CN112800395A - Copyright authentication and verification method for multiple images based on zero watermark technology - Google Patents

Copyright authentication and verification method for multiple images based on zero watermark technology Download PDF

Info

Publication number
CN112800395A
CN112800395A CN202110110707.8A CN202110110707A CN112800395A CN 112800395 A CN112800395 A CN 112800395A CN 202110110707 A CN202110110707 A CN 202110110707A CN 112800395 A CN112800395 A CN 112800395A
Authority
CN
China
Prior art keywords
image
images
scrambled
matrix
scrambling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110110707.8A
Other languages
Chinese (zh)
Other versions
CN112800395B (en
Inventor
王为申
王保卫
赵鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Information Science and Technology
Original Assignee
Nanjing University of Information Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Information Science and Technology filed Critical Nanjing University of Information Science and Technology
Priority to CN202110110707.8A priority Critical patent/CN112800395B/en
Publication of CN112800395A publication Critical patent/CN112800395A/en
Application granted granted Critical
Publication of CN112800395B publication Critical patent/CN112800395B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a copyright authentication method for a plurality of images based on a zero watermark technology, which comprises the following steps: processing a plurality of images to be protected to fuse the images into one image; determining an effective area of the fused image, and extracting features in the effective area to obtain a feature image; and respectively scrambling and encrypting the characteristic image and the identification image, and carrying out XOR operation on the scrambled characteristic image and the scrambled identification image to obtain a zero watermark image. A copyright verification method for a plurality of images based on a zero watermark technology comprises the following steps: and performing exclusive OR operation on the scrambled characteristic image and the zero watermark image to obtain a scrambled identification image, then performing scrambling and decryption to obtain an identification image, and verifying and comparing the identification image with the original identification image. The method can protect the copyright of a plurality of images more efficiently and safely, effectively reduce the time and the storage cost in the copyright protection process, and has higher practical value.

Description

Copyright authentication and verification method for multiple images based on zero watermark technology
Technical Field
The invention belongs to the technical field of digital multimedia anti-counterfeiting and information security protection, and particularly relates to a method for authenticating and verifying copyright of a plurality of images based on a zero watermark technology.
Background
With the rapid development of the internet, computer and mobile communication technologies, people can upload or download multimedia information (images, videos, texts, audio, etc.) more conveniently and quickly. However, the rapidly developed technology brings convenience to people, and also brings information security problems such as easy copying and stealing of multimedia information to people. In recent years, the problem of security protection of multimedia information is solved to a certain extent by the rapid development of digital watermarking technology, the traditional embedded watermarking technology is the most widely applied image copyright protection technology in recent years, but as the watermark information is embedded into an original image, the data of the image is necessarily modified, so that the quality of the image is influenced.
At present, most of zero watermark algorithms perform copyright protection on a single image, and when large-scale image sets are subjected to copyright protection, repeated operation not only consumes a large amount of time, but also copyright storage evidence occupies a large amount of storage space. Therefore, how to reduce the time and storage cost in copyright protection will become a research focus in the future. In 2016, shore macros et al propose a robust zero-watermark scheme based on orthogonal fourier mellin moment and chaotic mapping, which can realize copyright protection for two images at the same time. Firstly, two images are respectively used as a real part and an imaginary part of a complex number, so that a 'two-channel structure' is combined into a 'single-channel structure', then a characteristic invariant obtained by orthogonal Fourier mellin moments is calculated, and a binary characteristic image is constructed by utilizing the characteristic invariant. And finally, scrambling the watermark image and the characteristic image together by using chaotic mapping to generate a verification image. However, this method maps images to complex fields, so that only two images can be processed simultaneously, and the algorithm may be difficult to cope with malicious attacks such as translation, mirror image, and joint attack. In 2019, summer, autumn and the like propose a scheme for protecting the copyright of three CT images based on quaternion polar harmonic Fourier moments, the scheme is that the three CT images are firstly mapped into three imaginary parts of pure quaternion, so that a three-channel structure is combined into a single-channel structure, the quaternion polar harmonic Fourier moments are calculated, then binary feature images are constructed by using the amplitude of the quaternion polar harmonic Fourier moments, and finally the feature images are chaotic scrambled and are subjected to exclusive or operation with watermark images to generate key images.
In summary, although the current zero-watermarking algorithms for multiple images can map multiple images to a complex field, thereby implementing copyright protection for two or three images at the same time, these algorithms lack flexibility, that is, a reasonable image copyright protection scheme and the number of images to be protected at one time cannot be flexibly determined according to the number of large-scale image sets, and copyright protection cannot be performed on all images in the large-scale image sets.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method for authenticating and verifying the copyright of a plurality of images based on a zero-watermark technique, aiming at the defects of the prior art.
In order to realize the technical purpose, the following technical scheme is adopted:
a copyright authentication method for a plurality of images based on a zero watermark technology comprises the following steps:
step S1: processing a plurality of images to be protected to fuse the images into a fused image;
step S2: determining an effective area of the fused image, and extracting features in the effective area to obtain a feature image;
step S3: and respectively scrambling and encrypting the characteristic image and the identification image, and carrying out XOR operation on the scrambled characteristic image and the scrambled identification image to obtain a zero watermark image.
In order to optimize the technical scheme, the specific measures adopted further comprise:
further, step S1 is specifically:
s11: carrying out X-axis direction shearing normalization, Y-axis direction shearing normalization, scaling normalization and translation normalization on the multiple images by using an image normalization method to obtain corresponding standard images;
s12: fusing a plurality of standard images into a fused image by utilizing a gray-scale weighted average image fusion method, wherein the fusion formula is as follows:
ImF=α1*Im12*Im2+…+αi*Imi
α1=α2=…=αi α12+…+αi=1 i∈N+
wherein: im is1,Im2,...,ImiRepresenting a plurality of images to be fused, ImFRepresenting the image obtained by fusing a plurality of images, and i represents the number of the plurality of images to be fused.
Further, step S2 is specifically:
s21: extracting an effective region with a fixed size according to the centroid of the fused image;
s22: performing lifting wavelet transformation on the effective region to obtain a low-frequency component matrix of image signals in the effective region, decomposing the low-frequency component matrix into a plurality of sub-matrix blocks A with fixed sizes, performing QR decomposition on each sub-matrix block A to obtain an orthogonal matrix Q and an upper triangular matrix R,
the low-frequency component matrix A is decomposed by the following formula: a ═ QR
Wherein: q is an orthogonal matrix, and R is an upper triangular matrix;
s23: and calculating the mean value of matrix elements formed by 2-norm of the first row vector of the upper triangular matrix R, if the element value is larger than or equal to the mean value, taking 1, otherwise, taking 0, thereby obtaining the binary characteristic image.
Further, in step S3, the scrambling procedure is: scrambling and encrypting and decrypting the characteristic image and the identification image by utilizing Cat mapping according to the key K,
the encryption formula is:
Figure BDA0002919235280000031
wherein: (x)n,yn) Coordinates representing pixels of the original grayscale image, (x)n+1,yn+1) Representing the transformed pixel coordinates, a and b are scrambling parameters, N represents the number of current transformations, mod () is the modulo operation, and N is the order of the image. The scrambling parameter and the number of transformations constitute a key K.
A copyright verification method for multiple images based on zero watermark technology comprises the steps of scrambling and encrypting a characteristic image by utilizing Cat mapping according to a secret key K to obtain a scrambled characteristic image, carrying out exclusive inversion or operation on the scrambled characteristic image and a zero watermark image to obtain a scrambled identification image, then scrambling and decrypting according to the secret key K to obtain an identification image, carrying out similarity comparison on the identification image and an original identification image to obtain a similarity coefficient, and when the similarity coefficient is larger than a set threshold value, judging that copyright verification is correct, otherwise, failing;
the scrambled identification image decryption formula is as follows:
Figure BDA0002919235280000032
the invention has the beneficial effects that:
the invention relates to a copyright authentication and verification method for a plurality of images based on a zero watermark technology, which can fuse a plurality of images into one image by using a gray-scale weighted average image fusion method, so that only one fused image needs to be subjected to operations such as feature extraction and the like, thereby effectively reducing the time and storage cost brought by repeated operation on a single image in copyright protection.
The method and the device have the advantages that multiple images are converted into standard images by using an image normalization technology, and the LWT-QR decomposition is used for feature extraction, compared with a zero watermark algorithm of a single image, the method and the device have higher robustness in coping with image attack, meanwhile, the method and the device for feature extraction by using a multiple-image fusion method and the LWT-QR decomposition can effectively save the operation time of the algorithm, protect the copyrights of the multiple images more efficiently and safely, effectively reduce the time and the storage cost in the copyright protection process, and have higher practical value.
Drawings
Fig. 1 is a flowchart of a copyright authentication method of the present invention.
Fig. 2 is a schematic flow chart of the copyright authentication algorithm of the present invention.
Fig. 3 is a schematic flow chart of the copyright verification algorithm of the present invention.
Fig. 4 is a graph comparing robustness of different aspects of the invention.
FIG. 5 is a comparison graph of run times for different aspects of the present invention.
Fig. 6 is a graph comparing the robustness of different aspects of the present invention.
Detailed Description
Embodiments of the present invention are described in further detail below with reference to the accompanying drawings.
Firstly, respectively normalizing a plurality of images into corresponding standard images, fusing the plurality of standard images into one image by using a gray-scale weighted average image fusion method, then performing feature extraction on an effective region of the fused image by using LWT-QR decomposition, scrambling the feature images and the identification images by using Cat mapping, and performing XOR operation on the scrambled feature images and the identification images to obtain a key-zero watermark image for copyright authentication and verification. Therefore, the problems of time and storage cost caused by repeated operation of a single image zero-watermarking algorithm during large-scale image set copyright protection are solved, and the problems that the conventional multi-image zero-watermarking algorithm is lack of flexibility and cannot perform copyright protection on all images in an image set are solved.
The method comprises two stages of copyright authentication and copyright verification, which are respectively explained with reference to fig. 1 and fig. 2.
As shown in fig. 1, the present invention is a method for authenticating copyright of multiple images based on zero watermark technology, comprising the following steps:
step S1: and carrying out image processing on the plurality of images to be protected, and fusing the images into one image.
Step S1 specifically includes:
s11: and carrying out X-axis direction shearing normalization, Y-axis direction shearing normalization, scaling normalization and translation normalization on the multiple images by using an image normalization method to obtain corresponding standard images.
S12: fusing a plurality of standard images into a fused image by utilizing a gray-scale weighted average image fusion method, wherein the fusion formula is as follows:
ImF=α1*Im12*Im2+…+αi*Imi
α1=α2=…=αi α12+…+αi=1 i∈N+
wherein: im is1,Im2,...,ImiRepresenting a plurality of images to be fused, ImFRepresenting the image obtained by fusing a plurality of images, and i represents the number of the plurality of images to be fused.
Step S2: determining an effective area of the fused image, and extracting features in the effective area to obtain a feature image;
step S2 specifically includes:
s21: and extracting an effective area with a fixed size according to the centroid of the fused image.
S22: performing lifting wavelet transformation on the effective area to obtain a low-frequency component matrix of an image signal in the effective area, decomposing the low-frequency component matrix into a plurality of sub-matrix blocks A with fixed sizes, and performing QR decomposition on each sub-matrix block A to obtain an orthogonal matrix Q and an upper triangular matrix R.
The low-frequency component matrix A is decomposed by the following formula: a ═ QR
Wherein: q is an orthogonal matrix and R is an upper triangular matrix.
S23: and calculating the mean value of matrix elements formed by 2-norm of the first row vector of the upper triangular matrix R, if the element value is larger than or equal to the mean value, taking 1, otherwise, taking 0, thereby obtaining the binary characteristic image.
Step S3: and respectively scrambling and encrypting the characteristic image and the identification image, and carrying out XOR operation on the scrambled characteristic image and the scrambled identification image to obtain a zero watermark image.
The scrambling encryption process comprises the following steps: and scrambling and encrypting the characteristic image and the identification image by utilizing Cat mapping according to the key K.
The encryption formula is:
Figure BDA0002919235280000051
wherein: (x)n,yn) Coordinates representing pixels of the original grayscale image, (x)n+1,yn+1) Representing the transformed pixel coordinates, a and b are scrambling parameters, N represents the number of current transformations, mod () is the modulo operation, and N is the order of the image. The scrambling parameter and the number of transformations constitute a key K.
Example one
Firstly, four different original images with the size of M multiplied by M are respectively normalized so as to be converted into standard images, and then the four standard images are fused by utilizing a gray-scale weighted average image fusion method so as to obtain a fused image containing information of each image. Then extracting an effective region with a fixed size of NxN according to the non-deformation center of the fused image, then performing l-level lifting wavelet transform on the effective region to obtain a low-frequency component matrix, and dividing the low-frequency component matrix into sub-matrix blocks A with a size of nxn, wherein the total number of the sub-matrix blocks A is
Figure BDA0002919235280000052
The ith sub-block is marked as Ai1,2, K, order
Figure BDA0002919235280000053
Then for each sub-matrix block AiQR decomposition is carried out, and each sub-matrix block A is calculatediThe 2-norm of the first row vector of the R matrix of (a) constitutes a matrix B of size k x k. And then, calculating the average value ave of the elements in the matrix B, taking ave as a basis for generating the characteristic image, and if the value of the elements in the matrix B is greater than or equal to the average value ave, taking 1, and if the value of the elements in the matrix B is less than the average value ave, taking 0, so as to generate the corresponding characteristic image F.
And finally, scrambling the characteristic image F and the identification image W by utilizing Cat mapping, wherein scrambling parameters are used as a key K during copyright verification and are stored by a copyright owner, and thenAnd then carrying out XOR operation on the scrambled feature image F 'and the scrambled identification image W', wherein the formula of the XOR operation is as follows:
Figure BDA0002919235280000054
and meanwhile, the zero watermark image omega is stored to a third-party trusted authority to be used as a basis for copyright verification.
A copyright verification method for a plurality of images based on a zero watermark technology specifically comprises the following steps: scrambling and encrypting the characteristic image by utilizing Cat mapping according to a secret key K to obtain a scrambled characteristic image, carrying out exclusive OR operation on the scrambled characteristic image and a zero watermark image to obtain a scrambled identification image, then scrambling and decrypting according to the secret key K to obtain an identification image, carrying out similarity comparison on the identification image and an original identification image to obtain a similarity coefficient, and when the similarity coefficient is greater than a set threshold value, determining that the copyright verification is correct, otherwise, failing;
the scrambled identification image decryption formula is as follows:
Figure BDA0002919235280000061
example two
In the process of copyright verification, a copyright owner needs to provide a secret key K and an identification image to prove the ownership of the image. As can be seen from fig. 1 and 2, the feature extraction step for verification is the same as the authentication part, and therefore, the description is omitted here, and only different parts are specifically described below.
Scrambling the generated characteristic image F by utilizing Cat mapping according to the key K, and carrying out exclusive OR operation on the scrambled characteristic image F 'and a zero watermark image omega stored by a trusted third party organization to obtain a scrambled identification image W', wherein the exclusive OR operation formula is as follows:
Figure BDA0002919235280000062
and finally, carrying out reverse scrambling on the scrambled identification image W' by using the key K, and recovering the identification image W. And comparing the similarity of the recovered identification image with the identification image stored by the copyright owner to obtain a similarity coefficient, if the similarity coefficient is greater than a set threshold value, the copyright verification is considered, otherwise, the copyright verification fails.
Fig. 4 and 6 show the robustness of the proposed scheme and compare it with the three schemes. The scheme is a copyright protection scheme based on discrete cosine transform, normalization processing is adopted in watermark embedding and extracting processes, and certain malicious signal processing and geometric attack can be resisted; and the second scheme utilizes an image normalization technology to map the image to a geometric invariant space. Then, an important region is extracted from the normalized image. Finally, carrying out XOR operation by using the low-frequency discrete cosine transform coefficient of the important area and the watermark image so as to construct copyright information; and the third scheme is a strong robust zero-watermark algorithm based on non-subsampled Contourlet transform and image normalization. The scheme converts an original image into a standard image by utilizing an invariant moment based image normalization technology. The active area is then subjected to a block-wise non-subsampled Contourlet transform. And carrying out block singular value decomposition on the low-frequency coefficient sub-band obtained by transformation, and generating a zero watermark according to the parity of the highest bit of the maximum singular value of each block. Compared with the other three schemes, the method of the scheme has higher robustness in coping with image attacks, as shown in fig. 4 and 6. Meanwhile, the characteristic extraction by adopting a multi-image fusion method and LWT-QR decomposition can effectively save the running time of the algorithm, as shown in FIG. 5, so that the time cost is lower. From the above chart, the method proposed by the present scheme is an optimal scheme.
The above is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above-mentioned embodiments, and all technical solutions belonging to the idea of the present invention belong to the protection scope of the present invention. It should be noted that modifications and embellishments within the scope of the invention may be made by those skilled in the art without departing from the principle of the invention.

Claims (5)

1. A copyright authentication method for a plurality of images based on a zero watermark technology is characterized by comprising the following steps:
step S1: processing a plurality of images to be protected to fuse the images into a fused image;
step S2: determining an effective area of the fused image, and extracting features in the effective area to obtain a feature image;
step S3: and respectively scrambling and encrypting the characteristic image and the identification image, and carrying out XOR operation on the scrambled characteristic image and the scrambled identification image to obtain a zero watermark image.
2. The method for authenticating the copyright of a plurality of images based on the zero-watermarking technology as claimed in claim 1, wherein: the step S1 specifically includes:
s11: carrying out X-axis direction shearing normalization, Y-axis direction shearing normalization, scaling normalization and translation normalization on the multiple images by using an image normalization method to obtain corresponding standard images;
s12: fusing a plurality of standard images into a fused image by utilizing a gray-scale weighted average image fusion method, wherein the fusion formula is as follows:
ImF=α1*Im12*Im2+…+αi*Imi
α1=α2=…=αi α12+…+αi=1 i∈N+
wherein: im is1,Im2,...,ImiRepresenting a plurality of images to be fused, ImFRepresenting the image obtained by fusing a plurality of images, wherein i represents the number of images to be fused.
3. The method for authenticating the copyright of a plurality of images based on the zero-watermarking technology as claimed in claim 2, wherein: the step S2 specifically includes:
s21: extracting an effective region with a fixed size according to the centroid of the fused image;
s22: performing lifting wavelet transformation on the effective area to obtain a low-frequency component matrix of an image signal in the effective area, decomposing the low-frequency component matrix into a plurality of sub-matrix blocks A with fixed sizes, and performing QR decomposition on each sub-matrix block A to obtain an orthogonal matrix Q and an upper triangular matrix R;
the low-frequency component matrix A is decomposed by the following formula: a ═ QR
Wherein: the size of the orthogonal matrix Q is m multiplied by m, and the size of the upper triangular matrix R is m multiplied by n;
s23: and calculating the mean value of matrix elements formed by 2-norm of the first row vector of the upper triangular matrix R, if the element value is larger than or equal to the mean value, taking 1, otherwise, taking 0, thereby obtaining the binary characteristic image.
4. The method for authenticating copyright of multiple images based on zero-watermarking technology as claimed in claim 3, wherein the scrambling procedure in step S3 is: scrambling and encrypting the characteristic image and the identification image by utilizing Cat mapping according to the key K,
the encryption formula is:
Figure FDA0002919235270000021
wherein: (x)n,yn) Coordinates representing pixels of the original grayscale image, (x)n+1,yn+1) Representing the transformed pixel coordinates, a and b are scrambling parameters, N represents the current number of transformations, mod () is a modulo operation, N is the order of the image, and the scrambling parameters and the number of transformations constitute a key K.
5. A copyright verification method for a plurality of images based on a zero watermark technology is characterized in that: scrambling and encrypting the characteristic image by utilizing Cat mapping according to a secret key K to obtain a scrambled characteristic image, carrying out exclusive OR operation on the scrambled characteristic image and a zero watermark image to obtain a scrambled identification image, then scrambling and decrypting according to the secret key K to obtain an identification image, carrying out similarity comparison on the identification image and an original identification image to obtain a similarity coefficient, and when the similarity coefficient is greater than a set threshold value, determining that the copyright verification is correct, otherwise, failing;
the scrambled identification image decryption formula is as follows:
Figure FDA0002919235270000022
CN202110110707.8A 2021-01-27 2021-01-27 Copyright authentication and verification method for multiple images based on zero watermark technology Active CN112800395B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110110707.8A CN112800395B (en) 2021-01-27 2021-01-27 Copyright authentication and verification method for multiple images based on zero watermark technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110110707.8A CN112800395B (en) 2021-01-27 2021-01-27 Copyright authentication and verification method for multiple images based on zero watermark technology

Publications (2)

Publication Number Publication Date
CN112800395A true CN112800395A (en) 2021-05-14
CN112800395B CN112800395B (en) 2023-04-14

Family

ID=75812091

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110110707.8A Active CN112800395B (en) 2021-01-27 2021-01-27 Copyright authentication and verification method for multiple images based on zero watermark technology

Country Status (1)

Country Link
CN (1) CN112800395B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113658030A (en) * 2021-08-18 2021-11-16 辽宁工程技术大学 Low false alarm zero watermark algorithm based on regional XOR
CN113689319A (en) * 2021-08-04 2021-11-23 南京信息工程大学 Local multiple watermarking method for color image
CN116522289A (en) * 2023-01-17 2023-08-01 山东青橙视联信息科技有限公司 Multi-view image copyright protection method, device and medium based on blockchain

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030058477A1 (en) * 2001-09-25 2003-03-27 Brunk Hugh L. Embedding digital watermarks in spot colors
CN103996165A (en) * 2014-05-30 2014-08-20 东北大学 Digital image zero watermark embedding and extracting method based on compressed sensing characteristics
CN106204411A (en) * 2016-07-15 2016-12-07 兰州交通大学 Vector settlement place Zero watermarking method based on not bending moment and Hilbert code
CN106780278A (en) * 2016-11-25 2017-05-31 陕西师范大学 A kind of combination zero watermarking and the self- recoverage image encryption and decryption method of block sort fusion
CN109727179A (en) * 2018-12-29 2019-05-07 燕山大学 A kind of zero watermarking generation method and system, extracting method and system
CN109859093A (en) * 2019-01-29 2019-06-07 中国民航大学 A kind of mixing transformation area image Zero watermarking method based on variable element chaotic maps
CN109919824A (en) * 2019-03-06 2019-06-21 辽宁师范大学 Color image Zero watermarking method based on the transformation of quick quaternary number CENERALIZED POLAR complex exponential
CN110889798A (en) * 2019-12-11 2020-03-17 中南大学 Robustness zero-watermark method for two-dimensional video frame and depth map right protection in three-dimensional video
CN111784556A (en) * 2020-06-23 2020-10-16 中国平安人寿保险股份有限公司 Method, device, terminal and storage medium for adding digital watermark in image
CN111882477A (en) * 2020-07-28 2020-11-03 辽宁工程技术大学 Self-adaptive zero-watermarking method combining visual password and enhanced singular value decomposition
CN111968025A (en) * 2020-08-19 2020-11-20 海南大学 Bandlelet-DCT-based medical image robust zero watermarking method
CN111968027A (en) * 2020-08-20 2020-11-20 海南大学 Robust color image zero watermarking method based on SURF and DCT features
CN112070648A (en) * 2020-09-04 2020-12-11 上海蓝书信息科技有限公司 Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting device and electronic equipment

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030058477A1 (en) * 2001-09-25 2003-03-27 Brunk Hugh L. Embedding digital watermarks in spot colors
CN103996165A (en) * 2014-05-30 2014-08-20 东北大学 Digital image zero watermark embedding and extracting method based on compressed sensing characteristics
CN106204411A (en) * 2016-07-15 2016-12-07 兰州交通大学 Vector settlement place Zero watermarking method based on not bending moment and Hilbert code
CN106780278A (en) * 2016-11-25 2017-05-31 陕西师范大学 A kind of combination zero watermarking and the self- recoverage image encryption and decryption method of block sort fusion
CN109727179A (en) * 2018-12-29 2019-05-07 燕山大学 A kind of zero watermarking generation method and system, extracting method and system
CN109859093A (en) * 2019-01-29 2019-06-07 中国民航大学 A kind of mixing transformation area image Zero watermarking method based on variable element chaotic maps
CN109919824A (en) * 2019-03-06 2019-06-21 辽宁师范大学 Color image Zero watermarking method based on the transformation of quick quaternary number CENERALIZED POLAR complex exponential
CN110889798A (en) * 2019-12-11 2020-03-17 中南大学 Robustness zero-watermark method for two-dimensional video frame and depth map right protection in three-dimensional video
CN111784556A (en) * 2020-06-23 2020-10-16 中国平安人寿保险股份有限公司 Method, device, terminal and storage medium for adding digital watermark in image
CN111882477A (en) * 2020-07-28 2020-11-03 辽宁工程技术大学 Self-adaptive zero-watermarking method combining visual password and enhanced singular value decomposition
CN111968025A (en) * 2020-08-19 2020-11-20 海南大学 Bandlelet-DCT-based medical image robust zero watermarking method
CN111968027A (en) * 2020-08-20 2020-11-20 海南大学 Robust color image zero watermarking method based on SURF and DCT features
CN112070648A (en) * 2020-09-04 2020-12-11 上海蓝书信息科技有限公司 Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting device and electronic equipment

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
FEIFENG JIANG 等: "Arobust zero-watremarking algorithm for color image based on tensor mode expansion" *
VISHAL CHOUDHARY 等: "Fourier Tansform based Digital Watermarking Scheme for Biometric Images" *
刘西林: "数字图像变换域鲁棒性水印算法研究" *
吕文清: "基于零水印与数字指纹的矢量空间数据版权保护研究" *
姜晓琴 等: "基于不变矩和Hilbert码的矢量居民地零水印算法" *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113689319A (en) * 2021-08-04 2021-11-23 南京信息工程大学 Local multiple watermarking method for color image
CN113658030A (en) * 2021-08-18 2021-11-16 辽宁工程技术大学 Low false alarm zero watermark algorithm based on regional XOR
CN116522289A (en) * 2023-01-17 2023-08-01 山东青橙视联信息科技有限公司 Multi-view image copyright protection method, device and medium based on blockchain
CN116522289B (en) * 2023-01-17 2024-03-08 山东青橙数字科技有限公司 Multi-view image copyright protection method, device and medium based on blockchain

Also Published As

Publication number Publication date
CN112800395B (en) 2023-04-14

Similar Documents

Publication Publication Date Title
CN112800395B (en) Copyright authentication and verification method for multiple images based on zero watermark technology
Haghighi et al. TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique
Elshoura et al. A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments
CN105634732A (en) Ciphertext domain multi-bit reversible information hiding method
CN102208097A (en) Network image copyright real-time distinguishing method
CN107346528B (en) Image tampering detection method based on double-image reversible fragile watermark
Chen et al. TSIA: A novel image authentication scheme for AMBTC-based compressed images using turtle shell based reference matrix
Wang et al. Review on self-embedding fragile watermarking for image authentication and self-recovery
Lazarov et al. A fragile watermarking algorithm for image tamper detection based on chaotic maps
Lin et al. Applying projection and B-spline to image authentication and remedy
CN116503232A (en) Remote sensing image zero watermark processing method based on robust statistical characteristics
Melman et al. Methods for countering attacks on image watermarking schemes: Overview
He et al. Exploring Accurate Invariants on Polar Harmonic Fourier Moments in Polar Coordinates for Robust Image Watermarking
Liu et al. A Survey of Fragile Watermarking-based Image Authentication Techniques.
LV et al. A semi-fragile watermarking scheme for image tamper localization and recovery
Sumalatha et al. Local content based image authentication for tamper localization
Mehta et al. Biometric data security using joint encryption and watermarking
Shakeri et al. A robust zero-watermark copyright protection scheme based on DWT and image normalization
Jun et al. An improved watermarking detect algorithm for color image in spatial domain
CN111968023B (en) Dual-image reversible data hiding method based on EMD matrix
Jothimani et al. Image authentication using global and local features
Pham et al. INVARIANT ZERO-WATERMARKING ALGORITHM IN DWT-DCT DOMAIN USING ROBUST FEATURES MATCHING
Song et al. Digital watermarking technique for digital medical images
Hoang et al. Bit priority-based biometric watermarking
Belhocine et al. Biometric based Copyright Verification in the Era of Digital Piracy: A Promising Solution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant