CN116506558A - Method and device for communication based on dot matrix code and digital watermark image - Google Patents

Method and device for communication based on dot matrix code and digital watermark image Download PDF

Info

Publication number
CN116506558A
CN116506558A CN202310755322.6A CN202310755322A CN116506558A CN 116506558 A CN116506558 A CN 116506558A CN 202310755322 A CN202310755322 A CN 202310755322A CN 116506558 A CN116506558 A CN 116506558A
Authority
CN
China
Prior art keywords
frequency
low
image
watermark
matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310755322.6A
Other languages
Chinese (zh)
Other versions
CN116506558B (en
Inventor
李璐
邵抵程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongke Micropoint Technology Co ltd
Original Assignee
Zhongke Micropoint Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongke Micropoint Technology Co ltd filed Critical Zhongke Micropoint Technology Co ltd
Priority to CN202310755322.6A priority Critical patent/CN116506558B/en
Publication of CN116506558A publication Critical patent/CN116506558A/en
Application granted granted Critical
Publication of CN116506558B publication Critical patent/CN116506558B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/3232Robust embedding or watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/12Use of codes for handling textual entities
    • G06F40/126Character encoding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/60Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
    • H04N19/625Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding using discrete cosine transform [DCT]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/60Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
    • H04N19/63Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding using sub-band based transform, e.g. wavelets
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention relates to the field of digital watermarking, and provides a method for communicating based on dot matrix codes and digital watermarking images. The invention overcomes the defects of noise and limited capability of resisting malicious attacks on the premise of ensuring the safety, so that the watermarking technology can accurately extract the dot matrix code and enhance the robustness and the safety of a watermarking algorithm.

Description

Method and device for communication based on dot matrix code and digital watermark image
Technical Field
The present invention relates to the field of digital watermarking, and more particularly, to a method and apparatus for communicating with a digital watermark image based on a dot matrix code.
Background
With the rapid development of information and communication technology and the widespread use of mobile intelligent terminals, capturing digital images and remotely sharing images has become an important part of people's work and life. However, in the communication process of digital images, sensitive privacy information of the end user recorded in the images, such as acquisition device information, time, date, etc., also has a risk of being tampered with or revealed by an attack. It is therefore critical for users to use secure tools to ensure that their information is protected.
The primary method of protecting image content during transmission has been encryption, but after image reception and decryption, the image information is still allowed to be edited or disseminated. Digital watermarking techniques have been developed to ensure the authenticity, integrity and privacy protection of image information.
Digital watermarking is an effective solution for detecting infringement and illegally using images, embedding additional data in an image signal and detecting and extracting the data when needed under the premise of not affecting the original image value and use.
The manner of embedding digital watermarks is divided into two types, namely a spatial domain and a frequency domain. The frequency domain technique can effectively disperse the energy of the embedded signal in the frequency domain to all pixels in the spatial domain, and is widely used.
As a classical frequency domain technique, a Discrete Wavelet Transform (DWT) can decompose an image into different low and high frequency information, and the frequency, position and orientation information about the original image obtained by wavelet analysis can provide an accurate reference during watermark embedding.
Watermark systems that undergo Discrete Wavelet Transform (DWT) typically have four large characteristics of invisibility, high capacity, robustness, and security, namely, the watermark is imperceptible to humans, can be embedded with a sufficient amount of data, can withstand signal changes, and can resist malicious attacks.
Although Discrete Wavelet Transform (DWT) technology has the advantages described above, there are still some problems that remain unsolved in practice. In the image transmission process, the embedded watermark information is possibly tampered due to the existence of noise and other factors. In addition, the ability to resist malicious attacks is limited. The content information in the picture and the image are also at risk of leakage when transferred separately. When the DWT technology is used for embedding the watermark, the signal can be shifted during the sampling operation due to the nonlinear transformation of the signal, so that the robustness of the watermark is affected.
Disclosure of Invention
The invention provides a method and a device for communication based on dot matrix codes and digital watermark images, aiming at the problems of robustness and safety in the prior art. The invention overcomes the defects of noise and limited capability of resisting malicious attacks on the premise of ensuring the safety, so that the watermarking technology can accurately extract the dot matrix code and enhance the robustness and the safety of a watermarking algorithm.
The technical scheme of the invention is as follows: the method for communication based on the dot matrix code and the digital watermark image specifically comprises the following steps:
step 1: performing image content extraction processing on an original image to generate a host image without privacy information and privacy information, and generating a watermark according to the privacy information and a secret key, wherein the watermark is a lattice code; wherein the size of the bit-array code isA character; the privacy information includes one or more of the following: user name, location, address, device, date and time;
wherein the step 1 comprises the following steps:
step 1.1: carrying out data analysis on the privacy information to determine a coding mode;
step 1.2: encoding the privacy information, generating a character code, and executing encoding verification to obtain codeword error correction;
step 1.3: reading the literal code and the codeword error correction, generating a dot matrix code, and correcting wrongly written words in the literal code;
step 1.4: putting the lattice code codes after error correction into a matrix of the lattice codes to generate watermarks;
step 2: embedding the watermark into the host image with privacy information to obtain a secret-loaded image;
the step 2 comprises the following steps:
step 2.1: performing Discrete Wavelet Transform (DWT) analysis on the host image to obtain coefficients of low frequency-low frequency (LL), low frequency-high frequency (LH), high frequency-low frequency (HL), and high frequency-high frequency (HH), wherein the coefficients of LL form LL subband square matrix M;
step 2.2: performing Schur decomposition on the LL sub-band square matrix M to obtain a unitary matrix U and an upper triangular matrix S, wherein M=U×S×U', and the diagonal coefficient of the upper triangular matrix S is the eigenvalue of the LL sub-band square matrix;
step 2.3: obtaining an embedded upper triangular matrix Sa according to the diagonal coefficients of the watermark transformation upper triangular matrix S;
wherein obtaining the embedded upper triangular matrix Sa includes determining three consecutive eigenvalues of the embedded upper triangular matrix Sa according to the following formula:
wherein the method comprises the steps ofAnd->Two bits representing the watermark, < >>、/>、/>Representing three successive eigenvalues of the matrix Sa, respectively.
Step 2.4: performing inverse Schur decomposition processing according to the embedded upper triangular matrix Sa and the unitary matrix U to obtain an embedded LL sub-band square matrix Ma, wherein Ma=U×Sa×U';
step 2.5: and performing inverse DWT according to the embedded LL sub-band square matrix Ma and coefficients of low frequency-high frequency (LH), high frequency-low frequency (HL) and high frequency-high frequency (HH) to obtain the secret-carrying image.
Step 3: and obtaining the host image of the privacy removing information and the privacy information according to the secret image and the secret key.
The step 3 comprises the following steps:
step 3.1: performing DWT analysis according to the dense image to obtain an embedded low frequency-low frequency (LL) coefficient, an embedded low frequency-high frequency (LH) coefficient, an embedded high frequency-low frequency (HL) coefficient and an embedded high frequency-high frequency (HH) coefficient, and obtaining an embedded LL sub-band square matrix as Ma;
step 3.2: decomposing the square matrix of the embedded LL sub-band into the unitary matrix U and the embedded upper triangular matrix Sa, wherein Ma=U×Sa×U', and the diagonal coefficient of the embedded upper triangular matrix Sa is the eigenvalue of the square matrix of the embedded LL sub-band;
step 3.3: obtaining bits of the upper triangular matrix S and the watermark according to the characteristic value of the embedded LL sub-band square matrix, and obtaining the privacy information according to the bits of the watermark;
wherein obtaining the upper triangular matrix S and bits of the watermark comprises:
wherein the method comprises the steps ofAnd->Two bits representing the watermark, < >>、/>、/>Representing three successive eigenvalues of the matrix Sa, respectively.
Wherein obtaining the privacy information from bits of the watermark comprises:
extracting the watermark according to the bit of the watermark;
and decoding the lattice code according to the watermark and the secret key to obtain the privacy information.
Step 3.4: performing inverse Schur decomposition processing according to the upper triangular matrix S and the unitary matrix U to obtain the LL subband square matrix M, wherein M=U×S×U';
step 3.5: and performing inverse DWT according to the LL sub-band square matrix M and coefficients of low frequency-high frequency (LH), high frequency-low frequency (HL) and high frequency-high frequency (HH) to obtain the host image.
In another aspect, the present invention provides an apparatus for communicating based on a lattice code and a digital watermark image for performing the method, the apparatus comprising: the image acquisition and sending terminal is used for acquiring an original image, carrying out image content extraction processing on the original image, generating the host image with privacy information and the privacy information, and transmitting the host image and the privacy information to the watermark generator;
a watermark generator for receiving image pixels and the privacy information, generating the watermark according to the privacy information and the secret key, embedding the watermark into the host image, generating the encrypted image, and uploading the encrypted image to an image receiving terminal;
and the image receiving terminal receives the encrypted image and obtains the host image and the privacy information according to the encrypted image and the secret key.
In another aspect, the invention provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method when executing the computer program.
In another aspect, the present invention provides a computer readable storage medium storing processor executable instructions that, when executed, enable a processor to implement the above-described method.
The invention has the beneficial effects that: the method takes the dot matrix code as a carrier of the digital watermark, and utilizes the frequency domain embedding technology to embed the dot matrix code watermark containing privacy information into a host image and carry out image communication. The lattice code has the characteristics of high information density, high reliability, high fault tolerance, selectable error correction level and the like. The dot matrix code is used as a watermark information carrier, so that the embedding amount of watermark information can be effectively increased, and the anti-attack capability of the digital watermark is enhanced. And the Schur transformation technology is fused, so that the anti-interference capability of the matrix code watermark is enhanced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention, and therefore should not be considered as limiting the scope of patent protection, and other related drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a digital watermark embedding process of a dot matrix code according to the present invention;
fig. 2 is a schematic structural diagram of a digital watermark image generating apparatus based on a dot matrix code according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to fall within the scope of the invention.
Example 1
In order to solve the above problems, as shown in fig. 1, the present invention proposes a method for communicating based on a dot matrix code and a digital watermark image, so as to solve the problem of privacy disclosure when a user uses a mobile communication application program for image transmission.
Step 1: and carrying out image content extraction processing on the original image, generating a host image without privacy information and privacy information, and generating a watermark according to the privacy information and a secret key, wherein the watermark is a lattice code.
Illustratively, the privacy information includes one or more of the following: user name, place, address, device, date and time. .
The lattice code is a kind of lattice code that represents the outline of a character by dividing each character into a plurality of points and using the false and true of each point.
The main flow of the steps is as follows:
step 1.1: carrying out data analysis on the privacy information, and if the privacy information is digital information, encoding the privacy information into Arabic numerals; if the privacy information is character, using an alphanumeric mode, and encoding into a UTF-8 encoding mode; if the privacy information is JIS character, chinese character mode is used;
step 1.2: encoding the privacy information, generating a character code, and executing encoding verification to obtain codeword error correction;
step 1.3: reading the literal code and the codeword error correction, generating a dot matrix code, and correcting wrongly written words in the literal code;
step 1.4: and (5) putting the lattice code codes after error correction into a matrix of the lattice codes to generate the watermark.
Illustratively, the lattice code used may be sized toAnd (3) characters.
Step 2: embedding the watermark into a host image to obtain a secret-loaded image. Performing discrete wavelet transformation on the host image, and extracting coefficients of low frequency-low frequency (LL), low frequency-high frequency (LH), high frequency-low frequency (HL) and high frequency-high frequency (HH) sub-bands, wherein the coefficients of LL form an LL sub-band square matrix M. Schur decomposition is performed on the LL subband square matrix M to decompose the LL subband square matrix into a unitary matrix U and an upper triangular matrix S, wherein m=u×s×u', and wherein the diagonal coefficients of the upper triangular matrix S are eigenvalues of the LL subband square matrix. Embedding the diagonal coefficients of the upper triangular matrix S into the root of the characteristic polynomial, thereby completing the embedding of the watermark signal, and then carrying out inverse Schur decomposition and inverse DWT transformation to obtain a secret-loaded image.
Step 2 may be performed by a watermark generator, for example.
The main flow of the steps is as follows:
step 2.1: for host images in the spatial domainPerforming DWT analysis to obtain output image +.>. Discrete Wavelet Transform (DWT) can decompose an image into different low and high frequency information.
Host imagePixels comprising M rows and N columns, outputting an image +.>The calculation formula of the coefficients is as follows:
wherein, the liquid crystal display device comprises a liquid crystal display device,the coefficients of the mth row and the nth column of the host image and the coefficient of the nth row and the nth column of the output image are respectively;
using low-pass and high-pass filters to output imagesInto four sub-bands, namely low frequency-low frequency (LL), low frequency-high frequency (LH), high frequency-low frequency (HL), and high frequency-high frequency (HH), wherein the coefficients of LL form LL sub-band square matrix M.
Step 2.2: schur decomposition is carried out on the LL sub-band square matrix M to obtain unitary matrixAnd an upper triangular matrix S, wherein +.>Wherein the diagonal coefficients of S are eigenvalues of the LL subband square matrix M.
Step 2.3: embedding the lattice code watermark into a host image to obtain an embedded upper triangular matrix Sa, wherein the algorithm of three eigenvalues of the embedded upper triangular matrix Sa is as follows:
wherein the method comprises the steps ofAnd->Two bits representing a matrix code watermark, < >>、/>、/>Representing three consecutive eigenvalues of the matrix S, respectively.
Step 2.4: performing inverse Schur decomposition processing according to the embedded upper triangular matrix Sa to obtain an embedded LL sub-band square matrix. Wherein->
Step 2.5: from the embedded LL subband square matrixAnd coefficients of low frequency-high frequency (LH), high frequency-low frequency (HL) and high frequency-high frequency (HH), performing inverse DWT transformation to obtain a secret image +.>
Step 3: this is the reverse of step 2. Based on the encrypted imageAnd the dot matrix code watermark obtains the host image and the privacy information.
Step 3.1: performing DWT analysis according to the dense image to obtain an embedded low frequency-low frequency (LL) coefficient, an embedded low frequency-high frequency (LH) coefficient, an embedded high frequency-low frequency (HL) coefficient and an embedded high frequency-high frequency (HH) coefficient, and obtaining an embedded LL sub-band square matrix as Ma;
step 3.2: decomposing the embedded LL subband square matrix Ma into a unitary matrix U and an embedded upper triangular matrix Sa, wherein Ma=U×Sa×U', and the diagonal coefficients of the embedded upper triangular matrix Sa are the eigenvalues of the embedded LL subband square matrix;
step 3.3: obtaining the upper triangular matrix S and bits of the watermark according to the characteristic value of the embedded LL sub-band square matrix, and obtaining privacy information according to the bits of the watermark;
extracting bits of the watermark from the embedded LL subband square matrix eigenvalues by applying the following formula to the least significant bits:
wherein the method comprises the steps ofAnd->Two bits representing the watermark, < >>、/>、/>Representing three successive eigenvalues of the matrix Sa, respectively.
Obtaining the private information from the bits of the watermark includes: extracting the watermark according to the bit of the watermark; and decoding the dot matrix code according to the watermark and the secret key to obtain the privacy information.
Step 3.4: performing inverse Schur decomposition processing according to the upper triangular matrix S and the unitary matrix U to obtain an LL sub-band square matrix M, wherein M=U×S×U';
step 3.5: the inverse DWT transform is performed based on the LL subband square matrix M and coefficients of low-frequency-high-frequency (LH), high-frequency-low-frequency (HL), and high-frequency-high-frequency (HH), to obtain a host image.
Step 3 may be performed by the picture receiving terminal, for example.
Example two
To further explain the method in the first embodiment, as shown in fig. 2, a second embodiment of the present invention further provides an apparatus for communicating based on a dot matrix code and a digital watermark image, where the apparatus includes:
the image acquisition and sending terminal is used for acquiring an original image, carrying out image content extraction processing on the original image, generating a host image with privacy information and privacy information, and transmitting the host image and the privacy information to the watermark generator;
the watermark generator is used for receiving the image pixels and the privacy information, generating a watermark according to the privacy information and the secret key, embedding the watermark into the host image, generating a secret-loaded image, and uploading the secret-loaded image to the image receiving terminal;
and the image receiving terminal receives the secret-carrying image and obtains the host image and the privacy information according to the secret-carrying image and the secret key.
Example III
Correspondingly, the embodiment of the application also provides electronic equipment which can be a terminal or a server. The electronic device includes a processor having one or more processing cores, a memory having one or more computer-readable storage media, and a computer program stored on the memory and executable on the processor. The processor is electrically connected with the memory.
The processor is a control center of the electronic device, connects various parts of the entire electronic device using various interfaces and lines, and performs various functions of the electronic device and processes data by running or loading software programs (computer programs) and/or units stored in the memory, and calling data stored in the memory, thereby performing overall monitoring of the electronic device.
In this embodiment of the present application, the processor in the electronic device loads the instructions corresponding to the processes of one or more application programs into the memory according to the method steps in the foregoing embodiment, and the processor executes the application programs stored in the memory, thereby implementing various functions.
Example IV
The present embodiments provide a computer readable storage medium storing processor executable instructions that, when executed, enable a processor to implement a method of communicating based on a lattice code and a digital watermark image.
In the embodiments provided herein, it should be understood that the disclosed apparatus and methods may be implemented in other ways. The above-described apparatus embodiments are merely illustrative, for example, the division of the units is merely a logical function division, and there may be other manners of division in actual implementation, and for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, device or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments provided in the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
Finally, it should be noted that: the above examples are only specific embodiments of the present invention, and are not intended to limit the scope of the present invention, but it should be understood by those skilled in the art that the present invention is not limited thereto, and that the present invention is described in detail with reference to the foregoing examples: any person skilled in the art may modify or easily conceive of the technical solution described in the foregoing embodiments, or perform equivalent substitution of some of the technical features, while remaining within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the corresponding technical solutions. Are intended to be encompassed within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (13)

1. A method for communicating based on a lattice code and a digital watermark image, comprising:
step 1: performing image content extraction processing on an original image to generate a host image without privacy information and privacy information, and generating a watermark according to the privacy information and a secret key, wherein the watermark is a lattice code;
step 2: embedding the watermark into the host image with privacy information to obtain a secret-loaded image;
step 3: and obtaining the host image of the privacy removing information and the privacy information according to the secret image and the secret key.
2. The method according to claim 1, wherein said step 1 comprises:
step 1.1: carrying out data analysis on the privacy information to determine a coding mode;
step 1.2: encoding the privacy information, generating a character code, and executing encoding verification to obtain codeword error correction;
step 1.3: reading the character codes and the codeword error correction to generate dot matrix code codes;
step 1.4: and putting the lattice code codes after error correction into a matrix of the lattice codes to generate the watermark.
3. The method of claim 2, wherein determining the encoding mode for the privacy information by data analysis comprises:
if the privacy information is digital information, encoding the privacy information into Arabic numerals; if the privacy information is characters, an alphanumeric mode is used, and the coding is a UTF-8 coding mode; if the privacy information is JIS character, chinese character mode is used.
4. The method according to claim 2, wherein said step 2 comprises:
step 2.1: performing discrete wavelet transform analysis on the host image to obtain low-frequency-low-frequency, low-frequency-high-frequency, high-frequency-low-frequency and high-frequency-high-frequency coefficients, wherein the low-frequency-low-frequency coefficients form a low-frequency-low-frequency sub-band square matrix M;
step 2.2: performing Schur decomposition on the low-frequency-low-frequency sub-band square matrix M to obtain a unitary matrix U and an upper triangular matrix S, wherein M=U×S×U', and the diagonal coefficient of the upper triangular matrix S is the characteristic value of the low-frequency-low-frequency sub-band square matrix;
step 2.3: obtaining an embedded upper triangular matrix Sa according to the diagonal coefficients of the watermark transformation upper triangular matrix S;
step 2.4: performing inverse Schur decomposition processing according to the embedded upper triangular matrix Sa and the unitary matrix U to obtain an embedded low-frequency-low-frequency sub-band square matrix Ma, wherein Ma=U×Sa×U';
step 2.5: and performing inverse discrete wavelet transformation according to the embedded low-frequency-low-frequency sub-band square matrix Ma, the low-frequency-high-frequency coefficient, the high-frequency-low-frequency coefficient and the high-frequency-high-frequency coefficient to obtain the secret-carrying image.
5. The method according to claim 4, wherein obtaining the embedded upper triangular matrix Sa comprises determining three consecutive eigenvalues of the embedded upper triangular matrix Sa according to the following formula:
wherein the method comprises the steps ofAnd->Two bits representing the watermark, < >>、/>、/>Representing three consecutive eigenvalues of the matrix S, respectively.
6. The method of claim 5, wherein step 3 comprises:
step 3.1: performing discrete wavelet transformation analysis according to the secret image to obtain an embedded low-frequency-low-frequency coefficient, an embedded low-frequency-high-frequency coefficient, an embedded high-frequency-low-frequency coefficient and an embedded high-frequency-high-frequency coefficient, and obtaining an embedded low-frequency-low-frequency sub-band square matrix which is Ma;
step 3.2: decomposing the embedded low-frequency-low-frequency subband square matrix Ma into the unitary matrix U and the embedded upper triangular matrix Sa, wherein ma=u×sa×u', and wherein the diagonal coefficients of the embedded upper triangular matrix Sa are eigenvalues of the embedded low-frequency-low-frequency subband square matrix;
step 3.3: obtaining bits of the upper triangular matrix S and the watermark according to the characteristic value of the embedded low-frequency-low-frequency sub-band square matrix, and obtaining the privacy information according to the bits of the watermark;
step 3.4: performing inverse Schur decomposition processing according to the upper triangular matrix S and the unitary matrix U to obtain a low-frequency-low-frequency sub-band square matrix M, wherein M=U×S×U';
step 3.5: and performing inverse DWT according to the low-frequency-low frequency sub-band square matrix M and coefficients of the low-frequency-high frequency, the high-frequency-low frequency and the high-frequency-high frequency to obtain the host image.
7. The method of claim 6, wherein obtaining the upper triangular matrix S and bits of the watermark comprises:
wherein the method comprises the steps ofAnd->Two bits representing the watermark, < >>、/>、/>Representing three successive eigenvalues of the matrix Sa, respectively.
8. The method of claim 6, wherein obtaining the privacy information from bits of the watermark comprises:
extracting the watermark according to the bit of the watermark;
and decoding the lattice code according to the watermark and the secret key to obtain the privacy information.
9. The method of claim 1 wherein the size of the midamble isAnd (3) characters.
10. The method of claim 1, wherein the privacy information comprises one or more of the following: user name, place, address, device, date and time.
11. An apparatus for communicating based on a lattice code and a digital watermark image for performing the method of any one of claims 1-10, the apparatus comprising:
the image acquisition and sending terminal is used for acquiring an original image, carrying out image content extraction processing on the original image, generating the host image with privacy information and the privacy information, and transmitting the host image and the privacy information to the watermark generator;
a watermark generator for receiving image pixels and the privacy information, generating the watermark according to the privacy information and the secret key, embedding the watermark into the host image, generating the encrypted image, and uploading the encrypted image to an image receiving terminal;
and the image receiving terminal receives the encrypted image and obtains the host image and the privacy information according to the encrypted image and the secret key.
12. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, characterized by:
the processor, when executing the computer program, implements the steps of the method of any of the preceding claims 1-10.
13. A computer readable storage medium storing processor executable instructions, wherein the processor executable instructions stored in the computer readable storage medium when executed are capable of causing a processor to perform the method of any one of claims 1-10.
CN202310755322.6A 2023-06-26 2023-06-26 Method and device for communication based on dot matrix code and digital watermark image Active CN116506558B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310755322.6A CN116506558B (en) 2023-06-26 2023-06-26 Method and device for communication based on dot matrix code and digital watermark image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310755322.6A CN116506558B (en) 2023-06-26 2023-06-26 Method and device for communication based on dot matrix code and digital watermark image

Publications (2)

Publication Number Publication Date
CN116506558A true CN116506558A (en) 2023-07-28
CN116506558B CN116506558B (en) 2023-09-26

Family

ID=87316888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310755322.6A Active CN116506558B (en) 2023-06-26 2023-06-26 Method and device for communication based on dot matrix code and digital watermark image

Country Status (1)

Country Link
CN (1) CN116506558B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040761A (en) * 2018-09-17 2018-12-18 俞群爱 A kind of monitoring on-wall system with encrypted watermark
CN109726348A (en) * 2018-12-29 2019-05-07 上海携程商务有限公司 The method and system of webpage watermark protection
CN110796586A (en) * 2019-10-29 2020-02-14 中国人民解放军63850部队 Blind watermarking method and system based on digital dot matrix and readable storage medium
CN112215738A (en) * 2020-09-14 2021-01-12 华东交通大学 Two-dimensional code-based tamper-proof digital watermark method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040761A (en) * 2018-09-17 2018-12-18 俞群爱 A kind of monitoring on-wall system with encrypted watermark
CN109726348A (en) * 2018-12-29 2019-05-07 上海携程商务有限公司 The method and system of webpage watermark protection
CN110796586A (en) * 2019-10-29 2020-02-14 中国人民解放军63850部队 Blind watermarking method and system based on digital dot matrix and readable storage medium
CN112215738A (en) * 2020-09-14 2021-01-12 华东交通大学 Two-dimensional code-based tamper-proof digital watermark method

Also Published As

Publication number Publication date
CN116506558B (en) 2023-09-26

Similar Documents

Publication Publication Date Title
Singh et al. Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability
Kumar et al. A recent survey on image watermarking techniques and its application in e-governance
Sun et al. A SVD-and quantization based semi-fragile watermarking technique for image authentication
Kang et al. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
Chandrakar et al. Performance comparison of digital Image watermarking techniques: a survey
CN107622470B (en) Real-time robust digital watermark embedding and extracting method based on two-dimensional code
Rajput et al. Image tamper detection and self-recovery using multiple median watermarking
Pal et al. Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image
CN107103577A (en) Half fragile uniqueness image watermark insertion and extracting method for integrity protection
Singh et al. Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine
Bhautmage et al. Advanced video steganography algorithm
Sinhal et al. A multipurpose image watermarking scheme for digital image protection
Chamlawi et al. Wavelet based image authentication and recovery
Preda Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain
Lin et al. Semi-fragile watermarking scheme for authentication of JPEG images
Kannan et al. An extensive research on robust digital image watermarking techniques: A review
Pal A survey on digital watermarking and its application
Singh et al. An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability
CN116506558B (en) Method and device for communication based on dot matrix code and digital watermark image
Ling et al. Watermarking for image authentication
Doke et al. Digital signature scheme for image
CN113538200A (en) Rapid robust watermarking method, system and application for color image
Pareek et al. Discrete cosine transformation based image watermarking for authentication and copyright protection
Kaur et al. Review on Different Video Watermarking Techniques
Cai et al. A multiple watermarks algorithm for image content authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant