CN109086613A - A kind of figure mark method for anti-counterfeit and system - Google Patents
A kind of figure mark method for anti-counterfeit and system Download PDFInfo
- Publication number
- CN109086613A CN109086613A CN201810809024.XA CN201810809024A CN109086613A CN 109086613 A CN109086613 A CN 109086613A CN 201810809024 A CN201810809024 A CN 201810809024A CN 109086613 A CN109086613 A CN 109086613A
- Authority
- CN
- China
- Prior art keywords
- watermarking images
- image
- matrix
- obtains
- obtaining unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The present invention provides a kind of figure mark method for anti-counterfeit and devices, which comprises obtains first vector image;Obtain the first watermarking images;First watermarking images are pre-processed and carried out with logistic chaos encryption, obtains first key;SVD transformation is carried out to pretreated first watermarking images, obtains the second key;By the first watermarking images described in watermark information additive embedding, the second watermarking images are obtained, include third key in second watermarking images;Idct transform is carried out according to second watermarking images, the carrier image, obtains Second support image;According to Second support image, image to be detected is obtained.Through the invention, it solves existing method for anti-counterfeit technical costs height, false alarm easily occur, be unfavorable for the technical issues of being widely popularized, reached low in cost, highly-safe, consumer is easy to use, is difficult to imitated technical effect.
Description
Technical field
The present invention relates to graphics safegurard technical field more particularly to a kind of figure mark method for anti-counterfeit and systems.
Background technique
Domestic fake and forged commodity, mountain vallage, Gao Fang, homogeneity have seriously affected the prestige of enterprise, damage enterprise's product at present
List price value, occupation rate of market and enterprise profit, for protect business and consumer legitimate interests, product false proof ever more important,
Anti-counterfeiting technology increasingly obtains the concern of various circles of society.The preferable technology of antifalse effect is safety line anti-counterfeiting paper skill currently on the market
Art includes all kinds of commodity counterfeit prevention specifications and the quality certification, Anti-faking bottle label, antifalsification label etc..Consumer can be by identification safety
Whether line is embedded in paper center to be easily accomplished true and false identification.The imitated threshold of this kind of anti-counterfeiting technology commodity is high, can not
It completes to fake with the method for printing, has really accomplished " be easily recognized, be difficult to forge ".Thus favor by the majority of consumers.
But present inventor during inventive technique scheme, has found above-mentioned technology extremely in realizing the embodiment of the present application
It has the following technical problems less:
That there are technical costs is high for existing anti-counterfeiting technology, false alarm easily occurs, is unfavorable for the technical issues of being widely popularized.
Summary of the invention
The embodiment of the present invention by providing a kind of figure mark method for anti-counterfeit and system, solve existing method for anti-counterfeit technology at
Easily there is false alarm in this height, is unfavorable for the technical issues of being widely popularized, and has reached low in cost, highly-safe, consumer user
Just, it is difficult to imitated technical effect.
To solve the above-mentioned problems, the embodiment of the invention provides a kind of figure mark method for anti-counterfeit and devices.
In a first aspect, the embodiment of the invention provides a kind of figure mark method for anti-counterfeit, which comprises obtain first and carry
Body image;Obtain the first watermarking images;First watermarking images are pre-processed and are carried out with logistic chaos encryption,
Obtain first key;SVD transformation is carried out to pretreated first watermarking images, obtains the second key;Watermark information is superimposed
First watermarking images are embedded in, the second watermarking images are obtained, include third key in second watermarking images;According to described
Second watermarking images, the carrier image carry out idct transform, obtain Second support image;According to Second support image, obtain
Image to be detected.
Preferably, the acquisition first vector image, comprising: obtain original image;The original image is carried out uniform
Segmentation obtains original image sub-block;Disorder processing is carried out to the original image sub-block;To the original graph after progress disorder processing
As sub-block carries out dct transform, the first matrix of acquisition and the second matrix.
Preferably, described by the first watermarking images described in watermark information additive embedding, obtain the second watermarking images, comprising:
By the formula of the first watermarking images described in watermark information additive embedding are as follows:
D α β=diag (Dn1+ α DA ┊ Dn2+ β DA),
Wherein α, β are the insertion factors;
Dn1 is the upper semi-matrix of Dn;
Dn2 is the lower semi-matrix of Dn.
Preferably, after the second watermarking images of the acquisition, comprising: carry out SVD transformation to second watermarking images;
Obtain the third key.
Preferably, described that idct transform is carried out according to second watermarking images, the carrier image, obtain Second support
Image, comprising: obtain third matrix;The 6th matrix is obtained according to the third matrix;Obtain the 4th matrix;According to the described 4th
Matrix obtains the 7th matrix;Obtain the first corresponding relationship;According to first corresponding relationship, IDCT is carried out to the 6th matrix
Transformation, and/or according to first corresponding relationship, idct transform is carried out to the 7th matrix;Obtain Second support image.
Preferably, described according to Second support image, after obtaining image to be detected, comprising: according to the mapping to be checked
Picture obtains image to be detected sub-block;According to first corresponding relationship, dct transform is carried out to image to be detected sub-block, is mentioned
Take third matrix, the 4th matrix;SVD transformation is carried out to the third matrix, the 4th matrix respectively, obtains the 5th matrix;
According to the 5th matrix, the first key and second key, first watermarking images are extracted.
Preferably, first corresponding relationship are as follows:
T(1, r)=Σ am-2rcJ, mm∈z;
Wherein, Z, C representative insertion agree with degree.
Second aspect, the present invention provides a kind of figure mark anti-counterfeiting systems, which is characterized in that described device includes: first
Obtaining unit, the first obtains unit obtain first vector image;Second obtaining unit, second obtaining unit obtain the
One watermarking images;Third obtaining unit, the third obtaining unit are pre-processed and are carried out to first watermarking images
Logistic chaos encryption obtains first key;4th obtaining unit, the 4th obtaining unit is to pretreated first water
Watermark image carries out SVD transformation, obtains the second key;Watermark information is superimposed embedding by the 5th obtaining unit, the 5th obtaining unit
Enter first watermarking images, obtain the second watermarking images, includes third key in second watermarking images;6th obtains list
Member, the 6th obtaining unit carry out idct transform according to second watermarking images, the carrier image, obtain Second support
Image;7th obtaining unit, the 7th obtaining unit obtain image to be detected according to Second support image.
Preferably, the first obtains unit further include: the 8th obtaining unit, the 8th obtaining unit obtain original graph
Picture;The original image is carried out even partition by the 9th obtaining unit, the 9th obtaining unit, obtains original image sub-block;
First processing units, the first processing units carry out disorder processing to the original image sub-block;Tenth obtaining unit, it is described
Tenth obtaining unit carries out dct transform to the original image sub-block after carrying out disorder processing, obtains the first matrix and the second matrix.
Preferably, the 5th obtaining unit further include: by the public affairs of the first watermarking images described in watermark information additive embedding
Formula are as follows: D α β=diag (Dn1+ α DA ┊ Dn2+ β DA), wherein α, β are the insertion factors;Dn1 is the upper semi-matrix of Dn;Dn2 is Dn
Lower semi-matrix.
Preferably, the 5th obtaining unit further include: the second processing unit, described the second processing unit is to described second
Watermarking images carry out SVD transformation;11st obtaining unit, the 11st obtaining unit obtain the third key.
Preferably, the 6th obtaining unit further include: the 12nd obtaining unit, the 12nd obtaining unit obtain the
Three matrixes;13rd obtaining unit, the 13rd obtaining unit obtain the 6th matrix according to the third matrix;14th obtains
Unit is obtained, the 14th obtaining unit obtains the 4th matrix;15th obtaining unit, the 15th obtaining unit is according to institute
It states the 4th matrix and obtains the 7th matrix;16th obtaining unit, the 16th obtaining unit obtain the first corresponding relationship;Third
Processing unit, the third processing unit is according to first corresponding relationship, to the 6th matrix progress idct transform, and/
Or according to first corresponding relationship, idct transform is carried out to the 7th matrix;17th obtaining unit, the described 17th obtains
It obtains unit and obtains Second support image.
Preferably, the 7th obtaining unit further include: the 18th obtaining unit, the 18th obtaining unit is according to institute
Image to be detected is stated, image to be detected sub-block is obtained;First extraction unit, first extraction unit are corresponding according to described first
Relationship carries out dct transform to image to be detected sub-block, extracts third matrix, the 4th matrix;19th obtaining unit, institute
It states the 19th obtaining unit and SVD transformation is carried out to the third matrix, the 4th matrix respectively, obtain the 5th matrix;Second
Extraction unit, second extraction unit extract institute according to the 5th matrix, the first key and second key
State the first watermarking images.
Preferably, the 6th obtaining unit further include: first corresponding relationship are as follows:
T(1, r)=Σ am-2rcJ, mm∈z;Wherein, Z, C representative insertion agree with degree.
The third aspect is the present invention provides a kind of figure mark anti-counterfeiting system, including processor, memory and is stored in storage
On device and the computer program that can run on a processor, the processor perform the steps of when executing described program
Obtain first vector image;
Obtain the first watermarking images;
First watermarking images are pre-processed and carried out with logistic chaos encryption, obtains first key;
SVD transformation is carried out to pretreated first watermarking images, obtains the second key;
By the first watermarking images described in watermark information additive embedding, the second watermarking images, second watermarking images are obtained
In include third key;
Idct transform is carried out according to second watermarking images, the carrier image, obtains Second support image;
According to Second support image, image to be detected is obtained.
Said one or multiple technical solutions in the embodiment of the present invention at least have following one or more technology effects
Fruit:
1, the embodiment of the present invention is by providing a kind of figure mark method for anti-counterfeit and device, which comprises obtains first
Carrier image;Obtain the first watermarking images;First watermarking images are pre-processed and are carried out with logistic chaos encryption,
Obtain first key;SVD transformation is carried out to pretreated first watermarking images, obtains the second key;Watermark information is superimposed
First watermarking images are embedded in, the second watermarking images are obtained, include third key in second watermarking images;According to described
Second watermarking images, the carrier image carry out idct transform, obtain Second support image;According to Second support image, obtain
Image to be detected.It solves existing method for anti-counterfeit technical costs height, false alarm easily occur, be unfavorable for the technical issues of being widely popularized,
Reach low in cost, highly-safe, consumer is easy to use, is difficult to imitated technical effect.
2, the embodiment of the present invention passes through the acquisition first vector image, comprising: obtains original image;By the original graph
As carrying out even partition, original image sub-block is obtained;Disorder processing is carried out to the original image sub-block;To progress disorder processing
Original image sub-block afterwards carries out dct transform, obtains the first matrix and the second matrix.Further reached raising imitation difficulty and
The technical effect of security performance
3, the embodiment of the present invention by described according to Second support image, after obtaining image to be detected, comprising: according to institute
Image to be detected is stated, image to be detected sub-block is obtained;According to first corresponding relationship, image to be detected sub-block is carried out
Dct transform extracts third matrix, the 4th matrix;SVD transformation is carried out to the third matrix, the 4th matrix respectively, is obtained
5th matrix;According to the 5th matrix, the first key and second key, first watermarking images are extracted.
User, which need to only scan the watermarking images, can be obtained authenticity of products information, further reach easy to operate, easy to use
Technical effect.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technological means of invention, and
It can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can be more
It becomes apparent, the followings are specific embodiments of the present invention.
Detailed description of the invention
Fig. 1 is a kind of figure mark method for anti-counterfeit flow chart provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of figure mark anti-counterfeiting system provided in an embodiment of the present invention;
Fig. 3 is the structural schematic diagram of another figure mark anti-counterfeiting system provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the present invention by providing a kind of figure mark method for anti-counterfeit and device, solve existing method for anti-counterfeit technology at
Easily there is false alarm in this height, is unfavorable for the technical issues of being widely popularized, and has reached low in cost, highly-safe, consumer user
Just, it is difficult to imitated technical effect.
Technical solution in the embodiment of the present invention, general thought are as follows: a kind of figure mark method for anti-counterfeit and device, the side
Method includes: to obtain first vector image;Obtain the first watermarking images;First watermarking images are pre-processed and carried out
Logistic chaos encryption obtains first key;SVD transformation is carried out to pretreated first watermarking images, it is close to obtain second
Key;By the first watermarking images described in watermark information additive embedding, the second watermarking images are obtained, include in second watermarking images
Third key;Idct transform is carried out according to second watermarking images, the carrier image, obtains Second support image;According to
Second support image obtains image to be detected.Through the invention, it solves existing method for anti-counterfeit technical costs height, easily miss
It is alert, it is unfavorable for the technical issues of being widely popularized, has reached low in cost, highly-safe, consumer is easy to use, it is imitated to be difficult to
Technical effect.
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
The terms "and/or", only a kind of incidence relation for describing affiliated partner, indicates that there may be three kinds of passes
System, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.In addition, herein
Middle character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or".
Embodiment one
As shown in Figure 1, the present invention provides a kind of figure mark method for anti-counterfeit, which comprises
Step 110: obtaining first vector image;Further, the acquisition first vector image, comprising: obtain original
Image;The original image is subjected to even partition, obtains original image sub-block;The original image sub-block is carried out at scramble
Reason;Dct transform is carried out to the original image sub-block after progress disorder processing, obtains the first matrix and the second matrix.
Specifically, generating the carrier image I for being used for safe-guarding and anti-counterfeiting, the original image that size is M × M is chosen, size is divided into
Be 8 × 8 pieces of (M/8) × (M/8), carry out discrete cosine transform respectively to every piece later and obtain Cij, wherein i, j ∈ N and 1≤
I, j≤8 choose low frequency coefficient in Cij and obtain coefficient matrices A i.e. the first matrix, choose intermediate frequency coefficient in Cij and obtain coefficient matrix
B i.e. the second matrix carries out SVD to matrix A and converts to obtain UA, DA, VA, wherein A=UA × DA × VA T, carries out to matrix B
SVD converts to obtain UB, DB, VB, wherein B=UB × DB × VB T.
Step 120: obtaining the first watermarking images;
Step 130: first watermarking images being pre-processed and carried out with logistic chaos encryption, it is close to obtain first
Key;
Specifically, being pre-processed after obtaining the first watermarking images N to watermarking images N gray processing, and it is mixed to carry out logistic
Ignorant encryption, obtaining and retaining initial value is first key K1.
Step 140: SVD transformation being carried out to pretreated first watermarking images, obtains the second key;
Specifically, the key K1 to reservation carries out SVD transformation, i.e. N=Un × Dn × V nT;Saving Un, Vn is second close
Key K2, when watermark to be extracted, use.
Step 150: by the first watermarking images described in watermark information additive embedding, obtain the second watermarking images, described second
It include third key in watermarking images;Further, described by the first watermarking images described in watermark information additive embedding, obtain the
Two watermarking images, comprising: by the formula of the first watermarking images described in watermark information additive embedding are as follows: D α β=diag (Dn1+ α DA ┊
Dn2+ β DA), wherein α, β are the insertion factors;Dn1 is the upper semi-matrix of Dn;Dn2 is the lower semi-matrix of Dn.Further, described
After obtaining the second watermarking images, comprising: carry out SVD transformation to second watermarking images;Obtain the third key.
Specifically, wherein α, β are the insertion factors by formula D α β=diag (Dn1+ α DA ┊ Dn2+ β DA), Dn1 is Dn's
Upper semi-matrix, Dn2 are the lower semi-matrix of Dn;By the first watermarking images N described in watermark information additive embedding, the second watermark figure is obtained
As N '.Then SVD transformation is carried out to D α β, obtains U1, D1, V1T, i.e. N '=U1 × D α β × V 1T, preservation U1, V 1 is third
Key K3, when watermark to be extracted, use.
Step 160: idct transform being carried out according to second watermarking images, the carrier image, obtains Second support figure
Picture;Further, described that IDCT transformation is carried out according to second watermarking images, the carrier image, obtain Second support figure
Picture, comprising: obtain third matrix;The 6th matrix is obtained according to the third matrix;Obtain the 4th matrix;According to the 4th square
Battle array obtains the 7th matrix;Obtain the first corresponding relationship;According to first corresponding relationship, IDCT change is carried out to the 6th matrix
It changes, and/or according to first corresponding relationship, idct transform is carried out to the 7th matrix;Obtain Second support image.Into one
Step, first corresponding relationship are as follows: T(1, r)=Σ am-2rcJ, mm∈z;Wherein, Z, C representative insertion agree with degree.
Specifically, by D1 and SVD anti-change is carried out, according to formula A '=[UA ┊ 0 ..., 0] × D1 × [VA ┊ 0 ..., 0] T
Third matrix is obtained, the 4th matrix, third matrix are obtained according to formula B '=[0 ..., 0 ┊ UB] × D1 × [0 ..., 0 ┊ VB] T
A ', the 4th matrix B ' represent information after insertion watermark;By third matrix A ' in value replace low frequency coefficient obtain the 6th matrix PA,
By the 4th matrix B ' in value replace intermediate frequency coefficient obtain new the 7th PB of matrix, according to formula: T(1, r)=Σ am-2rcJ, m m∈
z;Wherein, Z, C representative insertion agree with degree, obtain each piece in 64 pieces of 8 × 8 pieces of compositions according to corresponding relationship T, selection
6th matrix PA or the 7th matrix PB carries out the carrier Second support image I ' with watermarked information that IDCT constitutes 8 × 8 pieces.
Step 170: according to Second support image, obtaining image to be detected.Further, described according to Second support figure
Picture, after obtaining image to be detected, comprising: according to described image to be detected, obtain image to be detected sub-block;According to described first
Corresponding relationship carries out dct transform to image to be detected sub-block, extracts third matrix, the 4th matrix;Respectively to the third
Matrix, the 4th matrix carry out SVD transformation, obtain the 5th matrix;According to the 5th matrix, the first key and described
Second key extracts first watermarking images.
Specifically, Second support image I ' with watermarked information is printed on rag trade, grocery trade, medicine, agricultural and sideline product, luxurious
Become image to be detected on the products such as shifting product, tobacco and wine industry, hardware and electrical equipment, certificate ticketing service.Image to be detected is first carried out 8 × 8 points
Then block carries out dct transform to all sub-blocks, according to corresponding relationship T, selective extraction obtains the low of dct transform coefficient respectively
Frequency coefficient or intermediate frequency coefficient, separately constitute, and obtain whole low frequency coefficients and whole intermediate frequency coefficients obtain low frequency coefficient matrix respectively
A ', frequency coefficient matrixes B ', according to formula: D1=[VA ┊ 0 ..., 0] × A ' × [UA ┊ 0 ..., 0] T, D1=[0 ..., 0 ┊
VB] × B ' × [0 ..., 0 ┊ UB] T, SVD transformation is carried out to A ', B ' respectively, obtains the 5th matrix D ';In conjunction with key K2, Ke Yiji
Calculate D "=U1 × D ' × V1 ';Further according to formula: Dn1=U1 × D ' × V1 ', Dn2=U1 × D ' × V1 ' and key K1 are obtained
To the watermark pattern extracted.
Embodiment two
As shown in Fig. 2, the present invention provides a kind of figure mark anti-counterfeiting system, described device includes:
First obtains unit 11, the first obtains unit 11 obtain first vector image;
Second obtaining unit 12, second obtaining unit 12 obtain the first watermarking images;
Third obtaining unit 13, the third obtaining unit 13 are pre-processed and are carried out to first watermarking images
Logistic chaos encryption obtains first key;
4th obtaining unit 14, the 4th obtaining unit 14 carry out SVD change to pretreated first watermarking images
It changes, obtains the second key;
5th obtaining unit 15, the 5th obtaining unit 15 by the first watermarking images described in watermark information additive embedding,
The second watermarking images are obtained, include third key in second watermarking images;
6th obtaining unit 16, the 6th obtaining unit 16 according to second watermarking images, the carrier image into
Row idct transform obtains Second support image;
7th obtaining unit 17, the 7th obtaining unit 17 obtain image to be detected according to Second support image.
Preferably, the first obtains unit 11 further include: the 8th obtaining unit, the 8th obtaining unit obtain original
Image;The original image is carried out even partition by the 9th obtaining unit, the 9th obtaining unit, obtains original image
Block;First processing units, the first processing units carry out disorder processing to the original image sub-block;Tenth obtaining unit,
Tenth obtaining unit carries out dct transform to the original image sub-block after carrying out disorder processing, obtains the first matrix and second
Matrix.
Preferably, the 5th obtaining unit 15 further include: by the first watermarking images described in watermark information additive embedding
Formula are as follows: D α β=diag (Dn1+ α DA ┊ Dn2+ β DA), wherein α, β are the insertion factors;Dn1 is the upper semi-matrix of Dn;Dn2 is
The lower semi-matrix of Dn.
Preferably, the 5th obtaining unit 15 further include: the second processing unit, described the second processing unit is to described
Two watermarking images carry out SVD transformation;11st obtaining unit, the 11st obtaining unit obtain the third key.
Preferably, the 6th obtaining unit 16 further include: the 12nd obtaining unit, the 12nd obtaining unit obtain
Third matrix;13rd obtaining unit, the 13rd obtaining unit obtain the 6th matrix according to the third matrix;14th
Obtaining unit, the 14th obtaining unit obtain the 4th matrix;15th obtaining unit, the 15th obtaining unit according to
4th matrix obtains the 7th matrix;16th obtaining unit, the 16th obtaining unit obtain the first corresponding relationship;The
Three processing units, the third processing unit carry out idct transform according to first corresponding relationship, to the 6th matrix,
And/or according to first corresponding relationship, idct transform is carried out to the 7th matrix;17th obtaining unit, the described tenth
Seven obtaining units obtain Second support image.
Preferably, the 7th obtaining unit 17 further include: the 18th obtaining unit, the 18th obtaining unit according to
Described image to be detected obtains image to be detected sub-block;First extraction unit, first extraction unit is according to described first pair
It should be related to, dct transform is carried out to image to be detected sub-block, extracts third matrix, the 4th matrix;19th obtaining unit,
19th obtaining unit carries out SVD transformation to the third matrix, the 4th matrix respectively, obtains the 5th matrix;The
Two extraction units, second extraction unit are extracted according to the 5th matrix, the first key and second key
First watermarking images.
Preferably, the 6th obtaining unit 16 further include: first corresponding relationship are as follows:
T(1, r)=Σ am-2rcJ, mm∈z;Wherein, Z, C representative insertion agree with degree.
Embodiment three
Based on inventive concept same as figure mark method for anti-counterfeit a kind of in previous embodiment, the present invention also provides another
Kind figure mark anti-counterfeiting system, is stored thereon with computer program, which realizes a kind of figure described previously when being executed by processor
The step of either shape mark method for anti-counterfeit method.
Wherein, in Fig. 3, bus architecture (is represented) with bus 300, and bus 300 may include any number of interconnection
Bus and bridge, bus 300 will include the one or more processors represented by processor 302 and what memory 304 represented deposits
The various circuits of reservoir link together.Bus 300 can also will peripheral equipment, voltage-stablizer and management circuit etc. it
Various other circuits of class link together, and these are all it is known in the art, therefore, no longer carry out further to it herein
Description.Bus interface 306 provides interface between bus 300 and receiver 301 and transmitter 303.Receiver 301 and transmitter
303 can be the same element, i.e. transceiver, provide the unit for communicating over a transmission medium with various other devices.
Processor 302 is responsible for management bus 300 and common processing, and memory 304 can be used for storage processor
302 when executing operation used data.
Key technology of the invention is anti-fake carrier generation module, the generation of anti-counterfeiting information and random scrambling, has Shandong concurrently
The anti-fake real-time verification etc. of the exploitation of stick and the anti-fake embedded mobile GIS of fragility, client.The present invention has a characteristic that
1, any consumer, manager without any instrument, tool or pay extra charge energy simply, accurately
It identifies and result is accurate and reliable.
2, this method has carried out anti-counterfeiting design, Neng Gouzhen from multiple links such as anti-fake carrier, anti-pseudo Algorithm and insertion watermarks
Just effectively contain and hit and fakes.
3, product false proof being realized by software technology and anti-pseudo Algorithm, consumer does not need to buy special authentication equipment,
Common equipment had both been able to satisfy code requirement processed.
Said one or multiple technical solutions in the embodiment of the present invention at least have following one or more technology effects
Fruit:
1, the embodiment of the present invention is by providing a kind of figure mark method for anti-counterfeit and device, which comprises obtains first
Carrier image;Obtain the first watermarking images;First watermarking images are pre-processed and are carried out with logistic chaos encryption,
Obtain first key;SVD transformation is carried out to pretreated first watermarking images, obtains the second key;Watermark information is superimposed
First watermarking images are embedded in, the second watermarking images are obtained, include third key in second watermarking images;According to described
Second watermarking images, the carrier image carry out idct transform, obtain Second support image;According to Second support image, obtain
Image to be detected.It solves existing method for anti-counterfeit technical costs height, false alarm easily occur, be unfavorable for the technical issues of being widely popularized,
Reach low in cost, highly-safe, consumer is easy to use, is difficult to imitated technical effect.
2, the embodiment of the present invention passes through the acquisition first vector image, comprising: obtains original image;By the original graph
As carrying out even partition, original image sub-block is obtained;Disorder processing is carried out to the original image sub-block;To progress disorder processing
Original image sub-block afterwards carries out dct transform, obtains the first matrix and the second matrix.Further reached raising imitation difficulty and
The technical effect of security performance
3, the embodiment of the present invention by described according to Second support image, after obtaining image to be detected, comprising: according to institute
Image to be detected is stated, image to be detected sub-block is obtained;According to first corresponding relationship, image to be detected sub-block is carried out
Dct transform extracts third matrix, the 4th matrix;SVD transformation is carried out to the third matrix, the 4th matrix respectively, is obtained
5th matrix;According to the 5th matrix, the first key and second key, first watermarking images are extracted.
User, which need to only scan the watermarking images, can be obtained authenticity of products information.Further reach easy to operate, easy to use
Technical effect.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications can be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from this hair to the embodiment of the present invention
The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention
And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.
Claims (9)
1. a kind of figure mark method for anti-counterfeit, which is characterized in that the described method includes:
Obtain first vector image;
Obtain the first watermarking images;
First watermarking images are pre-processed and carried out with logistic chaos encryption, obtains first key;
SVD transformation is carried out to pretreated first watermarking images, obtains the second key;
By the first watermarking images described in watermark information additive embedding, the second watermarking images are obtained, are wrapped in second watermarking images
Key containing third;
Idct transform is carried out according to second watermarking images, the carrier image, obtains Second support image;
According to Second support image, image to be detected is obtained.
2. the method as described in claim 1, which is characterized in that the acquisition first vector image, comprising:
Obtain original image;
The original image is subjected to even partition, obtains original image sub-block;
Disorder processing is carried out to the original image sub-block;
Dct transform is carried out to the original image sub-block after progress disorder processing, obtains the first matrix and the second matrix.
3. the method as described in claim 1, which is characterized in that described by the first watermark figure described in watermark information additive embedding
Picture obtains the second watermarking images, comprising:
By the formula of the first watermarking images described in watermark information additive embedding are as follows: D α β=diag (Dn1+ α DA ┊ Dn2+ β DA),
Wherein α, β are the insertion factors;
Dn1 is the upper semi-matrix of Dn;
Dn2 is the lower semi-matrix of Dn.
4. the method as described in claim 1, which is characterized in that after the second watermarking images of the acquisition, comprising:
SVD transformation is carried out to second watermarking images;
Obtain the third key.
5. the method as described in claim 1, which is characterized in that described according to second watermarking images, the carrier image
Idct transform is carried out, Second support image is obtained, comprising:
Obtain third matrix;
The 6th matrix is obtained according to the third matrix;
Obtain the 4th matrix;
The 7th matrix is obtained according to the 4th matrix;
Obtain the first corresponding relationship;
According to first corresponding relationship, idct transform is carried out to the 6th matrix, and/or according to the described first corresponding pass
System carries out idct transform to the 7th matrix;
Obtain Second support image.
6. method as claimed in claim 5, which is characterized in that it is described according to Second support image, obtain image to be detected it
Afterwards, comprising:
According to described image to be detected, image to be detected sub-block is obtained;
According to first corresponding relationship, dct transform is carried out to image to be detected sub-block, extracts third matrix, the 4th square
Battle array;
SVD transformation is carried out to the third matrix, the 4th matrix respectively, obtains the 5th matrix;
According to the 5th matrix, the first key and second key, first watermarking images are extracted.
7. method as claimed in claim 5, which is characterized in that first corresponding relationship are as follows:
T(1, r)=∑ am-2rCJ, mm∈z;
Wherein, Z, C representative insertion agree with degree.
8. a kind of figure mark anti-counterfeiting system, which is characterized in that described device includes:
First obtains unit, the first obtains unit obtain first vector image;
Second obtaining unit, second obtaining unit obtain the first watermarking images;
Third obtaining unit, the third obtaining unit pre-process first watermarking images and carry out logistic and mixed
Ignorant encryption obtains first key;
4th obtaining unit, the 4th obtaining unit carry out SVD transformation to pretreated first watermarking images, obtain second
Key;
First watermarking images described in watermark information additive embedding are obtained second by the 5th obtaining unit, the 5th obtaining unit
Watermarking images include third key in second watermarking images;
6th obtaining unit, the 6th obtaining unit carry out IDCT change according to second watermarking images, the carrier image
It changes, obtains Second support image;
7th obtaining unit, the 7th obtaining unit obtain image to be detected according to Second support image.
9. a kind of figure mark anti-counterfeiting system, including processor, memory and storage can be run on a memory and on a processor
Computer program, which is characterized in that the processor performs the steps of when executing described program
Obtain first vector image;
Obtain the first watermarking images;
First watermarking images are pre-processed and carried out with logistic chaos encryption, obtains first key;
SVD transformation is carried out to pretreated first watermarking images, obtains the second key;
By the first watermarking images described in watermark information additive embedding, the second watermarking images are obtained, are wrapped in second watermarking images
Key containing third;
Idct transform is carried out according to second watermarking images, the carrier image, obtains Second support image;
According to Second support image, image to be detected is obtained.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810809024.XA CN109086613A (en) | 2018-07-23 | 2018-07-23 | A kind of figure mark method for anti-counterfeit and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810809024.XA CN109086613A (en) | 2018-07-23 | 2018-07-23 | A kind of figure mark method for anti-counterfeit and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109086613A true CN109086613A (en) | 2018-12-25 |
Family
ID=64838446
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810809024.XA Pending CN109086613A (en) | 2018-07-23 | 2018-07-23 | A kind of figure mark method for anti-counterfeit and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109086613A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112053164A (en) * | 2020-08-19 | 2020-12-08 | 吴晓庆 | Block chain-based electronic commerce data processing method and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101493928A (en) * | 2009-02-10 | 2009-07-29 | 国网信息通信有限公司 | Digital watermarking embedding, extracting and quantizing step size coordinating factor optimizing method and device |
CN101604441A (en) * | 2009-06-15 | 2009-12-16 | 北京邮电大学 | A kind of dual transform domain image zero watermarking method with strong robustness |
CN101699508A (en) * | 2009-09-03 | 2010-04-28 | 中兴通讯股份有限公司 | Image digital watermark embedding and extracting method and system |
CN101847251A (en) * | 2010-06-13 | 2010-09-29 | 电子科技大学 | Digital watermark embedding and extraction method based on chaos sequences |
CN102496367A (en) * | 2011-12-06 | 2012-06-13 | 北京邮电大学 | Audio blind watermark algorithm based on combination of discrete wavelet transformation (DWT), discrete cosine transformation (DCT) and singular value decomposition (SVD) |
CN104134185A (en) * | 2014-07-31 | 2014-11-05 | 江西理工大学 | Image watermark embedding and extracting method and system for resisting combination attacks |
EP2351288B1 (en) * | 2008-10-23 | 2014-12-10 | University Of Ulster | An encryption method |
-
2018
- 2018-07-23 CN CN201810809024.XA patent/CN109086613A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2351288B1 (en) * | 2008-10-23 | 2014-12-10 | University Of Ulster | An encryption method |
CN101493928A (en) * | 2009-02-10 | 2009-07-29 | 国网信息通信有限公司 | Digital watermarking embedding, extracting and quantizing step size coordinating factor optimizing method and device |
CN101604441A (en) * | 2009-06-15 | 2009-12-16 | 北京邮电大学 | A kind of dual transform domain image zero watermarking method with strong robustness |
CN101699508A (en) * | 2009-09-03 | 2010-04-28 | 中兴通讯股份有限公司 | Image digital watermark embedding and extracting method and system |
CN101847251A (en) * | 2010-06-13 | 2010-09-29 | 电子科技大学 | Digital watermark embedding and extraction method based on chaos sequences |
CN102496367A (en) * | 2011-12-06 | 2012-06-13 | 北京邮电大学 | Audio blind watermark algorithm based on combination of discrete wavelet transformation (DWT), discrete cosine transformation (DCT) and singular value decomposition (SVD) |
CN104134185A (en) * | 2014-07-31 | 2014-11-05 | 江西理工大学 | Image watermark embedding and extracting method and system for resisting combination attacks |
Non-Patent Citations (1)
Title |
---|
杨垚婷: "基于小波变换的数字水印算法的研究与实现", 《中国优秀硕士学位论文全文数据库•信息科技辑》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112053164A (en) * | 2020-08-19 | 2020-12-08 | 吴晓庆 | Block chain-based electronic commerce data processing method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101061494B (en) | Method for making secure a personal portable object | |
Jumanto | An enhanced LSB-image steganography using the hybrid Canny-Sobel edge detection | |
Zhang et al. | Steganalysis for LSB matching in images with high-frequency noise | |
Chang et al. | A secure fragile watermarking scheme based on chaos-and-hamming code | |
CN102682418B (en) | Method for embedding and extracting multiple zero watermarks of digital image | |
CN101939760B (en) | Method and apparatus to mark a document using a combination between guilloches and watermarking, method and apparatus to read previous combination | |
Aparna et al. | Image watermarking using Diffie Hellman key exchange algorithm | |
CN102880998A (en) | Method for extracting watermark image | |
CN106779740A (en) | A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach | |
Sun | A new information hiding method based on improved BPCS steganography | |
Mulani et al. | An approach for robust digital image watermarking using DWTPCA | |
CN109816077A (en) | A kind of hidden method of two-dimensional barcode information, device, electronic equipment and storage medium | |
Medeni et al. | A novel steganographic method for gray-level images with four-pixel differencing and LSB substitution | |
CN102880997B (en) | Method for embedding watermark image | |
Halboos et al. | Hiding text using the least significant bit technique to improve cover image in the steganography system | |
CN109086613A (en) | A kind of figure mark method for anti-counterfeit and system | |
CN1322470C (en) | Digital watermark anti fake method in anti-digital-to-analog conversion process | |
Kumar et al. | Digital image steganography based on combination of DCT and DWT | |
CN101817268A (en) | Application of digital watermarking in RFID technology | |
KR102180924B1 (en) | System and Method for Embedding and Extracting Digital Watermark Using QR Code | |
CN105427234A (en) | Sharing method and sharing system for WIFI password | |
CN106934756B (en) | Method and system for embedding information in single-color or special-color image | |
Khan | An efficient neural network based algorithm of steganography for image | |
CN106454510B (en) | A kind of original video watermark handling method and device | |
Lu et al. | An improved data hiding method of five pixel pair differencing and LSB substitution hiding scheme |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181225 |
|
RJ01 | Rejection of invention patent application after publication |