CN115311119A - Three-dimensional image zero watermark embedding and extracting method capable of resisting geometric attack - Google Patents

Three-dimensional image zero watermark embedding and extracting method capable of resisting geometric attack Download PDF

Info

Publication number
CN115311119A
CN115311119A CN202211223860.2A CN202211223860A CN115311119A CN 115311119 A CN115311119 A CN 115311119A CN 202211223860 A CN202211223860 A CN 202211223860A CN 115311119 A CN115311119 A CN 115311119A
Authority
CN
China
Prior art keywords
scrambling
matrix
image
watermark
binary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211223860.2A
Other languages
Chinese (zh)
Other versions
CN115311119B (en
Inventor
韩绍程
张鹏
王博
程争
陈柄桥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Civil Aviation University of China
Original Assignee
Civil Aviation University of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Civil Aviation University of China filed Critical Civil Aviation University of China
Priority to CN202211223860.2A priority Critical patent/CN115311119B/en
Publication of CN115311119A publication Critical patent/CN115311119A/en
Application granted granted Critical
Publication of CN115311119B publication Critical patent/CN115311119B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention provides a geometric attack resistant stereo image zero watermark embedding and extracting method, which comprises the steps of respectively separating R, G and B channels from a left viewpoint and a right viewpoint of an original color stereo image, combining six separated components and regarding the six components as a third-order tensor to carry out Tucker decomposition, and obtaining a first energy diagram containing correlation of the left viewpoint and the right viewpoint and correlation among the R, G and B channels in the left viewpoint and the right viewpoint; then, on the basis of the energy diagram, a binary robust feature matrix is constructed by calculating a fractional Jacobian-Fourier matrix; and finally, carrying out exclusive OR operation on the original copyright watermark subjected to double scrambling and encryption and the feature matrix subjected to redundancy expansion and sequencing scrambling, thereby realizing zero watermark embedding. The method has good robustness for resisting common multiple image processing attacks such as noise addition, filtering, JPEG (joint photographic experts group) compression, shearing, rotation, scaling and translation geometric attack and the like, and has effectiveness and certain practical value.

Description

Three-dimensional image zero watermark embedding and extracting method capable of resisting geometric attack
Technical Field
The embodiment of the invention relates to the technical field of image processing, in particular to a geometric attack resistant three-dimensional image zero watermark embedding and extracting method.
Background
With the rapid development of the internet and the convenient access of digital devices, stereoscopic images may become targets for illegal copying and redistribution by illegal persons. As an effective mechanism for multimedia copyright authentication, digital watermarking technology has been widely studied, which is to embed some secret information (such as a logo, some text or identifier, etc.) in a carrier image, and to perform ownership authentication on an image work by retrieving the information if necessary. However, the embedding of the secret information will inevitably affect the content of the carrier image, resulting in distortion of the image. To solve this problem, a zero-watermark scheme is proposed, which uses the inherent features of the carrier image to construct the watermark, and this process does not modify any image content, so the zero-watermark technique is well suited for copyright protection of images.
At present, the research on the two-dimensional plane image watermarking algorithm is mature, however, the method is not applicable to a stereo image at all, and compared with the two-dimensional plane image, a binocular stereo image consists of a left view point image and a right view point image.
Disclosure of Invention
The embodiment of the invention provides a geometric attack resistant stereo image zero watermark embedding and extracting method, which aims to solve the technical problems of low robustness and poor geometric attack resistance of a stereo image zero watermark technology in the prior art.
The embodiment of the invention provides a geometric attack resistant stereo image zero watermark embedding and extracting method, which comprises the following steps:
embedding a zero watermark in an original color stereo image and extracting the zero watermark from the color stereo image to be authenticated;
the embedding of the zero watermark in the original color stereo image comprises the following steps:
original binary copyright watermark by adopting image scrambling method based on matrix transformationWScrambling is carried out to obtain a watermark image after primary scramblingW 1 Adopting image scrambling method based on complete Latin square to watermark imageW 1 Scrambling again to obtain the watermark image after secondary scramblingW 2 And (3) utilizing a two-dimensional Chebyshev-Singer Map system to perform secondary scrambling on the watermark imageW 2 Chaotic encryption is carried out to obtain a watermark image after double scrambling and encryption processingW E
For original stereo imageISeparating R, G and B channels of the left viewpoint and the right viewpoint respectively, combining the six separated components and constructing a third-order tensorE LR (ii) a To tensorE LR Performing Tucker decomposition to obtain original stereo imageIFirst energy diagram ofE M
For is toE M Non-overlapping blocks are divided and the mean value of each sub-block is calculated, and the mean value of all sub-blocks is constructedE M Mean subgraph ofE MS
Computed mean subgraphE MS And generating mixed low-order moment features thereofV M
For mixed low order moment featuresV M Carrying out binarization according to the mean value to obtain a binary sequenceHFor the binary sequenceHPerforming ascending dimension transformation to obtain a binary transition matrixP 1 For transition matrixP 1 Redundancy and expansion to obtain a binary robust feature matrixT
To binary robust feature matrixTChaotic sequencing scrambling is carried out to obtain a feature matrix after scramblingT S
Watermark image after double scrambling and encryption processingW E And the feature matrix after scramblingT S Executing XOR operation to obtain the final authentication zero watermarkW Z Will beW Z Storing the zero watermark in a watermark database of a registration organization, and storing a secret key in the zero watermark embedding process, namely completing the zero watermark embedding process;
the zero watermark extraction is carried out on the color stereo image to be authenticated, and comprises the following steps:
stereo image to be authenticatedI′Separating R, G and B channels of the left viewpoint and the right viewpoint respectively, combining the six separated components and constructing a third-order tensorE′ LR (ii) a Then to tensorE′ LR Performing Tucker decomposition to obtain a stereo image to be authenticatedI′First energy diagram ofE′ M
For is toE′ M Non-overlapping blocks are divided and the mean value of each sub-block is calculated, then constructed from the mean values of all sub-blocksE′ M Mean subgraphE′ MS
Computed mean subgraphE′ MS And generating mixed low-order moment features thereofV′ M
For mixed low order moment featuresV′ M Carrying out binarization according to the mean value to obtain a binary sequenceH′For the binary sequenceH′Performing ascending dimension transformation to obtain a binary transition matrixP′ 1 To the transition matrixP′ 1 Redundancy and expansion to obtain binary robust feature matrixT′
To binary robust feature matrixT′Chaotic sequencing scrambling is carried out to obtain a feature matrix after scramblingT′ S
Taking out the authentication zero watermark stored in the copyright identification database of the registration authorityW Z And the feature matrix after scramblingT′ S Performing exclusive OR operation to obtain undecrypted binary watermark imageW′ E
For undecrypted watermark imageW′ E Sequentially carrying out chaotic decryption and two successive anti-scrambling operations based on complete Latin square and matrix transformation to extract final watermark informationW', finally according toW' displayed content information to authenticate color stereoscopic image to be authenticatedI′Copyright ownership;
obtaining an original stereo imageIFirst energy diagram ofE M The method comprises the following steps:
one group of the sizes isM×NThe double-viewpoint color stereo imageIThe respective R, G and B channels of the left and right viewpoints are separated, and the separated six components are combined and regarded as a third-order tensorE LR Subjecting it to Tucker decomposition to obtain stereo imageIIt can be expressed as follows,
Figure 100002_DEST_PATH_IMAGE001
in the formulaE LR Representing stereo images in tensor formI
Figure 100002_DEST_PATH_IMAGE003
The tensor of the core is represented as,V (1)V (2)V (3) are 3 in size respectivelyM×MN×NAnd a 6 × 6 factor matrix, the number of which is set
Figure 100002_DEST_PATH_IMAGE004
Is a tensorE LR A sub-tensor of
Figure 100002_DEST_PATH_IMAGE005
Tensor of expression
Figure 100002_DEST_PATH_IMAGE006
To (1)iLayer, then layer 1 subfigure Z 1 Namely a first energy diagram after the Tucker decomposition of the stereo imageE M
The embodiment of the invention provides a method for embedding and extracting a three-dimensional image zero watermark resisting geometric attack, which is characterized in that a first energy diagram of a three-dimensional image is obtained by utilizing Tucker decomposition, so that the energy diagram not only contains the correlation between left and right viewpoints of the three-dimensional image, but also keeps the correlation between R, G and B channels in the two viewpoints, the robustness of a three-dimensional image zero watermark algorithm can be effectively improved, and a zero watermark is constructed by adopting fractional order Jacobi-Fourier matrix low-order mixed matrix characteristics based on the obtained energy diagram, so that the timeliness, the robustness and the geometric attack resistance of the watermark algorithm are ensured.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of an embedding method in a geometric attack resistant stereo image zero watermark embedding and extracting method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an extraction method in a geometric attack resistant stereo image zero watermark embedding and extraction method according to an embodiment of the present invention;
fig. 3 (a) is a schematic diagram of a left viewpoint of an Art stereoscopic image in a method for embedding and extracting a zero watermark in a stereoscopic image for resisting geometric attacks according to an embodiment of the present invention;
fig. 3 (b) is a schematic diagram of a right viewpoint of an Art of a stereo image in a geometric attack resistant stereo image zero watermark embedding and extracting method according to an embodiment of the present invention;
fig. 4 (a) is a left viewpoint image of a stereo image Computer in a method for embedding and extracting a geometric attack-resistant stereo image zero watermark according to an embodiment of the present invention;
fig. 4 (b) is a right viewpoint image of a stereo image Computer in the geometric attack resistant stereo image zero watermark embedding and extracting method according to the embodiment of the present invention;
fig. 5 (a) is a schematic left viewpoint diagram of stereo images Flowers in a geometric attack resistant stereo image zero watermark embedding and extracting method according to an embodiment of the present invention;
fig. 5 (b) is a schematic diagram of a right viewpoint of stereo images Flowers in a geometric attack resistant stereo image zero watermark embedding and extracting method according to an embodiment of the present invention;
fig. 6 (a) is a schematic diagram of a left viewpoint of a stereo image Hoops in a geometric attack resistant stereo image zero watermark embedding and extracting method according to an embodiment of the present invention;
fig. 6 (b) is a schematic diagram of a stereo image Hoops right viewpoint in a geometric attack resistant stereo image zero watermark embedding and extracting method according to an embodiment of the present invention;
fig. 7 is a schematic diagram of an original binary copyright watermark image in a geometric attack resistant stereo image zero watermark embedding and extracting method according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flowchart of an embedding method in a geometric attack resistant stereo image zero watermark embedding and extracting method according to an embodiment of the present invention, and fig. 2 is a schematic flowchart of an extracting method in a geometric attack resistant stereo image zero watermark embedding and extracting method according to an embodiment of the present invention. The embodiment can be applied to the condition of performing copyright protection on the color stereo image by using the zero watermark.
As shown in fig. 1, the embedding method in the geometric attack resistant stereo image zero watermark embedding and extracting method provided in this embodiment specifically includes the following steps:
s110, adopting an image scrambling method based on matrix transformation to carry out original binary copyright watermarkingWScrambling is carried out to obtain a watermark image after primary scramblingW 1 Adopting image scrambling method based on complete Latin square to watermark imageW 1 Scrambling again to obtain the watermark image after secondary scramblingW 2 Performing chaotic encryption on the image subjected to secondary scrambling by using a two-dimensional Chebyshev-Singer Map system to obtain a watermark image subjected to double scrambling and encryption processingW E
Firstly, the original binary copyright watermark is scrambled by adopting an image scrambling method based on matrix transformationWScrambling is carried out to obtain a watermark image after primary scramblingW 1
Fig. 7 is a schematic diagram of an original binary watermark image in a geometric attack resistant stereo image zero watermark embedding and extracting method according to an embodiment of the present invention, and the size of the original binary watermark image in fig. 7 isN W ×N W Original binary copyright watermarkWAnd scrambling by adopting an image scrambling method based on matrix transformation. Specifically, the matrix transformation formula is as follows:
Figure 100002_DEST_PATH_IMAGE007
wherein, the first and the second end of the pipe are connected with each other,Arepresents a scrambling matrix and satisfies det: (A)=±1,
Figure 100002_DEST_PATH_IMAGE008
N W For watermarking an image of an original copyrightWThe size of (a); (x,y) And (a)x′,y′) Respectively representing the coordinates of the original copyright watermark image pixel before and after matrix transformation,effor controlling the parameters, the number of iterations in the process and the control parameters are determinedefStored as the Key 1. The original binary image containing the copyright information may adopt a pattern as shown in fig. 7, or may be flexibly set according to actual needs, which is not limited in the embodiment of the present invention.
Then, an image scrambling method based on a complete Latin square is adopted to scramble the watermark image after the first scramblingW 1 Scrambling again to obtain the watermark image after secondary scramblingW 2
Specifically, firstly, one is constructedN W Order-complete Latin square matrixC 1 Then will beC 1 And a isN W Adding the order all-1 matrix to obtain a matrixC 2 Then the matrix is dividedC 2 Expanding the rows and columns to construct a structure containingN W 2 Scrambling matrix of mutually different ordered pairs of numbersSThen the matrixSNamely a scrambling matrix; matrix arraySAll of the elements in (1) are matricesC 2 In adjacent rows and columns, and a matrixSThe last row of elements of (2) use the matrixC 2 Expanding and filling corresponding elements in the last row; finally, a scrambling matrix is utilizedSThe provided position information is used for the watermark image after one-time scramblingW 1 Carrying out pixel position scrambling to obtain a watermark image after secondary scramblingW 2 . Wherein the scrambling matrix in the scrambling processSAnd the scrambling number are used together as the Key 2. For ease of understanding, the process of constructing the scrambling matrix from a 4 th order perfect Latin square is given below:
Figure 100002_DEST_PATH_IMAGE009
the two modes are adopted to carry out scrambling twice in sequence, so that the original watermark image can be addedWThe complexity of the preprocessing is used for enhancing the safety of the whole watermarking algorithm and simultaneously leading the original watermarking image to beWThe scrambled 0 or 1 pixels are distributed more uniformly and chaotic, so that a better scrambling effect is achieved, and the robustness of the watermark can be greatly improved.
Performing chaotic encryption on the image subjected to twice scrambling by using a two-dimensional Chebyshev-Singer Map system to obtain a watermark image subjected to double scrambling and encryption processingW E The method comprises the following steps:
generating the length of 2 by using a newly constructed chaotic Map, namely a two-dimensional Chebyshev-Singer MapN W ×N W Random sequence of (2)Y 1 (ii) a Then cutting the half segment length intoN W ×N W Is binarized according to the sequence mean value of the random sequence and is subjected to dimension increasing to obtain the value ofN W ×N W Of the two-dimensional chaotic matrixD(ii) a The watermark image after double scramblingW 2 And chaos matrixDExecuting XOR operation to obtain final preprocessed watermark imageW E
The two-dimensional Chebyshev-Singer Map system model is as follows:
Figure 100002_DEST_PATH_IMAGE010
wherein, the first and the second end of the pipe are connected with each other,abcanddthe parameters are fixed for the system and,τandμfor the system control parameters, the fixed parameters and control parameters of the system may be constants. The parameters can be used as a Key together and recorded as a Key Key3, so that the later authentication is convenient to use.
S120, aiming at the original stereo imageISeparating R, G and B channels of the left viewpoint and the right viewpoint respectively, combining the six separated components and constructing a third-order tensorE LR (ii) a To tensorE LR Performing Tucker decomposition to obtain original stereo imageIFirst energy diagram ofE M
Illustratively, a group may be sized asM×NThe dual-viewpoint color stereo imageIThe respective R, G and B components of the left and right viewpoints are combined and regarded as a third order tensorE LR, Subjecting it to Tucker decomposition to obtain stereo imageICan be expressed as follows:
Figure 100002_DEST_PATH_IMAGE011
in the formula:E LR representing stereo images in tensor formI
Figure DEST_PATH_IMAGE003A
Representing a core tensor;V (1)V (2)V (3) are 3 in size respectivelyM×MN×NAnd a 6 x 6 factor matrix. Hypothesis tensor
Figure 100002_DEST_PATH_IMAGE012
Is tensorE LR A sub-tensor of, and
Figure 100002_DEST_PATH_IMAGE013
tensor of expression
Figure 100002_DEST_PATH_IMAGE014
To (1) aiFirst energy diagram after Tucker decomposition of layer and stereo imageE M Is a tensor of a sub-tensor
Figure 392620DEST_PATH_IMAGE014
Layer 1 sub-diagram ofZ 1Z 1 The method not only contains most energy of an original stereo image, but also contains the correlation between the left and right viewpoints and the correlation between the respective R, G and B channels in the left and right viewpoints.
The method can obtain the original stereo imageIAlso contains the correlation between the left and right viewpoints and the first energy diagram of the correlation between the R, G and B channels in the left and right viewpointsE M That is to say
Figure 513023DEST_PATH_IMAGE014
Layer 1 sub-diagram ofZ 1 For subsequent calculation, thereby realizing the construction of the subsequent robust feature matrix.
S130, pairE M Non-overlapping blocks are divided and the mean value of each sub-block is calculated and then constructed from the mean values of all sub-blocksE M Mean subgraph ofE MS
The traditional mode for calculating the moment features of the image is to directly calculate the obtained image, but the mode is operatedThe amount is large. Therefore, in the present embodiment, the image obtained by the preceding pair is usedE M Blocking and calculating a mean value, and then constructing by using the mean valueE M Mean subgraph ofE MS And finally calculateE MS Of the image moment of (c). By using the method, the computational complexity in the process of extracting the robust features can be reduced on the premise of not reducing the robustness of the moment features of the image, and the mean features can represent the original image and have certain stability, so that the robustness of a watermark algorithm cannot be reduced.
S140, calculating a mean value subgraphE MS And generating a hybrid low-order moment feature thereofV M
The calculated mean subgraphE MS And generating mixed low-order moment features thereofV M The method of (a), may include: sub-plot of meanE MS Converting into polar coordinate to obtain polar coordinate image
Figure 100002_DEST_PATH_IMAGE016
. Is calculated according to the following formula
Figure DEST_PATH_IMAGE016A
Fractional Jacobian-Fourier moments ofF nm
Figure DEST_PATH_IMAGE017
In the formula, the score parameterα∈R + (ii) a Order of the ordernE is N; the repetition degree m belongs to Z; parameter(s)p,qBelongs to R and satisfiesp-q>-1,q>0; radial basis functionJ n (α,p,q,r) Can be expressed as
Figure 100002_DEST_PATH_IMAGE018
Figure DEST_PATH_IMAGE019
In order to be a function of the weight,
Figure 100002_DEST_PATH_IMAGE020
in order to be a normalization constant, the method comprises the following steps of,
Figure DEST_PATH_IMAGE021
is a fractional order Jacobi polynomial,
Figure 100002_DEST_PATH_IMAGE023
is a gamma function.
ByF nm Generating hybrid low-order moment featuresV M The method is realized by the following steps:
Figure 100002_DEST_PATH_IMAGE024
Figure DEST_PATH_IMAGE025
wherein the content of the first and second substances,nrepresents the order;mrepresents the degree of repetition;N W representing the watermark image size; fractional parameterαE {0.25,0.5,1,2,4}, symbol \8968; \ 8969h, meaning rounding up.
Will have different score parameters (a), (b)αThe low-order moments of e 0.25,0.5,1,2, 4) are combined into a mixed set of feature vectors, rather than treating them as single features. Since the fractional order parameters are related to the time domain nature of the fractional order Jacobian-Fourier basis functions, combining these moments can make the features more discriminative. In addition, only low-order moments (namely low-frequency information) of the image are adopted, so that the feature robustness is ensured, meanwhile, the calculation consumption is reduced, and the timeliness of the algorithm is improved.
S150, to the mixed low-order moment characteristicsV M Carrying out binarization according to the mean value to obtain a binary sequenceHThen for the binary sequenceHPerforming ascending dimension transformation to obtain a binary transition matrixP 1 To the transition matrixP 1 Redundancy and expansion to obtain a binary robust feature matrixT
The binarizing the mixed low-order moment features VM according to the mean value thereof to obtain a binary sequence H, and then performing dimension-increasing transformation on the binary sequence H to obtain a binary transition matrix P1, which may include:
for mixed low order moment featuresV M Carrying out binarization according to the mean value to obtain a binary sequence
Figure 100002_DEST_PATH_IMAGE026
For the binary sequenceHPerforming dimension-increasing transformation to obtain a binary transition matrix
Figure DEST_PATH_IMAGE027
Wherein the content of the first and second substances,
Figure 100002_DEST_PATH_IMAGE028
threshold value
Figure DEST_PATH_IMAGE029
N W Representing the original copyright watermark image size.
The pair of transition matricesP 1 Redundancy and expansion to obtain a binary robust feature matrixTThe method can be realized by the following steps:
for transition matrixP 1 Redundant to get matrix
Figure DEST_PATH_IMAGE031
Will matrixP 2 Are divided into 4 area blocks of upper left, upper right, lower left and lower right, which are respectively marked asB 1B 2B 3 AndB 4 respectively using
Figure DEST_PATH_IMAGE033
Replacement ofB 1B 2B 3B 4 0 elements in the region block, respectively
Figure DEST_PATH_IMAGE035
Replacement ofB 1B 2B 3B 4 1 element in the area block, and the expanded matrix is a binary robust feature matrixT
Due to the calculation of the mixed low-order moment characteristicsV M Is a one-dimensional numerical sequence with stable geometric invariance, and is binarized according to the mean value and subjected to dimension increasing so as to obtain a matrix with elements of 0 or 1 onlyP 1 To facilitate the generation of a watermark matrix in conjunction with the above stepsW E And carrying out exclusive or operation. But whenN W =Calculated at 64 hoursP 1 Is a binary matrix with size of 16 × 16, in order to improve the original watermarkWThe embedding capacity of (64 × 64), so thatP 1 Performing redundancy and expansion to obtain 16 × 16P 1 Two-value robust characteristic matrix expanded to 64 x 64TTo fit the embedding capacity of the original watermark.
S160, for the binary robust feature matrixTChaotic sequencing scrambling is carried out to obtain a feature matrix after scramblingT S
Illustratively, the feature matrix may be first constructedTScanning in-line vectors by zigzagT 1 And then generating the length of the Key into the length of the Key based on a Key4 by utilizing a two-dimensional Chebyshev-Singer Map systemN W ×N W Random sequence of (2)Y 2 (ii) a Then pair the sequencesY 2 Sorting in ascending order, and recording the sorted position index asU(ii) a Finally based on the indexUTo row vectorT 1 Reordering, and performing zigzag inverse scanning on the reordered result to obtain a scrambled characteristic matrixT S Here, a random sequence will be generatedY 2 The used related two-dimensional Chebyshev-Singer Map system parameter different from the Key Key3 is marked as a Key Key4.
S170, double scrambling and encrypting the processed watermark imageW E And the feature matrix after scramblingT S Performing exclusive OR (XOR) operation to obtain the final authentication zero watermarkW Z Will beW Z Storing in the watermark database of the registration organization, and embedding the zero watermarkAnd simultaneously storing the related keys in the process.
Figure DEST_PATH_IMAGE036
Through the steps, the final authentication zero watermark image is obtainedW Z And related keys Key1, key2, key3 and Key4 used in the zero watermark embedding process are used for finally verifying the copyright of the stereoscopic image to be authenticated.
In addition, the embodiment also provides an extraction method in the method for embedding and extracting the zero watermark of the stereo image for resisting the geometric attack, as shown in fig. 2, the method specifically includes the following steps:
s210, stereo image to be authenticatedI′Separating R, G and B channels of the left viewpoint and the right viewpoint respectively, combining the six separated components and constructing a third-order tensorE′ LR (ii) a Then to the tensorE′ LR Performing Tucker decomposition to obtain a stereo image to be authenticatedI′First energy diagram ofE′ M
S220, pairE′ M Non-overlapping blocks are divided and the mean value of each sub-block is calculated and then constructed from the mean values of all sub-blocksE′ M Mean subgraph ofE′ MS
S230, calculating a mean value subgraphE′ MS And generating mixed low-order moment features thereofV M
Generating hybrid low-order moment featuresV′ M The method can be realized in the following way:
Figure DEST_PATH_IMAGE037
Figure DEST_PATH_IMAGE038
wherein the content of the first and second substances,nrepresents an order;mrepresents the degree of repetition;N W representing the watermark image size; fraction parameterNumber ofαE {0.25,0.5,1,2,4}, symbol 8968the symbol 8969l indicates rounding up.
S240, mixing low-order moment characteristicsV′ M Carrying out binarization according to the mean value to obtain a binary sequenceH′Then for the binary sequenceH′Performing ascending dimension transformation to obtain a binary transition matrixP′ 1 For transition matrixP′ 1 Redundancy and expansion to obtain a binary robust feature matrixT′
The pair-blending low order moment featuresV′ M Carrying out binarization according to the mean value to obtain a binary sequenceH′Then for the binary sequenceH′Performing dimension-increasing transformation to obtain a binary transition matrixP′ 1 The method comprises the following steps:
exemplary, for mixed low-order moment featuresV′ M Carrying out binarization according to the mean value to obtain a binary sequence
Figure DEST_PATH_IMAGE039
For the binary sequenceH′Performing ascending dimension transformation to obtain a binary transition matrix
Figure DEST_PATH_IMAGE040
Wherein, the first and the second end of the pipe are connected with each other,
Figure DEST_PATH_IMAGE041
threshold value
Figure DEST_PATH_IMAGE042
N W Representing the original copyright watermark image size.
The pair of transition matricesP′ 1 Redundancy and expansion to obtain a binary robust feature matrixT′The method comprises the following steps:
for transition matrixP′ 1 Redundant to get matrix
Figure DEST_PATH_IMAGE044
Will matrixP′ 2 Are divided into 4 area blocks of upper left, upper right, lower left and lower right, which are respectively marked asB′ 1B′ 2B′ 3 AndB′ 4 respectively using
Figure DEST_PATH_IMAGE046
Replacement ofB′ 1B′ 2B′ 3 AndB′ 4 0 elements in the region block, respectively
Figure DEST_PATH_IMAGE048
Replacement ofB′ 1B′ 2B′ 3 AndB′ 4 obtaining a filled matrix which is a binary robust feature matrix by 1 element in the region blockT′
S250, to the two-value robust feature matrixT′Chaotic sequencing scrambling is carried out to obtain a feature matrix after scramblingT′ S
Illustratively, the feature matrix may be firstT′Scanning in-line vectors by zigzagT′ 1 And then generating the length of the Key into the length of the Key based on a Key4 by utilizing a two-dimensional Chebyshev-Singer Map systemN W ×N W Random sequence of (2)Y′ 2 (ii) a Then to the sequenceY′ 2 Sorting in ascending order, and recording the sorted position index asU′(ii) a Finally based on the indexU′For line vectorT′ 1 Reordering, and performing zigzag inverse scanning on the reordered result to obtain a scrambled feature matrixT′ S
S260, taking out the authentication zero watermark stored in the copyright identification database of the registration authorityW Z And the feature matrix after scramblingT′ S Performing exclusive OR operation to obtain an undecrypted binary watermark imageW′ E,
Figure DEST_PATH_IMAGE049
S270, the undecrypted watermark image is processedW′ E Sequentially carrying out chaotic decryption and based on complete latinThe final watermark information can be extracted by two successive inverse scrambling operations of square and matrix transformationW', finally according toW' displayed content information to authenticate color stereoscopic image to be authenticatedI′The copyright attribution.
Exemplarily, the zero watermark embedding and extracting method for the stereoscopic image with geometric attack resistance provided by the present embodiment can be referred to the original binary watermark image when the zero watermark is embedded in the methodWThe reverse process of the steps of double scrambling and encryption processing is carried out, and the watermark image is orderly processed according to the keys Key3, key2 and Key1
Figure DEST_PATH_IMAGE050
Chaotic decryption and twice anti-scrambling operations are carried out, and the final binary watermark information can be extractedW′
According to the method for embedding and extracting the zero watermark of the stereoscopic image resisting the geometric attack, the first energy diagram of the stereoscopic image with the double view points is obtained through Tucker decomposition, the energy diagram not only contains the correlation between the left view point and the right view point of the stereoscopic image, but also keeps the correlation between the R channel, the G channel and the B channel in the two view points, the zero watermark of the stereoscopic image is constructed based on the energy diagram, and the whole robustness of the algorithm is improved; secondly, a robust binary feature matrix is obtained by using the mixed low-order moment features of the fractional Jacobian-Fourier moments of the first energy graph mean value subgraph, so that the calculation efficiency of the algorithm is guaranteed, and the geometric attack resistance of the algorithm is effectively improved by using the good geometric invariance of the feature moments; meanwhile, a double scrambling method and a newly designed two-dimensional Chebyshev-Singer Map system are adopted to encrypt and scramble the original watermark image and the binary feature matrix, so that the safety of the algorithm is enhanced. The method can be very robust against common multiple image processing attacks such as noise addition, filtering, JPEG compression, shearing, rotation, scaling, translation geometric attack and the like.
The following describes the process and effect of the method for embedding and extracting a zero watermark of a stereoscopic image with geometric attack resistance provided by the invention with reference to specific examples.
In order to verify the effectiveness of the present invention, the simulation experiment uses standard binocular stereo images of middlebury stereos databases, and fig. 3-6 show the Art, computer, flowers and Hoops4 sets of stereo images in the databases, which are 512 × 512 in size. The original binary copyright watermark image is a Logo image with a size of 64 × 64, as shown in fig. 7.
The invention adopts peak signal-to-noise ratio (PSNR) to evaluate the quality of an original image after being attacked, and the PSNR is defined as follows:
Figure DEST_PATH_IMAGE051
wherein the content of the first and second substances,N I ×N I is the size of the original image and is,
Figure DEST_PATH_IMAGE052
represents an original image inx,y) The value of the pixel at the point(s),
Figure DEST_PATH_IMAGE053
represents the image after the attack in (x,y) The pixel value at a point. The lower the PSNR value, the greater the image quality loss after the image is attacked.
The invention adopts a normalized correlation coefficient (NC) to evaluate the finally detected binary watermark imageW' and original binary watermark imageWThe degree of similarity between them, NC is defined as follows:
Figure DEST_PATH_IMAGE054
wherein the content of the first and second substances,N W ×N W the larger the NC value is, the larger the watermark image size is, the extracted binary watermark image is representedW' with original binary watermark imageWThe more similar, the more robust the method is indicated.
Table 1 shows a comparison between a PSNR test value and an NC test value of a stereo image Art under a non-geometric attack in the method for embedding and extracting a geometric attack-resistant stereo image zero watermark provided in the embodiment of the present invention. It can be seen from table 1 that, no matter for asymmetric attack or symmetric attack, after the stereo image Art undergoes several high-strength non-geometric attacks such as noise addition, filtering and JPEG compression, the PSNR value of the image indicates that the visual quality of the image is seriously lost, but the detected watermark is still clearly visible and NC is almost all 1, which indicates that the method has extremely strong robustness for several non-geometric attacks in table 1. Here, the asymmetric attack refers to an attack on only a left viewpoint image of a stereoscopic image, and the symmetric attack refers to an attack on both left and right viewpoint images of a stereoscopic image.
TABLE 1 PSNR value and NC value of stereo image Art under non-geometric attack
Figure DEST_PATH_IMAGE056
Table 2 shows a comparison between a PSNR test value and an NC test value of the stereo image Art under the geometric attack in the geometric attack resistant stereo image zero watermark embedding and extracting method provided in the embodiment of the present invention. It can be seen from table 2 that after the stereo image Art experiences four kinds of geometric attacks, namely, rotation attack at a larger angle, scaling, translation and large-area shearing, the PSNR value of the image shows that the visual quality of the image is seriously lost, but at this time, the extracted watermark NC values are all above 0.98, which shows that the stereo image zero watermark embedding and extracting method for resisting geometric attacks provided by the embodiment of the present invention can effectively resist several kinds of geometric attacks in table 2.
TABLE 2 PSNR and NC values of stereoscopic image Art under geometric attack
Figure DEST_PATH_IMAGE058
Table 3 shows the comparison of the NC values of the robustness test of 4 stereo images under non-geometric attack in the geometric attack resistant stereo image zero watermark embedding and extracting method provided in the embodiment of the present invention; table 4 shows the comparison of the NC values of the robustness test of 4 stereoscopic images under the geometric attack in the method for embedding and extracting a geometric attack resistant stereoscopic image zero watermark provided in the embodiment of the present invention. As can be seen from tables 3 and 4, for different stereo images, no matter symmetric attacks or asymmetric attacks, the stereo image zero watermark embedding and extracting method provided by the embodiment shows superior robustness to common non-geometric attacks and geometric attacks, and further illustrates robustness and universality in terms of attack resistance of the stereo image zero watermark embedding and extracting method for resisting geometric attacks provided by the embodiment of the present invention.
Table 3 comparison of test NC-values of 4 stereo images under non-geometric attack
Figure DEST_PATH_IMAGE060
TABLE 4 test NC value comparison of three-dimensional images under geometric attack
Figure DEST_PATH_IMAGE062
The above-described embodiments should not be construed as limiting the scope of the invention. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A geometric attack resistant stereo image zero watermark embedding and extracting method is characterized by comprising the following steps:
embedding a zero watermark in an original color stereo image and extracting the zero watermark from the color stereo image to be authenticated;
the embedding of the zero watermark in the original color stereo image comprises the following steps:
original binary copyright watermark by adopting image scrambling method based on matrix transformationWScrambling is carried out to obtain a watermark image after primary scramblingW 1 Adopting image scrambling method based on complete Latin square to watermark imageW 1 Performing secondary scrambling to obtain secondary scramblingLater watermark imageW 2 And (3) utilizing a two-dimensional Chebyshev-Singer Map system to perform secondary scrambling on the watermark imageW 2 Chaotic encryption is carried out to obtain a watermark image after double scrambling and encryption processingW E
For original stereo imageISeparating R, G and B channels of the left viewpoint and the right viewpoint respectively, combining the six separated components and constructing a third-order tensorE LR (ii) a To tensorE LR Performing Tucker decomposition to obtain original stereo imageIFirst energy diagram ofE M
For is toE M Non-overlapping blocks are divided and the mean value of each sub-block is calculated, and the mean value of all sub-blocks is constructedE M Mean subgraph ofE MS
Computed mean subgraphE MS And generating mixed low-order moment features thereofV M
For mixed low order moment featuresV M Carrying out binarization according to the mean value to obtain a binary sequenceHThen for the binary sequenceHPerforming ascending dimension transformation to obtain a binary transition matrixP 1 To the transition matrixP 1 Redundancy and expansion to obtain binary robust feature matrixT
For binary robust feature matrixTChaotic sequencing scrambling is carried out to obtain a feature matrix after scramblingT S
Watermark image after double scrambling and encryption processingW E And ordering the scrambled feature matricesT S Executing XOR operation to obtain the final authentication zero watermarkW Z Will beW Z Storing the zero watermark in a watermark database of a registration organization, and storing a secret key in the zero watermark embedding process, namely completing the zero watermark embedding process;
the zero watermark extraction of the color stereo image to be authenticated for legality comprises the following steps:
stereo image to be authenticatedI′Separating R, G and B channels of left and right viewpoints, and separating six separated componentsCombining and constructing a third order tensorE′ LR (ii) a Then to tensorE′ LR Performing Tucker decomposition to obtain a stereo image to be authenticatedI′First energy diagram ofE′ M
To pairE′ M Non-overlapping blocks are divided and the mean value of each sub-block is calculated, then constructed from the mean values of all sub-blocksE′ M Mean subgraph ofE′ MS
Computed mean subgraphE′ MS And generating mixed low-order moment features thereofV′ M
For mixed low order moment featuresV′ M Carrying out binarization according to the mean value to obtain a binary sequenceH′Then for the binary sequenceH′Performing ascending dimension transformation to obtain a binary transition matrixP′ 1 To the transition matrixP′ 1 Redundancy and expansion to obtain a binary robust feature matrixT′
To binary robust feature matrixT′Chaotic sequencing scrambling is carried out to obtain a feature matrix after scramblingT′ S
Taking out the authentication zero watermark stored in the copyright identification database of the registration authorityW Z And the feature matrix after scramblingT′ S Performing exclusive OR operation to obtain an undecrypted binary watermark imageW′ E
For undecrypted watermark imageW′ E Sequentially carrying out chaotic decryption and two successive anti-scrambling operations based on complete Latin square and matrix transformation to extract final watermark informationW', finally according toW' displayed content information to authenticate color stereoscopic image to be authenticatedI′Copyright ownership;
obtaining an original stereo imageIFirst energy diagram ofE M The method comprises the following steps:
one group is sized asM×NThe double-viewpoint color stereo imageIThe respective R, G and B channels of the left viewpoint and the right viewpoint are separated, and the separated six components are combined and regarded as a third-order tensorE LR Subjecting it to Tucker decomposition to obtain stereo imageIIt can be expressed as follows,
Figure DEST_PATH_IMAGE001
in the formulaE LR Representing stereoscopic images in tensor formI
Figure DEST_PATH_IMAGE003
The tensor of the core is represented as,V (1)V (2)V (3) are 3 in size respectivelyM×MN×NAnd a factor matrix of 6 x 6, the number of which is set
Figure DEST_PATH_IMAGE004
Is tensorE LR A sub-tensor of, and
Figure DEST_PATH_IMAGE005
representing a sub-tensor
Figure DEST_PATH_IMAGE006
To (1) aiLayer, then layer 1 subfigure Z 1 Namely a first energy diagram after the Tucker decomposition of the stereo imageE M
2. The method of claim 1, wherein the two-dimensionally Chebyshev-Singer Map system is used to scramble the twice-scrambled watermark imageW 2 Performing chaotic encryption, comprising:
the two-dimensional Chebyshev-Singer Map system is expressed by the following formula:
Figure DEST_PATH_IMAGE007
wherein a, b, c and d are all system fixed parameters,τandμin order to control the parameters of the system,x i andy i is an intermediate variable in the iterative process of the system,x i+1 andy i+1 are respectively asx i Andy i the next state of (a);
two-dimensional Chebyshev-Singer Map system is adopted to generate watermark with original copyright lengthWChaotic random sequence of twice sizeY 1 Intercepting a random sequenceY 1 The second half of the method is carried out binaryzation according to the sequence mean value, and the binaryzation sequence is carried out upscaling transformation to obtain the watermark corresponding to the original copyright watermarkWTwo-dimensional chaotic matrix with the same size, and two-dimensional chaotic matrix and watermark image after secondary scramblingW 2 Executing XOR operation to obtain encrypted watermark imageW E
3. The method of claim 1, wherein the computed mean subgraphE MS And generating a hybrid low-order moment feature thereofV M The method comprises the following steps:
sub-plot of meanE MS Converting into polar coordinate to obtain polar coordinate image
Figure DEST_PATH_IMAGE008
Calculated according to the following formula
Figure 628308DEST_PATH_IMAGE008
Fractional Jacobian-Fourier moments ofF nm
Figure DEST_PATH_IMAGE009
In the formula, the score parameterα∈R + (ii) a Order of the scalenE is N; degree of repetitionmE is Z; parameter(s)p,qBelongs to R and satisfies p-q>-1,q>0; radial basis functionJ n (α,p,q,r) Can be expressed as
Figure DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE011
In order to be a function of the weight,
Figure DEST_PATH_IMAGE012
in order to be a normalization constant, the method comprises the following steps of,
Figure DEST_PATH_IMAGE013
is a fractional order Jacobi polynomial,
Figure DEST_PATH_IMAGE014
is a gamma function;
byF nm Generating hybrid low-order moment featuresV M The method is realized by the following steps:
Figure DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE016
,
wherein the content of the first and second substances,nthe order of the order is represented,mthe degree of repetition is indicated as such,N W representing watermark image size, fractional parameterαE {0.25,0.5,1,2,4}, symbol \8968; \ 8969; indicating rounding up;
the pair of transition matricesP 1 Redundancy and expansion to obtain binary robust feature matrixTThe method comprises the following steps:
for transition matrixP 1 Redundant to get matrix
Figure DEST_PATH_IMAGE018
Will matrixP 2 Are divided into 4 area blocks of upper left, upper right, lower left and lower right, which are respectively marked asB 1B 2B 3 AndB 4 respectively using
Figure DEST_PATH_IMAGE020
Replacement ofB 1B 2B 3B 4 0 elements in the region block, respectively
Figure DEST_PATH_IMAGE022
Replacement ofB 1B 2B 3B 4 1 element in the area block, and the expanded matrix is a binary robust feature matrixT
4. The method of claim 1, wherein the original binary copyright watermark is scrambled using a matrix-based image scrambling methodWScrambling is carried out to obtain a watermark image after primary scramblingW 1, The method comprises the following steps:
watermarking original copyright by matrix transformation formulaWCarrying out first scrambling to obtain the watermark image after the first scramblingW 1 The matrix transformation formula is expressed as:
Figure DEST_PATH_IMAGE023
in the formula (I), the compound is shown in the specification,Arepresents a scrambling matrix and satisfies det: (A)=±1,
Figure DEST_PATH_IMAGE024
N W For watermarking an image of an original copyrightWThe size of (a); (x,y) And (a) and (b)x′,y′) Respectively representing the coordinates of the original copyright watermark image pixel before and after matrix transformation,efare control parameters.
5. The method according to claim 1, wherein the watermark image is scrambled using a complete latin square based image scrambling methodW 1 Scrambling again to obtain the watermark image after secondary scramblingImageW 2 The method comprises the following steps:
structure of the deviceN W Order-complete Latin square matrixC 1 Then the matrix is formedC 1 With one element being all 1N W Adding the order matrix to obtain a matrixC 2
Will matrixC 2 Expanding the rows and columns to construct a structure containingN W 2 Scrambling matrices of mutually different pairs of ordered numbersSUsing scrambling matricesSThe provided position information is used for the watermark image after the primary scramblingW 1 Pixel position scrambling is carried out to obtain a watermark image after secondary scramblingW 2
6. The method of claim 1, wherein the binary robust feature matrixTChaotic sequencing scrambling is carried out to obtain a feature matrix after scramblingT S The method comprises the following steps:
feature matrixTScanning in-line vectors by zigzagT 1 Generating the length and the original watermark by using a two-dimensional Chebyshev-Singer Map systemWRandom sequences of the same sizeY 2 Then to the sequenceY 2 Sorting in ascending order, and recording the sorted position index asUFinally based on the indexUTo row vectorT 1 Reordering, and performing zigzag inverse scanning on the reordered result to obtain a scrambled feature matrixT S
7. The method of claim 1, wherein the pair of transition matricesP′ 1 Redundancy and expansion to obtain binary robust feature matrixT′The method comprises the following steps:
for transition matrixP′ 1 Redundancy to obtain a matrix
Figure DEST_PATH_IMAGE026
Will matrixP′ 2 Are divided into 4 area blocks of upper left, upper right, lower left and lower right respectivelyRecord asB′ 1B′ 2B′ 3 AndB′ 4 respectively using
Figure DEST_PATH_IMAGE028
Replacement ofB′ 1B′ 2B′ 3 AndB′ 4 0 elements in the region block, respectively
Figure DEST_PATH_IMAGE030
Replacement ofB 1B′ 2B′ 3 AndB′ 4 obtaining a filled matrix which is a binary robust feature matrix by 1 element in the region blockT′
8. The method of claim 1, wherein the key comprises:
watermark the original binary imageWControl parameters in matrix-transform scramblingefAnd scrambling times as a Key Key1;
the watermark image after one-time scrambling is to be comparedW 1 Scrambling matrix for perfect Latin-square scramblingSAnd scrambling times as a Key Key2;
the watermark image after the secondary scrambling is adopted by a two-dimensional Chebyshev-Singer Map systemW 2 Chaotic encryption is carried out to generate random sequenceY 1 Fixed system parameters used at the timea,b,c,dAnd control parametersτ、μAs the Key3;
the Chebyshev-Singer Map system is adopted to carry out binary robust feature matrixTAndT′chaotic ordering and scrambling are carried out to generate random sequenceY 2 Fixed system parameters used at the timea,b,c,dAnd control parametersτ、μAs the Key4.
CN202211223860.2A 2022-10-09 2022-10-09 Three-dimensional image zero watermark embedding and extracting method capable of resisting geometric attack Active CN115311119B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211223860.2A CN115311119B (en) 2022-10-09 2022-10-09 Three-dimensional image zero watermark embedding and extracting method capable of resisting geometric attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211223860.2A CN115311119B (en) 2022-10-09 2022-10-09 Three-dimensional image zero watermark embedding and extracting method capable of resisting geometric attack

Publications (2)

Publication Number Publication Date
CN115311119A true CN115311119A (en) 2022-11-08
CN115311119B CN115311119B (en) 2022-12-23

Family

ID=83866486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211223860.2A Active CN115311119B (en) 2022-10-09 2022-10-09 Three-dimensional image zero watermark embedding and extracting method capable of resisting geometric attack

Country Status (1)

Country Link
CN (1) CN115311119B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117217973A (en) * 2023-09-14 2023-12-12 兰州交通大学 Three-dimensional point cloud data watermarking method using Mahalanobis distance and ISS feature points
CN117217976A (en) * 2023-11-09 2023-12-12 中国民航大学 Quaternion domain color image zero watermark processing method based on multi-chaotic system

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102208097A (en) * 2011-05-26 2011-10-05 浙江工商大学 Network image copyright real-time distinguishing method
CN103123719A (en) * 2013-03-11 2013-05-29 九江学院 Zero watermark method for image authentication and tamper localization
CN105263024A (en) * 2015-10-15 2016-01-20 宁波大学 Anti-quantitative-transcoding HEVC video stream zero-watermark registering and detecting method
CN107507122A (en) * 2017-08-22 2017-12-22 吉林大学 Stereo-picture Zero watermarking method based on NSCT and SIFT
CN108898025A (en) * 2018-06-25 2018-11-27 河南大学 New chaotic image encryption method based on dual scramble and DNA encoding
CN109345440A (en) * 2018-09-25 2019-02-15 珠海格力电器股份有限公司 Digital Media watermark handling method, computer equipment and storage medium
CN111882477A (en) * 2020-07-28 2020-11-03 辽宁工程技术大学 Self-adaptive zero-watermarking method combining visual password and enhanced singular value decomposition
CN112381701A (en) * 2020-11-17 2021-02-19 中国民航大学 RST attack resisting stereo image zero watermarking method based on FFST and Hessenberg decomposition
CN113095988A (en) * 2021-03-29 2021-07-09 贵州大学 Dispersion tensor image robust zero watermarking method based on ORC sampling and QGPCE conversion
CN114359012A (en) * 2022-03-21 2022-04-15 中国民航大学 Robust combined domain color image zero watermark embedding and extracting method
CN114742687A (en) * 2022-03-08 2022-07-12 重庆理工大学 Medical image zero watermark generation algorithm based on multi-algorithm fusion
WO2022205853A1 (en) * 2021-03-31 2022-10-06 海南大学 Medical image digital watermarking method based on perceptual hash and data enhancement

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102208097A (en) * 2011-05-26 2011-10-05 浙江工商大学 Network image copyright real-time distinguishing method
CN103123719A (en) * 2013-03-11 2013-05-29 九江学院 Zero watermark method for image authentication and tamper localization
CN105263024A (en) * 2015-10-15 2016-01-20 宁波大学 Anti-quantitative-transcoding HEVC video stream zero-watermark registering and detecting method
US20170109858A1 (en) * 2015-10-15 2017-04-20 Ningbo University Zero-watermarking registration and detection method for HEVC video streaming against requantization transcoding
CN107507122A (en) * 2017-08-22 2017-12-22 吉林大学 Stereo-picture Zero watermarking method based on NSCT and SIFT
CN108898025A (en) * 2018-06-25 2018-11-27 河南大学 New chaotic image encryption method based on dual scramble and DNA encoding
CN109345440A (en) * 2018-09-25 2019-02-15 珠海格力电器股份有限公司 Digital Media watermark handling method, computer equipment and storage medium
CN111882477A (en) * 2020-07-28 2020-11-03 辽宁工程技术大学 Self-adaptive zero-watermarking method combining visual password and enhanced singular value decomposition
CN112381701A (en) * 2020-11-17 2021-02-19 中国民航大学 RST attack resisting stereo image zero watermarking method based on FFST and Hessenberg decomposition
CN113095988A (en) * 2021-03-29 2021-07-09 贵州大学 Dispersion tensor image robust zero watermarking method based on ORC sampling and QGPCE conversion
WO2022205853A1 (en) * 2021-03-31 2022-10-06 海南大学 Medical image digital watermarking method based on perceptual hash and data enhancement
CN114742687A (en) * 2022-03-08 2022-07-12 重庆理工大学 Medical image zero watermark generation algorithm based on multi-algorithm fusion
CN114359012A (en) * 2022-03-21 2022-04-15 中国民航大学 Robust combined domain color image zero watermark embedding and extracting method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
WAFA" HAMDAN ALSHOURA ET AL.: "Hybrid SVD-Based Image Watermarking", 《IEEE》 *
韩邵程等: "基于FFST和Hessenberg分解的立体图像零水印算法", 《包装工程》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117217973A (en) * 2023-09-14 2023-12-12 兰州交通大学 Three-dimensional point cloud data watermarking method using Mahalanobis distance and ISS feature points
CN117217973B (en) * 2023-09-14 2024-06-07 兰州交通大学 Three-dimensional point cloud data watermarking method using mahalanobis distance and ISS feature points
CN117217976A (en) * 2023-11-09 2023-12-12 中国民航大学 Quaternion domain color image zero watermark processing method based on multi-chaotic system
CN117217976B (en) * 2023-11-09 2024-01-30 中国民航大学 Quaternion domain color image zero watermark processing method based on multi-chaotic system

Also Published As

Publication number Publication date
CN115311119B (en) 2022-12-23

Similar Documents

Publication Publication Date Title
CN115311119B (en) Three-dimensional image zero watermark embedding and extracting method capable of resisting geometric attack
Lee et al. Reversible data hiding scheme based on dual stegano-images using orientation combinations
CN112381701B (en) RST attack resisting stereo image zero watermarking method based on FFST and Hessenberg decomposition
CN109981918B (en) Reversible information hiding method for encrypted image based on dynamic block segmentation of quadtree
Schmitz et al. A new approach to commutative watermarking-encryption
Bahi et al. A new chaos-based watermarking algorithm
Chanu et al. A survey paper on secret image sharing schemes
CN111861851A (en) Method for exchanging cryptographic watermark by vector geographic data
CN114359012B (en) Robust combined domain color image zero watermark embedding and extracting method
Singh High PSNR based image steganography
Ernawan et al. A blind multiple watermarks based on human visual characteristics
Gao et al. An authenticatable (2, 3) secret sharing scheme using meaningful share images based on hybrid fractal matrix
Waleed et al. A robust optimal zero-watermarking technique for secret watermark sharing
Song et al. A secure image encryption algorithm based on multiple one-dimensional chaotic systems
CN114666453A (en) Separable ciphertext domain reversible data hiding method based on bit plane segmentation
CN113099069B (en) Multi-image encryption method based on three-dimensional spiral model
Abdulhammed Improving encryption digital watermark by using blue monkey algorithm
Surekha et al. Visual secret sharing based digital image watermarking
Shi et al. A Blind Watermarking Technique for Color Image based on SVD with Circulation.
CN110136045B (en) Method for hiding and recovering based on mutual scrambling of two images
Cao et al. Low-complexity reversible data hiding in encrypted image via MSB hierarchical coding and LSB compression
Li et al. High‐Capacity Reversible Data Hiding in Encrypted Images by Information Preprocessing
Chang et al. Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques.
CN117217976B (en) Quaternion domain color image zero watermark processing method based on multi-chaotic system
CN110944096B (en) Image encryption method for meaningful ciphertext

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
OL01 Intention to license declared
OL01 Intention to license declared
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20221108

Assignee: Beijing Feifan Chuangxiang Technology Industry Co.,Ltd.

Assignor: CIVIL AVIATION University OF CHINA

Contract record no.: X2024980007072

Denomination of invention: A Zero Watermark Embedding and Extraction Method for Stereoscopic Images Against Geometric Attacks

Granted publication date: 20221223

License type: Common License

Record date: 20240612