CN110032839A - The digital media content infringement detection system of high security digital watermarking - Google Patents

The digital media content infringement detection system of high security digital watermarking Download PDF

Info

Publication number
CN110032839A
CN110032839A CN201910270689.2A CN201910270689A CN110032839A CN 110032839 A CN110032839 A CN 110032839A CN 201910270689 A CN201910270689 A CN 201910270689A CN 110032839 A CN110032839 A CN 110032839A
Authority
CN
China
Prior art keywords
image
watermark
digital
information
watermarking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910270689.2A
Other languages
Chinese (zh)
Inventor
黄卫华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Datong Industrial Co Ltd
Original Assignee
Shenzhen Datong Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Datong Industrial Co Ltd filed Critical Shenzhen Datong Industrial Co Ltd
Priority to CN201910270689.2A priority Critical patent/CN110032839A/en
Publication of CN110032839A publication Critical patent/CN110032839A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

For the present invention using the method validation copyright ownership for extracting watermark from dispute over copyright image, the technology differentiated for the copyright of digital image data, cipher system, pirate digital picture works ownership solves the present invention.The present invention includes the load by carrying out digital watermarking to image data, realizes the copyright to image data, is designed using common recognition agreement and public-key cryptosystem, realizes and belongs to the function of making decisions to pirate digital picture works.Certification is compared to the digital watermarking and digital signature that detect simultaneously, judges the copyright ownership problem of digital picture.Asymmetric encryption techniques and symmetric key technique are utilized in watermark insertion and extraction process, in combination with brightness of image masking effect and contrast masking sensitivity effect.Watermark be it is sightless, in addition the extraction of watermark does not need the participation of initial carrier image, belongs to Blind extracting.

Description

The digital media content infringement detection system of high security digital watermarking
Technical field
The invention belongs to security technical fields, and in particular to the digital media content based on high security digital watermarking Infringement detection system.
Background technique
The pirate wildness of network brings immeasurable loss to image creator, in news, design, photography and electronics The fields such as commercial affairs are especially prominent.Since the behavior of usurping of image is difficult to identify, and the longer lawsuit time is needed, infringement The actual cost of behavior is often undertaken by the injured party, this also results in the diffusion of copy right piracy.
In recent years, with country, society and the personal continuous enhancing to Sense of Copyright Protection, video, music, literature etc. Copyright protection achieves significant progress.However, copyright protection process is made slow progress due to the Some features of picture itself. It is either online or offline, the content of picture be all it is indispensable, the value of picture is increasingly prominent, protects to the copyright of picture Shield becomes inevitable." Chinese Network Copyright industry development report in 2017 " display, Chinese core network copyright industry size More than 500,000,000,000 yuan, increase by 31.3% on a year-on-year basis.Compared with the copyright protections such as video, music, the copyright protection of picture is current It is less subject to concern, the copyright consciousness of people is also relatively weak.It is asked to solve the market infringement of this image infringement at present It inscribes, researchers wish to solve the problems, such as current right protection by technological means, enable original author by marking oneself Works and marking are to track.
Digital watermarking is to be embedded in visible or sightless copyright using Multimedia digital informations such as images as data medium The technology of information.When digital product dispute over copyright occurs, the information in data medium can be extracted, and verifies all of copyright Power.Digital watermarking system generally comprises watermark insertion and extracts two stages.Evaluation watermaking system quality index mainly include Concealment, watermark capacity, robustness and safety.
Blind watermatking technology is that one kind can be by the Image Watermarking Technique of digital information hiding in the picture.Treated image It does not appear to change, but in fact, image has had its unique identifier.It either shears, paste, rotation, scaling also It is addition text or filter, can all influences the content of watermark to a certain extent.This damages copyright protection and tracking not It original artwork and is not taken care.
Summary of the invention
In order to overcome the deficiencies of the prior art, the present invention provides the digital media content infringement based on high security digital watermarking Detection system belongs to security technical field.The present invention is used for the copyright of digital image data, cipher system, piracy A special product that digital picture works ownership differentiates.System software core function includes by carrying out number to image data The copyright to image data is realized in the load of watermark, is designed using DSE arithmetic and public-key cryptosystem, is realized Pirate digital picture works are belonged to the function of making decisions, to achieve this purpose, the present invention adopts the following technical scheme:
Digital media content infringement detection system based on high security digital watermarking, comprising the following steps:
Including digital figure watermark telescopiny:
The first step, digital image anti-fake process, steps are as follows:
Step1: selection carrier image Image, copyright information Copyright, the copyright information Copyright are texts The combination of word, image or both;
Step2: using Hashgraph common recognition agreement, Hash is calculated to copyright information Copyright, obtains cryptographic Hash h= H (Copyright), wherein H (Copyright) is calculated by hash function Copyrigh;
Step3: time stamp T imestamp is added in anti-fake treatment process each time, and to cryptographic Hash and timestamp label Name, it is assumed that the private key of copyright owner is K1, Encryption Algorithm E1, watermark signature value S is obtained by digital signature calculation method Are as follows: S=E1(K1,h,Timestamp),
Step4: copyright information Copyright is converted into watermark information W, by watermark information W and watermark signature value S with symmetrically Cipher algorithm encryption, Encryption Algorithm E2, key K2, ciphertext is that C then passes through one C=E of formula after encryption2(K2, W | | S) Out;
Step5: the rgb signal of carrier image Image is converted by YCbCr signal, i.e. brightness of image by luminance equation Signal Y;
Step6: image brightness signal Y is subjected to piecemeal, is divided into the subimage block of several 8 × 8 block sizes, while will be each Sub-image carries out 8 × 8 discrete cosine transforms transformation, chooses low frequency coefficient D in discrete cosine transformi(k) watermark insertion is carried out, Di(k) low frequency coefficient D in discrete cosine transform is indicatedi(k), k indicates that k-th of intermediate frequency coefficient, i indicate i-th of sub-image;
Step7: according to brightness of image masking effect, contrast masking sensitivity effect, texture effect, image optimum quantization step is calculated Long δ;
Step8: in conjunction with image optimum quantization step-length δ, low frequency coefficient D in discrete cosine transform is selectedi(k) ciphertext C is carried out Information insertion;
Step9: the carrier image after selecting suitable image compression quality factor compressed encoding insertion watermark.
Further include image watermark extraction process:
Digital picture copyright authentication process, steps are as follows:
Step10: watermark C' is extracted from containing watermarking images Image ', by luminance equation by the rgb signal of watermarking images It is converted into YCbCr signal, i.e. image brightness signal Y';
Step11: carrying out piecemeal for image brightness signal Y', be divided into the subimage block of several 8 × 8 block sizes, simultaneously will Each sub-image carries out 8 × 8 discrete cosine transforms transformation, chooses low frequency coefficient D in discrete cosine transformi(k) watermark is carried out to mention It takes, k indicates that k-th of intermediate frequency coefficient, i indicate i-th of sub-image;
Step12: watermark extracting is carried out according to watermark extraction algorithm corresponding with watermark insertion, extracts watermark C';
Step13: watermark information W' and signature value S', decipherment algorithm are decrypted using symmetric cryptographic algorithm from watermark C' For D2, decruption key K2, it calculates and passes through formula two:
D2(K2, C') and=D2(K2,E2(K2, W'| | S'))=W'| | S';Restore copyright information Copyright from W';
Step14: the public key K of copyright applicant is utilized3Verifying signature, public key cryptography decipherment algorithm are D1, calculate and pass through public affairs Formula three: D1(K3, S') and=D1(K3,E1(K1, h, Timestamp) and=h';
Step15: the Cryptographic Hash Function h=H (Copyright) by calculating copyright information Copyright obtains password Hash functional value h illustrates that the copyright of image returns copyright applicant to possess using technical method of the invention if h'=h, will Digital watermarking and its digital signature and digital picture pass through digital figure watermark detection side by digital watermark embedding technology correlation Method restores the hiding information in carrier image, while comparing certification to the digital watermarking and digital signature that detect, judges The copyright ownership problem of digital picture.Asymmetric encryption techniques and symmetric key skill are utilized in watermark insertion and extraction process Art.Watermark be it is sightless, in addition the extraction of watermark does not need the participation of initial carrier image, belongs to Blind extracting.
Detailed description of the invention
Fig. 1 is image copyright ownership authentication schemes figure;
Fig. 2 is digital image anti-fake flow chart;
Fig. 3 is digital picture copyright authentication flow chart.
Specific embodiment
To further illustrate the technical scheme of the present invention below with reference to the accompanying drawings and specific embodiments.
Digital media content infringement detection system of the technical solution of the present invention based on high security digital watermarking includes number Image false-proof process, digital picture copyright authentication process.Digital media content of the inventive technique based on high security digital watermarking Detection system image copyright ownership authentication schemes of encroaching right are as shown in Figure 1.Digital image anti-fake flow chart is as shown in Figure 2.Digitized map As copyright authentication flow chart is as shown in Figure 3.
In the present invention, image copyright ownership authentication schemes technical principle is real using cryptological technique and digital watermark technology Now to the copyright protection function of digital picture.
Digital picture copyright owner can issue the digital picture works of insertion watermark to public passages such as internets, if The digital picture works for being found to have ownership are doubtful stolen, then can mention to copyright authentication mechanism or copyright certification management person Punching application out, the private key and public key that punching person provides according to copyright owner carry out watermark to doubtful copyright digital image artifacts It extracts, and carries out copyright authentication, judge whether works return copyright owner all.Copyright discrimination method schematic diagram is as shown in Figure 1.
In the present invention, image copyright mark and tampering detection system business mainly include two parts: digital image anti-fake Process, digital picture copyright authentication process.Fig. 2 is digital image anti-fake process flow diagram in the specific embodiment of the invention.Fig. 3 It is digital picture copyright authentication process flow diagram in the specific embodiment of the invention.
Digital image anti-fake
As shown in Fig. 2, the digital image anti-fake process flow the following steps are included:
Step 201, design copyright information, copyright information can be BMP picture, be also possible to TXT text digital information, It is also possible to the merging of the two.
Step 202, agreement of being known together using Hashgraph, are carried out Hash calculating to copyright information, hash value h are calculated, H=H (W).
Step 203, using public key cryptography, the Hash functional value h of copyright information is digitally signed, it is assumed here that Encryption key is that the private key of copyright owner is K1, Encryption Algorithm E1, digital signature calculation method is S=E1(K1, h, Timestamp)。
Copyright information is converted into binary system watermark W by step 203, at the same with the digital signature calculated in step 203 S is merged into plaintext watermark, and carries out symmetric key encryption to plaintext watermark, forms ciphertext watermark, Encryption Algorithm E2, key is K2, ciphertext is C after encryption, then C=E2(K2, W | | S);
Step 205, selection need the digital picture carrier of copyright protection, and format JPEG, TIFF etc. pass through luminance equation Color RGB image is converted into YCbCR signal.
Carrier image rgb signal is converted to YCbCR signal, transfer equation are as follows:
Y=0.299 × R+0.587 × G+0.114 × B
Cb=-0.299 × R-0.587 × G+0.886 × B
Cr=0.701 × R-0.587 × G-0.114 × B
Step 206, selection need the digital picture carrier of copyright protection, and format JPEG, TIFF etc. pass through luminance equation Color RGB image is converted into YCbCR signal.
Image brightness signal Y is subjected to piecemeal, is divided into the subimage block of several 8 × 8 block sizes, while by each sub-block figure As carrying out 8 × 8DCT transformation, low frequency coefficient D in DCT is choseni(k) watermark insertion is carried out, k indicates that k-th of intermediate frequency coefficient, i indicate I-th of sub-image;
Step 207 calculates brightness of image effect and contrast effect, design factor quantization step.
According to the adaptive phenomenon of brightness of image, picture quantization step size is calculated
c0,0,kFor the DC coefficient of k-th of subimage block, c0,0It is assigned a value of 1024, Tu,vIt is quantization matrix.It is covered in conjunction with contrast Effect is covered, quantization step is optimized for
Wherein, wu,v=0.7, Xu,v,kFor contrast masking sensitivity effect matrix.
Image is f (x, y) ∈ L2(R2), 2-d wavelet decomposition computation is as follows:
H () and g () is respectively horizontal filtering function and vertical filtering function, and j is picture breakdown series.
Here 3 grades of decomposition, i.e. j=3 are carried out to image.
A3F characterizes the texture effect of image, and in conjunction with image texture effect, quantization step calculates as follows:
Low frequency coefficient carries out robust watermarking insertion in step 208, selection DCT.
Mod () is modular arithmetic, and sig () is symbolic operation.
DCT coefficient is subjected to idct transform, then passes through inverse quantization, compression, cataloged procedure completes image copyright and identifies water Print load.
Carrier image after step 209, the suitable image compression quality factor compressed encoding insertion watermark of selection.
Digital picture copyright authentication
As shown in figure 3, the digital picture copyright authentication process the following steps are included:
Step 301 carries out luminance signal conversion to detection image, and carries out block image dct transform to Y-signal.
Method is the same as the anti-fake process steps 205 of image digitization and step 206.
Step 302, selection DCT coefficient, the method Detection and Extraction of usage factor quantization go out ciphertext watermark C'.
Image watermark embedded mobile GIS is corresponding during image watermark extraction algorithm and digital image anti-fake, is all that all rights reserved Person provides.
Watermark extracting method is as follows:
Mod () is modular arithmetic, and sig () is symbolic operation.
Watermark extracting is carried out according to the above watermark extraction algorithm, extracts watermark ciphertext watermark C '.
Step 303 utilizes key K2Ciphertext watermark C ' is decrypted, decipherment algorithm D2, obtain binary system watermark W ' and Digital signature S '.Binary system watermark W restores digital rights information, key K2Negotiate to obtain by copyright owner and copyright arbitrator ?.
D2(K2, C ') and=D2(K2, E2(K2, W ' | | S '))=W ' | | S '
Restore copyright information Copyright from W.
Step 304 carries out hash function calculating to watermark copyright information, obtains h.
Specific method is shown in step 202 during digital image anti-fake.
Step 305 utilizes public key K3Digital signature S ' is verified, decryption obtains h '.
Utilize the public key K of copyright applicant3Verifying signature S ', public key cryptography decipherment algorithm are D1, calculate as follows: D1(K3, S ')=D1(K3,E1(K1, h ', Timestamp))=h ' Timestamp.
Step 306 first confirms that timestamp, then compare h and h ', judge if equal detection image copyright authentication at Function, image return copyright owner all, and otherwise copyright authentication fails.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Within the technical scope disclosed by the invention, any changes or substitutions that can be easily thought of by any people for being familiar with the technology, should all cover Within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (1)

  1. The detection system 1. digital media content of high security digital watermarking is encroached right, which is characterized in that high security digital watermarking Digital media content infringement detection system include digital figure watermark insertion module, for the watermark insertion to image: the One step, digital image anti-fake process, steps are as follows: Step1: selection carrier image Image, copyright information Copyright, described Copyright information Copyright is the combination of text, image or both;Step2: using Hashgraph common recognition agreement, copyright is believed It ceases Copyright and calculates Hash, obtain cryptographic Hash h=H (Copyright), wherein H (Copyright) is logical to Copyrigh Hash function is crossed to be calculated;Step3: time stamp T imestamp is added in anti-fake treatment process each time, and to cryptographic Hash It signs with timestamp, it is assumed that the private key of copyright owner is K1, Encryption Algorithm E1, must be discharged by digital signature calculation method Signature name value S are as follows: S=E1(K1, h, Timestamp), Step4: copyright information Copyright is converted into watermark information W, by water Official seal breath W and watermark signature value S is encrypted with symmetric cryptographic algorithm, Encryption Algorithm E2, key K2, ciphertext is that C then leads to after encryption Cross one C=E of formula2(K2, W | | S) it obtains;Step5: the rgb signal of carrier image Image is converted by luminance equation YCbCr signal, i.e. image brightness signal Y;Step6: image brightness signal Y is subjected to piecemeal, is divided into several 8 × 8 block sizes Subimage block, while by each sub-image carry out 8 × 8 discrete cosine transforms transformation, choose discrete cosine transform in low frequency system Number Di(k) watermark insertion, D are carried outi(k) low frequency coefficient D in discrete cosine transform is indicatedi(k), k indicates k-th of intermediate frequency coefficient, i Indicate i-th of sub-image;Step7: according to brightness of image masking effect, contrast masking sensitivity effect, texture effect, image is calculated Optimum quantization step-length δ;Step8: in conjunction with image optimum quantization step-length δ, low frequency coefficient D in discrete cosine transform is selectedi(k) it carries out The information of ciphertext C is embedded in;Step9: the carrier image after selecting suitable image compression quality factor compressed encoding insertion watermark; The digital media content infringement detection system based on high security digital watermarking, further includes image watermark extraction module, For digital picture copyright authentication, steps are as follows: Step1: watermark C' is extracted from containing watermarking images Image ', by brightness side The rgb signal of watermarking images is converted into YCbCr signal, i.e. image brightness signal Y' by journey;Step2: by image brightness signal Y' Piecemeal is carried out, is divided into the subimage block of several 8 × 8 block sizes, while each sub-image is subjected to 8 × 8 discrete cosine transforms Low frequency coefficient D in discrete cosine transform is chosen in transformationi(k) watermark extracting is carried out, k indicates that k-th of intermediate frequency coefficient, i indicate i-th A sub-image;Step3: watermark extracting is carried out according to watermark extraction algorithm corresponding with watermark insertion, extracts watermark C'; Step4: watermark information W' and signature value S', decipherment algorithm D are decrypted using symmetric cryptographic algorithm from watermark C'2, decryption Key is K2, it calculates and passes through formula two:
    D2(K2, C') and=D2(K2,E2(K2, W'| | S'))=W'| | S';Restore copyright information Copyright from W';Step5: Utilize the public key K of copyright applicant3Verifying signature, public key cryptography decipherment algorithm are D1, calculate and pass through formula three: D1(K3, S')= D1(K3,E1(K1, h, Timestamp) and=h';Step6: the Cryptographic Hash Function h=H by calculating copyright information Copyright (Copyright) it obtains Cryptographic Hash Function value h, if h'=h, illustrates that the copyright of image returns copyright applicant to possess.
CN201910270689.2A 2019-04-04 2019-04-04 The digital media content infringement detection system of high security digital watermarking Pending CN110032839A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910270689.2A CN110032839A (en) 2019-04-04 2019-04-04 The digital media content infringement detection system of high security digital watermarking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910270689.2A CN110032839A (en) 2019-04-04 2019-04-04 The digital media content infringement detection system of high security digital watermarking

Publications (1)

Publication Number Publication Date
CN110032839A true CN110032839A (en) 2019-07-19

Family

ID=67237460

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910270689.2A Pending CN110032839A (en) 2019-04-04 2019-04-04 The digital media content infringement detection system of high security digital watermarking

Country Status (1)

Country Link
CN (1) CN110032839A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112800396A (en) * 2021-02-08 2021-05-14 北京百度网讯科技有限公司 Page watermark generation method, device, equipment, storage medium and program product
WO2021109691A1 (en) * 2019-12-03 2021-06-10 支付宝(杭州)信息技术有限公司 Blockchain-based picture watermark processing method and apparatus
CN113706361A (en) * 2021-08-19 2021-11-26 兰州大学 Digital image ownership protection cloud platform based on confidential computation
CN114363068A (en) * 2022-01-05 2022-04-15 北京智云芯科技有限公司 Image-text publishing method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101271568A (en) * 2008-05-16 2008-09-24 山东大学 Iteration self-adapting quantizing index modulation watermark method based on vision model
CN101493928A (en) * 2009-02-10 2009-07-29 国网信息通信有限公司 Digital watermarking embedding, extracting and quantizing step size coordinating factor optimizing method and device
CN101710995A (en) * 2009-12-10 2010-05-19 武汉大学 Video coding system based on vision characteristic
CN102208097B (en) * 2011-05-26 2013-06-19 浙江工商大学 Network image copyright real-time distinguishing method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101271568A (en) * 2008-05-16 2008-09-24 山东大学 Iteration self-adapting quantizing index modulation watermark method based on vision model
CN101493928A (en) * 2009-02-10 2009-07-29 国网信息通信有限公司 Digital watermarking embedding, extracting and quantizing step size coordinating factor optimizing method and device
CN101710995A (en) * 2009-12-10 2010-05-19 武汉大学 Video coding system based on vision characteristic
CN102208097B (en) * 2011-05-26 2013-06-19 浙江工商大学 Network image copyright real-time distinguishing method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
陈洪涛: "基于HVS的图像变换域鲁棒性数字水印算法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
高扬: "基于数字水印的图像反盗版系统研究与设计", 《信息技术》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021109691A1 (en) * 2019-12-03 2021-06-10 支付宝(杭州)信息技术有限公司 Blockchain-based picture watermark processing method and apparatus
CN112800396A (en) * 2021-02-08 2021-05-14 北京百度网讯科技有限公司 Page watermark generation method, device, equipment, storage medium and program product
CN112800396B (en) * 2021-02-08 2023-10-27 北京百度网讯科技有限公司 Page watermark generation method, device, equipment, storage medium and program product
CN113706361A (en) * 2021-08-19 2021-11-26 兰州大学 Digital image ownership protection cloud platform based on confidential computation
CN113706361B (en) * 2021-08-19 2022-04-26 兰州大学 Digital image ownership protection cloud system based on confidential calculation
CN114363068A (en) * 2022-01-05 2022-04-15 北京智云芯科技有限公司 Image-text publishing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110032839A (en) The digital media content infringement detection system of high security digital watermarking
Shih Digital watermarking and steganography: fundamentals and techniques
Guo et al. A region-based lossless watermarking scheme for enhancing security of medical data
US8379911B2 (en) Method and system for efficient watermarking of video content
Singh et al. Experimental studies of LSB watermarking with different noise
CN101694724A (en) Method for embedding GPS information in JPEG image of digital camera and ensuring safety of image
Chandramouli et al. Digital watermarking
CN106454367B (en) Multimedia file identification method and system
Lakrissi et al. Novel dynamic color image watermarking based on DWT-SVD and the human visual system
TW200826686A (en) Method of authentication and restoration for images
Lu et al. Combined watermarking for image authentication and protection
Huang et al. Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents
Shen et al. A self-embedding fragile image authentication based on singular value decomposition
Vyas et al. A review on methods for image authentication and visual cryptography in digital image watermarking
Gul A blind robust color image watermarking method based on discrete wavelet transform and discrete cosine transform using grayscale watermark image
CN103971321A (en) Method and system for steganalysis of JPEG compatibility
Gope et al. An enhanced JPEG steganography scheme with encryption technique
Saturwar et al. Review of models, issues and applications of digital watermarking based on visual cryptography
Vaidya et al. Adaptive medical image watermarking system for e-health care applications
Fan Blind dual image watermarking for copyright protection, tamper proofing and self-recovery
Chahal et al. A review on digital image watermarking
Kuang et al. Watermarking image authentication in hospital information system
Tsai et al. A new repeating color watermarking scheme based on human visual model
Sumalatha et al. Local content based image authentication for tamper localization
Han et al. A reversible image authentication method without memorization of hiding parameters

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190719

RJ01 Rejection of invention patent application after publication