CN110032839A - The digital media content infringement detection system of high security digital watermarking - Google Patents
The digital media content infringement detection system of high security digital watermarking Download PDFInfo
- Publication number
- CN110032839A CN110032839A CN201910270689.2A CN201910270689A CN110032839A CN 110032839 A CN110032839 A CN 110032839A CN 201910270689 A CN201910270689 A CN 201910270689A CN 110032839 A CN110032839 A CN 110032839A
- Authority
- CN
- China
- Prior art keywords
- image
- watermark
- digital
- information
- watermarking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000001514 detection method Methods 0.000 title claims description 15
- 238000000034 method Methods 0.000 claims abstract description 29
- 238000003780 insertion Methods 0.000 claims abstract description 16
- 230000037431 insertion Effects 0.000 claims abstract description 16
- 230000000694 effects Effects 0.000 claims abstract description 11
- 238000000605 extraction Methods 0.000 claims abstract description 11
- 230000000873 masking effect Effects 0.000 claims abstract description 7
- 230000035945 sensitivity Effects 0.000 claims abstract description 4
- 238000013139 quantization Methods 0.000 claims description 11
- 239000000284 extract Substances 0.000 claims description 5
- 230000006835 compression Effects 0.000 claims description 4
- 238000007906 compression Methods 0.000 claims description 4
- 230000009466 transformation Effects 0.000 claims description 4
- 238000004364 calculation method Methods 0.000 claims description 3
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 2
- 238000010200 validation analysis Methods 0.000 abstract 1
- 230000004224 protection Effects 0.000 description 14
- 229910002056 binary alloy Inorganic materials 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000000354 decomposition reaction Methods 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 239000011159 matrix material Substances 0.000 description 2
- 238000004080 punching Methods 0.000 description 2
- 230000003044 adaptive effect Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000009792 diffusion process Methods 0.000 description 1
- 238000012850 discrimination method Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
For the present invention using the method validation copyright ownership for extracting watermark from dispute over copyright image, the technology differentiated for the copyright of digital image data, cipher system, pirate digital picture works ownership solves the present invention.The present invention includes the load by carrying out digital watermarking to image data, realizes the copyright to image data, is designed using common recognition agreement and public-key cryptosystem, realizes and belongs to the function of making decisions to pirate digital picture works.Certification is compared to the digital watermarking and digital signature that detect simultaneously, judges the copyright ownership problem of digital picture.Asymmetric encryption techniques and symmetric key technique are utilized in watermark insertion and extraction process, in combination with brightness of image masking effect and contrast masking sensitivity effect.Watermark be it is sightless, in addition the extraction of watermark does not need the participation of initial carrier image, belongs to Blind extracting.
Description
Technical field
The invention belongs to security technical fields, and in particular to the digital media content based on high security digital watermarking
Infringement detection system.
Background technique
The pirate wildness of network brings immeasurable loss to image creator, in news, design, photography and electronics
The fields such as commercial affairs are especially prominent.Since the behavior of usurping of image is difficult to identify, and the longer lawsuit time is needed, infringement
The actual cost of behavior is often undertaken by the injured party, this also results in the diffusion of copy right piracy.
In recent years, with country, society and the personal continuous enhancing to Sense of Copyright Protection, video, music, literature etc.
Copyright protection achieves significant progress.However, copyright protection process is made slow progress due to the Some features of picture itself.
It is either online or offline, the content of picture be all it is indispensable, the value of picture is increasingly prominent, protects to the copyright of picture
Shield becomes inevitable." Chinese Network Copyright industry development report in 2017 " display, Chinese core network copyright industry size
More than 500,000,000,000 yuan, increase by 31.3% on a year-on-year basis.Compared with the copyright protections such as video, music, the copyright protection of picture is current
It is less subject to concern, the copyright consciousness of people is also relatively weak.It is asked to solve the market infringement of this image infringement at present
It inscribes, researchers wish to solve the problems, such as current right protection by technological means, enable original author by marking oneself
Works and marking are to track.
Digital watermarking is to be embedded in visible or sightless copyright using Multimedia digital informations such as images as data medium
The technology of information.When digital product dispute over copyright occurs, the information in data medium can be extracted, and verifies all of copyright
Power.Digital watermarking system generally comprises watermark insertion and extracts two stages.Evaluation watermaking system quality index mainly include
Concealment, watermark capacity, robustness and safety.
Blind watermatking technology is that one kind can be by the Image Watermarking Technique of digital information hiding in the picture.Treated image
It does not appear to change, but in fact, image has had its unique identifier.It either shears, paste, rotation, scaling also
It is addition text or filter, can all influences the content of watermark to a certain extent.This damages copyright protection and tracking not
It original artwork and is not taken care.
Summary of the invention
In order to overcome the deficiencies of the prior art, the present invention provides the digital media content infringement based on high security digital watermarking
Detection system belongs to security technical field.The present invention is used for the copyright of digital image data, cipher system, piracy
A special product that digital picture works ownership differentiates.System software core function includes by carrying out number to image data
The copyright to image data is realized in the load of watermark, is designed using DSE arithmetic and public-key cryptosystem, is realized
Pirate digital picture works are belonged to the function of making decisions, to achieve this purpose, the present invention adopts the following technical scheme:
Digital media content infringement detection system based on high security digital watermarking, comprising the following steps:
Including digital figure watermark telescopiny:
The first step, digital image anti-fake process, steps are as follows:
Step1: selection carrier image Image, copyright information Copyright, the copyright information Copyright are texts
The combination of word, image or both;
Step2: using Hashgraph common recognition agreement, Hash is calculated to copyright information Copyright, obtains cryptographic Hash h=
H (Copyright), wherein H (Copyright) is calculated by hash function Copyrigh;
Step3: time stamp T imestamp is added in anti-fake treatment process each time, and to cryptographic Hash and timestamp label
Name, it is assumed that the private key of copyright owner is K1, Encryption Algorithm E1, watermark signature value S is obtained by digital signature calculation method
Are as follows: S=E1(K1,h,Timestamp),
Step4: copyright information Copyright is converted into watermark information W, by watermark information W and watermark signature value S with symmetrically
Cipher algorithm encryption, Encryption Algorithm E2, key K2, ciphertext is that C then passes through one C=E of formula after encryption2(K2, W | | S)
Out;
Step5: the rgb signal of carrier image Image is converted by YCbCr signal, i.e. brightness of image by luminance equation
Signal Y;
Step6: image brightness signal Y is subjected to piecemeal, is divided into the subimage block of several 8 × 8 block sizes, while will be each
Sub-image carries out 8 × 8 discrete cosine transforms transformation, chooses low frequency coefficient D in discrete cosine transformi(k) watermark insertion is carried out,
Di(k) low frequency coefficient D in discrete cosine transform is indicatedi(k), k indicates that k-th of intermediate frequency coefficient, i indicate i-th of sub-image;
Step7: according to brightness of image masking effect, contrast masking sensitivity effect, texture effect, image optimum quantization step is calculated
Long δ;
Step8: in conjunction with image optimum quantization step-length δ, low frequency coefficient D in discrete cosine transform is selectedi(k) ciphertext C is carried out
Information insertion;
Step9: the carrier image after selecting suitable image compression quality factor compressed encoding insertion watermark.
Further include image watermark extraction process:
Digital picture copyright authentication process, steps are as follows:
Step10: watermark C' is extracted from containing watermarking images Image ', by luminance equation by the rgb signal of watermarking images
It is converted into YCbCr signal, i.e. image brightness signal Y';
Step11: carrying out piecemeal for image brightness signal Y', be divided into the subimage block of several 8 × 8 block sizes, simultaneously will
Each sub-image carries out 8 × 8 discrete cosine transforms transformation, chooses low frequency coefficient D in discrete cosine transformi(k) watermark is carried out to mention
It takes, k indicates that k-th of intermediate frequency coefficient, i indicate i-th of sub-image;
Step12: watermark extracting is carried out according to watermark extraction algorithm corresponding with watermark insertion, extracts watermark C';
Step13: watermark information W' and signature value S', decipherment algorithm are decrypted using symmetric cryptographic algorithm from watermark C'
For D2, decruption key K2, it calculates and passes through formula two:
D2(K2, C') and=D2(K2,E2(K2, W'| | S'))=W'| | S';Restore copyright information Copyright from W';
Step14: the public key K of copyright applicant is utilized3Verifying signature, public key cryptography decipherment algorithm are D1, calculate and pass through public affairs
Formula three: D1(K3, S') and=D1(K3,E1(K1, h, Timestamp) and=h';
Step15: the Cryptographic Hash Function h=H (Copyright) by calculating copyright information Copyright obtains password
Hash functional value h illustrates that the copyright of image returns copyright applicant to possess using technical method of the invention if h'=h, will
Digital watermarking and its digital signature and digital picture pass through digital figure watermark detection side by digital watermark embedding technology correlation
Method restores the hiding information in carrier image, while comparing certification to the digital watermarking and digital signature that detect, judges
The copyright ownership problem of digital picture.Asymmetric encryption techniques and symmetric key skill are utilized in watermark insertion and extraction process
Art.Watermark be it is sightless, in addition the extraction of watermark does not need the participation of initial carrier image, belongs to Blind extracting.
Detailed description of the invention
Fig. 1 is image copyright ownership authentication schemes figure;
Fig. 2 is digital image anti-fake flow chart;
Fig. 3 is digital picture copyright authentication flow chart.
Specific embodiment
To further illustrate the technical scheme of the present invention below with reference to the accompanying drawings and specific embodiments.
Digital media content infringement detection system of the technical solution of the present invention based on high security digital watermarking includes number
Image false-proof process, digital picture copyright authentication process.Digital media content of the inventive technique based on high security digital watermarking
Detection system image copyright ownership authentication schemes of encroaching right are as shown in Figure 1.Digital image anti-fake flow chart is as shown in Figure 2.Digitized map
As copyright authentication flow chart is as shown in Figure 3.
In the present invention, image copyright ownership authentication schemes technical principle is real using cryptological technique and digital watermark technology
Now to the copyright protection function of digital picture.
Digital picture copyright owner can issue the digital picture works of insertion watermark to public passages such as internets, if
The digital picture works for being found to have ownership are doubtful stolen, then can mention to copyright authentication mechanism or copyright certification management person
Punching application out, the private key and public key that punching person provides according to copyright owner carry out watermark to doubtful copyright digital image artifacts
It extracts, and carries out copyright authentication, judge whether works return copyright owner all.Copyright discrimination method schematic diagram is as shown in Figure 1.
In the present invention, image copyright mark and tampering detection system business mainly include two parts: digital image anti-fake
Process, digital picture copyright authentication process.Fig. 2 is digital image anti-fake process flow diagram in the specific embodiment of the invention.Fig. 3
It is digital picture copyright authentication process flow diagram in the specific embodiment of the invention.
Digital image anti-fake
As shown in Fig. 2, the digital image anti-fake process flow the following steps are included:
Step 201, design copyright information, copyright information can be BMP picture, be also possible to TXT text digital information,
It is also possible to the merging of the two.
Step 202, agreement of being known together using Hashgraph, are carried out Hash calculating to copyright information, hash value h are calculated,
H=H (W).
Step 203, using public key cryptography, the Hash functional value h of copyright information is digitally signed, it is assumed here that
Encryption key is that the private key of copyright owner is K1, Encryption Algorithm E1, digital signature calculation method is S=E1(K1, h,
Timestamp)。
Copyright information is converted into binary system watermark W by step 203, at the same with the digital signature calculated in step 203
S is merged into plaintext watermark, and carries out symmetric key encryption to plaintext watermark, forms ciphertext watermark, Encryption Algorithm E2, key is
K2, ciphertext is C after encryption, then C=E2(K2, W | | S);
Step 205, selection need the digital picture carrier of copyright protection, and format JPEG, TIFF etc. pass through luminance equation
Color RGB image is converted into YCbCR signal.
Carrier image rgb signal is converted to YCbCR signal, transfer equation are as follows:
Y=0.299 × R+0.587 × G+0.114 × B
Cb=-0.299 × R-0.587 × G+0.886 × B
Cr=0.701 × R-0.587 × G-0.114 × B
Step 206, selection need the digital picture carrier of copyright protection, and format JPEG, TIFF etc. pass through luminance equation
Color RGB image is converted into YCbCR signal.
Image brightness signal Y is subjected to piecemeal, is divided into the subimage block of several 8 × 8 block sizes, while by each sub-block figure
As carrying out 8 × 8DCT transformation, low frequency coefficient D in DCT is choseni(k) watermark insertion is carried out, k indicates that k-th of intermediate frequency coefficient, i indicate
I-th of sub-image;
Step 207 calculates brightness of image effect and contrast effect, design factor quantization step.
According to the adaptive phenomenon of brightness of image, picture quantization step size is calculated
c0,0,kFor the DC coefficient of k-th of subimage block, c0,0It is assigned a value of 1024, Tu,vIt is quantization matrix.It is covered in conjunction with contrast
Effect is covered, quantization step is optimized for
Wherein, wu,v=0.7, Xu,v,kFor contrast masking sensitivity effect matrix.
Image is f (x, y) ∈ L2(R2), 2-d wavelet decomposition computation is as follows:
H () and g () is respectively horizontal filtering function and vertical filtering function, and j is picture breakdown series.
Here 3 grades of decomposition, i.e. j=3 are carried out to image.
A3F characterizes the texture effect of image, and in conjunction with image texture effect, quantization step calculates as follows:
Low frequency coefficient carries out robust watermarking insertion in step 208, selection DCT.
Mod () is modular arithmetic, and sig () is symbolic operation.
DCT coefficient is subjected to idct transform, then passes through inverse quantization, compression, cataloged procedure completes image copyright and identifies water
Print load.
Carrier image after step 209, the suitable image compression quality factor compressed encoding insertion watermark of selection.
Digital picture copyright authentication
As shown in figure 3, the digital picture copyright authentication process the following steps are included:
Step 301 carries out luminance signal conversion to detection image, and carries out block image dct transform to Y-signal.
Method is the same as the anti-fake process steps 205 of image digitization and step 206.
Step 302, selection DCT coefficient, the method Detection and Extraction of usage factor quantization go out ciphertext watermark C'.
Image watermark embedded mobile GIS is corresponding during image watermark extraction algorithm and digital image anti-fake, is all that all rights reserved
Person provides.
Watermark extracting method is as follows:
Mod () is modular arithmetic, and sig () is symbolic operation.
Watermark extracting is carried out according to the above watermark extraction algorithm, extracts watermark ciphertext watermark C '.
Step 303 utilizes key K2Ciphertext watermark C ' is decrypted, decipherment algorithm D2, obtain binary system watermark W ' and
Digital signature S '.Binary system watermark W restores digital rights information, key K2Negotiate to obtain by copyright owner and copyright arbitrator
?.
D2(K2, C ') and=D2(K2, E2(K2, W ' | | S '))=W ' | | S '
Restore copyright information Copyright from W.
Step 304 carries out hash function calculating to watermark copyright information, obtains h.
Specific method is shown in step 202 during digital image anti-fake.
Step 305 utilizes public key K3Digital signature S ' is verified, decryption obtains h '.
Utilize the public key K of copyright applicant3Verifying signature S ', public key cryptography decipherment algorithm are D1, calculate as follows: D1(K3,
S ')=D1(K3,E1(K1, h ', Timestamp))=h ' Timestamp.
Step 306 first confirms that timestamp, then compare h and h ', judge if equal detection image copyright authentication at
Function, image return copyright owner all, and otherwise copyright authentication fails.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Within the technical scope disclosed by the invention, any changes or substitutions that can be easily thought of by any people for being familiar with the technology, should all cover
Within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (1)
- The detection system 1. digital media content of high security digital watermarking is encroached right, which is characterized in that high security digital watermarking Digital media content infringement detection system include digital figure watermark insertion module, for the watermark insertion to image: the One step, digital image anti-fake process, steps are as follows: Step1: selection carrier image Image, copyright information Copyright, described Copyright information Copyright is the combination of text, image or both;Step2: using Hashgraph common recognition agreement, copyright is believed It ceases Copyright and calculates Hash, obtain cryptographic Hash h=H (Copyright), wherein H (Copyright) is logical to Copyrigh Hash function is crossed to be calculated;Step3: time stamp T imestamp is added in anti-fake treatment process each time, and to cryptographic Hash It signs with timestamp, it is assumed that the private key of copyright owner is K1, Encryption Algorithm E1, must be discharged by digital signature calculation method Signature name value S are as follows: S=E1(K1, h, Timestamp), Step4: copyright information Copyright is converted into watermark information W, by water Official seal breath W and watermark signature value S is encrypted with symmetric cryptographic algorithm, Encryption Algorithm E2, key K2, ciphertext is that C then leads to after encryption Cross one C=E of formula2(K2, W | | S) it obtains;Step5: the rgb signal of carrier image Image is converted by luminance equation YCbCr signal, i.e. image brightness signal Y;Step6: image brightness signal Y is subjected to piecemeal, is divided into several 8 × 8 block sizes Subimage block, while by each sub-image carry out 8 × 8 discrete cosine transforms transformation, choose discrete cosine transform in low frequency system Number Di(k) watermark insertion, D are carried outi(k) low frequency coefficient D in discrete cosine transform is indicatedi(k), k indicates k-th of intermediate frequency coefficient, i Indicate i-th of sub-image;Step7: according to brightness of image masking effect, contrast masking sensitivity effect, texture effect, image is calculated Optimum quantization step-length δ;Step8: in conjunction with image optimum quantization step-length δ, low frequency coefficient D in discrete cosine transform is selectedi(k) it carries out The information of ciphertext C is embedded in;Step9: the carrier image after selecting suitable image compression quality factor compressed encoding insertion watermark; The digital media content infringement detection system based on high security digital watermarking, further includes image watermark extraction module, For digital picture copyright authentication, steps are as follows: Step1: watermark C' is extracted from containing watermarking images Image ', by brightness side The rgb signal of watermarking images is converted into YCbCr signal, i.e. image brightness signal Y' by journey;Step2: by image brightness signal Y' Piecemeal is carried out, is divided into the subimage block of several 8 × 8 block sizes, while each sub-image is subjected to 8 × 8 discrete cosine transforms Low frequency coefficient D in discrete cosine transform is chosen in transformationi(k) watermark extracting is carried out, k indicates that k-th of intermediate frequency coefficient, i indicate i-th A sub-image;Step3: watermark extracting is carried out according to watermark extraction algorithm corresponding with watermark insertion, extracts watermark C'; Step4: watermark information W' and signature value S', decipherment algorithm D are decrypted using symmetric cryptographic algorithm from watermark C'2, decryption Key is K2, it calculates and passes through formula two:D2(K2, C') and=D2(K2,E2(K2, W'| | S'))=W'| | S';Restore copyright information Copyright from W';Step5: Utilize the public key K of copyright applicant3Verifying signature, public key cryptography decipherment algorithm are D1, calculate and pass through formula three: D1(K3, S')= D1(K3,E1(K1, h, Timestamp) and=h';Step6: the Cryptographic Hash Function h=H by calculating copyright information Copyright (Copyright) it obtains Cryptographic Hash Function value h, if h'=h, illustrates that the copyright of image returns copyright applicant to possess.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910270689.2A CN110032839A (en) | 2019-04-04 | 2019-04-04 | The digital media content infringement detection system of high security digital watermarking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910270689.2A CN110032839A (en) | 2019-04-04 | 2019-04-04 | The digital media content infringement detection system of high security digital watermarking |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110032839A true CN110032839A (en) | 2019-07-19 |
Family
ID=67237460
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910270689.2A Pending CN110032839A (en) | 2019-04-04 | 2019-04-04 | The digital media content infringement detection system of high security digital watermarking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110032839A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112800396A (en) * | 2021-02-08 | 2021-05-14 | 北京百度网讯科技有限公司 | Page watermark generation method, device, equipment, storage medium and program product |
WO2021109691A1 (en) * | 2019-12-03 | 2021-06-10 | 支付宝(杭州)信息技术有限公司 | Blockchain-based picture watermark processing method and apparatus |
CN113706361A (en) * | 2021-08-19 | 2021-11-26 | 兰州大学 | Digital image ownership protection cloud platform based on confidential computation |
CN114363068A (en) * | 2022-01-05 | 2022-04-15 | 北京智云芯科技有限公司 | Image-text publishing method and device, electronic equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101271568A (en) * | 2008-05-16 | 2008-09-24 | 山东大学 | Iteration self-adapting quantizing index modulation watermark method based on vision model |
CN101493928A (en) * | 2009-02-10 | 2009-07-29 | 国网信息通信有限公司 | Digital watermarking embedding, extracting and quantizing step size coordinating factor optimizing method and device |
CN101710995A (en) * | 2009-12-10 | 2010-05-19 | 武汉大学 | Video coding system based on vision characteristic |
CN102208097B (en) * | 2011-05-26 | 2013-06-19 | 浙江工商大学 | Network image copyright real-time distinguishing method |
-
2019
- 2019-04-04 CN CN201910270689.2A patent/CN110032839A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101271568A (en) * | 2008-05-16 | 2008-09-24 | 山东大学 | Iteration self-adapting quantizing index modulation watermark method based on vision model |
CN101493928A (en) * | 2009-02-10 | 2009-07-29 | 国网信息通信有限公司 | Digital watermarking embedding, extracting and quantizing step size coordinating factor optimizing method and device |
CN101710995A (en) * | 2009-12-10 | 2010-05-19 | 武汉大学 | Video coding system based on vision characteristic |
CN102208097B (en) * | 2011-05-26 | 2013-06-19 | 浙江工商大学 | Network image copyright real-time distinguishing method |
Non-Patent Citations (2)
Title |
---|
陈洪涛: "基于HVS的图像变换域鲁棒性数字水印算法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
高扬: "基于数字水印的图像反盗版系统研究与设计", 《信息技术》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021109691A1 (en) * | 2019-12-03 | 2021-06-10 | 支付宝(杭州)信息技术有限公司 | Blockchain-based picture watermark processing method and apparatus |
CN112800396A (en) * | 2021-02-08 | 2021-05-14 | 北京百度网讯科技有限公司 | Page watermark generation method, device, equipment, storage medium and program product |
CN112800396B (en) * | 2021-02-08 | 2023-10-27 | 北京百度网讯科技有限公司 | Page watermark generation method, device, equipment, storage medium and program product |
CN113706361A (en) * | 2021-08-19 | 2021-11-26 | 兰州大学 | Digital image ownership protection cloud platform based on confidential computation |
CN113706361B (en) * | 2021-08-19 | 2022-04-26 | 兰州大学 | Digital image ownership protection cloud system based on confidential calculation |
CN114363068A (en) * | 2022-01-05 | 2022-04-15 | 北京智云芯科技有限公司 | Image-text publishing method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110032839A (en) | The digital media content infringement detection system of high security digital watermarking | |
Shih | Digital watermarking and steganography: fundamentals and techniques | |
Guo et al. | A region-based lossless watermarking scheme for enhancing security of medical data | |
US8379911B2 (en) | Method and system for efficient watermarking of video content | |
Singh et al. | Experimental studies of LSB watermarking with different noise | |
Chandramouli et al. | Digital watermarking | |
CN106454367B (en) | Multimedia file identification method and system | |
Lakrissi et al. | Novel dynamic color image watermarking based on DWT-SVD and the human visual system | |
Lu et al. | Combined watermarking for image authentication and protection | |
TW200826686A (en) | Method of authentication and restoration for images | |
Shen et al. | A self-embedding fragile image authentication based on singular value decomposition | |
Huang et al. | Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents | |
Vyas et al. | A review on methods for image authentication and visual cryptography in digital image watermarking | |
Gul | A blind robust color image watermarking method based on discrete wavelet transform and discrete cosine transform using grayscale watermark image | |
Surekha et al. | A multiple watermarking technique for images based on visual cryptography | |
Fan | Blind dual image watermarking for copyright protection, tamper proofing and self-recovery | |
Saturwar et al. | Review of models, issues and applications of digital watermarking based on visual cryptography | |
CN103971321A (en) | Method and system for steganalysis of JPEG compatibility | |
Vaidya et al. | Adaptive medical image watermarking system for e-health care applications | |
Chahal et al. | A review on digital image watermarking | |
Kuang et al. | Watermarking image authentication in hospital information system | |
CN110782383B (en) | Electronic certificate personalized information embedding and authentication method for mobile equipment | |
Tsai et al. | A new repeating color watermarking scheme based on human visual model | |
Sumalatha et al. | Local content based image authentication for tamper localization | |
Han et al. | A reversible image authentication method without memorization of hiding parameters |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190719 |
|
RJ01 | Rejection of invention patent application after publication |