CN106127668A - GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information - Google Patents
GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information Download PDFInfo
- Publication number
- CN106127668A CN106127668A CN201610479090.6A CN201610479090A CN106127668A CN 106127668 A CN106127668 A CN 106127668A CN 201610479090 A CN201610479090 A CN 201610479090A CN 106127668 A CN106127668 A CN 106127668A
- Authority
- CN
- China
- Prior art keywords
- watermark
- image
- information
- binaryzation
- pseudo
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0042—Fragile watermarking, e.g. so as to detect tampering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0065—Extraction of an embedded watermark; Reliable detection
Abstract
The invention discloses the guard method in IOS end digitized video of a kind of GPS and BEI-DOU position system space time information.For the digitized video problem that temporal information and spatial information are easily lost, are easily tampered in communication process of IOS user, play digital watermark technology advantage in terms of image authentication, data protection.When watermark information embeds, image is done block DCT transform, according to watermark information length, image is divided, watermark information is embedded in every piece of region, and signature identification is set embedding region.Last embedding fragile watermark in image data;When Image detection, whether detection data contain fragile watermark judges whether image is tampered.Quickly position containing watermark region by finding signature identification, watermark information is realized high efficiency extraction.The present invention is possible not only to improve the tamper-resistance of image, strengthens the safety of data.And space time information and digital image data can be realized and itself combine closely, for image be accurately positioned and effectively certification provides technological means.
Description
Technical field
The invention belongs to image data security fields, be specifically related to a kind of space-time based on GPS and BEI-DOU position system letter
Breath guard method in IOS end digitized video.
Background technology
Space time information, as the basis of social life, contains the important information of mankind's activity.Along with GPS and domestic north
Popularizing of bucket alignment system application, the acquisition of space time information becomes the most convenient.But space time information and digital image data
In conjunction with, generally by space time information being embedded in the EXIF information of digitized video, the tightst with what data itself combined.
Development of Mobile Internet technology and the fast development of Intelligent mobile equipment so that the space time information of digitized video is transmitted across a series of
Facing problems such as easily losing or be tampered in journey, certification and sterically defined accuracy to image cause huge shadow
Ring.
Digital watermark technology, as a kind of information security technology, provides a kind of practicable solution way for data protection
Footpath.Digital watermarking refers to embed watermark information in digitalized data, is combined together with source data by watermark information, becomes source number
According to an inseparable part.Thus determine copyright owner, proprietary rights certification, follow the tracks of abuse, authenticated digital content
The verity in source, identify buyer, provide about other additional informations etc. of digital content.
IOS system, as world's second largest Mobile operating system, has the hugest customer volume, it is achieved can be in IOS system
On system run with space time information as watermark content, the digital watermark method with IOS end digitized video as watermark carrier, for time
The protection of empty information has important practical value.
Research currently for the digital watermark technology of mobile terminal is the most few." it is applicable to spatial domain and the frequency domain of smart mobile phone
The research of Arithmetic on Digital Watermarking of Image " and (Peng Le. Central China Normal University, 2015.) literary composition, disclose Android end based on amount
Change space watermark algorithm and the DCT watermarking algorithm of block gray average." digital watermark technology is in Android mobile terminal
Application " (all armies. Shanghai Communications University, 2011.), according to feature and the application scenarios of android system, compared for DCT numeral
The realization on Android of watermark and spatial domain watermark.But watermark does not the most possess anti-cutting ability in above two method.Existing
Research is all based on the water mark method of android system, is not applied to IOS system, and the DCT watermark side of existing mobile terminal
Method robustness is poor, does not have the ability of resisting cropping attack.
Summary of the invention
Present invention aim at: easily lose easily for IOS end digitized video its temporal information in the air and spatial information
The problem being tampered, it is provided that a kind of GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information.
The space time information obtained from GPS or BEI-DOU position system can be combined closely with image, improve the robustness of method
Tamper-resistance with image data.
The basic ideas of the inventive method: with IOS system (Internetwork Operating System) as platform,
Obtain space time information from GPS or BEI-DOU position system, generate watermark content based on the space time information obtained;Embed in watermark
Time, image is divided, each region embeds a complete watermark information, and arranges signature identification, water embedding region
Print embedding embeds fragile watermark after completing in image data;When Image detection and watermark extracting, by detection fragile watermark,
Judging whether image is tampered, by finding signature identification, quickly location containing watermark region and completes watermark extracting.
GPS of the present invention and the guard method in IOS end digitized video of the BEI-DOU position system space time information, its step is such as
Under:
Step one, the acquisition of space time information and watermark information based on space time information generate
Step 1.1: obtain space time information, i.e. time letter from the GPS module or BEI-DOU position system application of ios device
Breath and latitude and longitude information, omit time and longitude and latitude symbol, read remaining numerical character, and the quantity of numerical character is L1;
Step 1.2: use present clock as random number seed, use linear congruence function, generate 10 groups of { 0,1} two-values
Change pseudo-random sequence, represent numeral 0~9 respectively;Often group { 0,1} binaryzation pseudo-random sequence, its a length of L2, it is correlated with each other
Coefficient is less than threshold value T1(0 < T1< 0.5) (so that every two groups { have weak relevant between 0,1} binaryzation pseudo-random sequence
Property, T1Value need as close possible to 0).Linear congruence function formula is as follows:
Xn+1=(aXn+ c) mod (m) (n=0,1,2,3......, L2)
Wherein m, a, c and X0Being respectively modulus, multiplier, increment and the initial value of random function, mod is MOD function, Xn's
Value is for m, a, c and Xn-1For the value of function during parameter.{Xn(n=1,2,3......, L2) it is the pseudo-random sequence tried to achieve.So
After as follows by { XnSequence carry out 0,1} binaryzation, binarization method is:
Xn'=(int) XnMod2, (n=1,2,3......, L2)
Int is downward bracket function, { Xn' it is the binaryzation pseudo-random sequence tried to achieve.Then to the { X generatedn' carry out
Inspection, if the correlation coefficient between this group sequence and other each group binaryzation pseudo-random sequence generated is less than T1Then protect
Stay, otherwise carry out deleting and regenerate one group of binaryzation pseudo-random sequence and continue inspection, until qualified sequence reaches
10 groups.Between two groups of binaryzation pseudo-random sequences, the computing formula of correlation coefficient is as follows:
Wherein X and Y represents two groups of binaryzation pseudo-random sequences, XiAnd YiBeing the corresponding variable of two groups of sequences, n is one group
The quantity of variable i.e. L in binaryzation pseudo-random sequence2, r is the correlation coefficient tried to achieve, and its span is-1≤r≤1, and r's is exhausted
Value is closer to 1, represents that the linear dependence of two variablees is the strongest, when the absolute value of r is close to 0, represent two variablees it
Between there's almost no dependency relation.
Then, the L that will read1Individual numerical character be converted into correspondence 0,1} binaryzation pseudo-random sequence, and generate treat embedding
The watermark information W={W enteredi, i=0,1 ..., L}, wherein Wi={ 0,1}.Length L=L of watermark information W1×L2。
Step 2, the embedding of watermark information and embed region signature identification is set
Step 2.1: the raw video that size is x × y is done 8 × 8 piecemeals, and each piecemeal is carried out DCT change
Change (Discrete cosine transform, Discrete Cosine Transform), (piecemeal after conversion is referred to as DCT block).If image row picture
The situation that prime number x or row pixel count y can not be divided exactly by 8, then round the result of x/8 with y/8 downwards, it is impossible to the portion of piecemeal
Image is divided not process;
Step 2.2: whole image is divided into the sub-rectangular areas of non-overlapping copies, every piece of a length of (L in region2+ 1) × 8, wide
For (L1+1)×8.If x is < (L2+ 1) × 8 or y < (L1+ 1) × 8 explanation image size are too small, it is impossible to complete embedding one time
Watermark information, exits telescopiny.
Step 2.3: in the first row in each region and the DCT block of first row, signature identification is set.Method is to select
Intermediate frequency coefficient [1,3], [3,1] and [3,3], is assigned to [3,3] by the meansigma methods of [1,3] and [3,1] so that [3,3] are this group
The median of intermediate frequency coefficient.
Step 2.4: from the beginning of the second row secondary series of each rectangular area, according to order from left to right, from top to bottom
Being sequentially embedded watermark information in each DCT block intermediate frequency coefficient [2,2] and [2,3], every piece embeds a watermark information, embedding
Rule is:
Make watermark W to be embeddediDuring for " 1 ", [2,2] > [2,3];WiDuring for " 0 ", [2,2] < [2,3].Wherein p is
Watermark strength.
Step 2.5: each 8 × 8 piecemeals of image are carried out DCT inverse transformation, obtains the digitized video containing watermark.
Step 3, the embedding of fragile watermark
Read the image data having embedded watermark, select a flag code, before traffic locality residing for it, insert redundancy
Information 0xFF.
Step 4, fragile watermark detect
Reading image data to be detected, the embedded location at fragile watermark detects, if fragile watermark is lost, then
Illustrate that image data is tampered.Otherwise, then explanation image data is not tampered with.
Step 5, watermark extracting
Step 5.1: read image pixel information, obtains the picture from coordinate [i, j] to [i+ (a+1) × 8, j+ (b+1) × 8]
Prime matrix, initializes i=0, j=0,0 < i < 8,0 < j < 8.This picture element matrix is done 8 × 8 piecemeals, and each piecemeal is entered
Row dct transform.
Step 5.2: find a DCT characteristic block [m, n], if in the DCT block of same column of going together all with this feature block all
Have: [3,3] are the medians of [1,3], [3,1] and [3,3] three intermediate frequency coefficients, then this feature block be image certain containing watermark
The initial DCT block (the first row first row) of sub-rectangular areas.
Step 5.3: if not existing characteristics block, return step 5.1 so that i=i+1, j=j+1, until i=7, j=7.
If effective characteristic block cannot be searched out after traversal terminates, then explanation be not embedded into watermark information or watermark information by
Destroy, exit the Detection and Extraction process of watermark.
Step 5.4: by the location of characteristic block, extract the watermark information of its rectangular area, place.Method is: obtain from [i
+ (m+1) × 8, j+ (n+1) × 8] to the picture element matrix of [i+ (m+a+1) × 8, j+ (n+b+1) × 8], this picture element matrix is done 8
× 8 block DCT transforms, carry out watermark extracting.Extracting rule is: if intermediate frequency coefficient [2,2] > [2,3], then Wi=1;If [2,2]
< [2,3], then Wi=0.
Step 5.5: by extract { 0,1} binaryzation pseudo-random sequence is with every L2Position is one group, represents with default 10 groups
Numerical character { 0,1} sequence carries out the calculating of correlation coefficient, if normalizated correlation coefficient is more than threshold value 1-T1Then it is converted into phase
Corresponding numerical character, carries out character splicing by the format symbol of numerical character with time and longitude and latitude, obtains the space-time letter embedded
Breath.
This method, develops based on IOS mobile terminal, has effectively filled up digital watermarking application in IOS system blank,
Achieve combining closely of space time information and image data.When watermark information detects, by detection fragile watermark, it can be determined that
Whether image is tampered.The method being found characteristic block by traversal can quick and precisely navigate to, containing watermark region, solve shadow
As the nonsynchronous problem of watermark information afterwards under attack, it is achieved that the high efficiency extraction of watermark information, it is greatly improved method
Robustness.
Detailed description of the invention
Below in conjunction with embodiment, the present invention is described in further detail.
This example select iPhone 5s as test equipment, select take pictures obtain image as testing image, its form
For JPEG, size is 3264 × 2448.
Step one. the acquisition of space time information and watermark information based on space time information generate:
Step 1.1: obtain temporal information and latitude and longitude information from the GPS module of iPhone 5s.This embodiment obtain time
Between be " 2016-01-2820:20:55 ", the testing location longitude and latitude " 32.11676 ° of N of 118.91075 ° of E " of acquisition.Omit wherein
Format symbol, obtain the numerical character in time and latitude and longitude information: " 20160128202055118910753211676 ",
29 altogether;
Step 1.2: use linear congruence function, uses present clock as random number seed, generates 10 groups a length of 40,
And normalizated correlation coefficient is less than { 0,1} sequence, the expression numeral 0~9 of threshold value 0.2 each other.The digital information that will read
Be converted into correspondence { 0,1} sequence generates watermark information W={W to be embeddedi, i=0,1 ..., L}, wherein Wi={ 0,1}.Water
Official seal breath total length is 29 × 40=1160.{ 0,1} binaryzation pseudo-random sequence { Xn' production method is as follows:
Xn+1=(aXn+ c) mod (m) (n=0,1,2,3......, L2)
X′n=(int) XnMod2 (n=1,2,3......, L2)
Mod remainder function, int is downward bracket function.A=16807, c=0, m=2^31-are set in the present embodiment
1, random number seed X0=Time.Calculation of correlation factor formula is as follows:
Wherein n=40, XiAnd YiBeing respectively the variable that two groups of binaryzation pseudo-random sequences are corresponding, value is 0 or 1, arranges
R < 0.2.
Step 2. the embedding of watermark information and embedding region and arrange the process of signature identification
Step 2.1: the testing image A obtained is carried out 8 × 8 blocks of pixels, each piecemeal is carried out dct transform.Survey
The ranks pixel count of examination image A can be divided exactly by 8, and the most not existing can not the part of piecemeal;
Step 2.2: image size meets condition: 2448 > (40+1) × 8 and 3264 > (29+1) × 8, therefore by whole
Image is divided into multiple a length of 328 pixels, the rectangular area of a width of 240 pixels;
Step 2.3: in each area in the DCT block of the first row first row, signature identification is set.Method is: select intermediate frequency
Coefficient [1,3], [3,1] and [3,3], is assigned to [3,3] by the meansigma methods of [1,3] and [3,1] so that [3,3] are this group intermediate frequency
The median of coefficient.
Step 2.4: from the beginning of the second row secondary series of rectangular area, according to order from left to right, from top to bottom each
Being sequentially embedded watermark information in DCT block, every piece embeds a watermark information, and the rule of embedding is:
Make watermark W to be embeddediDuring for " 1 ", [2,2] > [2,3];WiDuring for " 0 ", [2,2] < [2,3].In this enforcement
Example arranges watermark strength p=10;
Step 2.5: each 8 × 8 piecemeals of image are carried out DCT inverse transformation, obtains the image containing watermark.
Step 3. fragile watermark embeds
Read the image data having embedded watermark, before APPn flag code, insert redundancy: 0xFF.
Step 4. fragile watermark detects
Reading image data to be detected, whether detection image contains fragile watermark, if fragile watermark is lost, then shadow is described
As being tampered;Otherwise, image is not tampered with.
Step 5. watermark extracting
Step 5.1: obtain from coordinate [i, j] to the picture element matrix of [i+ (a+1) × 8, j+ (b+1) × 8], initialize i=
0, j=0,0 < i < 8,0 < j < 8.This picture element matrix is done 8 × 8 piecemeals, and each piecemeal is carried out dct transform;
Step 5.2: find a DCT characteristic block [m, n], if in the DCT block of same column of going together all with this feature block all
Have: [3,3] are the medians of [1,3], [3,1] and [3,3] three intermediate frequency coefficients, then this feature block be image certain containing watermark
The initial DCT block of sub-rectangular areas;
Step 5.3: if not existing characteristics block, return step one so that i=i+1, j=j+1, until i=7, j=7.If
Cannot search out effective characteristic block after traversal terminates, then explanation is not embedded into watermark information or watermark information is broken
Bad, exit the Detection and Extraction process of watermark;
Step 5.4: by the location of characteristic block, extract the watermark information in the DCT block group of its place.Method is: obtain from
This picture element matrix, to the picture element matrix of [i+ (m+31) × 8, j+ (n+31) × 8], is done 8 by [i+ (m+1) × 8, j+ (n+1) × 8]
× 8 block DCT transforms, carry out watermark extracting.Extracting rule is: extracting rule is: if intermediate frequency coefficient [2,2] > [2,3], then Wi
=1;[if 2,2] < [2,3], then Wi=0.
Step 5.5: by extract { 0,1} sequence is one group with 40 and represents { the 0,1} of numerical character with default 10 groups
Sequence carries out the calculating of correlation coefficient, if normalizated correlation coefficient is more than threshold value 0.8, is converted into corresponding numerical character.Again will
The format symbol of numerical character and time and longitude and latitude carries out string-concatenation, obtains the space time information embedded: " 2016-01-28
20:20:55 32.11676 ° of N of 118.91075 ° of E ", consistent with initial information.
The feature of this method and technical advantage
(1) the most key mode being watermark and embedding in this method.The method embedded by subregion and mark is set,
Shearing attack can be effective against, it is achieved quickly location, the high efficiency extraction containing watermark region.
(2) this method makes full use of the own characteristic of digitized video, it is proposed that a kind of fragile watermark based on redundant data
Method, improves the ability that image data is anti-tamper.
Test and analysis
Method proposed by the invention is specific to the water mark method of IOS end digitized video.Robust for verification method
Property and operational efficiency, carry out the attack of distinct methods to it and calculate the operation time.
(1) JPEG compression is attacked
The image data embedding watermark information is carried out JPEG compression according to different compression qualities.After compression, then to this
A little data carry out watermark information extraction.Test result indicate that: the method can be effective against JPEG pressure when compressing quality more than 4
Contracting is attacked.Image is after compression processes, and whole promptings are tampered.Test result is as shown in table 1.
Table 1 anti-JPEG compression experimental result
(2) shearing attack
Image data is often in transmission way, and user can be carried out cutting according to self-demand, thus, method is necessary
Possesses the ability of the shearing attack of opposing optional position.After shearing attack, image data size can change, and destroys watermark
Information and the synchronized relation of embedded location.
Testing image after embedding watermark is done surrounding cutting, 1/2nd cuttings and 1/4th cuttings, by traversal
Look for characteristic area and still can extract space time information " 118.91075 ° of E of 2016-01-28 20:20:55 32.11676 °
N”.After image cutting, whole promptings are tampered.Test result is as shown in table 2.
The anti-shearing attack of table 2 is tested
(3) embed and extraction time test
Owing to the hardware performance of smart mobile phone is generally less than PC, it requires that the execution efficiency of method wants height.Holding of algorithm
The method of testing of row time is: test embeds watermark and extracts the time of watermark respectively, considers optimum feelings when extracting watermark
Condition and worst case.Optimal situation is embedding watermark in testing image, and not cutting is made without traversal when extracting watermark.
Worst case is not embed watermark in testing image, not cutting, extracts watermark, needs to travel through to i=7, j=7.Repeatedly test
Averaging, test result is as shown in table 3.Under worst case, time-consumingly less than 1s, illustrate that this method execution efficiency is the highest.
Table 3 embeds and extraction time tests
Optimal situation | Worst case | |
The embedding time | 0.45s | 0.48s |
Extraction time | 0.2s | 0.76s |
Claims (1)
1.GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information, its step is as follows:
Step one, the acquisition of space time information and watermark information based on space time information generate
Step 1.1: obtain temporal information and latitude and longitude information from the GPS module or BEI-DOU position system application of ios device,
Omitting time and longitude and latitude symbol, read remaining numerical character, the quantity of numerical character is L1;
Step 1.2: use present clock as random number seed, use linear congruence function, { 0,1} binaryzation is pseudo-to generate 10 groups
Random sequence, represents numeral 0~9 respectively;Often group { 0,1} binaryzation pseudo-random sequence, its a length of L2, mutual correlation coefficient
Less than threshold value T1, 0 < T1< 0.5;Linear congruence functional expression is as follows:
Xn+1=(aXn+ c) mod (m), n=0,1,2,3......, L2
Wherein m, a, c and X0Being respectively modulus, multiplier, increment and the initial value of random function, mod is MOD function, XnValue be
With m, a, c and Xn-1For the value of function during parameter;{Xn, n=1,2,3......, L2, for the pseudo-random sequence tried to achieve;By { Xn}
Sequence carry out the method for 0,1} binaryzation is as follows:
Xn'=(int) XnMod2, n=1,2,3......, L2
Wherein: int is downward bracket function, { Xn' it is { 0, the 1} binaryzation pseudo-random sequence tried to achieve;
Then to the { X generatedn' test, if this group sequence and other each group { 0, the 1} binaryzation pseudorandom generated
Correlation coefficient between sequence is less than T1, then retain, otherwise carry out deleting and regenerate one group of { 0,1} binaryzation pseudorandom sequence
Row, continue inspection, until qualified, { 0,1} binaryzation pseudo-random sequence reaches 10 groups.Two groups of { 0,1} binaryzation pseudorandoms
Between sequence, the computing formula of correlation coefficient is as follows:
Wherein X and Y represents two groups of { 0,1} binaryzation pseudo-random sequence, XiAnd YiBeing the corresponding variable of two groups of sequences, n is one group
{ the quantity i.e. L of variable in 0,1} binaryzation pseudo-random sequence2, r is the correlation coefficient tried to achieve, and its span is-1≤r≤1;
Then, the L that will read1Individual numerical character be converted into correspondence { 0,1} binaryzation pseudo-random sequence, generates to be embedded
Watermark information W={Wi, i=0,1 ..., L}, wherein Wi={ 0,1};Length L=L of watermark information W1×L2;
Step 2, the embedding of watermark information and embed region signature identification is set
Step 2.1: the raw video that size is x × y is done 8 × 8 piecemeals, and each piecemeal is carried out dct transform;If
The situation that image row pixel count x or row pixel count y can not be divided exactly by 8, then round the result of x/8 with y/8 downwards, it is impossible to
The partial image of piecemeal does not processes;
Step 2.2: whole image is divided into the sub-rectangular areas of non-overlapping copies, every piece of a length of (L in region2+ 1) × 8, a width of (L1
+1)×8;If x is < (L2+ 1) × 8 or y < (L1+ 1) × 8 explanation image size are too small, it is impossible to complete embedding time watermark letter
Breath, exits telescopiny;
Step 2.3: in the first row in each region and the DCT block of first row, signature identification is set by the following method: choosing
Select intermediate frequency coefficient [1,3], [3,1] and [3,3], the meansigma methods of [1,3] and [3,1] is assigned to [3,3] so that [3,3] are for being somebody's turn to do
The median of group intermediate frequency coefficient;
Step 2.4: from the beginning of the second row secondary series of each rectangular area, according to order from left to right, from top to bottom often
Being sequentially embedded watermark information in individual DCT block intermediate frequency coefficient [2,2] and [2,3], every piece embeds a watermark information, the rule of embedding
For:
Make watermark W to be embeddediDuring for " 1 ", [2,2] > [2,3];WiDuring for " 0 ", [2,2] < [2,3];Wherein p is watermark
Intensity;
Step 2.5: each 8 × 8 piecemeals of image are carried out DCT inverse transformation, obtains the digitized video containing watermark;
Step 3, the embedding of fragile watermark
Read the image data having embedded watermark, select a flag code, before traffic locality residing for it, insert redundancy
0xFF;
Step 4, fragile watermark detect
Reading image data to be detected, the embedded location at fragile watermark detects, if fragile watermark is lost, then illustrates
Image data is tampered;Otherwise, then explanation image data is not tampered with;
Step 5, watermark extracting
Step 5.1: read image pixel information, obtains the pixel square from coordinate [i, j] to [i+ (a+1) × 8, j+ (b+1) × 8]
Battle array, initializes i=0, j=0,0 < i < 8,0 < j < 8;This picture element matrix is done 8 × 8 piecemeals, and each piecemeal is carried out DCT
Conversion;
Step 5.2: find a DCT characteristic block [m, n], if the DCT block of go together same column all with this feature block has:
[3,3] are the medians of [1,3], [3,1] and [3,3] three intermediate frequency coefficients, then this feature block is certain square Han watermark of image
The initial DCT block of shape subregion;
Step 5.3: if not existing characteristics block, return step 5.1 so that i=i+1, j=j+1, until i=7, j=7;If
Traversal cannot search out effective characteristic block after terminating, then explanation is not embedded into watermark information or watermark information is broken
Bad, exit the Detection and Extraction process of watermark;
Step 5.4: by the location of characteristic block, extract the watermark information of its rectangular area, place;Method is: obtain from [i+ (m+
1) × 8, j+ (n+1) × 8] to the picture element matrix of [i+ (m+a+1) × 8, j+ (n+b+1) × 8], this picture element matrix is done 8 × 8 points
Block dct transform, carries out watermark extracting;Extracting rule is: if intermediate frequency coefficient [2,2] > [2,3], then Wi=1;If [2,2] < [2,
3], then Wi=0;
Step 5.5: by extract { 0,1} sequence is with every L2Position is one group, represents { the 0,1} bis-of numerical character with default 10 groups
Value pseudo-random sequence carries out the calculating of correlation coefficient, if normalizated correlation coefficient is more than threshold value 1-T1Then it is converted into corresponding number
Word character, carries out character splicing by the format symbol of numerical character with time and longitude and latitude, obtains the space time information embedded.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610479090.6A CN106127668A (en) | 2016-06-27 | 2016-06-27 | GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610479090.6A CN106127668A (en) | 2016-06-27 | 2016-06-27 | GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106127668A true CN106127668A (en) | 2016-11-16 |
Family
ID=57266500
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610479090.6A Pending CN106127668A (en) | 2016-06-27 | 2016-06-27 | GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106127668A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108449527A (en) * | 2018-03-28 | 2018-08-24 | 南京吉印信息科技有限公司 | A kind of digital watermark method and system for taking the photograph attack for the anti-screen of remote sensing images |
CN110599388A (en) * | 2019-08-26 | 2019-12-20 | 华中科技大学 | Blind robust digital watermark embedding and detecting method based on positioning point assistance |
WO2021018229A1 (en) * | 2019-08-01 | 2021-02-04 | 北京大米科技有限公司 | Image processing method and apparatus, and electronic device |
CN113129199A (en) * | 2021-05-10 | 2021-07-16 | 杭州天宽科技有限公司 | Dark watermark protection method based on Android platform |
CN117336570A (en) * | 2023-11-28 | 2024-01-02 | 北京富通亚讯网络信息技术有限公司 | Video tamper-proof system and method based on digital watermark, electronic equipment and medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104063834A (en) * | 2013-03-22 | 2014-09-24 | 中国水利水电科学研究院 | Watermark embedding method, watermark detecting method and device thereof |
CN104134185A (en) * | 2014-07-31 | 2014-11-05 | 江西理工大学 | Image watermark embedding and extracting method and system for resisting combination attacks |
-
2016
- 2016-06-27 CN CN201610479090.6A patent/CN106127668A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104063834A (en) * | 2013-03-22 | 2014-09-24 | 中国水利水电科学研究院 | Watermark embedding method, watermark detecting method and device thereof |
CN104134185A (en) * | 2014-07-31 | 2014-11-05 | 江西理工大学 | Image watermark embedding and extracting method and system for resisting combination attacks |
Non-Patent Citations (3)
Title |
---|
吴勇 等: ""可定位图像采集与检索方法研究"", 《计算机工程》 * |
朱长青 等: ""一种基于伪随机序列和DCT的遥感影像水印算法"", 《武汉大学学报·信息科技版》 * |
罗腾元 等: ""有声可定位图像采集方法"", 《计算机工程与设计》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108449527A (en) * | 2018-03-28 | 2018-08-24 | 南京吉印信息科技有限公司 | A kind of digital watermark method and system for taking the photograph attack for the anti-screen of remote sensing images |
CN108449527B (en) * | 2018-03-28 | 2019-06-18 | 南京吉印信息科技有限公司 | A kind of digital watermark method and system for taking the photograph attack for the anti-screen of remote sensing images |
WO2021018229A1 (en) * | 2019-08-01 | 2021-02-04 | 北京大米科技有限公司 | Image processing method and apparatus, and electronic device |
CN110599388A (en) * | 2019-08-26 | 2019-12-20 | 华中科技大学 | Blind robust digital watermark embedding and detecting method based on positioning point assistance |
CN113129199A (en) * | 2021-05-10 | 2021-07-16 | 杭州天宽科技有限公司 | Dark watermark protection method based on Android platform |
CN117336570A (en) * | 2023-11-28 | 2024-01-02 | 北京富通亚讯网络信息技术有限公司 | Video tamper-proof system and method based on digital watermark, electronic equipment and medium |
CN117336570B (en) * | 2023-11-28 | 2024-02-13 | 北京富通亚讯网络信息技术有限公司 | Video tamper-proof system and method based on digital watermark, electronic equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106127668A (en) | GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information | |
Kumar et al. | Image Transformation Technique Using Steganography Methods Using LWT Technique Image Transformation Technique Using Steganography Methods Using LWT Technique | |
CN101458810B (en) | Vector map watermark method based on object property characteristic | |
Pereira et al. | Fast robust template matching for affine resistant image watermarks | |
Bartolini et al. | Image authentication techniques for surveillance applications | |
CN102096894B (en) | Image fragile watermarking algorithm capable of realizing accurate positioning of tampered region | |
Bhatti et al. | New watermarking algorithm utilizing quaternion Fourier transform with advanced scrambling and secure encryption | |
Da et al. | A novel hybrid information security scheme for 2D vector map | |
CN106709853A (en) | Image retrieval method and system | |
CN105632506A (en) | Robust digital audio watermark embedding and detection method based on polar harmonic transform | |
CN106780287B (en) | Lossless watermarking method based on vector geographic line data organization characteristics | |
CN104794677A (en) | Vector map watermark method based on space geometric features | |
CN106485641B (en) | A kind of tile data digital watermarking generation insertion and extracting method based on QR code | |
CN103971324B (en) | Asymmetric watermarking method for protecting vector map data copyright | |
CN102419979A (en) | Audio semi-fragile watermarking algorithm for realizing precise positioning of altered area | |
CN102117474B (en) | Digital picture watermark embedding and detecting method and device | |
CN103886864A (en) | Method for detecting quantitatively-embedded secret information for DWT domain fidelity compensation | |
Zhiwei et al. | Steganography based on wavelet transform and modulus function | |
CN102523535A (en) | Video stream and global positioning system (GPS) real-time registration and synchronous transmission method based on digital watermarking technology | |
CN102646259A (en) | Anti-attack robustness multiple zero watermark method | |
CN103079066B (en) | Image watermark embedding and extracting method combining ridgelet transform and DCT transform | |
CN102682246B (en) | Vector geographic data digital watermark method based on data point positioning | |
Zhao et al. | Perceptual image hash for tampering detection using Zernike moments | |
CN114630130A (en) | Face-changing video tracing method and system based on deep learning | |
CN110349072B (en) | Watermark synchronization method in vector geographic data watermark embedding and detecting process |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161116 |
|
WD01 | Invention patent application deemed withdrawn after publication |