CN116506558B - Method and device for communication based on dot matrix code and digital watermark image - Google Patents
Method and device for communication based on dot matrix code and digital watermark image Download PDFInfo
- Publication number
- CN116506558B CN116506558B CN202310755322.6A CN202310755322A CN116506558B CN 116506558 B CN116506558 B CN 116506558B CN 202310755322 A CN202310755322 A CN 202310755322A CN 116506558 B CN116506558 B CN 116506558B
- Authority
- CN
- China
- Prior art keywords
- frequency
- low
- image
- watermark
- matrix
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 239000011159 matrix material Substances 0.000 title claims abstract description 116
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000006854 communication Effects 0.000 title description 10
- 238000004891 communication Methods 0.000 title description 9
- 238000012545 processing Methods 0.000 claims description 14
- 238000000354 decomposition reaction Methods 0.000 claims description 11
- 238000012937 correction Methods 0.000 claims description 10
- 230000009466 transformation Effects 0.000 claims description 9
- 238000004458 analytical method Methods 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 6
- 238000000605 extraction Methods 0.000 claims description 6
- 238000007405 data analysis Methods 0.000 claims description 4
- 238000012795 verification Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 abstract description 7
- 238000004422 calculation algorithm Methods 0.000 abstract description 3
- 230000007547 defect Effects 0.000 abstract description 2
- 230000005540 biological transmission Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/12—Use of codes for handling textual entities
- G06F40/126—Character encoding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/60—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
- H04N19/625—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding using discrete cosine transform [DCT]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/60—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
- H04N19/63—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding using sub-band based transform, e.g. wavelets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Artificial Intelligence (AREA)
- Health & Medical Sciences (AREA)
- Discrete Mathematics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The application relates to the field of digital watermarking, and provides a method for communicating based on dot matrix codes and digital watermarking images. The application overcomes the defects of noise and limited capability of resisting malicious attacks on the premise of ensuring the safety, so that the watermarking technology can accurately extract the dot matrix code and enhance the robustness and the safety of a watermarking algorithm.
Description
Technical Field
The present application relates to the field of digital watermarking, and more particularly, to a method and apparatus for communicating with a digital watermark image based on a dot matrix code.
Background
With the rapid development of information and communication technology and the widespread use of mobile intelligent terminals, capturing digital images and remotely sharing images has become an important part of people's work and life. However, in the communication process of digital images, sensitive privacy information of the end user recorded in the images, such as acquisition device information, time, date, etc., also has a risk of being tampered with or revealed by an attack. It is therefore critical for users to use secure tools to ensure that their information is protected.
The primary method of protecting image content during transmission has been encryption, but after image reception and decryption, the image information is still allowed to be edited or disseminated. Digital watermarking techniques have been developed to ensure the authenticity, integrity and privacy protection of image information.
Digital watermarking is an effective solution for detecting infringement and illegally using images, embedding additional data in an image signal and detecting and extracting the data when needed under the premise of not affecting the original image value and use.
The manner of embedding digital watermarks is divided into two types, namely a spatial domain and a frequency domain. The frequency domain technique can effectively disperse the energy of the embedded signal in the frequency domain to all pixels in the spatial domain, and is widely used.
As a classical frequency domain technique, a Discrete Wavelet Transform (DWT) can decompose an image into different low and high frequency information, and the frequency, position and orientation information about the original image obtained by wavelet analysis can provide an accurate reference during watermark embedding.
Watermark systems that undergo Discrete Wavelet Transform (DWT) typically have four large characteristics of invisibility, high capacity, robustness, and security, namely, the watermark is imperceptible to humans, can be embedded with a sufficient amount of data, can withstand signal changes, and can resist malicious attacks.
Although Discrete Wavelet Transform (DWT) technology has the advantages described above, there are still some problems that remain unsolved in practice. In the image transmission process, the embedded watermark information is possibly tampered due to the existence of noise and other factors. In addition, the ability to resist malicious attacks is limited. The content information in the picture and the image are also at risk of leakage when transferred separately. When the DWT technology is used for embedding the watermark, the signal can be shifted during the sampling operation due to the nonlinear transformation of the signal, so that the robustness of the watermark is affected.
Disclosure of Invention
The application provides a method and a device for communication based on dot matrix codes and digital watermark images, aiming at the problems of robustness and safety in the prior art. The application overcomes the defects of noise and limited capability of resisting malicious attacks on the premise of ensuring the safety, so that the watermarking technology can accurately extract the dot matrix code and enhance the robustness and the safety of a watermarking algorithm.
The technical scheme of the application is as follows: the method for communication based on the dot matrix code and the digital watermark image specifically comprises the following steps:
step 1: performing image content extraction processing on an original image to generate a host image without privacy information and privacy information, and generating a watermark according to the privacy information and a secret key, whereinThe watermark is a lattice code; wherein the size of the bit-array code isA character; the privacy information includes one or more of the following: user name, location, address, device, date and time;
wherein the step 1 comprises the following steps:
step 1.1: carrying out data analysis on the privacy information to determine a coding mode;
step 1.2: encoding the privacy information, generating a character code, and executing encoding verification to obtain codeword error correction;
step 1.3: reading the literal code and the codeword error correction, generating a dot matrix code, and correcting wrongly written words in the literal code;
step 1.4: putting the lattice code codes after error correction into a matrix of the lattice codes to generate watermarks;
step 2: embedding the watermark into the host image with privacy information to obtain a secret-loaded image;
the step 2 comprises the following steps:
step 2.1: performing Discrete Wavelet Transform (DWT) analysis on the host image to obtain coefficients of low frequency-low frequency (LL), low frequency-high frequency (LH), high frequency-low frequency (HL), and high frequency-high frequency (HH), wherein the coefficients of LL form LL subband square matrix M;
step 2.2: performing Schur decomposition on the LL sub-band square matrix M to obtain a unitary matrix U and an upper triangular matrix S, wherein M=U×S×U', and the diagonal coefficient of the upper triangular matrix S is the eigenvalue of the LL sub-band square matrix;
step 2.3: obtaining an embedded upper triangular matrix Sa according to the diagonal coefficients of the watermark transformation upper triangular matrix S;
wherein obtaining the embedded upper triangular matrix Sa includes determining three consecutive eigenvalues of the embedded upper triangular matrix Sa according to the following formula:
wherein the method comprises the steps ofAnd->Two bits representing the watermark, < >>、/>、/>Representing three successive eigenvalues of the matrix Sa, respectively.
Step 2.4: performing inverse Schur decomposition processing according to the embedded upper triangular matrix Sa and the unitary matrix U to obtain an embedded LL sub-band square matrix Ma, wherein Ma=U×Sa×U';
step 2.5: and performing inverse DWT according to the embedded LL sub-band square matrix Ma and coefficients of low frequency-high frequency (LH), high frequency-low frequency (HL) and high frequency-high frequency (HH) to obtain the secret-carrying image.
Step 3: and obtaining the host image of the privacy removing information and the privacy information according to the secret image and the secret key.
The step 3 comprises the following steps:
step 3.1: performing DWT analysis according to the dense image to obtain an embedded low frequency-low frequency (LL) coefficient, an embedded low frequency-high frequency (LH) coefficient, an embedded high frequency-low frequency (HL) coefficient and an embedded high frequency-high frequency (HH) coefficient, and obtaining an embedded LL sub-band square matrix as Ma;
step 3.2: decomposing the square matrix of the embedded LL sub-band into the unitary matrix U and the embedded upper triangular matrix Sa, wherein Ma=U×Sa×U', and the diagonal coefficient of the embedded upper triangular matrix Sa is the eigenvalue of the square matrix of the embedded LL sub-band;
step 3.3: obtaining bits of the upper triangular matrix S and the watermark according to the characteristic value of the embedded LL sub-band square matrix, and obtaining the privacy information according to the bits of the watermark;
wherein obtaining the upper triangular matrix S and bits of the watermark comprises:
wherein the method comprises the steps ofAnd->Two bits representing the watermark, < >>、/>、/>Representing three successive eigenvalues of the matrix Sa, respectively.
Wherein obtaining the privacy information from bits of the watermark comprises:
extracting the watermark according to the bit of the watermark;
and decoding the lattice code according to the watermark and the secret key to obtain the privacy information.
Step 3.4: performing inverse Schur decomposition processing according to the upper triangular matrix S and the unitary matrix U to obtain the LL subband square matrix M, wherein M=U×S×U';
step 3.5: and performing inverse DWT according to the LL sub-band square matrix M and coefficients of low frequency-high frequency (LH), high frequency-low frequency (HL) and high frequency-high frequency (HH) to obtain the host image.
In another aspect, the present application provides an apparatus for communicating based on a lattice code and a digital watermark image for performing the method, the apparatus comprising: the image acquisition and sending terminal is used for acquiring an original image, carrying out image content extraction processing on the original image, generating the host image with privacy information and the privacy information, and transmitting the host image and the privacy information to the watermark generator;
a watermark generator for receiving image pixels and the privacy information, generating the watermark according to the privacy information and the secret key, embedding the watermark into the host image, generating the encrypted image, and uploading the encrypted image to an image receiving terminal;
and the image receiving terminal receives the encrypted image and obtains the host image and the privacy information according to the encrypted image and the secret key.
In another aspect, the application provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method when executing the computer program.
In another aspect, the present application provides a computer readable storage medium storing processor executable instructions that, when executed, enable a processor to implement the above-described method.
The application has the beneficial effects that: the method takes the dot matrix code as a carrier of the digital watermark, and utilizes the frequency domain embedding technology to embed the dot matrix code watermark containing privacy information into a host image and carry out image communication. The lattice code has the characteristics of high information density, high reliability, high fault tolerance, selectable error correction level and the like. The dot matrix code is used as a watermark information carrier, so that the embedding amount of watermark information can be effectively increased, and the anti-attack capability of the digital watermark is enhanced. And the Schur transformation technology is fused, so that the anti-interference capability of the matrix code watermark is enhanced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application, and therefore should not be considered as limiting the scope of patent protection, and other related drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a digital watermark embedding process of a dot matrix code according to the present application;
fig. 2 is a schematic structural diagram of a digital watermark image generating apparatus based on a dot matrix code according to the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to fall within the scope of the application.
Example 1
In order to solve the above problems, as shown in fig. 1, the present application proposes a method for communicating based on a dot matrix code and a digital watermark image, so as to solve the problem of privacy disclosure when a user uses a mobile communication application program for image transmission.
Step 1: and carrying out image content extraction processing on the original image, generating a host image without privacy information and privacy information, and generating a watermark according to the privacy information and a secret key, wherein the watermark is a lattice code.
Illustratively, the privacy information includes one or more of the following: user name, place, address, device, date and time. .
The lattice code is a kind of lattice code that represents the outline of a character by dividing each character into a plurality of points and using the false and true of each point.
The main flow of the steps is as follows:
step 1.1: carrying out data analysis on the privacy information, and if the privacy information is digital information, encoding the privacy information into Arabic numerals; if the privacy information is character, using an alphanumeric mode, and encoding into a UTF-8 encoding mode; if the privacy information is JIS character, chinese character mode is used;
step 1.2: encoding the privacy information, generating a character code, and executing encoding verification to obtain codeword error correction;
step 1.3: reading the literal code and the codeword error correction, generating a dot matrix code, and correcting wrongly written words in the literal code;
step 1.4: and (5) putting the lattice code codes after error correction into a matrix of the lattice codes to generate the watermark.
Illustratively, the lattice code used may be sized toAnd (3) characters.
Step 2: embedding the watermark into a host image to obtain a secret-loaded image. Performing discrete wavelet transformation on the host image, and extracting coefficients of low frequency-low frequency (LL), low frequency-high frequency (LH), high frequency-low frequency (HL) and high frequency-high frequency (HH) sub-bands, wherein the coefficients of LL form an LL sub-band square matrix M. Schur decomposition is performed on the LL subband square matrix M to decompose the LL subband square matrix into a unitary matrix U and an upper triangular matrix S, wherein m=u×s×u', and wherein the diagonal coefficients of the upper triangular matrix S are eigenvalues of the LL subband square matrix. Embedding the diagonal coefficients of the upper triangular matrix S into the root of the characteristic polynomial, thereby completing the embedding of the watermark signal, and then carrying out inverse Schur decomposition and inverse DWT transformation to obtain a secret-loaded image.
Step 2 may be performed by a watermark generator, for example.
The main flow of the steps is as follows:
step 2.1: for host images in the spatial domainPerforming DWT analysis to obtain output image +.>. Discrete Wavelet Transform (DWT) can decompose an image into different low and high frequency information.
Host imagePixels comprising M rows and N columns, outputting an image +.>The calculation formula of the coefficients is as follows:
;
wherein,,the coefficients of the mth row and the nth column of the host image and the coefficient of the nth row and the nth column of the output image are respectively;
using low-pass and high-pass filters to output imagesInto four sub-bands, namely low frequency-low frequency (LL), low frequency-high frequency (LH), high frequency-low frequency (HL), and high frequency-high frequency (HH), wherein the coefficients of LL form LL sub-band square matrix M.
Step 2.2: schur decomposition is carried out on the LL sub-band square matrix M to obtain unitary matrixAnd an upper triangular matrix S, wherein +.>Wherein the diagonal coefficients of S are eigenvalues of the LL subband square matrix M.
Step 2.3: embedding the lattice code watermark into a host image to obtain an embedded upper triangular matrix Sa, wherein the algorithm of three eigenvalues of the embedded upper triangular matrix Sa is as follows:
wherein the method comprises the steps ofAnd->Two bits representing a matrix code watermark, < >>、/>、/>Representing three consecutive eigenvalues of the matrix S, respectively.
Step 2.4: performing inverse Schur decomposition processing according to the embedded upper triangular matrix Sa to obtain an embedded LL sub-band square matrix. Wherein->,
Step 2.5: from the embedded LL subband square matrixAnd coefficients of low frequency-high frequency (LH), high frequency-low frequency (HL) and high frequency-high frequency (HH), performing inverse DWT transformation to obtain a secret image +.>。
Step 3: this is the reverse of step 2. Based on the encrypted imageAnd the dot matrix code watermark obtains the host image and the privacy information.
Step 3.1: performing DWT analysis according to the dense image to obtain an embedded low frequency-low frequency (LL) coefficient, an embedded low frequency-high frequency (LH) coefficient, an embedded high frequency-low frequency (HL) coefficient and an embedded high frequency-high frequency (HH) coefficient, and obtaining an embedded LL sub-band square matrix as Ma;
step 3.2: decomposing the embedded LL subband square matrix Ma into a unitary matrix U and an embedded upper triangular matrix Sa, wherein Ma=U×Sa×U', and the diagonal coefficients of the embedded upper triangular matrix Sa are the eigenvalues of the embedded LL subband square matrix;
step 3.3: obtaining the upper triangular matrix S and bits of the watermark according to the characteristic value of the embedded LL sub-band square matrix, and obtaining privacy information according to the bits of the watermark;
extracting bits of the watermark from the embedded LL subband square matrix eigenvalues by applying the following formula to the least significant bits:
wherein the method comprises the steps ofAnd->Two bits representing the watermark, < >>、/>、/>Representing three successive eigenvalues of the matrix Sa, respectively.
Obtaining the private information from the bits of the watermark includes: extracting the watermark according to the bit of the watermark; and decoding the dot matrix code according to the watermark and the secret key to obtain the privacy information.
Step 3.4: performing inverse Schur decomposition processing according to the upper triangular matrix S and the unitary matrix U to obtain an LL sub-band square matrix M, wherein M=U×S×U';
step 3.5: the inverse DWT transform is performed based on the LL subband square matrix M and coefficients of low-frequency-high-frequency (LH), high-frequency-low-frequency (HL), and high-frequency-high-frequency (HH), to obtain a host image.
Step 3 may be performed by the picture receiving terminal, for example.
Example two
To further explain the method in the first embodiment, as shown in fig. 2, a second embodiment of the present application further provides an apparatus for communicating based on a dot matrix code and a digital watermark image, where the apparatus includes:
the image acquisition and sending terminal is used for acquiring an original image, carrying out image content extraction processing on the original image, generating a host image with privacy information and privacy information, and transmitting the host image and the privacy information to the watermark generator;
the watermark generator is used for receiving the image pixels and the privacy information, generating a watermark according to the privacy information and the secret key, embedding the watermark into the host image, generating a secret-loaded image, and uploading the secret-loaded image to the image receiving terminal;
and the image receiving terminal receives the secret-carrying image and obtains the host image and the privacy information according to the secret-carrying image and the secret key.
Example III
Correspondingly, the embodiment of the application also provides electronic equipment which can be a terminal or a server. The electronic device includes a processor having one or more processing cores, a memory having one or more computer-readable storage media, and a computer program stored on the memory and executable on the processor. The processor is electrically connected with the memory.
The processor is a control center of the electronic device, connects various parts of the entire electronic device using various interfaces and lines, and performs various functions of the electronic device and processes data by running or loading software programs (computer programs) and/or units stored in the memory, and calling data stored in the memory, thereby performing overall monitoring of the electronic device.
In the embodiment of the present application, the processor in the electronic device loads the instructions corresponding to the processes of one or more application programs into the memory according to the method steps in the foregoing embodiment, and the processor executes the application programs stored in the memory, thereby implementing various functions.
Example IV
The present embodiments provide a computer readable storage medium storing processor executable instructions that, when executed, enable a processor to implement a method of communicating based on a lattice code and a digital watermark image.
In the embodiments provided herein, it should be understood that the disclosed apparatus and methods may be implemented in other ways. The above-described apparatus embodiments are merely illustrative, for example, the division of the units is merely a logical function division, and there may be other manners of division in actual implementation, and for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, device or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments provided in the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
Finally, it should be noted that: the above examples are only specific embodiments of the present application, and are not intended to limit the scope of the present application, but it should be understood by those skilled in the art that the present application is not limited thereto, and that the present application is described in detail with reference to the foregoing examples: any person skilled in the art may modify or easily conceive of the technical solution described in the foregoing embodiments, or perform equivalent substitution of some of the technical features, while remaining within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the corresponding technical solutions. Are intended to be encompassed within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (9)
1. A method for communicating based on a lattice code and a digital watermark image, comprising:
step 1: performing image content extraction processing on an original image to generate a host image without privacy information and privacy information, and generating a watermark according to the privacy information and a secret key, wherein the watermark is a lattice code;
step 2: embedding the watermark into the host image with privacy information to obtain a secret-loaded image;
step 3: obtaining the host image of the privacy-removed information and the privacy information according to the secret image and the secret key;
wherein the step 1 comprises the following steps:
step 1.1: carrying out data analysis on the privacy information to determine a coding mode;
step 1.2: encoding the privacy information, generating a character code, and executing encoding verification to obtain codeword error correction;
step 1.3: reading the character codes and the codeword error correction to generate dot matrix code codes;
step 1.4: putting the lattice code codes after error correction into a matrix of the lattice code to generate a watermark;
wherein the step 2 comprises:
step 2.1: performing discrete wavelet transform analysis on the host image to obtain low-frequency-low-frequency, low-frequency-high-frequency, high-frequency-low-frequency and high-frequency-high-frequency coefficients, wherein the low-frequency-low-frequency coefficients form a low-frequency-low-frequency sub-band square matrix M;
step 2.2: performing Schur decomposition on the low-frequency-low-frequency sub-band square matrix M to obtain a unitary matrix U and an upper triangular matrix S, wherein M=U×S×U', and the diagonal coefficient of the upper triangular matrix S is the characteristic value of the low-frequency-low-frequency sub-band square matrix;
step 2.3: obtaining an embedded upper triangular matrix Sa according to the diagonal coefficients of the watermark transformation upper triangular matrix S;
step 2.4: performing inverse Schur decomposition processing according to the embedded upper triangular matrix Sa and the unitary matrix U to obtain an embedded low-frequency-low-frequency sub-band square matrix Ma, wherein Ma=U×Sa×U';
step 2.5: performing inverse discrete wavelet transformation according to the embedded low-frequency-low-frequency sub-band square matrix Ma, the low-frequency-high-frequency coefficient, the high-frequency-low-frequency coefficient and the high-frequency-high-frequency coefficient to obtain the secret-carrying image;
wherein obtaining the embedded upper triangular matrix Sa includes determining three consecutive eigenvalues of the embedded upper triangular matrix Sa according to the following formula:
;
wherein the method comprises the steps ofAnd->Two bits representing the watermark, < >>、/>、/>Three continuous eigenvalues of the matrix S are represented respectively;
wherein the step 3 comprises:
step 3.1: performing discrete wavelet transformation analysis according to the secret image to obtain an embedded low-frequency-low-frequency coefficient, an embedded low-frequency-high-frequency coefficient, an embedded high-frequency-low-frequency coefficient and an embedded high-frequency-high-frequency coefficient, and obtaining an embedded low-frequency-low-frequency sub-band square matrix which is Ma;
step 3.2: decomposing the embedded low-frequency-low-frequency subband square matrix Ma into the unitary matrix U and the embedded upper triangular matrix Sa, wherein ma=u×sa×u', and wherein the diagonal coefficients of the embedded upper triangular matrix Sa are eigenvalues of the embedded low-frequency-low-frequency subband square matrix;
step 3.3: obtaining bits of the upper triangular matrix S and the watermark according to the characteristic value of the embedded low-frequency-low-frequency sub-band square matrix, and obtaining the privacy information according to the bits of the watermark;
step 3.4: performing inverse Schur decomposition processing according to the upper triangular matrix S and the unitary matrix U to obtain a low-frequency-low-frequency sub-band square matrix M, wherein M=U×S×U';
step 3.5: and performing inverse DWT according to the low-frequency-low frequency sub-band square matrix M and coefficients of the low-frequency-high frequency, the high-frequency-low frequency and the high-frequency-high frequency to obtain the host image.
2. The method of claim 1, wherein determining the encoding mode for the privacy information by data analysis comprises:
if the privacy information is digital information, encoding the privacy information into Arabic numerals; if the privacy information is characters, an alphanumeric mode is used, and the coding is a UTF-8 coding mode; if the privacy information is JIS character, chinese character mode is used.
3. The method of claim 2, wherein obtaining the upper triangular matrix S and bits of the watermark comprises:
;
wherein the method comprises the steps ofAnd->Two bits representing the watermark, < >>、/>、/>Representing three successive eigenvalues of the matrix Sa, respectively.
4. The method of claim 2, wherein obtaining the privacy information from bits of the watermark comprises:
extracting the watermark according to the bit of the watermark;
and decoding the lattice code according to the watermark and the secret key to obtain the privacy information.
5. The method of claim 1 wherein the size of the midamble isAnd (3) characters.
6. The method of claim 1, wherein the privacy information comprises one or more of the following: user name, place, address, device, date and time.
7. An apparatus for communicating based on a lattice code and a digital watermark image for performing the method of any of claims 1-6, the apparatus comprising:
the image acquisition and sending terminal is used for acquiring an original image, carrying out image content extraction processing on the original image, generating the host image with privacy information and the privacy information, and transmitting the host image and the privacy information to the watermark generator;
a watermark generator for receiving image pixels and the privacy information, generating the watermark according to the privacy information and the secret key, embedding the watermark into the host image, generating the encrypted image, and uploading the encrypted image to an image receiving terminal;
and the image receiving terminal receives the encrypted image and obtains the host image and the privacy information according to the encrypted image and the secret key.
8. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, characterized by:
the processor, when executing the computer program, implements the steps of the method of any of the preceding claims 1-6.
9. A computer-readable storage medium storing processor-executable instructions, wherein the processor-executable instructions stored in the computer-readable storage medium are capable, when executed, of causing a processor to perform the method of any one of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310755322.6A CN116506558B (en) | 2023-06-26 | 2023-06-26 | Method and device for communication based on dot matrix code and digital watermark image |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310755322.6A CN116506558B (en) | 2023-06-26 | 2023-06-26 | Method and device for communication based on dot matrix code and digital watermark image |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116506558A CN116506558A (en) | 2023-07-28 |
CN116506558B true CN116506558B (en) | 2023-09-26 |
Family
ID=87316888
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310755322.6A Active CN116506558B (en) | 2023-06-26 | 2023-06-26 | Method and device for communication based on dot matrix code and digital watermark image |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116506558B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109040761A (en) * | 2018-09-17 | 2018-12-18 | 俞群爱 | A kind of monitoring on-wall system with encrypted watermark |
CN109726348A (en) * | 2018-12-29 | 2019-05-07 | 上海携程商务有限公司 | The method and system of webpage watermark protection |
CN110796586A (en) * | 2019-10-29 | 2020-02-14 | 中国人民解放军63850部队 | Blind watermarking method and system based on digital dot matrix and readable storage medium |
CN112215738A (en) * | 2020-09-14 | 2021-01-12 | 华东交通大学 | Two-dimensional code-based tamper-proof digital watermark method |
-
2023
- 2023-06-26 CN CN202310755322.6A patent/CN116506558B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109040761A (en) * | 2018-09-17 | 2018-12-18 | 俞群爱 | A kind of monitoring on-wall system with encrypted watermark |
CN109726348A (en) * | 2018-12-29 | 2019-05-07 | 上海携程商务有限公司 | The method and system of webpage watermark protection |
CN110796586A (en) * | 2019-10-29 | 2020-02-14 | 中国人民解放军63850部队 | Blind watermarking method and system based on digital dot matrix and readable storage medium |
CN112215738A (en) * | 2020-09-14 | 2021-01-12 | 华东交通大学 | Two-dimensional code-based tamper-proof digital watermark method |
Also Published As
Publication number | Publication date |
---|---|
CN116506558A (en) | 2023-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sun et al. | A SVD-and quantization based semi-fragile watermarking technique for image authentication | |
Kang et al. | A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression | |
Chandrakar et al. | Performance comparison of digital Image watermarking techniques: a survey | |
CN107622470B (en) | Real-time robust digital watermark embedding and extracting method based on two-dimensional code | |
Thulasidharan et al. | QR code based blind digital image watermarking with attack detection code | |
Chandra et al. | Digital watermarking technique for protecting digital images | |
Pal et al. | Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image | |
Rajput et al. | Image tamper detection and self-recovery using multiple median watermarking | |
CN102208097A (en) | Network image copyright real-time distinguishing method | |
CN107103577A (en) | Half fragile uniqueness image watermark insertion and extracting method for integrity protection | |
El-sayed et al. | Adaptive difference expansion-based reversible data hiding scheme for digital images | |
Singh et al. | Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine | |
CN112215738A (en) | Two-dimensional code-based tamper-proof digital watermark method | |
Pal et al. | Robust watermarking scheme for tamper detection and authentication exploiting CA | |
Lin et al. | Semi-fragile watermarking scheme for authentication of JPEG images | |
Preda | Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain | |
Chamlawi et al. | Wavelet based image authentication and recovery | |
Singh et al. | An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability | |
Sinhal et al. | A multipurpose image watermarking scheme for digital image protection | |
Kannan et al. | An extensive research on robust digital image watermarking techniques: A review | |
CN108985082B (en) | Medical image encryption method based on digital watermark | |
Pal | A survey on digital watermarking and its application | |
Singh et al. | Transform domain techniques for image steganography | |
CN116506558B (en) | Method and device for communication based on dot matrix code and digital watermark image | |
Doke et al. | Digital signature scheme for image |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |