio is constant thereafter. Scaling, the operation of rotation, translation or a combination thereof, come under linear transformation, and before and after conversion, the plural ratio of same pel pair is not Become, that is, rear plural number constant rate before and after converting, images fragment is not subject to become alternatively to be affected, can be fully against geometric attack.
Previous embodiment one and embodiment two, can be fully against geometric attacks used as illustrating enumerating of the present invention.
2nd, the robustness of interference attack
Interference attack refer to add, pel is deleted or modified, and combinations thereof operation;In the way of destroying pel, by base In the calculating cut-out of pel, and cause to extract chaotic, interference extraction result.Implement interference attack person, also can consider interference to former The destruction of figure, for example, add pel, should be taken into account whether the pel being added to can affect to read, if impact reading leads to figure Value be difficult to embody, the meaning of its attack is also all gone.Equally, change or delete whether pel also should consider attack result The conversion of figure can be caused to deviate original design idea, if causing the loss of original design idea, not only lose the meaning of attack Justice, more likely Design Imported change led to disastrous effect.As can be seen here, even if interference attack intensity is excessive causes images fragment no Method is extracted, and also tends to cause figure value no to deposit because of attack itself, when figure value is no deposited or even is introduced into purposes risk Afterwards, for the owner of figure, its copyright protection also loses meaning.Thus, significant interference attack is only the present invention The meaning of robustness, and those unintentionally interference attack, even if the present invention attacks to it and does not possess robustness, also it is not intended that The protection copyright will under fire affect.
Assume embodiment one is implemented to add to attack.Pel due to being added to is later than embodiment one pel and generates, its After handle value comes embodiment one pel.Embodiment one does L complete extraction traversal when extracting, no matter add attack adding Added how many pels, in L complete extraction traversal, extracted just to travel through and certainly exist, as extract just traveling through be L time complete Whole extract traversal in which, with add pel number relevant.According to the method for sample analysis of embodiment one, must be correct Restore the drm image after discretization, add to attack and originally keep out completely.
Assume that implementing modification to embodiment one attacks.The image ordered series of numbers complete due to having at least G group, each complete figure As sequence is extracting eLWhen be independent of previous image sequence e1Inverse, and there is independence between group.Modification is attacked and only be will result only in In that group of modification pel point, posterior pel loses inverse basis, manufactures the images fragment of mistake, and modification pel is located Pel outside group is then unaffected.As long as there being one group attacked by modification in G group, in L traversal, must once carry Take and just travel through, according to the method for sample analysis of embodiment one, must correctly restore the drm image after discretization.If modification is attacked Hit practical range wide, in other words G not big it is impossible to opposing modification is attacked, therefore embodiment one can be resisted and repaiied under certain condition Change attack, to modification attack, there is robustness.
Assume embodiment one is implemented to delete to attack.With deleting attack, delete attack and only will result only in deletion pel In that group of point, posterior pel loses inverse basis, manufactures the images fragment of mistake, deletes outside the group of pel place Pel is then unaffected.As long as there being one group attacked by deletion in G group, in L traversal, must once extract just time Go through, according to the method for sample analysis of embodiment one, must correctly restore the drm image after discretization.Implement if deleting and attacking Scope is wide, and G not attacks it is impossible to resisting and deleting greatly in other words, therefore embodiment one can resist deletion attack under certain condition, To deletion attack, there is robustness.
Assume embodiment two is implemented to add to attack.Because embodiment two needs not move through inverse in extraction process Directly calculate pel and images fragment is obtained to plural ratio, and due to adding after the pel attacked will be arranged in by handle, add Plus U pel only produces U-1 wrong images fragment.According to the method for sample analysis of embodiment two, as long as threshold value is more than U-1, adds and attacks the error image fragment that produces and will be done filtrations, and adding attack can be by fully against must correctly Restore the drm image after discretization.When interpolation attack is excessively violent, that is, the pel number being added to even exceeds former arrow Length N of spirogram shape, will be lost efficacy with the method for sample analysis of embodiment two;Now, use instead in embodiment one sample analyses Method of completing the square moreover it is possible to correctly restore the drm image after discretization, add attack by fully against.
Assume that implementing modification to embodiment two attacks.Because embodiment two needs not move through inverse in extraction process Directly calculate pel and images fragment is obtained to plural ratio, modification is attacked and modifying point place pel only can be caused wrong to occurring Images fragment, as unaffected outside modifying point by mistake.Because modification attack is to be made with reducing correct images number of chips Become the increase of error image number of chips, when modification attack is excessively violent, the frequency of correct images fragment may not reach The reserve of threshold value, the drm image failure after leading to reduce discretization.Assume that modification attack changes embodiment two each First pel pair of group image sequence E, will lead to lose the basis extracting computing;But, as long as there being one group not to be subject to meet with G group Attacked by modification, according to the method for sample analysis of embodiment one, correct images fragment must be matched, successfully reduce discretization Drm image afterwards.Embodiment two can only be resisted modification under certain condition and be attacked, and have robustness to modification attack.
Assume embodiment two is implemented to delete to attack.Delete to attack and only can cause to delete point place pel to mistake occurs Images fragment, as delete point outside unaffected.It is to be caused with reducing correct images number of chips due to deleting attack The increase of error image number of chips, when deletion attack is excessively violent, the frequency of correct images fragment may not reach threshold The reserve of value, the drm image failure after leading to reduce discretization.Assume that deleting attack changes each group of embodiment two First pel pair of image sequence E, will lead to lose the basis extracting computing;But, as long as have one group in G group not suffered from Delete and attack, according to the method for sample analysis of embodiment one, correct images fragment must be matched, successfully after reduction discretization Drm image.Embodiment two can only be resisted deletion under certain condition and be attacked, and have robustness to deleting attack.
Assume to implementing interpolation, modification, the combination attacks deleted, as it was previously stated, embodiment one and embodiment two are to independent Interference attack all there is robustness, for combination attacks, as long as have in G group one group be not subjected to attack, must during sample analyses Complete image sequence can be matched, the intrinsic robustness to combination attacks.
By the elaboration of above-described embodiment, the present invention is clear, and open fully full and accurate, those of ordinary skill in the art are real Apply the present invention and obtain the again effective of the present invention.Any those of ordinary skill in the art, what the present invention was made is aobvious and easy The modification seen all should be regarded as the category without departing from the present invention, and protection scope of the present invention is defined by claims.

Claims (10)

1. the embedded and extracting method of vector graphics drm image is it is characterised in that including with Embedded step and extraction step, embedding Enter step to include:
Step 1.1, constructs drm image sequence, would indicate that the image object discretization of copyright information, and by discrete image data Change, obtain image sequence;Segmentation of Image Sequences is continuous fragment, referred to as " images fragment ", the number of images fragment is figure As the length of sequence, the pel number comprising in vector graphics to be embedded is the length of this vector graphics, the length of images fragment Degree is shorter than the length of vector graphics;
Step 1.2, is that the pel that vector graphics comprises builds complex vector operator;
Step 1.3, according to the complex vector operator of the generation order more adjacent order pel pair of pel, obtains pel to plural number Ratio, the mode comparing is taken and is made business's computing, and this step comparative result is referred to as " front plural number ratio ";
Step 1.4, is embedded into the position in the front plural number ratio mantissa bit of step 1.3 with character fragment, obtains embedded images broken The newly plural ratio of piece, referred to as " middle plural number ratio ";
Step 1.5, the middle plural number ratio modification pel pair being obtained according to step 1.4, after modification, the plural ratio of this pel pair claims For " plural ratio afterwards ", after modification result should make, plural number ratio is equal to middle plural number ratio;
Step 1.6, according to pel generation order traversal step 1.1 to step 1.5, images fragment is embedded into one by one and traverses Pel centering;
Extraction step comprises the following steps:
Step 2.1, is that the pel that vector graphics comprises builds complex vector operator;
Step 2.2, according to the complex vector operator of the generation order more adjacent order pel of pel, obtains pel to complex ratio Example, referred to as " extracts plural ratio ", reads images fragment from extracting plural ratio;
Step 2.3, according to pel to generating order traversal step 2.1 to step 2.2, obtains the sample of images fragment composition;
Step 2.4, analyzes sample, determines correct images fragment and error image fragment;
Step 2.5, correct images fragment is reduced into image.
2. claim 1 method it is characterised in that in Embedded step drm image or images fragment encrypt before embedding Process.
3. the method for claim 1 is it is characterised in that specific part in drm image plural ratio before replacing in Embedded step.
4. the method for claim 1 is it is characterised in that when changing pel pair in Embedded step, only change pel centering order formerly Pel.
5. the method for claim 1 is it is characterised in that when changing pel pair in Embedded step, only modification pel centering order is rear Pel.
6. the method for any one of claim 1 to 5 is it is characterised in that the length of vector graphics and image sequence in Embedded step Length ratio is more than or equal to 2.
7. the method for claim 6 is it is characterised in that front plural number ratio and middle plural number ratio and rear complex ratio in Embedded step Example is stored as double-precision floating pointses.
8. the method for claim 1 is it is characterised in that the traversal direction extracted in extraction step and embedded traversal direction are contrary.
9. the method for claim 1 or 8 is it is characterised in that analyze the frequency that in sample, each images fragment occurs in extraction step Secondary, with threshold filtering error image fragment, retain correct images fragment.
10. the method for claim 1 or 8 is it is characterised in that be compared sample with correct images fragment in extraction step, Using images fragment consistent for comparative result as correct images fragment.
CN201410258893.XA 2014-06-12 2014-06-12 Method for embedding and extracting vector graph copyright images Expired - Fee Related CN104166957B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410258893.XA CN104166957B (en) 2014-06-12 2014-06-12 Method for embedding and extracting vector graph copyright images

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410258893.XA CN104166957B (en) 2014-06-12 2014-06-12 Method for embedding and extracting vector graph copyright images

Publications (2)

Publication Number Publication Date
CN104166957A CN104166957A (en) 2014-11-26
CN104166957B true CN104166957B (en) 2017-02-15

Family

ID=51910750

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410258893.XA Expired - Fee Related CN104166957B (en) 2014-06-12 2014-06-12 Method for embedding and extracting vector graph copyright images

Country Status (1)

Country Link
CN (1) CN104166957B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106056528A (en) * 2016-05-31 2016-10-26 华中科技大学 Engineering drawing copyright protection and modification positioning method
CN106384024B (en) * 2016-08-31 2019-03-05 南宁市勘察测绘地理信息院 The copy-right protection method and DWG formatted data production method of DWG formatted data

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366335A (en) * 2013-07-17 2013-10-23 兰州交通大学 Vector point spatial data full-blind watermarking method based on grid dividing

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050105760A1 (en) * 2001-12-14 2005-05-19 Eggers Joachim J. Data embedding and extraction

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366335A (en) * 2013-07-17 2013-10-23 兰州交通大学 Vector point spatial data full-blind watermarking method based on grid dividing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
二维工程图中基于分数傅里叶变换的盲水印算法;康菁菁等;《计算机应用》;20090630;第29卷(第6期);全文 *
基于二维工程图的数字水印比例算法;汪亚顺等;《南昌大学学报(工科版)》;20031230;第25卷(第4期);全文 *

Also Published As

Publication number Publication date
CN104166957A (en) 2014-11-26

Similar Documents

Publication Publication Date Title
Wang et al. Reversible fragile watermarking for 2-D vector map authentication with localization
CN108961141B (en) Vector map double zero watermarking method, system, storage medium and server
Wang et al. A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates
CN111667395B (en) Three-dimensional model copyright authentication method
CN108876696A (en) A kind of medical image robust watermarking method based on SIFT-DCT
Cao et al. A recursive embedding algorithm towards lossless 2D vector map watermarking
CN109919824B (en) Color image zero watermarking method based on fast quaternion generalized extremely complex exponential transformation
CN116385250B (en) Track data double watermarking method based on robust watermarking and fragile watermarking
CN106780287B (en) Lossless watermarking method based on vector geographic line data organization characteristics
CN104166957B (en) Method for embedding and extracting vector graph copyright images
Singh et al. Hiding encrypted message in the features of images
CN104166956B (en) Method for embedding and extracting vector graph copyright characters
CN108470318B (en) Three-dimensional grid double watermarking method based on grouping strategy and neighborhood relation positioning
CN116805069B (en) Track data zero watermark generation method, track data zero watermark detection device and storage medium
Wang et al. RST invariant fragile watermarking for 2D vector map authentication
Abbas et al. Security and imperceptibility improving of image steganography using pixel allocation and random function techniques
CN116485623B (en) Multispectral image gray feature watermarking method based on sixteen-element rapid accurate moment
CN107423588A (en) A kind of common map symbol library copy-right protection method based on Human Visual System
Neyman et al. A new scheme to hide the data integrity marker on vector maps using a feature-based fragile watermarking algorithm
CN104866737B (en) A kind of DEM fragile watermark completeness certification methods for taking features of terrain into account
CN105574803B (en) Reversible water mark method, watermark insertion and the watermark extracting method of D CAD engineering drawing
Wang et al. Error detecting code based fragile watermarking scheme for 3D models
Sun et al. Lossless digital watermarking scheme for image maps
Thayananthan et al. Fragile Watermarking based on linear cellular automata using manhattan distances for 2D vector map
Ghoul et al. Imperceptible Image Steganography Technique Using a Novel PIT-Based Technique

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170215

Termination date: 20180612