CN112800395B - Copyright authentication and verification method for multiple images based on zero watermark technology - Google Patents
Copyright authentication and verification method for multiple images based on zero watermark technology Download PDFInfo
- Publication number
- CN112800395B CN112800395B CN202110110707.8A CN202110110707A CN112800395B CN 112800395 B CN112800395 B CN 112800395B CN 202110110707 A CN202110110707 A CN 202110110707A CN 112800395 B CN112800395 B CN 112800395B
- Authority
- CN
- China
- Prior art keywords
- image
- images
- scrambled
- matrix
- scrambling
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000005516 engineering process Methods 0.000 title claims abstract description 22
- 238000012795 verification Methods 0.000 title claims abstract description 19
- 230000008569 process Effects 0.000 claims abstract description 6
- 238000012545 processing Methods 0.000 claims abstract description 6
- 230000004927 fusion Effects 0.000 claims abstract description 4
- 239000011159 matrix material Substances 0.000 claims description 44
- 238000010606 normalization Methods 0.000 claims description 20
- 238000013507 mapping Methods 0.000 claims description 11
- 238000000354 decomposition reaction Methods 0.000 claims description 9
- 238000007500 overflow downdraw method Methods 0.000 claims description 8
- 230000009466 transformation Effects 0.000 claims description 8
- 238000010008 shearing Methods 0.000 claims description 6
- 238000000844 transformation Methods 0.000 claims description 4
- 238000013519 translation Methods 0.000 claims description 4
- 238000000605 extraction Methods 0.000 description 6
- 230000000739 chaotic effect Effects 0.000 description 3
- 230000010485 coping Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention discloses a method for authenticating the copyright of a plurality of images based on a zero watermark technology, which comprises the following steps: processing a plurality of images to be protected to fuse the images into one image; determining an effective area of the fusion image, and extracting features in the effective area to obtain a feature image; and respectively scrambling and encrypting the characteristic image and the identification image, and carrying out XOR operation on the scrambled characteristic image and the scrambled identification image to obtain a zero watermark image. A copyright verification method for a plurality of images based on a zero watermark technology comprises the following steps: and performing exclusive OR operation on the scrambled characteristic image and the zero watermark image to obtain a scrambled identification image, then performing scrambling and decryption to obtain an identification image, and verifying and comparing the identification image with the original identification image. The method can protect the copyright of a plurality of images more efficiently and safely, effectively reduce the time and the storage cost in the copyright protection process, and has higher practical value.
Description
Technical Field
The invention belongs to the technical field of digital multimedia anti-counterfeiting and information security protection, and particularly relates to a method for authenticating and verifying copyright of a plurality of images based on a zero watermark technology.
Background
With the rapid development of the internet, computer and mobile communication technologies, people can upload or download multimedia information (images, videos, texts, audio, etc.) more conveniently and quickly. However, the rapidly developed technology brings convenience to people, and also brings information security problems such as easy copying and stealing of multimedia information to people. In recent years, the problem of security protection of multimedia information is solved to a certain extent by the rapid development of digital watermarking technology, the traditional embedded watermarking technology is the most widely applied image copyright protection technology in recent years, but as the watermark information is embedded into an original image, the data of the image is necessarily modified, so that the quality of the image is influenced.
At present, most of zero watermark algorithms perform copyright protection on a single image, and when large-scale image sets are subjected to copyright protection, repeated operation not only consumes a large amount of time, but also copyright storage evidence occupies a large amount of storage space. Therefore, how to reduce the time and storage cost in copyright protection will become a research focus in the future. In 2016, shore macros et al propose a robust zero-watermark scheme based on orthogonal fourier mellin moment and chaotic mapping, which can realize copyright protection for two images at the same time. Firstly, two images are respectively used as a real part and an imaginary part of a complex number, so that a 'two-channel structure' is combined into a 'single-channel structure', then a characteristic invariant obtained by orthogonal Fourier mellin moments is calculated, and a binary characteristic image is constructed by utilizing the characteristic invariant. And finally, scrambling the watermark image and the characteristic image together by using chaotic mapping to generate a verification image. However, this method maps images to complex fields, so that only two images can be processed simultaneously, and the algorithm may be difficult to cope with malicious attacks such as translation, mirror image, and joint attack. In 2019, summer, autumn and the like propose a scheme for protecting the copyright of three CT images based on quaternion polar harmonic Fourier moments, the scheme is that the three CT images are firstly mapped into three imaginary parts of pure quaternion, so that a three-channel structure is combined into a single-channel structure, the quaternion polar harmonic Fourier moments are calculated, then binary feature images are constructed by using the amplitude of the quaternion polar harmonic Fourier moments, and finally the feature images are chaotic scrambled and are subjected to exclusive or operation with watermark images to generate key images.
In summary, although the current zero-watermarking algorithms for multiple images can map multiple images to a complex field, thereby implementing copyright protection for two or three images at the same time, these algorithms lack flexibility, that is, a reasonable image copyright protection scheme and the number of images to be protected at one time cannot be flexibly determined according to the number of large-scale image sets, and copyright protection cannot be performed on all images in the large-scale image sets.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method for authenticating and verifying the copyright of a plurality of images based on a zero watermark technology, in order to overcome the defects in the prior art.
In order to realize the technical purpose, the following technical scheme is adopted:
a copyright authentication method for a plurality of images based on a zero watermark technology comprises the following steps:
step S1: processing a plurality of images to be protected to fuse the images into a fused image;
step S2: determining an effective area of the fused image, and extracting features in the effective area to obtain a feature image;
and step S3: and respectively scrambling and encrypting the characteristic image and the identification image, and carrying out XOR operation on the scrambled characteristic image and the scrambled identification image to obtain a zero watermark image.
In order to optimize the technical scheme, the specific measures adopted further comprise:
further, step S1 specifically includes:
s11: carrying out X-axis direction shearing normalization, Y-axis direction shearing normalization, scaling normalization and translation normalization on the multiple images by using an image normalization method to obtain corresponding standard images;
s12: fusing a plurality of standard images into a fused image by utilizing a gray-scale weighted average image fusion method, wherein the fusion formula is as follows:
Im F =α 1 *Im 1 +α 2 *Im 2 +…+α i *Im i
α 1 =α 2 =…=α i ,α 1 +α 2 +…+α i =1,i∈N +
wherein: im is 1 ,Im 2 ,...,Im i Representing a plurality of images to be fused, im F Representing the image obtained by fusing a plurality of images, and i represents the number of the plurality of images to be fused.
Further, step S2 specifically includes:
s21: extracting an effective area with a fixed size according to the centroid of the fused image;
s22: performing lifting wavelet transform on the effective region to obtain a low-frequency component matrix of image signals in the effective region, decomposing the low-frequency component matrix into a plurality of sub-matrix blocks A with fixed sizes, performing QR decomposition on each sub-matrix block A to obtain an orthogonal matrix Q and an upper triangular matrix R,
the low-frequency component matrix A is decomposed by the following formula: a = QR
Wherein: q is an orthogonal matrix, and R is an upper triangular matrix;
s23: and calculating the mean value of matrix elements consisting of 2-norm of the first row vector of the upper triangular matrix R, and if the element value is greater than or equal to the mean value, taking 1, otherwise, taking 0, thereby obtaining the binary characteristic image.
Further, the scrambling procedure in step S3 is: scrambling and encrypting and decrypting the characteristic image and the identification image by utilizing Cat mapping according to the key K,
wherein: (x) n ,y n ) Coordinates representing pixels of the original gray-scale image, (x) n+1 ,y n+1 ) Representing transformed pixel coordinates, a and b being scrambling parameters, n representing the current transformationThe number of times mod () is the modulo operation and N is the order of the image. The scrambling parameter and the number of transformations constitute a key K.
A copyright verification method of a plurality of images based on a zero watermark technology comprises the steps of scrambling and encrypting a characteristic image by utilizing Cat mapping according to a secret key K to obtain a scrambled characteristic image, carrying out anti-exclusive OR operation on the scrambled characteristic image and the zero watermark image to obtain a scrambled identification image, then scrambling and decrypting according to the secret key K to obtain an identification image, carrying out similarity comparison on the identification image and an original identification image to obtain a similarity coefficient, and when the similarity coefficient is larger than a set threshold value, considering that copyright verification is correct, otherwise, failing;
the scrambled identification image decryption formula is as follows:
the invention has the beneficial effects that:
the invention relates to a method for authenticating and verifying the copyright of a plurality of images based on a zero watermark technology, which can fuse a plurality of images into one image by using a gray-scale weighted average image fusion method, so that the time and the storage cost brought by repeated operation on a single image in copyright protection can be effectively reduced by only carrying out operations such as feature extraction on one fused image, and meanwhile, a reasonable protection scheme and the number of images protected at one time are determined according to the number of images in a large-scale image set, so that the protection method has certain flexibility, thereby realizing the copyright protection on all the images in the image set, and the effective effect is obvious.
The method and the device have the advantages that multiple images are converted into standard images by using an image normalization technology, and the LWT-QR decomposition is used for feature extraction, compared with a zero watermark algorithm of a single image, the method and the device have higher robustness in coping with image attack, meanwhile, the method and the device for feature extraction by using a multiple-image fusion method and the LWT-QR decomposition can effectively save the operation time of the algorithm, protect the copyrights of the multiple images more efficiently and safely, effectively reduce the time and the storage cost in the copyright protection process, and have higher practical value.
Drawings
Fig. 1 is a flowchart of a copyright authentication method of the present invention.
Fig. 2 is a schematic flow chart of the copyright authentication algorithm of the present invention.
Fig. 3 is a flow chart of the copyright verification algorithm of the present invention.
Fig. 4 is a graph comparing robustness of different aspects of the invention.
FIG. 5 is a comparison graph of run times for different aspects of the present invention.
Fig. 6 is a graph comparing the robustness of different aspects of the invention.
Detailed Description
Embodiments of the present invention are described in further detail below with reference to the accompanying drawings.
Firstly, respectively normalizing a plurality of images into corresponding standard images, fusing the plurality of standard images into one image by using a gray-scale weighted average image fusion method, then performing feature extraction on an effective region of the fused image by using LWT-QR decomposition, scrambling the feature images and the identification images by using Cat mapping, and performing XOR operation on the scrambled feature images and the identification images to obtain a key-zero watermark image for copyright authentication and verification. Therefore, the problems of time and storage cost caused by repeated operation of a single image zero-watermarking algorithm during large-scale image set copyright protection are solved, and the problems that the conventional multi-image zero-watermarking algorithm is lack of flexibility and cannot perform copyright protection on all images in an image set are solved.
The method comprises two stages of copyright authentication and copyright verification, which are respectively explained with reference to fig. 1 and fig. 2.
As shown in fig. 1, the present invention is a method for authenticating copyright of multiple images based on zero watermark technology, comprising the following steps:
step S1: and carrying out image processing on the plurality of images to be protected, and fusing the images into one image.
The step S1 specifically comprises the following steps:
s11: and carrying out X-axis direction shearing normalization, Y-axis direction shearing normalization, scaling normalization and translation normalization on the multiple images by using an image normalization method to obtain corresponding standard images.
S12: fusing a plurality of standard images into a fused image by utilizing a gray-scale weighted average image fusion method, wherein the fusion formula is as follows:
Im F =α 1 *Im 1 +α 2 *Im 2 +…+α i *Im i
α 1 =α 2 =…=α i ,α 1 +α 2 +…+α i =1,i∈N +
wherein: im (c) 1 ,Im 2 ,...,Im i Representing a plurality of images to be fused, im F Representing the image obtained by fusing a plurality of images, and i represents the number of the plurality of images to be fused.
Step S2: determining an effective area of the fused image, and extracting features in the effective area to obtain a feature image;
the step S2 specifically comprises the following steps:
s21: and extracting an effective area with a fixed size according to the centroid of the fused image.
S22: lifting wavelet transformation is carried out on the effective area to obtain a low-frequency component matrix of an image signal in the effective area, the low-frequency component matrix is decomposed into a plurality of sub-matrix blocks A with fixed sizes, and QR decomposition is carried out on each sub-matrix block A to obtain an orthogonal matrix Q and an upper triangular matrix R.
The low-frequency component matrix A is decomposed by the following formula: a = QR
Wherein: q is an orthogonal matrix and R is an upper triangular matrix.
S23: and calculating the mean value of matrix elements formed by 2-norm of the first row vector of the upper triangular matrix R, if the element value is larger than or equal to the mean value, taking 1, otherwise, taking 0, thereby obtaining the binary characteristic image.
And step S3: and respectively scrambling and encrypting the characteristic image and the identification image, and carrying out XOR operation on the scrambled characteristic image and the scrambled identification image to obtain a zero watermark image.
The scrambling encryption process comprises the following steps: and scrambling and encrypting the characteristic image and the identification image by utilizing Cat mapping according to the key K.
wherein: (x) n ,y n ) Coordinates representing pixels of the original grayscale image, (x) n+1 ,y n+1 ) Representing the transformed pixel coordinates, a and b are scrambling parameters, N represents the number of current transformations, mod () is the modulo operation, and N is the order of the image. The scrambling parameter and the number of times of transformation constitute a key K.
Example one
Firstly, four different original images with the size of M multiplied by M are respectively normalized so as to be converted into standard images, and then the four standard images are fused by utilizing a gray-scale weighted average image fusion method so as to obtain a fused image containing information of each image. Then extracting an effective region with a fixed size of NxN according to the non-deformation center of the fused image, then performing l-level lifting wavelet transform on the effective region to obtain a low-frequency component matrix, and dividing the low-frequency component matrix into sub-matrix blocks A with a size of nxn, wherein the total number of the sub-matrix blocks A isThe ith sub-block is marked as A i I =1, 2.., K., order @>
Then for each sub-matrix block A i Performing QR decomposition and calculating each sub-matrix block A i The 2-norm of the first row vector of the R matrix of (a) constitutes a matrix B of size k x k. And then, calculating the average value ave of the elements in the matrix B, taking ave as a basis for generating the characteristic image, and if the value of the elements in the matrix B is greater than or equal to the average value ave, taking 1, and if the value of the elements in the matrix B is less than the average value ave, taking 0, so as to generate the corresponding characteristic image F.
And finally, scrambling the characteristic image F and the identification image W by utilizing Cat mapping, wherein scrambling parameters are used as a key K for copyright verification and are stored by a copyright owner, and then carrying out XOR operation on the scrambled characteristic image F 'and the scrambled identification image W', wherein the formula of the XOR operation is as follows:and meanwhile, the zero watermark image omega is stored to a third-party trusted authority to be used as a basis for copyright verification.
A copyright verification method for a plurality of images based on a zero watermark technology specifically comprises the following steps: according to a secret key K, scrambling and encrypting the characteristic image by utilizing Cat mapping to obtain a scrambled characteristic image, carrying out anti-exclusive OR operation on the scrambled characteristic image and a zero watermark image to obtain a scrambled identification image, then carrying out scrambling and decrypting according to the secret key K to obtain an identification image, carrying out similarity comparison on the identification image and an original identification image to obtain a similarity coefficient, when the similarity coefficient is greater than a set threshold value, determining that the copyright verification is correct, otherwise, failing;
the scrambled identification image decryption formula is as follows:
example two
In the process of copyright verification, a copyright owner needs to provide a secret key K and an identification image to prove the ownership of the image. As can be seen from fig. 1 and 2, the feature extraction step for verification is the same as the authentication part, and therefore, the description is omitted here, and only different parts are specifically described below.
Scrambling the generated characteristic image F by utilizing Cat mapping according to the key K, and carrying out exclusive OR operation on the scrambled characteristic image F 'and a zero watermark image omega stored by a trusted third party organization to obtain a scrambled identification image W', wherein the exclusive OR operation formula is as follows:
and finally, carrying out reverse scrambling on the scrambled identification image W' by using the key K, and recovering the identification image W. And comparing the similarity of the recovered identification image with the identification image stored by the copyright owner to obtain a similarity coefficient, if the similarity coefficient is greater than a set threshold value, the copyright verification is considered, otherwise, the copyright verification fails.
Fig. 4 and 6 show the robustness of the proposed scheme and compare it with the three schemes. The scheme is a copyright protection scheme based on discrete cosine transform, normalization processing is adopted in watermark embedding and extracting processes, and certain malicious signal processing and geometric attack can be resisted; and the second scheme utilizes an image normalization technology to map the image to a geometric invariant space. Then, an important region is extracted from the normalized image. Finally, carrying out exclusive OR operation by using the low-frequency discrete cosine transform coefficient of the important area and the watermark image so as to construct copyright information; and the third scheme is a strong robust zero-watermark algorithm based on non-subsampled Contourlet transform and image normalization. The scheme converts an original image into a standard image by utilizing an invariant moment based image normalization technology. The active area is then subjected to a block-wise non-subsampled Contourlet transform. And carrying out block singular value decomposition on the low-frequency coefficient sub-band obtained by transformation, and generating a zero watermark according to the parity of the highest bit of the maximum singular value of each block. Compared with the other three schemes, the method of the scheme has higher robustness in coping with image attacks, as shown in fig. 4 and 6. Meanwhile, the feature extraction by adopting a multi-image fusion method and LWT-QR decomposition can effectively save the operation time of the algorithm, as shown in FIG. 5, thereby having lower time cost. From the above chart, the method proposed by the present scheme is an optimal scheme.
The above is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above-mentioned embodiments, and all technical solutions belonging to the idea of the present invention belong to the protection scope of the present invention. It should be noted that modifications and embellishments within the scope of the invention may be made by those skilled in the art without departing from the principle of the invention.
Claims (2)
1. A copyright authentication method for a plurality of images based on a zero watermark technology is characterized by comprising the following steps:
step S1: processing a plurality of images to be protected to fuse the images into a fused image; the method specifically comprises the following steps:
s11: carrying out X-axis direction shearing normalization, Y-axis direction shearing normalization, scaling normalization and translation normalization on the multiple images by using an image normalization method to obtain corresponding standard images;
s12: fusing a plurality of standard images into a fused image by utilizing a gray-scale weighted average image fusion method, wherein the fusion formula is as follows:
Im F =α 1 *Im 1 +α 2 *Im 2 +…+α i *Im i
α 1 =α 2 =…=α i ,α 1 +α 2 +…+α i =1,i∈N +
wherein: im (c) 1 ,Im 2 ,...,Im i Representing a plurality of images to be fused, im F Representing an image obtained by fusing a plurality of images, wherein i represents the number of the images to be fused;
step S2: determining an effective area of the fused image, and extracting features in the effective area to obtain a feature image; the method specifically comprises the following steps:
s21: extracting an effective area with a fixed size according to the centroid of the fused image;
s22: performing lifting wavelet transformation on the effective area to obtain a low-frequency component matrix of an image signal in the effective area, decomposing the low-frequency component matrix into a plurality of sub-matrix blocks A with fixed sizes, and performing QR decomposition on each sub-matrix block A to obtain an orthogonal matrix Q and an upper triangular matrix R;
the low-frequency component matrix A is decomposed by the following formula: a = QR
Wherein: the size of the orthogonal matrix Q is m multiplied by m, and the size of the upper triangular matrix R is m multiplied by n;
s23: calculating the mean value of matrix elements consisting of 2-norm of the first row vector of the upper triangular matrix R, if the element value is more than or equal to the mean value, taking 1, otherwise, taking 0, thereby obtaining a binary characteristic image;
and step S3: respectively scrambling and encrypting the characteristic image and the identification image, and carrying out XOR operation on the scrambled characteristic image and the scrambled identification image to obtain a zero watermark image, wherein the scrambling and encrypting process specifically comprises the following steps:
scrambling and encrypting the characteristic image and the identification image by utilizing Cat mapping according to the key K,
wherein: (x) n ,y n ) Coordinates representing pixels of the original grayscale image, (x) n+1 ,y n+1 ) Representing the transformed pixel coordinates, a and b are scrambling parameters, N represents the current number of transformations, mod () is a modulo operation, N is the order of the image, and the scrambling parameters and the number of transformations constitute a key K.
2. A copyright verification method for a plurality of images based on a zero watermark technology is characterized in that: according to a secret key K, scrambling and encrypting the characteristic image by utilizing Cat mapping to obtain a scrambled characteristic image, carrying out anti-exclusive OR operation on the scrambled characteristic image and a zero watermark image to obtain a scrambled identification image, then carrying out scrambling and decrypting according to the secret key K to obtain an identification image, carrying out similarity comparison on the identification image and an original identification image to obtain a similarity coefficient, when the similarity coefficient is greater than a set threshold value, determining that the copyright verification is correct, otherwise, failing;
the zero watermark image is obtained according to a plurality of image copyright authentication methods based on the zero watermark technology in claim 1;
the scrambled identification image decryption formula is as follows:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110110707.8A CN112800395B (en) | 2021-01-27 | 2021-01-27 | Copyright authentication and verification method for multiple images based on zero watermark technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110110707.8A CN112800395B (en) | 2021-01-27 | 2021-01-27 | Copyright authentication and verification method for multiple images based on zero watermark technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112800395A CN112800395A (en) | 2021-05-14 |
CN112800395B true CN112800395B (en) | 2023-04-14 |
Family
ID=75812091
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110110707.8A Active CN112800395B (en) | 2021-01-27 | 2021-01-27 | Copyright authentication and verification method for multiple images based on zero watermark technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112800395B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113689319B (en) * | 2021-08-04 | 2023-06-16 | 南京信息工程大学 | Local multiple watermarking method for color image |
CN113658030A (en) * | 2021-08-18 | 2021-11-16 | 辽宁工程技术大学 | Low false alarm zero watermark algorithm based on regional XOR |
CN116522289B (en) * | 2023-01-17 | 2024-03-08 | 山东青橙数字科技有限公司 | Multi-view image copyright protection method, device and medium based on blockchain |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103996165A (en) * | 2014-05-30 | 2014-08-20 | 东北大学 | Digital image zero watermark embedding and extracting method based on compressed sensing characteristics |
CN106204411A (en) * | 2016-07-15 | 2016-12-07 | 兰州交通大学 | Vector settlement place Zero watermarking method based on not bending moment and Hilbert code |
CN106780278A (en) * | 2016-11-25 | 2017-05-31 | 陕西师范大学 | A kind of combination zero watermarking and the self- recoverage image encryption and decryption method of block sort fusion |
CN109727179A (en) * | 2018-12-29 | 2019-05-07 | 燕山大学 | A kind of zero watermarking generation method and system, extracting method and system |
CN109859093A (en) * | 2019-01-29 | 2019-06-07 | 中国民航大学 | A kind of mixing transformation area image Zero watermarking method based on variable element chaotic maps |
CN109919824A (en) * | 2019-03-06 | 2019-06-21 | 辽宁师范大学 | Color image Zero watermarking method based on the transformation of quick quaternary number CENERALIZED POLAR complex exponential |
CN110889798A (en) * | 2019-12-11 | 2020-03-17 | 中南大学 | Robustness zero-watermark method for two-dimensional video frame and depth map right protection in three-dimensional video |
CN111784556A (en) * | 2020-06-23 | 2020-10-16 | 中国平安人寿保险股份有限公司 | Method, device, terminal and storage medium for adding digital watermark in image |
CN111882477A (en) * | 2020-07-28 | 2020-11-03 | 辽宁工程技术大学 | Self-adaptive zero-watermarking method combining visual password and enhanced singular value decomposition |
CN111968025A (en) * | 2020-08-19 | 2020-11-20 | 海南大学 | Bandlelet-DCT-based medical image robust zero watermarking method |
CN111968027A (en) * | 2020-08-20 | 2020-11-20 | 海南大学 | Robust color image zero watermarking method based on SURF and DCT features |
CN112070648A (en) * | 2020-09-04 | 2020-12-11 | 上海蓝书信息科技有限公司 | Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting device and electronic equipment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6993149B2 (en) * | 2001-09-25 | 2006-01-31 | Digimarc Corporation | Embedding digital watermarks in spot colors |
-
2021
- 2021-01-27 CN CN202110110707.8A patent/CN112800395B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103996165A (en) * | 2014-05-30 | 2014-08-20 | 东北大学 | Digital image zero watermark embedding and extracting method based on compressed sensing characteristics |
CN106204411A (en) * | 2016-07-15 | 2016-12-07 | 兰州交通大学 | Vector settlement place Zero watermarking method based on not bending moment and Hilbert code |
CN106780278A (en) * | 2016-11-25 | 2017-05-31 | 陕西师范大学 | A kind of combination zero watermarking and the self- recoverage image encryption and decryption method of block sort fusion |
CN109727179A (en) * | 2018-12-29 | 2019-05-07 | 燕山大学 | A kind of zero watermarking generation method and system, extracting method and system |
CN109859093A (en) * | 2019-01-29 | 2019-06-07 | 中国民航大学 | A kind of mixing transformation area image Zero watermarking method based on variable element chaotic maps |
CN109919824A (en) * | 2019-03-06 | 2019-06-21 | 辽宁师范大学 | Color image Zero watermarking method based on the transformation of quick quaternary number CENERALIZED POLAR complex exponential |
CN110889798A (en) * | 2019-12-11 | 2020-03-17 | 中南大学 | Robustness zero-watermark method for two-dimensional video frame and depth map right protection in three-dimensional video |
CN111784556A (en) * | 2020-06-23 | 2020-10-16 | 中国平安人寿保险股份有限公司 | Method, device, terminal and storage medium for adding digital watermark in image |
CN111882477A (en) * | 2020-07-28 | 2020-11-03 | 辽宁工程技术大学 | Self-adaptive zero-watermarking method combining visual password and enhanced singular value decomposition |
CN111968025A (en) * | 2020-08-19 | 2020-11-20 | 海南大学 | Bandlelet-DCT-based medical image robust zero watermarking method |
CN111968027A (en) * | 2020-08-20 | 2020-11-20 | 海南大学 | Robust color image zero watermarking method based on SURF and DCT features |
CN112070648A (en) * | 2020-09-04 | 2020-12-11 | 上海蓝书信息科技有限公司 | Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting device and electronic equipment |
Non-Patent Citations (5)
Title |
---|
Feifeng Jiang 等.Arobust zero-watremarking algorithm for color image based on tensor mode expansion.《Multimedia Tools and Applications》.2022,7599-7614. * |
Vishal Choudhary 等.Fourier Tansform based Digital Watermarking Scheme for Biometric Images.《Proceedings of the International Conference on Advances in Electronics, Electronical& Computational Intelligence(ICAEEC)2019》.2020,1-12. * |
刘西林.数字图像变换域鲁棒性水印算法研究.《中国优秀博士学位论文全文数据库 信息科技辑》.2018,(第2期),I138-48. * |
吕文清.基于零水印与数字指纹的矢量空间数据版权保护研究.《中国优秀硕士学位论文全文数据库 基础科学辑》.2019,(第1期), A008-76. * |
姜晓琴 等.基于不变矩和Hilbert码的矢量居民地零水印算法.《测绘科学技术学报》.2017,第33卷(第5期),546-550. * |
Also Published As
Publication number | Publication date |
---|---|
CN112800395A (en) | 2021-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112800395B (en) | Copyright authentication and verification method for multiple images based on zero watermark technology | |
Haghighi et al. | TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique | |
Elshoura et al. | A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments | |
CN105634732A (en) | Ciphertext domain multi-bit reversible information hiding method | |
CN102208097A (en) | Network image copyright real-time distinguishing method | |
CN107346528B (en) | Image tampering detection method based on double-image reversible fragile watermark | |
Hasan et al. | Image authentication based on watermarking approach | |
Chen et al. | TSIA: A novel image authentication scheme for AMBTC-based compressed images using turtle shell based reference matrix | |
Kukreja et al. | Curvelet transform based robust copyright protection scheme for color images using extended visual cryptography | |
Al-Dabbas et al. | Digital Watermarking, Methodology, Techniques, and Attacks: A Review | |
Lazarov et al. | A fragile watermarking algorithm for image tamper detection based on chaotic maps | |
Lin et al. | Applying projection and B-spline to image authentication and remedy | |
CN116503232A (en) | Remote sensing image zero watermark processing method based on robust statistical characteristics | |
Melman et al. | Methods for countering attacks on image watermarking schemes: Overview | |
CN114862646B (en) | Watermark embedding and extracting method and system for vector tile anti-splicing | |
He et al. | Exploring Accurate Invariants on Polar Harmonic Fourier Moments in Polar Coordinates for Robust Image Watermarking | |
Liu et al. | A Survey of Fragile Watermarking-based Image Authentication Techniques. | |
LV et al. | A semi-fragile watermarking scheme for image tamper localization and recovery | |
Sumalatha et al. | Local content based image authentication for tamper localization | |
Mehta et al. | Biometric data security using joint encryption and watermarking | |
Shakeri et al. | A robust zero-watermark copyright protection scheme based on DWT and image normalization | |
Jun et al. | An improved watermarking detect algorithm for color image in spatial domain | |
Sulfi et al. | A Secure Watermarking Based Image Integrity Verification in IoMT | |
CN111968023B (en) | Dual-image reversible data hiding method based on EMD matrix | |
Guo et al. | Security attacks on the wavelet transform and singular value decomposition image watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |