CN108648130A - A kind of total blindness's digital watermark method with copyright protection and tampering location function - Google Patents

A kind of total blindness's digital watermark method with copyright protection and tampering location function Download PDF

Info

Publication number
CN108648130A
CN108648130A CN201810299604.9A CN201810299604A CN108648130A CN 108648130 A CN108648130 A CN 108648130A CN 201810299604 A CN201810299604 A CN 201810299604A CN 108648130 A CN108648130 A CN 108648130A
Authority
CN
China
Prior art keywords
region
denoted
block
watermark
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810299604.9A
Other languages
Chinese (zh)
Other versions
CN108648130B (en
Inventor
周亚训
薛栋
周自忠
程盼
苏秀娥
周明翰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo University
Original Assignee
Ningbo University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo University filed Critical Ningbo University
Priority to CN201810299604.9A priority Critical patent/CN108648130B/en
Publication of CN108648130A publication Critical patent/CN108648130A/en
Application granted granted Critical
Publication of CN108648130B publication Critical patent/CN108648130B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Abstract

The invention discloses a kind of total blindness's digital watermark methods with copyright protection and tampering location function, and nonoverlapping 8 × 8 sub-block is divided into the ll channel of original-gray image, each sub-block is divided into 4 × 4 region;Discrete cosine transform is carried out to each region;Feature watermark and self-embedding feature watermark are created according to the dct coefficient matrix of different zones;Discrete cosine transform is carried out to each of ll channel of watermarking images each region in the block in an identical manner when extraction;Feature watermark and authenticating water-mark are blindly extracted then according to the dct coefficient matrix of different zones;It calculates the normalizated correlation coefficient between feature watermark and authenticating water-mark and carries out copyright protection, successive appraximation feature watermark and authenticating water-mark realize total blindness's tampering location;Advantage is only need to be embedded in that a digital watermarking can be achieved with copyright protection and tampering location is difunctional, any information when extracting watermark without original image and original figure watermark, can realize total blindness's detection of watermark.

Description

A kind of total blindness's digital watermark method with copyright protection and tampering location function
Technical field
The present invention relates to a kind of digital media information safe practice, there is copyright protection and distort more particularly, to one kind and determine Total blindness's digital watermark method of bit function.
Background technology
With the rapid development of Digital Media and network technology, digital watermark technology has become medium copyright protection and content A kind of effective means of integrated authentication.But existing digital watermark technology is mostly single watermarking algorithm, often there is functions Single limitation can only realize the protection of copyright or can only realize the certification of content.Obviously, there is multi-functional digital water Print algorithm has stronger demand in practical applications.
Multifunction digital watermark refers to the embedded watermark of different nature in same width digital picture, is answered with reaching different Use purpose.Such as:It is embedded in a visible watermark and an invisible watermark simultaneously in a width digital picture, the former is used for copyright Notice, the latter are used for copyright protection.For another example:It is embedded in a fragile watermark and a robust water simultaneously in a width digital picture Print, the former is for distorting prompt and content authentication, and the latter is for copyright protection etc..
2009, Ye Tianyu existed《Electronics and information journal》On propose a kind of multi-functional double watermarks algorithm, which exists Embedded robust watermarking in the singular value of image block, it is embedded fragile on the spatial domain pixel least significant bit of the image containing robust watermarking Watermark realizes copyright protection and content authentication dual function with this.2012, Lin Junhai existed《Electronic University Of Science & Technology Of Hangzhou's journal》 On propose a kind of multifunctional watermark algorithm that null tone domain based on Error Correction of Coding combines, which carries out carrier image discrete Multipurpose watermarking is embedded into the diagonal line subband of low frequency sub-band by wavelet transformation, then utilizes the bit plane and robust of image Property watermark carry out Hamming code coding, the check code of generation is embedded in the least significant bit of image, realizes the insertion of fragile watermark. 2013, Yu Xiaoqing existed《Computer and application software》On propose a kind of double water of the Multifunctional color color image based on Lifting Wavelet Algorithm is printed, which utilizes the different characteristics of three Color Channels of color RGB image, by the low frequency coefficient of blue component Embedded robust watermarking, the embedded semi-fragile watermarking on the intermediate frequency coefficient of green component, realizes image copyright protection and content authentication And the multi-functional of tampering location.2015, Wang Juan《Minnan Normal University's journal》On propose a kind of more work(of coloured image Can double watermarks algorithm, the algorithm by extract coloured image tri- channels RGB, by copyright watermark qualified insertion in blue component Discrete wavelet low frequency coefficient piecemeal singular value in, then the authenticating water-mark adaptive quantizing generated from red component is embedded in In green component piecemeal singular value, the experimental results showed that, which has the dual function of copyright protection and content authentication.
As it can be seen that in order to realize the multi-functional purpose of digital watermarking, it is set forth above that there is multi-functional digital watermarking algorithm It needs robust watermarking and fragile watermark (or authenticating water-mark) while being embedded in image-carrier.Obviously, it is calculated compared to single watermark Method, while doubly time series model insertion inevitably lead to the decline of picture quality;And due to being carried in same image Embedded doubly time series model in body, therefore certain interference is certainly existed between robust watermarking and fragile watermark, after influencing The extraction effect of continuous watermark.In addition, in order to realize the functions such as copyright protection and content authentication, to the robust watermarking and fragility of extraction Watermark needs and original figure watermark carry out respectively relativity measurement and compared with, cannot achieve the blind Detecting of digital watermarking.
Therefore, for overcome it is above have multi-functional digital watermarking algorithm existing for associated limitations, research a kind of it is embedding Enter single watermark and can be achieved with multi-functional purpose, and can realize that the digital watermarking algorithm of total blindness's detection more has significant practical applications, Also will be the developing direction of field of information security technology.
Invention content
Technical problem to be solved by the invention is to provide a kind of total blindness's numbers with copyright protection and tampering location function Word water mark method only needs an embedded digital watermarking to can be achieved with double work(of copyright protection and tampering location in built-in end Can, and under the premise of ensureing watermarking images quality, there is more satisfactory robustness for normal image processing, for malice Attack has good sensibility, any letter when digital watermarking is extracted in test side without original image and original figure watermark Breath can realize total blindness's detection of digital watermarking.
Technical solution is used by the present invention solves above-mentioned technical problem:One kind having copyright protection and tampering location work( Can total blindness's digital watermark method, it is characterised in that main processes are:
At digital watermark embedding end, level-one discrete wavelet transformation is carried out to original 8bit gray level images, is forced what is obtained The sub-block that nearly dividing sub-picture is 8 × 8 at the size of multiple non-overlapping copies, 4 are divided by each sub-block in ll channel The region that the size of a non-overlapping copies is 4 × 4;Then to each of ll channel each region in the block carry out from Dissipate cosine transform;Then according to the discrete cosine transform of the upper left corner area and upper right comer region of all sub-blocks in ll channel DC coefficient, establishment obtain feature watermark;Lower left corner region further according to each sub-block in ll channel and lower right field Same position discrete cosine transform ac coefficient and create every bit in obtained feature watermark, in ll channel Each sub-block in a bit in self-embedding feature watermark;Finally by inverse discrete cosine transform and level-one against discrete wavelet Transformation obtains the watermarking images embedded with digital watermarking;
In digital watermarking extraction and test side, level-one discrete wavelet transformation is carried out to the watermarking images embedded with digital watermarking, Obtained ll channel is divided into the sub-block that the size of multiple non-overlapping copies is 8 × 8, by every height in ll channel Block is divided into the region that the size of 4 non-overlapping copies is 4 × 4;Then in the block to each of ll channel each Region carries out discrete cosine transform;Upper left corner area and upper right comer region then according to all sub-blocks in ll channel from Cosine transform DC coefficient is dissipated, Blind extracting obtains feature watermark;Further according to the lower left corner region of each sub-block in ll channel With the discrete cosine transform ac coefficient of the same position of lower right field, Blind extracting obtains authenticating water-mark;Finally by calculating Normalizated correlation coefficient between the authenticating water-mark that the feature watermark and Blind extracting that Blind extracting obtains obtain carries out copyright protection, Authenticating water-mark that the feature watermark and Blind extracting obtained by successive appraximation Blind extracting obtains realizes total blindness's tampering location.
Total blindness's digital watermark method with copyright protection and tampering location function includes digital watermark embedding, digital water Two parts of print extraction and detection;
The digital watermark embedding part the specific steps are:
Step 1. _ 1, choose an original 8bit gray level image, and be denoted as F, the size of F is I × J;Then to F Level-one discrete wavelet transformation is carried out, the three width details subgraphs and a width ll channel of F is obtained, the ll channel of F is denoted as FA, FA Size beThen FA is divided intoThe sub-block that the size of a non-overlapping copies is 8 × 8, will K-th of sub-block in FA is denoted as FABk;It is 4 × 4 that each sub-block in FA, which is divided into the size of 4 non-overlapping copies, again Region, by FABkIn upper left corner area as FABkIn the 1st region be denoted asBy FABkIn upper right comer region make For FABkIn the 2nd region be denoted asBy FABkIn lower left corner region as FABkIn the 3rd region be denoted asBy FABkIn lower right field as FABkIn the 4th region be denoted asWherein, I indicates the level side of F To resolution ratio, J indicates the vertical direction resolution ratio of F, symbolFor downward rounding operation symbol, k is positive integer,
1. _ 2, to each of FA each region in the block step carries out discrete cosine transform, obtain each of FA The dct coefficient matrix in son each region in the block, willDct coefficient matrix be denoted asIt willDct coefficient matrix be denoted asIt willDct coefficient matrix note ForIt willDct coefficient matrix be denoted asWherein, WithDimension be 4 × 4;
Step 1. _ 3, create feature watermark W, detailed process is:The discrete cosine transform for calculating each sub-block in FA is straight Coefficient Mean is flowed, by FABkDiscrete cosine transform DC coefficient mean value be denoted as FADk, Then according to the discrete cosine transform DC coefficient mean value of all sub-blocks in FA, establishment obtains feature watermark W, by the kth position of W Bit is denoted as Wk,Wherein, the length of W is It indicatesIn The 1st column element of the 1st row,ForDiscrete cosine transform DC coefficient,It indicatesIn The 1st column element of 1st row,ForDiscrete cosine transform DC coefficient, δ1For the first threshold of setting;
Step 1. _ 4, self-embedding feature watermark W, detailed process is:Self-embedding feature watermark W in each sub-block in FA In a bit, for FABk, take out WkIf Wk=0 andThen enableThen it enablesRealize Wk's Self-embedding, then whenIt is right when establishmentWithMake Further adjustment, evenAnd it enables
If Wk=0 andIt is then rightWithIt does not deal with, it is real Existing WkSelf-embedding, then whenIt is right when establishmentWithIt is for further adjustments, evenAnd it enables
If Wk=1 andThen enableThen it enablesRealize WkSelf-embedding, then when It is right when establishmentWithIt is for further adjustments, evenAnd it enables
If Wk=1 andIt is then rightWithIt does not deal with, it is real Existing WkSelf-embedding, then whenIt is right when establishmentWithIt is for further adjustments, evenAnd it enables
Wherein,It indicatesIn the 2nd column element of the 2nd row,It indicatesIn the 2nd row 2nd column element, G1 and G2 are the intermediate variable of introducing, and abs () is the function that takes absolute value, δ2For the second threshold of setting, In "=" be assignment;
Step 1. _ 5, step 1. _ 4 on the basis of, to each region carry out inverse discrete cosine transform;Then recombination obtains Each sub-block for being embedded with digital watermarking, and then recombinate and obtain the ll channel embedded with digital watermarking;Then to being embedded with digital watermarking Ll channel and the three width details subgraphs of F carry out level-one inverse discrete wavelet transform, obtain the watermarking images embedded with digital watermarking;
The digital watermarking extraction and detection part the specific steps are:
Step 2. _ 1, the watermarking images embedded with digital watermarking be 8bit gray level images, be denoted as TF, the size of TF is I ×J;Then level-one discrete wavelet transformation is carried out to TF, the three width details subgraphs and a width ll channel of TF is obtained, by forcing for TF Nearly subgraph is denoted as TFA, and the size of TFA isThen TFA is divided intoThe size of a non-overlapping copies is big K-th of sub-block in TFA is denoted as TFAB by the small sub-block for being 8 × 8k;It is divided into 4 not weigh mutually each sub-block in TFA again The region that folded size is 4 × 4, by TFABkIn upper left corner area as TFABkIn the 1st region be denoted asBy TFABkIn upper right comer region as TFABkIn the 2nd region be denoted asBy TFABkIn lower-left Angular zone is as TFABkIn the 3rd region be denoted asBy TFABkIn lower right field as TFABkIn the 4th Region is denoted asWherein, symbolFor downward rounding operation symbol, k is positive integer,
2. _ 2, to each of TFA each region in the block step carries out discrete cosine transform, obtain every in TFA The dct coefficient matrix in height each region in the block, willDct coefficient matrix be denoted asIt willDct coefficient matrix be denoted asIt willDiscrete cosine transform coefficient square Battle array is denoted asIt willDct coefficient matrix be denoted asWherein, WithDimension be 4 × 4;
Step 2. _ 3, Blind extracting feature watermark TW, detailed process is:The discrete cosine for calculating each sub-block in TFA becomes DC coefficient mean value is changed, by TFABkDiscrete cosine transform DC coefficient mean value be denoted as TFADk,Then according to the discrete cosine transform direct current system of all sub-blocks in TFA Number mean value, Blind extracting obtain feature watermark TW, the kth position bit of TW are denoted as TWk,Its In, the length of TW is It indicatesIn the 1st column element of the 1st row,ForDiscrete cosine transform DC coefficient,It indicatesIn the 1st column element of the 1st row, ForDiscrete cosine transform DC coefficient, δ1For the first threshold of setting;
Step 2. _ 4, Blind extracting authenticating water-mark TW*, detailed process is:One is blindly extracted in each sub-block in TFA Bit is to obtain authenticating water-mark TW*, for TFABk, extract and obtain TW*In kth position bit TW* k,Wherein, TW*Length be Table ShowIn the 2nd column element of the 2nd row,It indicatesIn the 2nd column element of the 2nd row;
Step 2. _ 5, according to TW and TW*Copyright protection is carried out, detailed process is:Calculate TW and TW*Between normalization phase Relationship number is denoted as ρ (TW, TW*), utilize ρ (TW, TW*) carry out copyright protection;
According to TW and TW*Tampering location is carried out, detailed process is:According to the every bit and TW in TW*In corresponding ratio Spy, determines whether each sub-block in TFA is tampered with, for TFABkIf TWkWith TW* kIt is equal, it is determined that TFABkIt is not usurped It corrects one's mistakes;If TWkWith TW* kIt is unequal, it is determined that TFABkIt is tampered with, realizes total blindness's tampering location.
The step 2. _ 5 in,Its In,Indicate the average value of all elements in TW,Indicate TW*In all elements average value.
Compared with the prior art, the advantages of the present invention are as follows:
1) the method for the present invention only needs watermarking images to can be carried out digital watermarking to carry in digital watermarking extraction with test side It takes and digital watermark detecting, it is no longer necessary to digital watermark embedding end original image or any relevant information of original figure watermark, Not only save digital watermark embedding end transmission original image or when original figure watermark required transmission cost and storage at This, and the passive attack of generally existing or interpretation Attack on internet are avoided, fully achieve blind examination brake.
2) the method for the present invention digital watermark embedding end only need an embedded feature watermark achieve that copyright protection and The difunctional purpose of tampering location, avoids the interference between more watermarks;And the establishment of feature watermark is being schemed respectively with insertion It is carried out in the different zones of each sub-block as in, avoids the influence that feature watermark telescopiny extracts itself.
3) the method for the present invention can realize copyright protection and the difunctional purpose of tampering location simultaneously, have widely practical Property.
4) under the premise of ensureing watermarking images quality, there is more satisfactory robustness for normal image processing, it is right There is good sensibility in malicious attack.
Description of the drawings
Fig. 1 is the original Lena gray level images that resolution ratio is 512 × 512;
Fig. 2 is to be obtained after being handled original Lena gray level images shown in FIG. 1 using the method for the present invention embedded with water The watermark Lena gray level images of print;
Fig. 3 is to carry out histogram equalization processing to watermark Lena gray level images shown in Fig. 2, and what is obtained is equal through histogram Weighing apparatusization treated watermark Lena gray level images;
Fig. 4 is to carry out JPEG lossy compressions processing (compression quality selecting predictors to watermark Lena gray level images shown in Fig. 2 For the watermark Lena gray level images after JPEG lossy compressions 5%), obtained;
Fig. 5 is that (noise of superposition is that mean value is 0 to watermark Lena gray level images shown in Fig. 2 progress noise overlap-add procedure And variance be 0.001 Gaussian reflectivity mirrors), the watermark Lena gray level images after obtained superimposed Gaussian noise;
Fig. 6 is to carry out the median filter process (window size of median filter to watermark Lena gray level images shown in Fig. 2 It is selected as [5 × 5]), the obtained watermark Lena gray level images after medium filtering;
Fig. 7 is the baboon gray level images that size is 128 × 128;
Fig. 8 is by (the 109 of watermark Lena gray level images shown in Fig. 2:236,149:276) region is substituted for shown in Fig. 7 Baboon gray level images, the watermark Lena gray level images obtained after replacement operation;
Fig. 9 is the testing result for carrying out tampering location to watermark Lena gray level images shown in Fig. 8 using the method for the present invention;
Figure 10 is by (the 129 of watermark Lena gray level images shown in Fig. 2:256,129:256) pixel in region replaces Change another region (229 of images themselves into:356,229:356) pixel in, the watermark Lena ashes obtained after replacement operation Spend image;
Figure 11 is the detection knot for carrying out tampering location to watermark Lena gray level images shown in Fig. 10 using the method for the present invention Fruit;
Figure 12 is by (the 329 of watermark Lena gray level images shown in Fig. 2:456,229:356) region is substituted for shown in Fig. 1 Original Lena gray level images (229:356,379:506) region, the watermark Lena gray level images obtained after replacement operation;
Figure 13 is the detection knot for carrying out tampering location to watermark Lena gray level images shown in Figure 12 using the method for the present invention Fruit;
Figure 14 is that watermark Lena gray level images shown in Fig. 2 are located at (214:267,189:227) image block in region It cuts away, the watermark Lena gray level images after obtained region cutting operation;
Figure 15 is the detection knot for carrying out tampering location to watermark Lena gray level images shown in Figure 14 using the method for the present invention Fruit;
Figure 16 is to be located at (329 to watermark Lena gray level images shown in Fig. 2:456,129:256) image block in region Increase into row pixel value and operate, obtained pixel value increases the watermark Lena gray level images after operation;
Figure 17 is the detection knot for carrying out tampering location to watermark Lena gray level images shown in Figure 16 using the method for the present invention Fruit;
Figure 18 is that the overall of the method for the present invention realizes block diagram.
Specific implementation mode
Below in conjunction with attached drawing embodiment, present invention is further described in detail.
A kind of total blindness's digital watermark method with copyright protection and tampering location function proposed by the present invention, it is overall real Existing block diagram is as shown in figure 18, and main processes are:
At digital watermark embedding end, level-one discrete wavelet transformation is carried out to original 8bit gray level images, is forced what is obtained The sub-block that nearly dividing sub-picture is 8 × 8 at the size of multiple non-overlapping copies, then each sub-block in ll channel is divided into The region that the size of 4 non-overlapping copies is 4 × 4;Then each of ll channel each region in the block is carried out Discrete cosine transform;The discrete cosine of upper left corner area and upper right comer region then according to all sub-blocks in ll channel becomes DC coefficient is changed, establishment obtains feature watermark;Lower left corner region further according to each sub-block in ll channel and bottom right angular region Every bit in the feature watermark that the discrete cosine transform ac coefficient of the same position in domain and establishment obtain, in ll channel In each sub-block in a bit in self-embedding feature watermark;Finally by inverse discrete cosine transform and level-one against discrete small Wave conversion obtains the watermarking images embedded with digital watermarking;
In digital watermarking extraction and test side, level-one discrete wavelet transformation is carried out to the watermarking images embedded with digital watermarking, Obtained ll channel is divided into the sub-block that the size of multiple non-overlapping copies is 8 × 8, then by each of ll channel Sub-block is divided into the region that the size of 4 non-overlapping copies is 4 × 4;Then in the block to each of ll channel every A region carries out discrete cosine transform;Upper left corner area and upper right comer region then according to all sub-blocks in ll channel Discrete cosine transform DC coefficient, Blind extracting obtain feature watermark;Further according to the lower-left angular region of each sub-block in ll channel The discrete cosine transform ac coefficient of the same position in domain and lower right field, Blind extracting obtain authenticating water-mark;Finally by meter The normalizated correlation coefficient between the authenticating water-mark that the obtained feature watermark of Blind extracting and Blind extracting obtain is calculated to carry out copyright guarantor Shield, authenticating water-mark that the feature watermark and Blind extracting obtained by successive appraximation Blind extracting obtains realize total blindness's tampering location.
Total blindness's digital watermark method with copyright protection and tampering location function of the present invention include digital watermark embedding, Digital watermarking is extracted and two parts of detection;
The digital watermark embedding part the specific steps are:
Step 1. _ 1, choose an original 8bit gray level image, and be denoted as F, the size of F is I × J;Then to F Level-one discrete wavelet transformation is carried out, the three width details subgraphs and a width ll channel of F is obtained, the ll channel of F is denoted as FA, FA Size beThen FA is divided by raster scan orderThe size of a non-overlapping copies For 8 × 8 sub-block, k-th of sub-block in FA is denoted as FABk;Each sub-block in FA is divided into 4 non-overlapping copies again The region that size is 4 × 4, by FABkIn upper left corner area as FABkIn the 1st region be denoted asBy FABk In upper right comer region as FABkIn the 2nd region be denoted asBy FABkIn lower left corner region as FABkIn 3rd region is denoted asBy FABkIn lower right field as FABkIn the 4th region be denoted asWherein, I Indicate that the horizontal direction resolution ratio of F, J indicate the vertical direction resolution ratio of F, symbolFor downward rounding operation symbol, k is Positive integer,
1. _ 2, to each of FA each region in the block step carries out discrete cosine transform, obtain each of FA The dct coefficient matrix in son each region in the block, willDct coefficient matrix be denoted asIt willDct coefficient matrix be denoted asIt willDct coefficient matrix note ForIt willDct coefficient matrix be denoted asWherein, WithDimension be 4 × 4.
Step 1. _ 3, create feature watermark W, detailed process is:Calculate the discrete remaining of each sub-block in FA String converts DC coefficient mean value, by FABkDiscrete cosine transform DC coefficient mean value be denoted as FADk,Then the discrete cosine transform DC coefficient according to all sub-blocks in FA is equal Value, establishment obtain feature watermark W, the kth position bit of W are denoted as Wk,Wherein, the length of W is It indicatesIn the 1st column element of the 1st row,ForDiscrete cosine transform DC coefficient,It indicatesIn the 1st column element of the 1st row,ForDiscrete cosine transform it is straight Flow coefficient, δ1For the first threshold of setting, δ is taken in the present embodiment1=1000.
Step 1. _ 4, self-embedding feature watermark W, detailed process is:Self-embedding feature water in each sub-block in FA A bit in W is printed, for FABk, take out WkIf Wk=0 andThen enableThen it enablesExchangeWithValue, realize WkSelf-embedding, then in order to improve the robustness of embedded digital watermarking, whenIt is right when establishmentWithIt is for further adjustments, i.e., It enablesAnd it enables
If Wk=0 andIt is then rightWithIt does not deal with, realizes WkSelf-embedding, then in order to improve the robustness of embedded digital watermarking, when It is right when establishmentWithIt is for further adjustments, evenAnd it enables
If Wk=1 andThen enable Then it enablesExchangeWithValue, realize Wk's Self-embedding, then in order to improve the robustness of embedded digital watermarking, whenAt Immediately, rightWithIt is for further adjustments, evenAnd it enables
If Wk=1 andIt is then rightWithIt does not deal with, realizes WkSelf-embedding, then in order to improve the robustness of embedded digital watermarking, when It is right when establishmentWithIt is for further adjustments, evenAnd it enables
Wherein,It indicatesIn the 2nd column element of the 2nd row,It indicatesIn the 2nd The 2nd column element of row, G1 and G2 are the intermediate variable of introducing, and abs () is the function that takes absolute value, δ2For the second threshold of setting, δ is taken in the present embodiment2=20, In "=" be assignment.
Step 1. _ 5, step 1. _ 4 on the basis of, to each region carry out inverse discrete cosine transform;Then recombination obtains Each sub-block for being embedded with digital watermarking, and then recombinate and obtain the ll channel embedded with digital watermarking;Then to being embedded with digital watermarking Ll channel and the three width details subgraphs of F carry out level-one inverse discrete wavelet transform, obtain the watermarking images embedded with digital watermarking.
The digital watermarking extraction and detection part the specific steps are:
Step 2. _ 1, the watermarking images embedded with digital watermarking be 8bit gray level images, be denoted as TF, the size of TF is I ×J;Then level-one discrete wavelet transformation is carried out to TF, the three width details subgraphs and a width ll channel of TF is obtained, by forcing for TF Nearly subgraph is denoted as TFA, and the size of TFA isThen TFA is divided by raster scan orderIt is a mutual The sub-block that nonoverlapping size is 8 × 8, TFAB is denoted as by k-th of sub-block in TFAk;Again by each sub-block in TFA It is divided into the region that the size of 4 non-overlapping copies is 4 × 4, by TFABkIn upper left corner area as TFABkIn the 1st A region is denoted asBy TFABkIn upper right comer region as TFABkIn the 2nd region be denoted asBy TFABk In lower left corner region as TFABkIn the 3rd region be denoted asBy TFABkIn lower right field as TFABk In the 4th region be denoted asWherein, symbolFor downward rounding operation symbol, k is positive integer,
2. _ 2, to each of TFA each region in the block step carries out discrete cosine transform, obtain every in TFA The dct coefficient matrix in height each region in the block, willDct coefficient matrix be denoted asIt willDct coefficient matrix be denoted asIt willDiscrete cosine transform coefficient square Battle array is denoted asIt willDct coefficient matrix be denoted asWherein, WithDimension be 4 × 4.
Step 2. _ 3, Blind extracting feature watermark TW, detailed process is:The discrete cosine for calculating each sub-block in TFA becomes DC coefficient mean value is changed, by TFABkDiscrete cosine transform DC coefficient mean value be denoted as TFADk,Then according to the discrete cosine transform direct current system of all sub-blocks in TFA Number mean value, Blind extracting obtain feature watermark TW, the kth position bit of TW are denoted as TWk,Its In, the length of TW is It indicatesIn the 1st column element of the 1st row,ForDiscrete cosine transform DC coefficient,It indicatesIn the 1st column element of the 1st row, ForDiscrete cosine transform DC coefficient, δ1For the first threshold of setting, δ is taken in the present embodiment1=1000.
Step 2. _ 4, Blind extracting authenticating water-mark TW*, detailed process is:One is blindly extracted in each sub-block in TFA Bit is to obtain authenticating water-mark TW*, for TFABk, extract and obtain TW*In kth position bit TW* k,Wherein, TW*Length be Table ShowIn the 2nd column element of the 2nd row,It indicatesIn the 2nd column element of the 2nd row.
Step 2. _ 5, according to TW and TW*Copyright protection is carried out, detailed process is:Calculate TW and TW*Between normalization phase Relationship number is denoted as ρ (TW, TW*),Wherein,Indicate the average value of all elements in TW,Indicate TW*In all elements average value;Utilize ρ (TW, TW*) come Carry out copyright protection.
According to TW and TW*Tampering location is carried out, detailed process is:According to the every bit and TW in TW*In corresponding ratio Spy, determines whether each sub-block in TFA is tampered with, for TFABkIf TWkWith TW* kIt is equal, it is determined that TFABkIt is not usurped It corrects one's mistakes;If TWkWith TW* kIt is unequal, it is determined that TFABkIt is tampered with, realizes total blindness's tampering location.
Method is applied to the feasibility in terms of digital image copyright protection and tampering location in order to better illustrate the present invention, Experiment simulation is carried out using the original Lena gray level images that resolution ratio shown in FIG. 1 is 512 × 512 as test image, experiment is imitative Really carried out on Matlab7.5 platforms.Wherein, first threshold δ1Value is 1000, second threshold δ2Value is 20.Fig. 2 gives The watermark embedded with watermark obtained after being handled original Lena gray level images shown in FIG. 1 using the method for the present invention is gone out Lena gray level images, from fig. 2 it can be seen that the masters of watermark Lena gray level images, objective quality embedded with watermark are very good, Y-PSNR has reached 38.23dB, is difficult visually to feel variation, meets the requirement of watermark imperceptible.Using this Normalizated correlation coefficient between the feature watermark and authenticating water-mark of inventive method extraction is 1, illustrates the watermark embedded with watermark Lena gray level images can extract embedded feature watermark completely losslessly when not destroyed by any processing or attack, because This can be used for the copyright protection of digital picture works.
Here, the picture quality after digital picture insertion watermark, and picture quality after image procossing are objective Evaluation is all made of Y-PSNR (PSNR),Wherein, I= Coordinate position is the pixel of (i, j) in 512, J=512,1≤i≤I, 1≤j≤J, f (i, j) expression original-gray image F Pixel value, tf (i, j) is indicated after embedded watermark or watermarking images coordinate bit in gray level image TF by image procossing and after distorting It is set to the pixel value of the pixel of (i, j), fmaxIndicate that the max pixel value in original-gray image F, I × J indicate original gradation The resolution ratio of image F.
Below by way of to embedded with watermark watermark Lena gray level images carry out it is various processing and distort operation, to verify this hair Bright method is for the feasibility in terms of digital image copyright protection and tampering location.
1) histogram equalization
Histogram equalization processing is carried out to watermark Lena gray level images shown in Fig. 2, is obtained through at histogram equalization Watermark Lena gray level images after reason, as shown in Figure 3.After histogram equalization processing, in watermark Lena gray level images Significant change has occurred in the pixel Distribution value of pixel, and Y-PSNR (PSNR) is only 19.04dB.But use the method for the present invention Normalizated correlation coefficient between the feature watermark and authenticating water-mark that extract has reached 0.89, has absolutely proved embedded feature Watermark can be extracted well, illustrate the robustness of the method for the present invention.
2) JPEG lossy compressions
JPEG lossy compression processing is carried out to watermark Lena gray level images shown in Fig. 2, compression quality selecting predictors are 5%, the watermark Lena gray level images after JPEG lossy compressions are obtained, as shown in Figure 4.Figure 4, it is seen that having through JPEG It damages compressed watermark Lena gray level images and shows certain blocking artifact, visual quality is degenerated, Y-PSNR (PSNR) 33.62dB is dropped to.But the normalization phase between the feature watermark and authenticating water-mark extracted using the method for the present invention Relationship number has reached 0.83, has absolutely proved that embedded feature watermark can be extracted well, has illustrated the method for the present invention Robustness.
3) it is superimposed Gauss (Gauss) noise
Noise overlap-add procedure is carried out to watermark Lena gray level images shown in Fig. 2, it is 0 and variance that the noise of superposition, which is mean value, For 0.001 Gaussian reflectivity mirrors, the watermark Lena gray level images after superimposed Gaussian noise are obtained, as shown in Figure 5.From Fig. 5 In as can be seen that more serious degeneration, peak value occur for the visual quality of the watermark Lena gray level images after superimposed Gaussian noise Signal-to-noise ratio (PSNR) is only 29.41dB.But the normalizing between the feature watermark and authenticating water-mark extracted using the method for the present invention Changing related coefficient has 0.96, illustrates that embedded feature watermark almost do not influenced by.
4) medium filtering
Median filter process, the window size selection of median filter are carried out to watermark Lena gray level images shown in Fig. 2 For [5 × 5], the watermark Lena gray level images after medium filtering are obtained, as shown in Figure 6.From fig. 6 it can be seen that through intermediate value The detailed information of filtered watermark Lena gray level images occurs to obscure, and Y-PSNR (PSNR) drops to 32.89dB.But it adopts Normalizated correlation coefficient between the feature watermark and authenticating water-mark that are extracted with the method for the present invention still has 0.86, illustrates insertion Feature watermark remains to preferably be extracted the copyright protection for digital picture works.
The multifunctionality of method in order to further illustrate the present invention dislikes watermark Lena gray level images shown in Fig. 2 Tampering detection of anticipating is tested, and the sub-block of distorting detected is shown with density bullet.The malice of image is distorted main including replacing, cutting It cuts and the operations such as pixel value increase.
Region replacement operation 1:By (the 109 of watermark Lena gray level images shown in Fig. 2:236,149:276) region is replaced The baboon gray level images for being 128 × 128 at size shown in Fig. 7, the watermark Lena gray-scale maps obtained after replacement operation As shown in Figure 8.The tampering location testing result obtained using the method for the present invention is usurped as shown in figure 9, can orient well The image-region changed.
Region replacement operation 2:By (the 129 of watermark Lena gray level images shown in Fig. 2:256,129:256) in region Pixel is substituted for another region (229 of images themselves:356,229:356) pixel in, the water obtained after replacement operation It is as shown in Figure 10 to print Lena gray level images.The tampering location testing result obtained using the method for the present invention is as shown in figure 11, can be with The image-region distorted is oriented well.
Region replacement operation 3:By (the 329 of watermark Lena gray level images shown in Fig. 2:456,229:356) region is replaced At (the 229 of original Lena gray level images shown in FIG. 1:356,379:506) region, the watermark Lena ashes obtained after replacement operation It is as shown in figure 12 to spend image.The tampering location testing result obtained using the method for the present invention is as shown in figure 13, can accurately determine Position goes out the image-region distorted.
Region cutting operation:Watermark Lena gray level images shown in Fig. 2 are located at (214:267,189:227) in region Image block is cut away, i.e., the pixel value of each pixel in the region is set to 0, obtains the watermark after the cutting operation of region Lena gray level images are as shown in figure 14.The tampering location testing result obtained using the method for the present invention is as shown in figure 15, Ke Yizhun Really detect and orient the image-region distorted.
Pixel value increases operation:(329 are located to watermark Lena gray level images shown in Fig. 2:456,129:256) in region Image block into row pixel value increase operate, such as by the pixel value of each pixel in the region add 50, obtain pixel The watermark Lena gray level images that value increases after operation are as shown in figure 16.The tampering location testing result obtained using the method for the present invention As shown in figure 17, the image-region distorted can be oriented well.

Claims (3)

1. a kind of total blindness's digital watermark method with copyright protection and tampering location function, it is characterised in that main processes For:
At digital watermark embedding end, level-one discrete wavelet transformation, the approximator that will be obtained are carried out to original 8bit gray level images Figure be divided into multiple non-overlapping copies size be 8 × 8 sub-block, by each sub-block in ll channel be divided into 4 mutually The region that nonoverlapping size is 4 × 4;Then each of ll channel each region in the block is carried out discrete remaining String converts;The discrete cosine transform direct current of upper left corner area and upper right comer region then according to all sub-blocks in ll channel Coefficient, establishment obtain feature watermark;Lower left corner region and lower right field further according to each sub-block in ll channel it is same Every bit in the feature watermark that the discrete cosine transform ac coefficient of one position and establishment obtain, it is every in ll channel A bit in a sub-block in self-embedding feature watermark;Finally by inverse discrete cosine transform and level-one inverse discrete wavelet transform Obtain the watermarking images embedded with digital watermarking;
In digital watermarking extraction and test side, level-one discrete wavelet transformation is carried out to the watermarking images embedded with digital watermarking, will To ll channel be divided into the sub-block that the size of multiple non-overlapping copies is 8 × 8, by each sub-block in ll channel point It is cut into the region that the size of 4 non-overlapping copies is 4 × 4;Then to each of ll channel each region in the block Carry out discrete cosine transform;Upper left corner area and upper right comer region then according to all sub-blocks in ll channel it is discrete remaining String converts DC coefficient, and Blind extracting obtains feature watermark;Lower left corner region further according to each sub-block in ll channel and the right side The discrete cosine transform ac coefficient of the same position of lower angular zone, Blind extracting obtain authenticating water-mark;It is carried finally by calculating is blind Normalizated correlation coefficient between the authenticating water-mark that the feature watermark and Blind extracting obtained obtains carries out copyright protection, passes through Authenticating water-mark that the feature watermark and Blind extracting that successive appraximation Blind extracting obtains obtain realizes total blindness's tampering location.
2. a kind of total blindness's digital watermark method with copyright protection and tampering location function according to claim 1, It is characterized in that total blindness's digital watermark method includes two digital watermark embedding, digital watermarking extraction and detection parts;
The digital watermark embedding part the specific steps are:
Step 1. _ 1, choose an original 8bit gray level image, and be denoted as F, the size of F is I × J;Then F is carried out Level-one discrete wavelet transformation obtains the three width details subgraphs and a width ll channel of F, the ll channel of F is denoted as FA, the ruler of FA Very little size isThen FA is divided intoThe sub-block that the size of a non-overlapping copies is 8 × 8, will be in FA K-th of sub-block be denoted as FABk;Each sub-block in FA is divided into the area that the size of 4 non-overlapping copies is 4 × 4 again Domain, by FABkIn upper left corner area as FABkIn the 1st region be denoted asBy FABkIn upper right comer region conduct FABkIn the 2nd region be denoted asBy FABkIn lower left corner region as FABkIn the 3rd region be denoted as By FABkIn lower right field as FABkIn the 4th region be denoted asWherein, I indicates that the horizontal direction of F is differentiated Rate, J indicate the vertical direction resolution ratio of F, symbolFor downward rounding operation symbol, k is positive integer,
1. _ 2, to each of FA each region in the block step carries out discrete cosine transform, obtain each sub-block in FA In each region dct coefficient matrix, willDct coefficient matrix be denoted asIt willDct coefficient matrix be denoted asIt willDct coefficient matrix be denoted as It willDct coefficient matrix be denoted asWherein, WithDimension It is 4 × 4;
Step 1. _ 3, create feature watermark W, detailed process is:Calculate the discrete cosine transform direct current system of each sub-block in FA Number mean value, by FABkDiscrete cosine transform DC coefficient mean value be denoted as FADk, Then according to the discrete cosine transform DC coefficient mean value of all sub-blocks in FA, establishment obtains feature watermark W, by the kth position of W Bit is denoted as Wk,Wherein, the length of W is It indicatesIn The 1st column element of the 1st row,ForDiscrete cosine transform DC coefficient,It indicatesIn The 1st column element of 1st row,ForDiscrete cosine transform DC coefficient, δ1For the first threshold of setting;
Step 1. _ 4, self-embedding feature watermark W, detailed process is:A ratio in each sub-block in FA in self-embedding feature watermark W Spy, for FABk, take out WkIf Wk=0 andThen enable Then it enablesRealize WkSelf-embedding, then when It is right when establishmentWithIt is for further adjustments, evenAnd It enables
If Wk=0 andIt is then rightWithIt does not deal with, realizes Wk's Self-embedding, then whenIt is right when establishmentWithMake Further adjustment, evenAnd it enables
If Wk=1 andThen enableThen it enablesRealize WkSelf-embedding, then when It is right when establishmentWithIt is for further adjustments, evenAnd it enables
If Wk=1 andIt is then rightWithIt does not deal with, realizes Wk's Self-embedding, then whenIt is right when establishmentWithMake Further adjustment, evenAnd it enables
Wherein,It indicatesIn the 2nd column element of the 2nd row,It indicatesIn the 2nd row the 2nd Column element, G1 and G2 are the intermediate variable of introducing, and abs () is the function that takes absolute value, δ2For the second threshold of setting, In "=" be assignment;
Step 1. _ 5, step 1. _ 4 on the basis of, to each region carry out inverse discrete cosine transform;Then recombination obtains each Sub-block embedded with digital watermarking, and then recombinate and obtain the ll channel embedded with digital watermarking;Then to being forced embedded with digital watermarking The three width details subgraphs of nearly subgraph and F carry out level-one inverse discrete wavelet transform, obtain the watermarking images embedded with digital watermarking;
The digital watermarking extraction and detection part the specific steps are:
Step 2. _ 1, the watermarking images embedded with digital watermarking be 8bit gray level images, be denoted as TF, the size of TF is I × J; Then level-one discrete wavelet transformation is carried out to TF, the three width details subgraphs and a width ll channel of TF is obtained, by the approximator of TF Seal is TFA, and the size of TFA isThen TFA is divided intoThe size of a non-overlapping copies is K-th of sub-block in TFA is denoted as TFAB by 8 × 8 sub-blockk;Each sub-block in TFA is divided into 4 non-overlapping copies again The region that size is 4 × 4, by TFABkIn upper left corner area as TFABkIn the 1st region be denoted asIt will TFABkIn upper right comer region as TFABkIn the 2nd region be denoted asBy TFABkIn lower left corner region conduct TFABkIn the 3rd region be denoted asBy TFABkIn lower right field as TFABkIn the 4th region be denoted asWherein, symbolFor downward rounding operation symbol, k is positive integer,
2. _ 2, to each of TFA each region in the block step carries out discrete cosine transform, obtain every height in TFA The dct coefficient matrix in each region in the block, willDct coefficient matrix be denoted asIt willDct coefficient matrix be denoted asIt willDiscrete cosine transform coefficient square Battle array is denoted asIt willDct coefficient matrix be denoted asWherein, WithDimension be 4 × 4;
Step 2. _ 3, Blind extracting feature watermark TW, detailed process is:Calculate the discrete remaining of each sub-block in TFA String converts DC coefficient mean value, by TFABkDiscrete cosine transform DC coefficient mean value be denoted as TFADk,Then according to the discrete cosine transform direct current system of all sub-blocks in TFA Number mean value, Blind extracting obtain feature watermark TW, the kth position bit of TW are denoted as TWk,Its In, the length of TW is It indicatesIn the 1st column element of the 1st row,ForDiscrete cosine transform DC coefficient,It indicatesIn the 1st column element of the 1st row, ForDiscrete cosine transform DC coefficient, δ1For the first threshold of setting;
Step 2. _ 4, Blind extracting authenticating water-mark TW*, detailed process is:A bit is blindly extracted in each sub-block in TFA To obtain authenticating water-mark TW*, for TFABk, extract and obtain TW*In kth position bit TW* k,Wherein, TW*Length be Table ShowIn the 2nd column element of the 2nd row,It indicatesIn the 2nd column element of the 2nd row;
Step 2. _ 5, according to TW and TW*Copyright protection is carried out, detailed process is:Calculate TW and TW*Between normalization phase relation Number, is denoted as ρ (TW, TW*), utilize ρ (TW, TW*) carry out copyright protection;
According to TW and TW*Tampering location is carried out, detailed process is:According to the every bit and TW in TW*In corresponding bit, really Whether each sub-block determined in TFA is tampered with, for TFABkIf TWkWith TW* kIt is equal, it is determined that TFABkIt was not tampered with; If TWkWith TW* kIt is unequal, it is determined that TFABkIt is tampered with, realizes total blindness's tampering location.
3. a kind of total blindness's digital watermark method with copyright protection and tampering location function according to claim 2, In being characterized in that the step 2. _ 5,Its In,Indicate the average value of all elements in TW,Indicate TW*In all elements average value.
CN201810299604.9A 2018-04-04 2018-04-04 Totally-blind digital watermarking method with copyright protection and tampering positioning functions Active CN108648130B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810299604.9A CN108648130B (en) 2018-04-04 2018-04-04 Totally-blind digital watermarking method with copyright protection and tampering positioning functions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810299604.9A CN108648130B (en) 2018-04-04 2018-04-04 Totally-blind digital watermarking method with copyright protection and tampering positioning functions

Publications (2)

Publication Number Publication Date
CN108648130A true CN108648130A (en) 2018-10-12
CN108648130B CN108648130B (en) 2022-05-27

Family

ID=63745452

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810299604.9A Active CN108648130B (en) 2018-04-04 2018-04-04 Totally-blind digital watermarking method with copyright protection and tampering positioning functions

Country Status (1)

Country Link
CN (1) CN108648130B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109977878A (en) * 2019-03-28 2019-07-05 华南理工大学 Vehicle checking method based on weight A weighting nchor
CN110555792A (en) * 2019-08-16 2019-12-10 广东外语外贸大学南国商学院 Image tampering blind detection method based on normalized histogram comprehensive feature vector
CN110580405A (en) * 2019-08-16 2019-12-17 湖北工业大学 Picture copyright protection system and method based on social network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184520A (en) * 2011-05-26 2011-09-14 浙江工商大学 Complete blind detection robust quantization watermarking method
CN102208097A (en) * 2011-05-26 2011-10-05 浙江工商大学 Network image copyright real-time distinguishing method
CN102223561A (en) * 2011-07-01 2011-10-19 宁波大学 Blind watermark embedding and extracting method of stereoscopic video image
EP2428930A1 (en) * 2009-09-03 2012-03-14 ZTE Corporation Method and system for embedding and extracting image digital watermark
CN102682418A (en) * 2012-05-11 2012-09-19 宁波大学 Method for embedding and extracting multiple zero watermarks of digital image

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2428930A1 (en) * 2009-09-03 2012-03-14 ZTE Corporation Method and system for embedding and extracting image digital watermark
CN102184520A (en) * 2011-05-26 2011-09-14 浙江工商大学 Complete blind detection robust quantization watermarking method
CN102208097A (en) * 2011-05-26 2011-10-05 浙江工商大学 Network image copyright real-time distinguishing method
CN102223561A (en) * 2011-07-01 2011-10-19 宁波大学 Blind watermark embedding and extracting method of stereoscopic video image
CN102682418A (en) * 2012-05-11 2012-09-19 宁波大学 Method for embedding and extracting multiple zero watermarks of digital image

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
薛栋,周亚训,金炜: "版权保护和内容认证的全盲双功能数字水印算法", 《研究与开发》 *
薛栋: "基于自嵌入技术的图像内容认证和恢复的研究", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑(月刊)》 *
赵伟;肖世校;陈仁安: "基于ICA的混合域盲水印算法", 《实验室研究与探索》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109977878A (en) * 2019-03-28 2019-07-05 华南理工大学 Vehicle checking method based on weight A weighting nchor
CN110555792A (en) * 2019-08-16 2019-12-10 广东外语外贸大学南国商学院 Image tampering blind detection method based on normalized histogram comprehensive feature vector
CN110580405A (en) * 2019-08-16 2019-12-17 湖北工业大学 Picture copyright protection system and method based on social network
CN110555792B (en) * 2019-08-16 2022-05-17 广东外语外贸大学南国商学院 Image tampering blind detection method based on normalized histogram comprehensive feature vector
CN110580405B (en) * 2019-08-16 2022-07-05 湖北工业大学 Picture copyright protection system and method based on social network

Also Published As

Publication number Publication date
CN108648130B (en) 2022-05-27

Similar Documents

Publication Publication Date Title
US7995790B2 (en) Digital watermark detection using predetermined color projections
Chou et al. A perceptually tuned watermarking scheme for color images
US6631198B1 (en) Perceptual modeling of media signals based on local contrast and directional edges
CN112241929B (en) Watermark embedding method, watermark detecting method, watermark embedding device, watermark detecting device and electronic equipment
CN101246588B (en) Self-adapting watermarking algorithm of colorful image hypercomplex number spacing
CN110599388B (en) Blind robust digital watermark embedding and detecting method based on positioning point assistance
CN108416727A (en) A kind of coloured image total blindness's robust digital watermark method based on self-embedding technology
CN108648130A (en) A kind of total blindness's digital watermark method with copyright protection and tampering location function
CN102880999A (en) Color image digital watermark method capable of resisting stamping, printing and scanning processes
CN102024249A (en) Digital image watermarking method based on visual perception characteristics
Khalifa et al. A robust non-blind algorithm for watermarking color images using multi-resolution wavelet decomposition
CN110189243A (en) A kind of color image robust watermarking method based on tensor singular value decomposition
Riad et al. Robust fourier watermarking for id images on smart card plastic supports
Nguyen et al. Perceptual watermarking using a new Just-Noticeable-Difference model
Fung et al. A novel DWT-SVD video watermarking scheme using side view
CN110246076A (en) The high dynamic range images water mark method decomposed based on Tucker
Fung et al. A new approach of DWT-SVD video watermarking
CN1329874C (en) Universal digital image invisible information detecting method
Rawat et al. DCT and SVD based new watermarking scheme
Liu et al. Optimization-based image watermarking algorithm using a maximum-likelihood decoding scheme in the complex wavelet domain
Abdel-Aziz et al. On perceptual quality of watermarked images–an experimental approach
Masry et al. Digital watermarking using local contrast-based texture masking
Yaghmaee et al. Computing watermark capacity in images according to their quad tree
Al-Otum et al. Color image watermarking based on self-embedded color permissibility with preserved high image quality and enhanced robustness
Hosam et al. A hybrid ROI-embedding based watermarking technique using DWT and DCT transforms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant