CN109858207B - Unauthorized distribution multimedia copyright tracking method - Google Patents

Unauthorized distribution multimedia copyright tracking method Download PDF

Info

Publication number
CN109858207B
CN109858207B CN201910095614.5A CN201910095614A CN109858207B CN 109858207 B CN109858207 B CN 109858207B CN 201910095614 A CN201910095614 A CN 201910095614A CN 109858207 B CN109858207 B CN 109858207B
Authority
CN
China
Prior art keywords
watermark
picture
module
information
watermarks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910095614.5A
Other languages
Chinese (zh)
Other versions
CN109858207A (en
Inventor
于小军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Maiduo Information Technology Co ltd
Original Assignee
Nanjing Maiduo Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Maiduo Information Technology Co ltd filed Critical Nanjing Maiduo Information Technology Co ltd
Priority to CN201910095614.5A priority Critical patent/CN109858207B/en
Publication of CN109858207A publication Critical patent/CN109858207A/en
Application granted granted Critical
Publication of CN109858207B publication Critical patent/CN109858207B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a method for tracking unauthorized distributed multimedia copyright, which comprises the following steps: entering a personal interface from a user inquiry and display port, and then transmitting the picture information to a digital information receiving end of the picture containing the visible watermark; the invention relates to the technical field of multimedia copyright, in particular to a method for extracting image characteristic by a characteristic extraction algorithm, which comprises the steps of transmitting image information received by a digital information receiving end of a visible watermark image to a picture separation processing module containing a watermark, separating an original image from the watermark by the picture separation processing module containing the watermark, transmitting an area containing the watermark to a watermark copyright retrieval module, and transmitting an area of the original image not containing the watermark to the characteristic extraction algorithm to extract the image characteristic module. The method for tracking the unauthorized distribution multimedia copyright achieves the purposes of detecting the copyright information of the unauthorized distribution multimedia picture, perfecting the copyright watermark information, simultaneously encrypting the perfected multimedia picture, realizing the tracking of the unauthorized distribution multimedia copyright and ensuring that the economic benefit of a copyright owner is not lost.

Description

Unauthorized distribution multimedia copyright tracking method
Technical Field
The invention relates to the technical field of multimedia copyright, in particular to a method for tracking unauthorized distribution of multimedia copyright.
Background
Multimedia data broadcasting enables multimedia data to be broadcast to multiple users at a time, i.e., a sender only sends one data stream, and multiple users can receive the data stream.
In multimedia copyright protection, digital watermarking plays an important role. Digital watermarks can be divided into visible watermarks and invisible watermarks, and the two watermark technologies respectively play different roles in multimedia copyright protection.
The visual watermark technology protects the copyright of the multimedia data by embedding a visual watermark (such as logo) marked with copyright information in the multimedia data. The visible watermarks can be divided into erasable watermarks and non-erasable watermarks according to whether the original image can be restored: some of the visible watermarks can be extracted and erased to recover the original image, and such watermarks are called visually erasable watermarks, whereas the visible watermarks that cannot recover the original image are visually erasable watermarks.
At present, watermarks on multimedia pictures can be erased, the multimedia pictures after the watermarks are erased can be distributed to other users for use, and therefore unauthorized distributed multimedia pictures cannot track picture copyright information, copyright information is difficult to track, and great loss is caused to economic benefits of multimedia copyright owners.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a method for tracking the copyright of a multimedia distributed without authorization, which solves the problems that the watermark on the current multimedia picture can be erased, and the multimedia picture after the watermark is erased can be distributed to other users for use, so that the copyright information of the picture cannot be tracked by the multimedia picture distributed without authorization, the copyright information is difficult to track, and the economic benefit of a multimedia copyright owner is greatly lost.
In order to achieve the purpose, the invention is realized by the following technical scheme: a method for multimedia rights tracking for unauthorized distribution, comprising the steps of:
step one, entering a personal interface from a user inquiry and display port, logging in a personal account, and then transmitting picture information to a digital information receiving end containing a visible watermark picture;
transmitting picture information received by a digital information receiving end of a visible watermark picture to a picture separation processing module containing the watermark, separating an original picture from the watermark by the picture separation processing module containing the watermark, transmitting an area containing the watermark to a watermark copyright retrieval module, and transmitting an original picture area not containing the watermark to a feature extraction algorithm picture feature extraction module;
thirdly, a feature extraction algorithm extracts a picture feature module, transmits the picture feature module to an MD operation decoding module to perform feature decoding on the picture, transmits decoded information to a picture feature information retrieval module to perform data comparison retrieval, and transmits an original picture with a determined copyright to a visual watermark security embedding module;
fourthly, the watermark copyright retrieval module carries out watermark retrieval on the watermark area, and watermarks with uncertain copyright are transmitted to the visible watermark safety embedding module for copyright watermark embedding and are transmitted to the integration module to be integrated with the original image into a copyright picture;
fifthly, transmitting the picture information after the copyright watermarks are integrated through the integration module to a hash function encryption module to encrypt the picture;
and step six, transmitting the encrypted picture to a DRM agent terminal for storage management, wherein the output end of the DRM agent terminal is connected with a user inquiry and display port.
Preferably, the determined copyright information obtained by the retrieval and analysis of the watermark copyright retrieval module is transmitted to the watermark integrity detection module to detect the integrity of the watermark.
Preferably, the watermark with high integrity is directly transmitted to an integration module for integration of the image and the watermark.
Preferably, the watermark with low integrity is transmitted to a visible watermark security embedding module for watermark supplement.
Preferably, the image feature information retrieval module comprises a feature code extractor, an image feature code database and a feature code comparator.
Preferably, the feature code extractor compares the extracted picture feature code with a picture feature code database through a feature code comparator.
Preferably, the feature code comparator transmits the picture with the confirmed copyright to the visual watermark security embedding module.
Preferably, the feature code comparer transmits information that the copyright cannot be confirmed to the user query and display port.
Preferably, the monitoring submodule of the DRM agent terminal adopts a hash algorithm to calculate each core module read by the code reading submodule respectively.
Preferably, the DRM agent terminal verifies integrity of the copyright information and the picture content processing code.
The invention provides a method for tracking unauthorized distributed multimedia copyright. The method has the following beneficial effects:
the method for tracking the multimedia copyright distributed without authorization enters a personal interface through a user inquiry and display port, logs in a personal account and then transmits picture information to a digital information receiving end containing a visible watermark picture; the image information received by a digital information receiving end of a visible watermark image is transmitted to an image separation processing module containing the watermark, the image separation processing module containing the watermark separates an original image from the watermark, an area containing the watermark is transmitted to a watermark copyright retrieval module, and an original image area without the watermark is transmitted to a feature extraction algorithm image feature extraction module; the image characteristic extraction module of the characteristic extraction algorithm is transmitted to the image characteristic decoding module for carrying out characteristic decoding on the image through MD operation, then the decoded information is transmitted to the image characteristic information retrieval module for data comparison and retrieval, and the original image with the determined copyright is transmitted to the visible watermark safety embedding module; the watermark copyright retrieval module carries out watermark retrieval on the watermark area, and watermarks of which the copyright can not be determined are transmitted to the visible watermark safe embedding module for copyright watermark embedding and are transmitted to the integration module to be integrated with an original image into a copyright picture; the picture information after the copyright watermark integration of the integration module is completed is transmitted to the hash function encryption module to encrypt the picture, so that the purposes of detecting the copyright information of the unauthorized distribution multimedia picture, perfecting the copyright watermark information, encrypting the improved multimedia picture, realizing the tracking of the unauthorized distribution multimedia copyright and ensuring that the economic benefit of a copyright owner is not lost are achieved.
Drawings
FIG. 1 is a flow chart of copyright tracking according to the present invention;
FIG. 2 is a flowchart of the module for retrieving picture characteristic information according to the present invention.
In the figure: the system comprises a user inquiry module, a display port, a personal interface 2, a digital information receiving end 3 containing a visible watermark picture, a separation processing module 4 containing the watermark picture, a watermark copyright retrieval module 5, a picture characteristic extraction module 6 by a characteristic extraction algorithm, a decoding module 7 for carrying out operation through MD5, a picture characteristic information retrieval module 8, a characteristic code extractor 81, a picture characteristic code database 82, a characteristic code comparator 83, a visible watermark safety embedding module 9, an integration module 10, a hash function encryption module 11, a DRM proxy terminal 12 and a watermark integrity detection module 13.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, the present invention provides a technical solution: a method for multimedia rights tracking for unauthorized distribution, comprising the steps of:
step one, entering a personal interface 2 from a user inquiry and display port 1, logging in a personal account, and then transmitting picture information to a digital information receiving end 3 containing a visible watermark picture;
secondly, the picture information received by a visible watermark picture digital information receiving terminal 3 is transmitted to a watermark-containing picture separation processing module 4, the watermark-containing picture separation processing module 4 separates the original picture from the watermark, the area containing the watermark is transmitted to a watermark copyright retrieval module 5, and the area of the original picture without the watermark is transmitted to a feature extraction algorithm picture feature extraction module 6;
thirdly, a feature extraction algorithm picture feature extraction module 6 transmits the picture feature extraction algorithm picture feature extraction information to an MD5 operation decoding module 7 for feature decoding of the picture, then the decoded information is transmitted to a picture feature information retrieval module 8 for data comparison retrieval, and an original picture with a determined copyright is transmitted to a visual watermark security embedding module 9;
fourthly, the watermark copyright retrieval module 5 carries out watermark retrieval on the watermark area, and watermarks with uncertain copyright are transmitted to the visible watermark safe embedding module 9 for copyright watermark embedding and transmitted to the integration module 10 to be integrated with an original image into a copyright picture;
fifthly, transmitting the picture information after the copyright watermark integration is finished through the integration module 10 to the hash function encryption module 11 to encrypt the picture;
and step six, transmitting the encrypted pictures to the DRM agent terminal 12 for storage management, wherein the output end of the DRM agent terminal 12 is connected with the user inquiry and display port 1.
The determined copyright information obtained by the watermark copyright retrieval module 5 is transmitted to the watermark integrity detection module 13 to detect the integrity of the watermark. The watermark with high integrity is directly transmitted to the integration module 10 for integrating the picture and the watermark. The watermark with low integrity is transmitted to the visible watermark security embedding module 9 for watermark supplement. The retrieved picture characteristic information module 8 includes a characteristic code extractor 81, a picture characteristic code database 82 and a characteristic code comparator 83. The feature code extractor 81 compares the extracted picture feature code with the picture feature code database 82 through a feature code comparator 83. The feature code comparator 83 transmits the picture with confirmed copyright to the visual watermark security embedding module 9. The feature code comparator 83 transmits the information that the copyright cannot be confirmed to the user inquiry display port 1. The monitoring submodule of the DRM agent terminal 12 calculates each core module read in by the code read-in submodule using a hash algorithm. The DRM agent terminal 12 verifies the integrity of the copyright information and the picture content processing code.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation. The use of the phrase "comprising" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the same.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (4)

1. A method for tracking unauthorized distributed multimedia copyright, comprising the steps of:
step one, entering a personal interface (2) from a user inquiry and display port (1), logging in a personal account, and then transmitting picture information to a digital information receiving end (3) containing a visual watermark picture;
transmitting picture information received by a digital information receiving terminal (3) of a picture containing a visual watermark to a picture separation processing module (4) containing the watermark, separating an original picture from the watermark by the picture separation processing module (4) containing the watermark, transmitting an area containing the watermark to a watermark copyright retrieval module (5), and transmitting an original picture area without the watermark to a feature extraction algorithm picture feature extraction module (6);
thirdly, a feature extraction algorithm extraction picture feature module (6) is transmitted to a decoding module (7) which operates through MD5 to perform feature decoding on the picture, then decoded information is transmitted to a retrieval picture feature information module (8) to perform data comparison and retrieval, original pictures with determined copyright are transmitted to a visual watermark safe embedding module (9), the retrieval picture feature information module (8) comprises a feature code extractor (81), a picture feature code database (82) and a feature code comparator (83), the feature code extractor (81) compares the extracted picture feature code with the picture feature code database (82) through the feature code comparator (83), and the feature code comparator (83) transmits the picture with the confirmed copyright to the visual watermark safe embedding module (9);
fourthly, a watermark copyright retrieval module (5) retrieves watermarks in a watermark area, watermarks with undetermined copyrights are transmitted to a visual watermark security embedding module (9) to be embedded with the copyright watermarks and are transmitted to an integration module (10) to be integrated with an original image to form a copyright picture, the determined copyright information obtained by the watermark copyright retrieval module (5) through retrieval and analysis is transmitted to a watermark integrity detection module (13) to detect the integrity of the watermarks, watermarks with high integrity are directly transmitted to the integration module (10) to be integrated with the pictures and the watermarks, watermarks with low integrity are transmitted to the visual watermark security embedding module (9) to be added with the watermarks, and then the watermarks are transmitted to the integration module (10) to be integrated with the pictures and the watermarks;
fifthly, transmitting the picture information after the copyright watermark integration is finished through the integration module (10) to the hash function encryption module (11) to encrypt the picture;
and step six, transmitting the encrypted pictures to a DRM agent terminal (12) for storage management, wherein the output end of the DRM agent terminal (12) is connected with a user inquiry and display port (1).
2. The method of claim 1, wherein the method comprises: the characteristic code comparer (83) transmits the information that the copyright can not be confirmed to the user inquiry and display port (1).
3. The method for multimedia copyright tracking for unauthorized distribution according to claim 1, wherein: and the monitoring submodule of the DRM agent terminal (12) adopts a hash algorithm to respectively calculate each core module read by the code reading submodule.
4. The method of claim 1, wherein the method comprises: the DRM agent terminal (12) verifies the integrity of the copyright information and the picture content processing code.
CN201910095614.5A 2019-01-31 2019-01-31 Unauthorized distribution multimedia copyright tracking method Active CN109858207B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910095614.5A CN109858207B (en) 2019-01-31 2019-01-31 Unauthorized distribution multimedia copyright tracking method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910095614.5A CN109858207B (en) 2019-01-31 2019-01-31 Unauthorized distribution multimedia copyright tracking method

Publications (2)

Publication Number Publication Date
CN109858207A CN109858207A (en) 2019-06-07
CN109858207B true CN109858207B (en) 2023-03-31

Family

ID=66897174

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910095614.5A Active CN109858207B (en) 2019-01-31 2019-01-31 Unauthorized distribution multimedia copyright tracking method

Country Status (1)

Country Link
CN (1) CN109858207B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111798360B (en) * 2020-06-30 2023-08-15 百度在线网络技术(北京)有限公司 Watermark detection method and device, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101086754A (en) * 2006-06-09 2007-12-12 中国科学院研究生院 Mobile image digital copyright secure processing system based on digital watermark technology
WO2010012175A1 (en) * 2008-07-31 2010-02-04 华为技术有限公司 Method and device for inspecting file
EP2169588A1 (en) * 2008-09-24 2010-03-31 EADS Deutschland GmbH Method for guaranteeing safety
CN102081715A (en) * 2011-01-26 2011-06-01 天擎华媒(北京)科技有限公司 Method and device for judging internet audio and video copyrights
CN102855423A (en) * 2011-06-29 2013-01-02 盛乐信息技术(上海)有限公司 Tracking method and device of literary works
CN103294667A (en) * 2012-02-27 2013-09-11 深圳市腾讯计算机系统有限公司 Method and system for tracing homologous image through watermark
CN103390121A (en) * 2012-05-10 2013-11-13 北京大学 Digital work ownership authentication method and digital work ownership authentication system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101086754A (en) * 2006-06-09 2007-12-12 中国科学院研究生院 Mobile image digital copyright secure processing system based on digital watermark technology
WO2010012175A1 (en) * 2008-07-31 2010-02-04 华为技术有限公司 Method and device for inspecting file
EP2169588A1 (en) * 2008-09-24 2010-03-31 EADS Deutschland GmbH Method for guaranteeing safety
CN102081715A (en) * 2011-01-26 2011-06-01 天擎华媒(北京)科技有限公司 Method and device for judging internet audio and video copyrights
CN102855423A (en) * 2011-06-29 2013-01-02 盛乐信息技术(上海)有限公司 Tracking method and device of literary works
CN103294667A (en) * 2012-02-27 2013-09-11 深圳市腾讯计算机系统有限公司 Method and system for tracing homologous image through watermark
CN103390121A (en) * 2012-05-10 2013-11-13 北京大学 Digital work ownership authentication method and digital work ownership authentication system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
姜明芳 ; .大数据环境下可视媒体版权保护模式研究.现代情报.2018,(第02期),全文. *

Also Published As

Publication number Publication date
CN109858207A (en) 2019-06-07

Similar Documents

Publication Publication Date Title
Bartolini et al. Image authentication techniques for surveillance applications
AU2010201199B2 (en) Desynchronized fingerprinting method and system for digital multimedia data
WO2009010002A1 (en) Method and device for testing consistency of numeric contents
EP2915085A1 (en) Content protection
Kalker et al. Issues with digital watermarking and perceptual hashing
Dittmann et al. Media-independent Watermarking Classification and the need for combining digital video and audio watermarking for media authentication
CN101668170A (en) Digital television program copyright protecting method for resisting time synchronization attacks
CN110619197B (en) Digital asset right-confirming registration information processing system and method
EP1527415A2 (en) Identification of digital data sequences
CN102903072A (en) Blind digital watermark detection method and system
US20060161777A1 (en) Watermark embedding and detection
KR101535694B1 (en) Method and system for the secure distribution of audiovisual data by transactional marking
CN109858207B (en) Unauthorized distribution multimedia copyright tracking method
Dittmann et al. Combined video and audio watermarking: Embedding content information in multimedia data
CN101409818A (en) System for managing digital television copyright based on digital watermarking and condition-receiving technology
CN108229113B (en) Database digital watermark extraction method
CN111988639B (en) Video encryption and decryption method based on cryptographic algorithm and reversible steganography
Chen et al. Visual data security and management for smart cities
CN105208462A (en) Video digital watermarking processing method and video digital watermarking system executing same
CN101808241A (en) Video digital watermark embedding and detecting system based on DCT (Discrete Cosine Transformation) domain and method thereof
Yadav et al. Reversible data hiding techniques
Yin Multimedia authentication for copyright protection
Sharma et al. Digital watermarking for secure e-government framework
Gehani et al. Veil: A system for certifying video provenance
Vyas et al. Implementation of digital watermarking using MATLAB software

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant