CN106127668A - GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information - Google Patents

GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information Download PDF

Info

Publication number
CN106127668A
CN106127668A CN201610479090.6A CN201610479090A CN106127668A CN 106127668 A CN106127668 A CN 106127668A CN 201610479090 A CN201610479090 A CN 201610479090A CN 106127668 A CN106127668 A CN 106127668A
Authority
CN
China
Prior art keywords
watermark
image
information
binaryzation
pseudo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610479090.6A
Other languages
Chinese (zh)
Inventor
朱长青
俞恒
俞一恒
任娜
王莹莹
吴清华
王潇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University
Nanjing Normal University
Original Assignee
Nanjing Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Normal University filed Critical Nanjing Normal University
Priority to CN201610479090.6A priority Critical patent/CN106127668A/en
Publication of CN106127668A publication Critical patent/CN106127668A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0042Fragile watermarking, e.g. so as to detect tampering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Abstract

The invention discloses the guard method in IOS end digitized video of a kind of GPS and BEI-DOU position system space time information.For the digitized video problem that temporal information and spatial information are easily lost, are easily tampered in communication process of IOS user, play digital watermark technology advantage in terms of image authentication, data protection.When watermark information embeds, image is done block DCT transform, according to watermark information length, image is divided, watermark information is embedded in every piece of region, and signature identification is set embedding region.Last embedding fragile watermark in image data;When Image detection, whether detection data contain fragile watermark judges whether image is tampered.Quickly position containing watermark region by finding signature identification, watermark information is realized high efficiency extraction.The present invention is possible not only to improve the tamper-resistance of image, strengthens the safety of data.And space time information and digital image data can be realized and itself combine closely, for image be accurately positioned and effectively certification provides technological means.

Description

GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information
Technical field
The invention belongs to image data security fields, be specifically related to a kind of space-time based on GPS and BEI-DOU position system letter Breath guard method in IOS end digitized video.
Background technology
Space time information, as the basis of social life, contains the important information of mankind's activity.Along with GPS and domestic north Popularizing of bucket alignment system application, the acquisition of space time information becomes the most convenient.But space time information and digital image data In conjunction with, generally by space time information being embedded in the EXIF information of digitized video, the tightst with what data itself combined. Development of Mobile Internet technology and the fast development of Intelligent mobile equipment so that the space time information of digitized video is transmitted across a series of Facing problems such as easily losing or be tampered in journey, certification and sterically defined accuracy to image cause huge shadow Ring.
Digital watermark technology, as a kind of information security technology, provides a kind of practicable solution way for data protection Footpath.Digital watermarking refers to embed watermark information in digitalized data, is combined together with source data by watermark information, becomes source number According to an inseparable part.Thus determine copyright owner, proprietary rights certification, follow the tracks of abuse, authenticated digital content The verity in source, identify buyer, provide about other additional informations etc. of digital content.
IOS system, as world's second largest Mobile operating system, has the hugest customer volume, it is achieved can be in IOS system On system run with space time information as watermark content, the digital watermark method with IOS end digitized video as watermark carrier, for time The protection of empty information has important practical value.
Research currently for the digital watermark technology of mobile terminal is the most few." it is applicable to spatial domain and the frequency domain of smart mobile phone The research of Arithmetic on Digital Watermarking of Image " and (Peng Le. Central China Normal University, 2015.) literary composition, disclose Android end based on amount Change space watermark algorithm and the DCT watermarking algorithm of block gray average." digital watermark technology is in Android mobile terminal Application " (all armies. Shanghai Communications University, 2011.), according to feature and the application scenarios of android system, compared for DCT numeral The realization on Android of watermark and spatial domain watermark.But watermark does not the most possess anti-cutting ability in above two method.Existing Research is all based on the water mark method of android system, is not applied to IOS system, and the DCT watermark side of existing mobile terminal Method robustness is poor, does not have the ability of resisting cropping attack.
Summary of the invention
Present invention aim at: easily lose easily for IOS end digitized video its temporal information in the air and spatial information The problem being tampered, it is provided that a kind of GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information. The space time information obtained from GPS or BEI-DOU position system can be combined closely with image, improve the robustness of method Tamper-resistance with image data.
The basic ideas of the inventive method: with IOS system (Internetwork Operating System) as platform, Obtain space time information from GPS or BEI-DOU position system, generate watermark content based on the space time information obtained;Embed in watermark Time, image is divided, each region embeds a complete watermark information, and arranges signature identification, water embedding region Print embedding embeds fragile watermark after completing in image data;When Image detection and watermark extracting, by detection fragile watermark, Judging whether image is tampered, by finding signature identification, quickly location containing watermark region and completes watermark extracting.
GPS of the present invention and the guard method in IOS end digitized video of the BEI-DOU position system space time information, its step is such as Under:
Step one, the acquisition of space time information and watermark information based on space time information generate
Step 1.1: obtain space time information, i.e. time letter from the GPS module or BEI-DOU position system application of ios device Breath and latitude and longitude information, omit time and longitude and latitude symbol, read remaining numerical character, and the quantity of numerical character is L1
Step 1.2: use present clock as random number seed, use linear congruence function, generate 10 groups of { 0,1} two-values Change pseudo-random sequence, represent numeral 0~9 respectively;Often group { 0,1} binaryzation pseudo-random sequence, its a length of L2, it is correlated with each other Coefficient is less than threshold value T1(0 < T1< 0.5) (so that every two groups { have weak relevant between 0,1} binaryzation pseudo-random sequence Property, T1Value need as close possible to 0).Linear congruence function formula is as follows:
Xn+1=(aXn+ c) mod (m) (n=0,1,2,3......, L2)
Wherein m, a, c and X0Being respectively modulus, multiplier, increment and the initial value of random function, mod is MOD function, Xn's Value is for m, a, c and Xn-1For the value of function during parameter.{Xn(n=1,2,3......, L2) it is the pseudo-random sequence tried to achieve.So After as follows by { XnSequence carry out 0,1} binaryzation, binarization method is:
Xn'=(int) XnMod2, (n=1,2,3......, L2)
Int is downward bracket function, { Xn' it is the binaryzation pseudo-random sequence tried to achieve.Then to the { X generatedn' carry out Inspection, if the correlation coefficient between this group sequence and other each group binaryzation pseudo-random sequence generated is less than T1Then protect Stay, otherwise carry out deleting and regenerate one group of binaryzation pseudo-random sequence and continue inspection, until qualified sequence reaches 10 groups.Between two groups of binaryzation pseudo-random sequences, the computing formula of correlation coefficient is as follows:
r = n Σ i = 1 n X i Y i - Σ i = 1 n X i · Σ i = 1 n Y i n Σ i = 1 n X i 2 - ( Σ i = 1 n X i ) 2 · n Σ i = 1 n Y i 2 - ( Σ i = 1 n Y i ) 2
Wherein X and Y represents two groups of binaryzation pseudo-random sequences, XiAnd YiBeing the corresponding variable of two groups of sequences, n is one group The quantity of variable i.e. L in binaryzation pseudo-random sequence2, r is the correlation coefficient tried to achieve, and its span is-1≤r≤1, and r's is exhausted Value is closer to 1, represents that the linear dependence of two variablees is the strongest, when the absolute value of r is close to 0, represent two variablees it Between there's almost no dependency relation.
Then, the L that will read1Individual numerical character be converted into correspondence 0,1} binaryzation pseudo-random sequence, and generate treat embedding The watermark information W={W enteredi, i=0,1 ..., L}, wherein Wi={ 0,1}.Length L=L of watermark information W1×L2
Step 2, the embedding of watermark information and embed region signature identification is set
Step 2.1: the raw video that size is x × y is done 8 × 8 piecemeals, and each piecemeal is carried out DCT change Change (Discrete cosine transform, Discrete Cosine Transform), (piecemeal after conversion is referred to as DCT block).If image row picture The situation that prime number x or row pixel count y can not be divided exactly by 8, then round the result of x/8 with y/8 downwards, it is impossible to the portion of piecemeal Image is divided not process;
Step 2.2: whole image is divided into the sub-rectangular areas of non-overlapping copies, every piece of a length of (L in region2+ 1) × 8, wide For (L1+1)×8.If x is < (L2+ 1) × 8 or y < (L1+ 1) × 8 explanation image size are too small, it is impossible to complete embedding one time Watermark information, exits telescopiny.
Step 2.3: in the first row in each region and the DCT block of first row, signature identification is set.Method is to select Intermediate frequency coefficient [1,3], [3,1] and [3,3], is assigned to [3,3] by the meansigma methods of [1,3] and [3,1] so that [3,3] are this group The median of intermediate frequency coefficient.
Step 2.4: from the beginning of the second row secondary series of each rectangular area, according to order from left to right, from top to bottom Being sequentially embedded watermark information in each DCT block intermediate frequency coefficient [2,2] and [2,3], every piece embeds a watermark information, embedding Rule is:
Make watermark W to be embeddediDuring for " 1 ", [2,2] > [2,3];WiDuring for " 0 ", [2,2] < [2,3].Wherein p is Watermark strength.
Step 2.5: each 8 × 8 piecemeals of image are carried out DCT inverse transformation, obtains the digitized video containing watermark.
Step 3, the embedding of fragile watermark
Read the image data having embedded watermark, select a flag code, before traffic locality residing for it, insert redundancy Information 0xFF.
Step 4, fragile watermark detect
Reading image data to be detected, the embedded location at fragile watermark detects, if fragile watermark is lost, then Illustrate that image data is tampered.Otherwise, then explanation image data is not tampered with.
Step 5, watermark extracting
Step 5.1: read image pixel information, obtains the picture from coordinate [i, j] to [i+ (a+1) × 8, j+ (b+1) × 8] Prime matrix, initializes i=0, j=0,0 < i < 8,0 < j < 8.This picture element matrix is done 8 × 8 piecemeals, and each piecemeal is entered Row dct transform.
Step 5.2: find a DCT characteristic block [m, n], if in the DCT block of same column of going together all with this feature block all Have: [3,3] are the medians of [1,3], [3,1] and [3,3] three intermediate frequency coefficients, then this feature block be image certain containing watermark The initial DCT block (the first row first row) of sub-rectangular areas.
Step 5.3: if not existing characteristics block, return step 5.1 so that i=i+1, j=j+1, until i=7, j=7. If effective characteristic block cannot be searched out after traversal terminates, then explanation be not embedded into watermark information or watermark information by Destroy, exit the Detection and Extraction process of watermark.
Step 5.4: by the location of characteristic block, extract the watermark information of its rectangular area, place.Method is: obtain from [i + (m+1) × 8, j+ (n+1) × 8] to the picture element matrix of [i+ (m+a+1) × 8, j+ (n+b+1) × 8], this picture element matrix is done 8 × 8 block DCT transforms, carry out watermark extracting.Extracting rule is: if intermediate frequency coefficient [2,2] > [2,3], then Wi=1;If [2,2] < [2,3], then Wi=0.
Step 5.5: by extract { 0,1} binaryzation pseudo-random sequence is with every L2Position is one group, represents with default 10 groups Numerical character { 0,1} sequence carries out the calculating of correlation coefficient, if normalizated correlation coefficient is more than threshold value 1-T1Then it is converted into phase Corresponding numerical character, carries out character splicing by the format symbol of numerical character with time and longitude and latitude, obtains the space-time letter embedded Breath.
This method, develops based on IOS mobile terminal, has effectively filled up digital watermarking application in IOS system blank, Achieve combining closely of space time information and image data.When watermark information detects, by detection fragile watermark, it can be determined that Whether image is tampered.The method being found characteristic block by traversal can quick and precisely navigate to, containing watermark region, solve shadow As the nonsynchronous problem of watermark information afterwards under attack, it is achieved that the high efficiency extraction of watermark information, it is greatly improved method Robustness.
Detailed description of the invention
Below in conjunction with embodiment, the present invention is described in further detail.
This example select iPhone 5s as test equipment, select take pictures obtain image as testing image, its form For JPEG, size is 3264 × 2448.
Step one. the acquisition of space time information and watermark information based on space time information generate:
Step 1.1: obtain temporal information and latitude and longitude information from the GPS module of iPhone 5s.This embodiment obtain time Between be " 2016-01-2820:20:55 ", the testing location longitude and latitude " 32.11676 ° of N of 118.91075 ° of E " of acquisition.Omit wherein Format symbol, obtain the numerical character in time and latitude and longitude information: " 20160128202055118910753211676 ", 29 altogether;
Step 1.2: use linear congruence function, uses present clock as random number seed, generates 10 groups a length of 40, And normalizated correlation coefficient is less than { 0,1} sequence, the expression numeral 0~9 of threshold value 0.2 each other.The digital information that will read Be converted into correspondence { 0,1} sequence generates watermark information W={W to be embeddedi, i=0,1 ..., L}, wherein Wi={ 0,1}.Water Official seal breath total length is 29 × 40=1160.{ 0,1} binaryzation pseudo-random sequence { Xn' production method is as follows:
Xn+1=(aXn+ c) mod (m) (n=0,1,2,3......, L2)
X′n=(int) XnMod2 (n=1,2,3......, L2)
Mod remainder function, int is downward bracket function.A=16807, c=0, m=2^31-are set in the present embodiment 1, random number seed X0=Time.Calculation of correlation factor formula is as follows:
r = n Σ i = 1 n X i Y i - Σ i = 1 n X i · Σ i = 1 n Y i n Σ i = 1 n X i 2 - ( Σ i = 1 n X i ) 2 · n Σ i = 1 n Y i 2 - ( Σ i = 1 n Y i ) 2
Wherein n=40, XiAnd YiBeing respectively the variable that two groups of binaryzation pseudo-random sequences are corresponding, value is 0 or 1, arranges R < 0.2.
Step 2. the embedding of watermark information and embedding region and arrange the process of signature identification
Step 2.1: the testing image A obtained is carried out 8 × 8 blocks of pixels, each piecemeal is carried out dct transform.Survey The ranks pixel count of examination image A can be divided exactly by 8, and the most not existing can not the part of piecemeal;
Step 2.2: image size meets condition: 2448 > (40+1) × 8 and 3264 > (29+1) × 8, therefore by whole Image is divided into multiple a length of 328 pixels, the rectangular area of a width of 240 pixels;
Step 2.3: in each area in the DCT block of the first row first row, signature identification is set.Method is: select intermediate frequency Coefficient [1,3], [3,1] and [3,3], is assigned to [3,3] by the meansigma methods of [1,3] and [3,1] so that [3,3] are this group intermediate frequency The median of coefficient.
Step 2.4: from the beginning of the second row secondary series of rectangular area, according to order from left to right, from top to bottom each Being sequentially embedded watermark information in DCT block, every piece embeds a watermark information, and the rule of embedding is:
Make watermark W to be embeddediDuring for " 1 ", [2,2] > [2,3];WiDuring for " 0 ", [2,2] < [2,3].In this enforcement Example arranges watermark strength p=10;
Step 2.5: each 8 × 8 piecemeals of image are carried out DCT inverse transformation, obtains the image containing watermark.
Step 3. fragile watermark embeds
Read the image data having embedded watermark, before APPn flag code, insert redundancy: 0xFF.
Step 4. fragile watermark detects
Reading image data to be detected, whether detection image contains fragile watermark, if fragile watermark is lost, then shadow is described As being tampered;Otherwise, image is not tampered with.
Step 5. watermark extracting
Step 5.1: obtain from coordinate [i, j] to the picture element matrix of [i+ (a+1) × 8, j+ (b+1) × 8], initialize i= 0, j=0,0 < i < 8,0 < j < 8.This picture element matrix is done 8 × 8 piecemeals, and each piecemeal is carried out dct transform;
Step 5.2: find a DCT characteristic block [m, n], if in the DCT block of same column of going together all with this feature block all Have: [3,3] are the medians of [1,3], [3,1] and [3,3] three intermediate frequency coefficients, then this feature block be image certain containing watermark The initial DCT block of sub-rectangular areas;
Step 5.3: if not existing characteristics block, return step one so that i=i+1, j=j+1, until i=7, j=7.If Cannot search out effective characteristic block after traversal terminates, then explanation is not embedded into watermark information or watermark information is broken Bad, exit the Detection and Extraction process of watermark;
Step 5.4: by the location of characteristic block, extract the watermark information in the DCT block group of its place.Method is: obtain from This picture element matrix, to the picture element matrix of [i+ (m+31) × 8, j+ (n+31) × 8], is done 8 by [i+ (m+1) × 8, j+ (n+1) × 8] × 8 block DCT transforms, carry out watermark extracting.Extracting rule is: extracting rule is: if intermediate frequency coefficient [2,2] > [2,3], then Wi =1;[if 2,2] < [2,3], then Wi=0.
Step 5.5: by extract { 0,1} sequence is one group with 40 and represents { the 0,1} of numerical character with default 10 groups Sequence carries out the calculating of correlation coefficient, if normalizated correlation coefficient is more than threshold value 0.8, is converted into corresponding numerical character.Again will The format symbol of numerical character and time and longitude and latitude carries out string-concatenation, obtains the space time information embedded: " 2016-01-28 20:20:55 32.11676 ° of N of 118.91075 ° of E ", consistent with initial information.
The feature of this method and technical advantage
(1) the most key mode being watermark and embedding in this method.The method embedded by subregion and mark is set, Shearing attack can be effective against, it is achieved quickly location, the high efficiency extraction containing watermark region.
(2) this method makes full use of the own characteristic of digitized video, it is proposed that a kind of fragile watermark based on redundant data Method, improves the ability that image data is anti-tamper.
Test and analysis
Method proposed by the invention is specific to the water mark method of IOS end digitized video.Robust for verification method Property and operational efficiency, carry out the attack of distinct methods to it and calculate the operation time.
(1) JPEG compression is attacked
The image data embedding watermark information is carried out JPEG compression according to different compression qualities.After compression, then to this A little data carry out watermark information extraction.Test result indicate that: the method can be effective against JPEG pressure when compressing quality more than 4 Contracting is attacked.Image is after compression processes, and whole promptings are tampered.Test result is as shown in table 1.
Table 1 anti-JPEG compression experimental result
(2) shearing attack
Image data is often in transmission way, and user can be carried out cutting according to self-demand, thus, method is necessary Possesses the ability of the shearing attack of opposing optional position.After shearing attack, image data size can change, and destroys watermark Information and the synchronized relation of embedded location.
Testing image after embedding watermark is done surrounding cutting, 1/2nd cuttings and 1/4th cuttings, by traversal Look for characteristic area and still can extract space time information " 118.91075 ° of E of 2016-01-28 20:20:55 32.11676 ° N”.After image cutting, whole promptings are tampered.Test result is as shown in table 2.
The anti-shearing attack of table 2 is tested
(3) embed and extraction time test
Owing to the hardware performance of smart mobile phone is generally less than PC, it requires that the execution efficiency of method wants height.Holding of algorithm The method of testing of row time is: test embeds watermark and extracts the time of watermark respectively, considers optimum feelings when extracting watermark Condition and worst case.Optimal situation is embedding watermark in testing image, and not cutting is made without traversal when extracting watermark. Worst case is not embed watermark in testing image, not cutting, extracts watermark, needs to travel through to i=7, j=7.Repeatedly test Averaging, test result is as shown in table 3.Under worst case, time-consumingly less than 1s, illustrate that this method execution efficiency is the highest.
Table 3 embeds and extraction time tests
Optimal situation Worst case
The embedding time 0.45s 0.48s
Extraction time 0.2s 0.76s

Claims (1)

1.GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information, its step is as follows:
Step one, the acquisition of space time information and watermark information based on space time information generate
Step 1.1: obtain temporal information and latitude and longitude information from the GPS module or BEI-DOU position system application of ios device, Omitting time and longitude and latitude symbol, read remaining numerical character, the quantity of numerical character is L1
Step 1.2: use present clock as random number seed, use linear congruence function, { 0,1} binaryzation is pseudo-to generate 10 groups Random sequence, represents numeral 0~9 respectively;Often group { 0,1} binaryzation pseudo-random sequence, its a length of L2, mutual correlation coefficient Less than threshold value T1, 0 < T1< 0.5;Linear congruence functional expression is as follows:
Xn+1=(aXn+ c) mod (m), n=0,1,2,3......, L2
Wherein m, a, c and X0Being respectively modulus, multiplier, increment and the initial value of random function, mod is MOD function, XnValue be With m, a, c and Xn-1For the value of function during parameter;{Xn, n=1,2,3......, L2, for the pseudo-random sequence tried to achieve;By { Xn} Sequence carry out the method for 0,1} binaryzation is as follows:
Xn'=(int) XnMod2, n=1,2,3......, L2
Wherein: int is downward bracket function, { Xn' it is { 0, the 1} binaryzation pseudo-random sequence tried to achieve;
Then to the { X generatedn' test, if this group sequence and other each group { 0, the 1} binaryzation pseudorandom generated Correlation coefficient between sequence is less than T1, then retain, otherwise carry out deleting and regenerate one group of { 0,1} binaryzation pseudorandom sequence Row, continue inspection, until qualified, { 0,1} binaryzation pseudo-random sequence reaches 10 groups.Two groups of { 0,1} binaryzation pseudorandoms Between sequence, the computing formula of correlation coefficient is as follows:
r = n Σ i = 1 n X i Y i - Σ i = 1 n X i · Σ i = 1 n Y i n Σ i = 1 n X i 2 - ( Σ i = 1 n X i ) 2 · n Σ i = 1 n Y i 2 - ( Σ i = 1 n Y i ) 2
Wherein X and Y represents two groups of { 0,1} binaryzation pseudo-random sequence, XiAnd YiBeing the corresponding variable of two groups of sequences, n is one group { the quantity i.e. L of variable in 0,1} binaryzation pseudo-random sequence2, r is the correlation coefficient tried to achieve, and its span is-1≤r≤1;
Then, the L that will read1Individual numerical character be converted into correspondence { 0,1} binaryzation pseudo-random sequence, generates to be embedded Watermark information W={Wi, i=0,1 ..., L}, wherein Wi={ 0,1};Length L=L of watermark information W1×L2
Step 2, the embedding of watermark information and embed region signature identification is set
Step 2.1: the raw video that size is x × y is done 8 × 8 piecemeals, and each piecemeal is carried out dct transform;If The situation that image row pixel count x or row pixel count y can not be divided exactly by 8, then round the result of x/8 with y/8 downwards, it is impossible to The partial image of piecemeal does not processes;
Step 2.2: whole image is divided into the sub-rectangular areas of non-overlapping copies, every piece of a length of (L in region2+ 1) × 8, a width of (L1 +1)×8;If x is < (L2+ 1) × 8 or y < (L1+ 1) × 8 explanation image size are too small, it is impossible to complete embedding time watermark letter Breath, exits telescopiny;
Step 2.3: in the first row in each region and the DCT block of first row, signature identification is set by the following method: choosing Select intermediate frequency coefficient [1,3], [3,1] and [3,3], the meansigma methods of [1,3] and [3,1] is assigned to [3,3] so that [3,3] are for being somebody's turn to do The median of group intermediate frequency coefficient;
Step 2.4: from the beginning of the second row secondary series of each rectangular area, according to order from left to right, from top to bottom often Being sequentially embedded watermark information in individual DCT block intermediate frequency coefficient [2,2] and [2,3], every piece embeds a watermark information, the rule of embedding For:
Make watermark W to be embeddediDuring for " 1 ", [2,2] > [2,3];WiDuring for " 0 ", [2,2] < [2,3];Wherein p is watermark Intensity;
Step 2.5: each 8 × 8 piecemeals of image are carried out DCT inverse transformation, obtains the digitized video containing watermark;
Step 3, the embedding of fragile watermark
Read the image data having embedded watermark, select a flag code, before traffic locality residing for it, insert redundancy 0xFF;
Step 4, fragile watermark detect
Reading image data to be detected, the embedded location at fragile watermark detects, if fragile watermark is lost, then illustrates Image data is tampered;Otherwise, then explanation image data is not tampered with;
Step 5, watermark extracting
Step 5.1: read image pixel information, obtains the pixel square from coordinate [i, j] to [i+ (a+1) × 8, j+ (b+1) × 8] Battle array, initializes i=0, j=0,0 < i < 8,0 < j < 8;This picture element matrix is done 8 × 8 piecemeals, and each piecemeal is carried out DCT Conversion;
Step 5.2: find a DCT characteristic block [m, n], if the DCT block of go together same column all with this feature block has: [3,3] are the medians of [1,3], [3,1] and [3,3] three intermediate frequency coefficients, then this feature block is certain square Han watermark of image The initial DCT block of shape subregion;
Step 5.3: if not existing characteristics block, return step 5.1 so that i=i+1, j=j+1, until i=7, j=7;If Traversal cannot search out effective characteristic block after terminating, then explanation is not embedded into watermark information or watermark information is broken Bad, exit the Detection and Extraction process of watermark;
Step 5.4: by the location of characteristic block, extract the watermark information of its rectangular area, place;Method is: obtain from [i+ (m+ 1) × 8, j+ (n+1) × 8] to the picture element matrix of [i+ (m+a+1) × 8, j+ (n+b+1) × 8], this picture element matrix is done 8 × 8 points Block dct transform, carries out watermark extracting;Extracting rule is: if intermediate frequency coefficient [2,2] > [2,3], then Wi=1;If [2,2] < [2, 3], then Wi=0;
Step 5.5: by extract { 0,1} sequence is with every L2Position is one group, represents { the 0,1} bis-of numerical character with default 10 groups Value pseudo-random sequence carries out the calculating of correlation coefficient, if normalizated correlation coefficient is more than threshold value 1-T1Then it is converted into corresponding number Word character, carries out character splicing by the format symbol of numerical character with time and longitude and latitude, obtains the space time information embedded.
CN201610479090.6A 2016-06-27 2016-06-27 GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information Pending CN106127668A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610479090.6A CN106127668A (en) 2016-06-27 2016-06-27 GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610479090.6A CN106127668A (en) 2016-06-27 2016-06-27 GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information

Publications (1)

Publication Number Publication Date
CN106127668A true CN106127668A (en) 2016-11-16

Family

ID=57266500

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610479090.6A Pending CN106127668A (en) 2016-06-27 2016-06-27 GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information

Country Status (1)

Country Link
CN (1) CN106127668A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108449527A (en) * 2018-03-28 2018-08-24 南京吉印信息科技有限公司 A kind of digital watermark method and system for taking the photograph attack for the anti-screen of remote sensing images
CN110599388A (en) * 2019-08-26 2019-12-20 华中科技大学 Blind robust digital watermark embedding and detecting method based on positioning point assistance
WO2021018229A1 (en) * 2019-08-01 2021-02-04 北京大米科技有限公司 Image processing method and apparatus, and electronic device
CN113129199A (en) * 2021-05-10 2021-07-16 杭州天宽科技有限公司 Dark watermark protection method based on Android platform
CN117336570A (en) * 2023-11-28 2024-01-02 北京富通亚讯网络信息技术有限公司 Video tamper-proof system and method based on digital watermark, electronic equipment and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063834A (en) * 2013-03-22 2014-09-24 中国水利水电科学研究院 Watermark embedding method, watermark detecting method and device thereof
CN104134185A (en) * 2014-07-31 2014-11-05 江西理工大学 Image watermark embedding and extracting method and system for resisting combination attacks

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063834A (en) * 2013-03-22 2014-09-24 中国水利水电科学研究院 Watermark embedding method, watermark detecting method and device thereof
CN104134185A (en) * 2014-07-31 2014-11-05 江西理工大学 Image watermark embedding and extracting method and system for resisting combination attacks

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
吴勇 等: ""可定位图像采集与检索方法研究"", 《计算机工程》 *
朱长青 等: ""一种基于伪随机序列和DCT的遥感影像水印算法"", 《武汉大学学报·信息科技版》 *
罗腾元 等: ""有声可定位图像采集方法"", 《计算机工程与设计》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108449527A (en) * 2018-03-28 2018-08-24 南京吉印信息科技有限公司 A kind of digital watermark method and system for taking the photograph attack for the anti-screen of remote sensing images
CN108449527B (en) * 2018-03-28 2019-06-18 南京吉印信息科技有限公司 A kind of digital watermark method and system for taking the photograph attack for the anti-screen of remote sensing images
WO2021018229A1 (en) * 2019-08-01 2021-02-04 北京大米科技有限公司 Image processing method and apparatus, and electronic device
CN110599388A (en) * 2019-08-26 2019-12-20 华中科技大学 Blind robust digital watermark embedding and detecting method based on positioning point assistance
CN113129199A (en) * 2021-05-10 2021-07-16 杭州天宽科技有限公司 Dark watermark protection method based on Android platform
CN117336570A (en) * 2023-11-28 2024-01-02 北京富通亚讯网络信息技术有限公司 Video tamper-proof system and method based on digital watermark, electronic equipment and medium
CN117336570B (en) * 2023-11-28 2024-02-13 北京富通亚讯网络信息技术有限公司 Video tamper-proof system and method based on digital watermark, electronic equipment and medium

Similar Documents

Publication Publication Date Title
CN106127668A (en) GPS and the guard method in IOS end digitized video of the BEI-DOU position system space time information
Kumar et al. Image Transformation Technique Using Steganography Methods Using LWT Technique Image Transformation Technique Using Steganography Methods Using LWT Technique
CN101458810B (en) Vector map watermark method based on object property characteristic
Pereira et al. Fast robust template matching for affine resistant image watermarks
Bartolini et al. Image authentication techniques for surveillance applications
CN102096894B (en) Image fragile watermarking algorithm capable of realizing accurate positioning of tampered region
Bhatti et al. New watermarking algorithm utilizing quaternion Fourier transform with advanced scrambling and secure encryption
Da et al. A novel hybrid information security scheme for 2D vector map
CN106709853A (en) Image retrieval method and system
CN105632506A (en) Robust digital audio watermark embedding and detection method based on polar harmonic transform
CN106780287B (en) Lossless watermarking method based on vector geographic line data organization characteristics
CN104794677A (en) Vector map watermark method based on space geometric features
CN106485641B (en) A kind of tile data digital watermarking generation insertion and extracting method based on QR code
CN103971324B (en) Asymmetric watermarking method for protecting vector map data copyright
CN102419979A (en) Audio semi-fragile watermarking algorithm for realizing precise positioning of altered area
CN102117474B (en) Digital picture watermark embedding and detecting method and device
CN103886864A (en) Method for detecting quantitatively-embedded secret information for DWT domain fidelity compensation
Zhiwei et al. Steganography based on wavelet transform and modulus function
CN102523535A (en) Video stream and global positioning system (GPS) real-time registration and synchronous transmission method based on digital watermarking technology
CN102646259A (en) Anti-attack robustness multiple zero watermark method
CN103079066B (en) Image watermark embedding and extracting method combining ridgelet transform and DCT transform
CN102682246B (en) Vector geographic data digital watermark method based on data point positioning
Zhao et al. Perceptual image hash for tampering detection using Zernike moments
CN114630130A (en) Face-changing video tracing method and system based on deep learning
CN110349072B (en) Watermark synchronization method in vector geographic data watermark embedding and detecting process

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161116

WD01 Invention patent application deemed withdrawn after publication