CN117494083A - Block chain-based watermark processing method, device, equipment and storage medium - Google Patents

Block chain-based watermark processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN117494083A
CN117494083A CN202311543482.0A CN202311543482A CN117494083A CN 117494083 A CN117494083 A CN 117494083A CN 202311543482 A CN202311543482 A CN 202311543482A CN 117494083 A CN117494083 A CN 117494083A
Authority
CN
China
Prior art keywords
watermark
information
blockchain
recovery
processed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311543482.0A
Other languages
Chinese (zh)
Inventor
徐荣蓉
闫倩
邹容桂
袁可
李玉杰
沈欣
彭涛
靳聪
刘珊珊
吉宜斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Zijin Jiangsu Innovation Research Institute Co ltd
China Mobile Communications Group Co Ltd
China Mobile Group Jiangsu Co Ltd
Original Assignee
China Mobile Zijin Jiangsu Innovation Research Institute Co ltd
China Mobile Communications Group Co Ltd
China Mobile Group Jiangsu Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Zijin Jiangsu Innovation Research Institute Co ltd, China Mobile Communications Group Co Ltd, China Mobile Group Jiangsu Co Ltd filed Critical China Mobile Zijin Jiangsu Innovation Research Institute Co ltd
Priority to CN202311543482.0A priority Critical patent/CN117494083A/en
Publication of CN117494083A publication Critical patent/CN117494083A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a watermark processing method, device and equipment based on a blockchain and a storage medium, and belongs to the technical field of blockchains. The invention obtains transaction information and copyright information of the object to be processed; generating a watermark to be embedded according to the transaction information and the copyright information; embedding the watermark to be embedded into the object to be processed through a target color brightness space component algorithm to obtain a carrier object and a recovery secret key; uploading the carrier object and the recovery key to the target blockchain. By the method, the real-time uplink of the recovery secret key, the transaction information and the copyright information is added in the watermark embedding process, the picture transaction information is recorded and processed in real time, the instantaneity and the credibility of the original watermark information are improved, and the object to be processed can be recovered through the recovery secret key when the watermark is added each time, so that the poor visibility of the original coefficient of the watermark is prevented.

Description

Block chain-based watermark processing method, device, equipment and storage medium
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a blockchain-based watermark processing method, apparatus, device, and storage medium.
Background
The digital watermark is used as an effective picture protection means, copyright information and unique signature of a copyright owner can be more concealed and injected into a carrier, common operations (transmission, copying and the like) cannot influence watermark extraction, and therefore the digital watermark has copyright authentication capability in the survival period of digital media. However, whether the original watermark information of the digital watermark is reliable or not and the copyright attribution after the picture transaction still has disputes.
In recent years, the characteristics of decentralization and non-tampering of the blockchain are applied to various fields, and the watermark information is stored on the blockchain, so that the transaction information and the signature information of copyright owners can be accurately recorded in the transaction process, and the problems of the original watermark information of the digital watermark being destroyed and the risk of copyright are effectively solved. Therefore, combining blockchain and digital watermark will have a wide application prospect in the field of digital copyright protection. Since the watermark information is embedded by modifying the coefficients of the picture frequency domain or the picture time domain in the prior art, the current coefficients and the original coefficients have great differences after multiple embedding operations, so that the visibility of the watermark is poorer and worse.
The foregoing is provided merely for the purpose of facilitating understanding of the technical solutions of the present invention and is not intended to represent an admission that the foregoing is prior art.
Disclosure of Invention
The invention mainly aims to provide a watermark processing method, device, equipment and storage medium based on a blockchain, and aims to solve the technical problem of poor visibility of watermarks in the prior art.
To achieve the above object, the present invention provides a blockchain-based watermarking method, including the steps of:
acquiring transaction information and copyright information of an object to be processed;
generating a watermark to be embedded according to the transaction information and the copyright information;
embedding the watermark to be embedded into the object to be processed through a target color brightness space component algorithm to obtain a carrier object and a recovery secret key;
uploading the carrier object and the recovery key to the target blockchain.
Optionally, the generating the watermark to be embedded according to the transaction information and the copyright information includes:
determining a transaction identification code according to the transaction information, and determining a copyright signature identification code according to the copyright information;
generating a binary sequence according to the transaction identification code and the copyright signature identification code;
and (3) carrying out rewriting and scrambling operation on the binary sequence to obtain the watermark to be embedded.
Optionally, the embedding the watermark to be embedded into the object to be processed through a target color brightness space component algorithm to obtain a carrier object and a recovery key, including:
determining an inverse transformation brightness component and a recovery secret key corresponding to the object to be processed according to a target color brightness space component algorithm;
and obtaining a carrier object according to the object to be processed, the inverse transformation brightness component and the watermark to be embedded.
Optionally, the determining, according to a target color luminance space component algorithm, the inverse transform luminance component and the recovery key corresponding to the object to be processed includes:
when the object to be processed is uploaded for the first time, performing domain conversion on the object to be processed, and extracting a brightness component;
performing target transformation on the brightness component to obtain a transformation coefficient;
grouping the transformation coefficients, and modifying target coefficients of each group to obtain modified transformation coefficients and a recovery key;
and carrying out inverse transformation on the modified transformation coefficient to obtain an inverse transformation brightness component.
Optionally, the determining, according to a target color luminance space component algorithm, the inverse transform luminance component and the recovery key corresponding to the object to be processed includes:
when the object to be processed is not uploaded for the first time, performing domain conversion on the object to be processed, and extracting a brightness component;
performing target transformation on the brightness component to obtain a transformation coefficient;
grouping the transformation coefficients, and modifying target coefficients of each group to obtain modified transformation coefficients and a recovery key;
coefficient recovery is carried out on the modified transformation coefficient according to the recovery secret key, and a recovery transformation coefficient is obtained;
and carrying out inverse transformation on the recovery transformation coefficient to obtain an inverse transformation brightness component, and generating a new recovery secret key.
Optionally, after uploading the carrier object and the recovery key to the target blockchain, the method further includes:
when a watermark extraction instruction is received, performing color gamut conversion on the carrier object to obtain an extracted brightness component;
performing target transformation on the extracted brightness component to obtain extraction coefficients and grouping the extraction coefficients;
calculating each group of extraction coefficients to obtain watermark information;
and performing reverse rewriting operation and scrambling recovery operation on the watermark information to obtain plaintext information.
Optionally, after performing the reverse rewriting operation and the scrambling recovery operation on the watermark information to obtain plaintext information, the method further includes:
when a copyright verification instruction is received, determining an object identification code according to the plaintext information;
acquiring actually embedded watermark information, and comparing the embedded watermark information with the plaintext information;
inquiring historical transaction information according to the object identification code;
in addition, in order to achieve the above purpose, the invention also provides a watermark processing device based on a blockchain, which comprises:
the information acquisition module is used for acquiring transaction information and copyright information of the object to be processed;
the watermark generation module is used for generating a watermark to be embedded according to the transaction information and the copyright information;
the watermark embedding module is used for embedding the watermark to be embedded into the object to be processed through a target color brightness space component algorithm to obtain a carrier object and a recovery secret key;
and the object uplink module is used for uploading the carrier object and the recovery key to the target blockchain.
In addition, to achieve the above object, the present invention also proposes a block chain-based watermarking apparatus including: a memory, a processor, and a blockchain-based watermarking program stored on the memory and running on the processor, the blockchain-based watermarking program configured to implement a blockchain-based watermarking method as described above.
In addition, to achieve the above object, the present invention also proposes a storage medium having stored thereon a blockchain-based watermarking program that, when executed by a processor, implements a blockchain-based watermarking method as described above.
The method acquires transaction information and copyright information of the object to be processed; generating a watermark to be embedded according to the transaction information and the copyright information; embedding the watermark to be embedded into the object to be processed through a target color brightness space component algorithm to obtain a carrier object and a recovery secret key; uploading the carrier object and the recovery key to the target blockchain. By the method, the real-time uplink of the recovery secret key, the transaction information and the copyright information is added in the watermark embedding process, the picture transaction information is recorded and processed in real time, the instantaneity and the credibility of the original watermark information are improved, and the object to be processed can be recovered through the recovery secret key when the watermark is added each time, so that the poor visibility of the original coefficient of the watermark is prevented.
Drawings
Fig. 1 is a schematic structural diagram of a blockchain-based watermarking device of a hardware running environment according to an embodiment of the present invention;
FIG. 2 is a flowchart of a first embodiment of a blockchain-based watermarking method of the present invention;
FIG. 3 is a schematic diagram of a processing node in an embodiment of a blockchain-based watermarking method of the present invention;
FIG. 4 is a diagram illustrating an overwrite operation in an embodiment of a blockchain-based watermarking method of the present invention;
FIG. 5 is a schematic diagram of a watermark embedding process for picture creation in an embodiment of a blockchain-based watermarking method of the present invention;
FIG. 6 is a schematic diagram illustrating picture recovery and watermark embedding in an embodiment of a blockchain-based watermarking method of the present invention;
FIG. 7 is a schematic diagram of information uplink in an embodiment of a blockchain-based watermarking method of the present invention;
FIG. 8 is a flowchart of a second embodiment of a blockchain-based watermarking method of the present invention;
FIG. 9 is a schematic diagram illustrating a watermark extraction process in an embodiment of a blockchain-based watermarking method of the present invention;
fig. 10 is a block diagram of a first embodiment of a blockchain-based watermarking apparatus.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a blockchain-based watermarking device in a hardware running environment according to an embodiment of the present invention.
As shown in fig. 1, the blockchain-based watermarking device may include: a processor 1001, such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002, a user interface 1003, a network interface 1004, a memory 1005. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a Wireless interface (e.g., a Wireless-Fidelity (Wi-Fi) interface). The Memory 1005 may be a high-speed random access Memory (Random Access Memory, RAM) Memory or a stable nonvolatile Memory (NVM), such as a disk Memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
Those skilled in the art will appreciate that the structure shown in fig. 1 does not constitute a limitation of a blockchain-based watermarking apparatus, and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 1, an operating system, a network communication module, a user interface module, and a blockchain-based watermarking program may be included in the memory 1005 as one storage medium.
In the blockchain-based watermarking device shown in fig. 1, the network interface 1004 is mainly used for data communication with a network server; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 in the blockchain-based watermarking apparatus of the present invention may be disposed in the blockchain-based watermarking apparatus, and the blockchain-based watermarking apparatus invokes the blockchain-based watermarking program stored in the memory 1005 through the processor 1001 and executes the blockchain-based watermarking method provided by the embodiment of the present invention.
An embodiment of the present invention provides a block chain based watermarking method, and referring to fig. 2, fig. 2 is a flowchart of a first embodiment of a block chain based watermarking method according to the present invention.
In this embodiment, the block chain-based watermarking method includes the following steps:
step S10: and acquiring transaction information and copyright information of the object to be processed.
In this embodiment, the execution body of the embodiment may be the blockchain-based watermarking device, where the blockchain-based watermarking device has functions of data processing, data communication, program running, and the like, and the blockchain-based watermarking device may be an intelligent terminal such as a computer, a server, and the like. Of course, other devices with similar functions may be used, and the implementation conditions are not limited thereto. For convenience of explanation, this embodiment will be described by taking a blockchain-based watermarking apparatus as an example.
It should be noted that with the continuous development of media technology, the market for visual materials is unprecedented. But the condition of picture copyright is optimistic and needs to be solved. The digital watermark is used as an effective picture protection means, copyright information and unique signature of a copyright owner can be more concealed and injected into a carrier, common operations (transmission, copying and the like) cannot influence watermark extraction, and therefore the digital watermark has copyright authentication capability in the survival period of digital media. However, whether the original watermark information of the digital watermark is reliable or not and the copyright attribution after the picture transaction still has disputes. In recent years, the characteristics of decentralization and non-tampering of the blockchain are applied to various fields, and the watermark information is stored on the blockchain, so that the transaction information and the signature information of copyright owners can be accurately recorded in the transaction process, and the problems of the original watermark information of the digital watermark being destroyed and the risk of copyright are effectively solved. Therefore, combining blockchain and digital watermark will have a wide application prospect in the field of digital copyright protection. At present, a plurality of schemes related to processing the picture watermark are adopted, for example, a hash encryption algorithm is utilized to carry out hash encryption processing on a first watermark element, so as to obtain a first hash value corresponding to the first watermark element. And carrying out watermark encryption processing on the picture to be processed by utilizing the watermark picture corresponding to the first hash value to obtain a target picture. And determining verification information of the picture associated content of the target picture, and uploading the verification information to a blockchain. For another example, the prior art includes a method for generating a watermark of a security image based on a blockchain and a discrete wavelet transform, which uses the discrete wavelet transform to obtain a discrete wavelet transform domain of the image, uses the difference between an edge coefficient of a LL wavelet coefficient and an expansion component as a watermark, and implements digital watermark embedding based on edge detection; reconstructing the image embedded with the watermark through inverse discrete wavelet transformation, and encrypting the reconstructed image through an algorithm; transmitting the image as blockchain data; decrypting the image, calculating the watermark of the decrypted image by using discrete wavelet transformation and edge detection, comparing the watermark with the original watermark, and judging whether the image or the watermark is tampered.
It should be understood that the existing technology can extract and verify the watermark information of the picture, but cannot be used for solving the copyright dispute of the picture, because the watermark information of the picture cannot prove to be a copyright owner, the source (watermark information) cannot guarantee the watermark information to be trusted, that is, the credibility of the watermark of the picture cannot be guaranteed, and whether the watermark of the picture belongs to the copyright owner or not and is tampered with or not cannot be proved. In addition, since the watermark information is embedded by modifying the coefficients of the picture frequency domain or the picture time domain in the prior art, after multiple embedding operations, the current coefficients and the original coefficients are greatly different, so that the invisibility of the watermark is poorer and worse. According to the scheme of the embodiment, the watermark processing node and the copyright verification node are additionally arranged, so that watermark information is embedded into the picture in real time, the whole life cycle of the picture has copyright protection capability, and meanwhile, the problem that the watermark information cannot be updated in real time in the traditional watermark mode is effectively solved. By means of the characteristic that the blockchain is not tamperable, transaction information and copyright information are recorded, and the problems that original watermark information is not credible and transaction records are difficult to trace in a traditional watermarking mode are solved. A new watermark information structure is provided, and compared with the traditional watermark algorithm, the accuracy is improved. A new watermark embedding algorithm is provided, and before each watermark embedding, the picture is restored, so that the problem that the prior watermark algorithm is poor in invisibility after multiple embedding is solved.
In a specific implementation, the scheme of the embodiment provides a watermark processing method based on a blockchain, and as shown in fig. 3, a new blockchain front node is designed, wherein the new blockchain front node comprises a watermark processing node and a copyright verification node, so that the instantaneity and the accuracy of watermark processing and copyright verification are improved; and a novel watermark information structure and watermark embedding algorithm are provided creatively, the accuracy of watermark extraction and the invisibility after watermark embedding for multiple times are improved, and the quality of pictures and the capability of picture copyright protection are greatly enhanced. A group of watermarking nodes are added between the application and the blockchain, and the main functions of the watermarking nodes include extracting picture information, restoring watermarks, generating new watermark information, embedding the watermarks, uploading information and the like.
It should be noted that, the object to be processed may be any data type, and the embodiment is illustrated in the form of a picture, where the transaction information refers to related information of both parties of the buyer and the seller when the object to be processed performs the transaction, and the transaction time, and the copyright information refers to related information of the corresponding copyright signature in the object to be processed.
Step S20: and generating a watermark to be embedded according to the transaction information and the copyright information.
It should be understood that the generation of the watermark to be embedded according to the transaction information and the copyright information relies on the watermark structure designed by the scheme of the embodiment, and then the transaction information and the copyright information are rewritten and spliced to obtain the watermark to be embedded.
Further, in order to generate the watermark to be embedded, step S20 includes: determining a transaction identification code according to the transaction information, and determining a copyright signature identification code according to the copyright information; generating a binary sequence according to the transaction identification code and the copyright signature identification code; and (3) carrying out rewriting and scrambling operation on the binary sequence to obtain the watermark to be embedded.
In a specific implementation, the watermark information comprises two parts of transaction information and copyright information, wherein the picture transaction information comprises a user ID and a transaction ID of both parties of the transaction, and the copyright information comprises a copyright signature. Specifically, the transaction information and the copyright information are represented by binary sequences, and before overwriting as shown in fig. 4, the user IDs of both transaction parties are 32 bits, the transaction ID is 64 bits, and the copyright signature is 128 bits. That is, the picture watermark information may be determined according to the transaction information and the copyright information of the picture, and further, each bit of the binary sequence included in the picture watermark is subjected to 3 rewriting operations, for example, 111000111000 after 1010 rewriting operations, as shown in fig. 4, when the picture watermark is generated.
It should be noted that, as shown in fig. 4, the first segment is the ID of the seller of the transaction; the second section is the ID of the transaction; the third section of ID of the buyer (current copyright owner) of the transaction; the fourth segment is a copyright signature consisting of a 64-bit copyright party unique identification code consisting of a 64-bit random binary sequence, and a 64-bit bitmap slice ID. The main flow of generating the watermark is as follows: 1) Acquiring current transaction information, picture information and copyright information; 2) And generating binary sequences of the user, transaction and copyright signatures according to the rules. If the picture watermark is created for the first time, i.e. it indicates that the picture has not been transacted before, the first and second sequences are all set to 0; 3) Carrying out rewriting operation on the binary sequence in the step 2, wherein each bit is rewritten for 3 times; 4) The Arnold scrambling algorithm is utilized to confuse the rewritten sequence to obtain watermark information Win, and the confused Win is a nonsensical sequence, so that the watermark can be effectively prevented from being cracked by violence, and the original watermark information is prevented from being leaked.
Step S30: and embedding the watermark to be embedded into the object to be processed through a target color brightness space component algorithm to obtain a carrier object and a recovery secret key.
It should be understood that after obtaining the watermark to be embedded, the watermark to be embedded is processed through a preset target color brightness space component algorithm, so that the watermark to be embedded is embedded into the object to be processed, a carrier object is obtained, and a recovery key for the watermark embedding is generated. The target color luminance spatial component algorithm is a quantized modulated watermark algorithm with recoverability.
Further, in order to perform watermark embedding, step S30 includes: determining an inverse transformation brightness component and a recovery secret key corresponding to the object to be processed according to a target color brightness space component algorithm; and obtaining a carrier object according to the object to be processed, the inverse transformation brightness component and the watermark to be embedded.
In a specific implementation, since the picture is inevitably changed in the watermark embedding process, especially the frequent embedding of the picture watermark in the present proposal will have a great influence on the picture quality. The present proposal therefore proposes a new quantized modulation watermarking algorithm with recoverability. The algorithm embeds watermark information by modifying the last coefficient of each group of the YCbCr color space brightness components after DCT transformation and 4*4 grouping, has restorability, and can completely restore the modified DCT coefficient when embedding the watermark according to the embedded watermark information and the restoration key, and the specific flow is shown in figure 5.
Further, in order to generate a carrier object and generate a recovery key when an object to be processed is first uploaded, the step of determining an inverse transform luminance component and a recovery key corresponding to the object to be processed according to a target color luminance space component algorithm includes: when the object to be processed is uploaded for the first time, performing domain conversion on the object to be processed, and extracting a brightness component; performing target transformation on the brightness component to obtain a transformation coefficient; grouping the transformation coefficients, and modifying target coefficients of each group to obtain modified transformation coefficients and a recovery key; and carrying out inverse transformation on the modified transformation coefficient to obtain an inverse transformation brightness component.
It should be noted that, when the picture is first created and uploaded, the main flow is as follows:
1) Generating a picture I a Watermark information of (a) is provided. According to the target color brightness space component algorithm, since there is no transaction information, the first segment and the second segment are set to 0, and watermark information is generated according to the user ID, the unique identification code, and the picture ID of the creator.
2) Picture I a Conversion from RGB domain to YC b C r A domain and extracting a luminance component Y;
3) Performing 2D-DCT on the brightness component Y to obtain DCT coefficient D Y D is to Y Grouping 4*4;
reading the watermark w to be embedded currently in Is the ith value w of (2) in (i) And embedding the watermark by modifying the last coefficient d of the i-th group in step 3), while generating a recovery key a:
where d' (i) is the modified coefficient; delta is the quantization step length and the value is 10; floor is a downward rounding function; mod is a modulo function.
5) The modified coefficient D Y Performing 2D-IDCT inverse transformation to obtain new brightness component Y n
6) Y is set to n And former(s)C of image b 、C r Domain merging, converting into RGB domain, obtaining w according to watermark information in To embedded watermark w in Post carrier picture I b
Further, in order to perform watermark embedding when the object to be processed is not uploaded for the first time, the step of determining the inverse transform luminance component and the recovery key corresponding to the object to be processed according to the target color luminance space component algorithm includes: when the object to be processed is not uploaded for the first time, performing domain conversion on the object to be processed, and extracting a brightness component; performing target transformation on the brightness component to obtain a transformation coefficient; grouping the transformation coefficients, and modifying target coefficients of each group to obtain modified transformation coefficients and a recovery key; coefficient recovery is carried out on the modified transformation coefficient according to the recovery secret key, and a recovery transformation coefficient is obtained; and carrying out inverse transformation on the recovery transformation coefficient to obtain an inverse transformation brightness component, and generating a new recovery secret key.
It should be noted that, as shown in fig. 6, the process of recovering the picture and embedding the watermark when the object to be processed is not uploaded for the first time is different from the process of embedding the watermark when the picture is transacted in that: 1. the input picture is a carrier picture after the last watermark embedding; 2. the coefficient recovery step is added.
It should be appreciated that the original DCT coefficient recovery process is performed first: 1) Will have embedded the watermark w in Picture I of (2) b Conversion from RGB domain to YC b C r A domain and extracting a luminance component Y; 2) Performing 2D-DCT on the brightness component Y to obtain coefficient D Y D is to Y Grouping 4*4; restoring the last coefficient D (i) of the group of original slice luminance components Y after 2D-DCT transform according to:
wherein w is in (i) A first value that is the last watermark information; d' (i) is w in (i) Embedding the coefficients modified in a time step; a (i) is when the watermark is embedded last timeThe ith value in the generated recovery key, and w in (i) Corresponding to the above; delta is the quantization step length and takes a value of 10.
In a specific implementation, the watermark re-embedding step is the same as the embedding step of the first creation of the picture. After the watermark is embedded, obtaining the picture, watermark information and watermark recovery key of the transaction embedded with the watermark.
For pictures not first watermarked, e.g. picture I b The watermark information is updated according to the related information of the current picture transaction to obtain new watermark information, the original DCT coefficient is recovered according to the recovery key a obtained in the watermark embedding process to obtain the recovered original DCT coefficient, and watermark embedding operation is carried out according to the original DCT coefficient and the new watermark information to obtain a picture I re-embedded with watermark c I.e. a carrier object. Wherein a new recovery key a' is available during re-embedding of the watermark.
Step S40: uploading the carrier object and the recovery key to the target blockchain.
It should be appreciated that after watermark embedding is completed, the transaction information, owner signature and recovery key on the blockchain are updated and the picture is sent to the new copyrighter, as shown in fig. 7.
The embodiment obtains transaction information and copyright information of an object to be processed; generating a watermark to be embedded according to the transaction information and the copyright information; embedding the watermark to be embedded into the object to be processed through a target color brightness space component algorithm to obtain a carrier object and a recovery secret key; uploading the carrier object and the recovery key to the target blockchain. By the method, the real-time uplink of the recovery secret key, the transaction information and the copyright information is added in the watermark embedding process, the picture transaction information is recorded and processed in real time, the instantaneity and the credibility of the original watermark information are improved, and the object to be processed can be recovered through the recovery secret key when the watermark is added each time, so that the poor visibility of the original coefficient of the watermark is prevented.
Referring to fig. 8, fig. 8 is a flowchart of a second embodiment of a blockchain-based watermarking method according to the present invention.
Based on the first embodiment, the blockchain-based watermarking method of the present embodiment further includes, after the step S40:
step S401: and when receiving a watermark extraction instruction, performing color gamut conversion on the carrier object to obtain an extracted brightness component.
It should be noted that, the watermark-containing carrier picture is converted from the RGB domain to the YCbCr domain, resulting in the extracted luminance component Y.
Step S402: and carrying out target transformation on the extracted brightness component to obtain extraction coefficients and grouping the extraction coefficients.
It will be appreciated that Y is subjected to a 2D-DCT transform to obtain coefficients DY, and DY is grouped 4*4.
Step S403: and calculating the extraction coefficients of each group to obtain watermark information.
In a specific implementation, the ith watermark information w is calculated according to the following formula out (i):
Step S404: and performing reverse rewriting operation and scrambling recovery operation on the watermark information to obtain plaintext information.
It should be noted that, after all watermark extraction is finished, watermark information is obtained, reverse rewriting operation is performed, and Arnold scrambling recovery operation is performed on the watermark information to obtain plaintext information containing transaction information and copyright signature, and the watermark extraction process is shown in FIG. 9.
It should be understood that the reverse overwrite is a packet operation of length 3 on the extracted watermark information, and that the number of 0 and 1 in the 3-bit 2-ary number is greater, that is, the watermark before the overwrite is determined. The operation is based on the statistical characteristics, so that the accuracy of watermark extraction is effectively improved.
Further, in order to perform copyright verification after watermark extraction, after step S404, the method further includes: when a copyright verification instruction is received, determining an object identification code according to the plaintext information; acquiring actually embedded watermark information, and comparing the embedded watermark information with the plaintext information; inquiring historical transaction information according to the object identification code; and determining a copyright verification result according to the historical transaction information and the comparison result.
It should be understood that, in normal cases, whether the md5 value of the picture is the same as that of the picture to be verified can verify that the copyright belongs to, but in general scenes, the user changes the picture through operations such as clipping, editing and the like, so that the picture is difficult to verify by the method. According to the method, the copyright verification is carried out by extracting the picture watermark information, the picture copyright information can be effectively identified in most scenes, and the copyright protection capability is greatly improved. The main functions include watermark extraction and copyright verification.
In the implementation, when the similarity between the extracted watermark and the actually embedded watermark reaches more than 95%, the copyright of the picture can be judged to belong to the copyright party represented by the current unique identification code. In addition, all historical transaction information associated with the picture can be queried by extracting the picture ID in the watermark information. Therefore, the actually embedded watermark information is compared with the watermark related information in the plaintext information, and then the historical transaction information is combined for tracing discrimination, so that the copyright verification result is finally obtained.
In the embodiment, when a watermark extraction instruction is received, performing color gamut conversion on the carrier object to obtain an extracted brightness component; performing target transformation on the extracted brightness component to obtain extraction coefficients and grouping the extraction coefficients; calculating each group of extraction coefficients to obtain watermark information; and performing reverse rewriting operation and scrambling recovery operation on the watermark information to obtain plaintext information. By the method, a new picture copyright protection structure based on the block chain is realized, the picture copyright protection structure comprises the watermark embedding node and the copyright verification node, the watermark processing and copyright verification efficiency is improved, and the double guarantee of picture copyright is realized.
In addition, the embodiment of the invention also provides a storage medium, wherein the storage medium is stored with a block chain-based watermarking program, and the block chain-based watermarking program realizes the steps of the block chain-based watermarking method when being executed by a processor.
Because the storage medium adopts all the technical schemes of all the embodiments, the storage medium has at least all the beneficial effects brought by the technical schemes of the embodiments, and the description is omitted here.
Referring to fig. 10, fig. 10 is a block diagram of a first embodiment of a blockchain-based watermarking apparatus of the present invention.
As shown in fig. 10, a block chain-based watermarking apparatus according to an embodiment of the present invention includes:
the information acquisition module 10 is configured to acquire transaction information and copyright information of an object to be processed.
The watermark generation module 20 is configured to generate a watermark to be embedded according to the transaction information and the copyright information.
The watermark embedding module 30 is configured to embed the watermark to be embedded into the object to be processed through a target color brightness space component algorithm, so as to obtain a carrier object and a recovery key.
An object chaining module 40, configured to upload the carrier object and the recovery key to the target blockchain.
The embodiment obtains transaction information and copyright information of an object to be processed; generating a watermark to be embedded according to the transaction information and the copyright information; embedding the watermark to be embedded into the object to be processed through a target color brightness space component algorithm to obtain a carrier object and a recovery secret key; uploading the carrier object and the recovery key to the target blockchain. By the method, the real-time uplink of the recovery secret key, the transaction information and the copyright information is added in the watermark embedding process, the picture transaction information is recorded and processed in real time, the instantaneity and the credibility of the original watermark information are improved, and the object to be processed can be recovered through the recovery secret key when the watermark is added each time, so that the poor visibility of the original coefficient of the watermark is prevented.
In an embodiment, the watermark generation module 20 is further configured to determine a transaction identifier according to the transaction information, and determine a copyright signature identifier according to the copyright information; generating a binary sequence according to the transaction identification code and the copyright signature identification code; and (3) carrying out rewriting and scrambling operation on the binary sequence to obtain the watermark to be embedded.
In an embodiment, the watermark embedding module 30 is further configured to determine an inverse transform luminance component and a recovery key corresponding to the object to be processed according to a target color luminance space component algorithm; and obtaining a carrier object according to the object to be processed, the inverse transformation brightness component and the watermark to be embedded.
In an embodiment, the watermark embedding module 30 is further configured to perform domain conversion on the object to be processed and extract a luminance component when the object to be processed is uploaded for the first time; performing target transformation on the brightness component to obtain a transformation coefficient; grouping the transformation coefficients, and modifying target coefficients of each group to obtain modified transformation coefficients and a recovery key; and carrying out inverse transformation on the modified transformation coefficient to obtain an inverse transformation brightness component.
In an embodiment, the watermark embedding module 30 is further configured to perform domain conversion on the object to be processed and extract a luminance component when the object to be processed is not uploaded for the first time; performing target transformation on the brightness component to obtain a transformation coefficient; grouping the transformation coefficients, and modifying target coefficients of each group to obtain modified transformation coefficients and a recovery key; coefficient recovery is carried out on the modified transformation coefficient according to the recovery secret key, and a recovery transformation coefficient is obtained; and carrying out inverse transformation on the recovery transformation coefficient to obtain an inverse transformation brightness component, and generating a new recovery secret key.
In an embodiment, the object uplink module 40 is further configured to perform color gamut conversion on the carrier object to obtain an extracted luminance component when receiving a watermark extraction instruction; performing target transformation on the extracted brightness component to obtain extraction coefficients and grouping the extraction coefficients; calculating each group of extraction coefficients to obtain watermark information; and performing reverse rewriting operation and scrambling recovery operation on the watermark information to obtain plaintext information.
In one embodiment, the object uplink module 40 is further configured to determine an object identification code according to the plaintext information when receiving a copyright verification instruction; acquiring actually embedded watermark information, and comparing the embedded watermark information with the plaintext information; inquiring historical transaction information according to the object identification code; and determining a copyright verification result according to the historical transaction information and the comparison result.
It should be understood that the foregoing is illustrative only and is not limiting, and that in specific applications, those skilled in the art may set the invention as desired, and the invention is not limited thereto.
It should be noted that the above-described working procedure is merely illustrative, and does not limit the scope of the present invention, and in practical application, a person skilled in the art may select part or all of them according to actual needs to achieve the purpose of the embodiment, which is not limited herein.
In addition, technical details that are not described in detail in this embodiment may refer to the blockchain-based watermarking method provided in any embodiment of the present invention, and are not described herein.
Furthermore, it should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. Read Only Memory)/RAM, magnetic disk, optical disk) and including several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (10)

1. A blockchain-based watermarking method, the blockchain-based watermarking method comprising:
acquiring transaction information and copyright information of an object to be processed;
generating a watermark to be embedded according to the transaction information and the copyright information;
embedding the watermark to be embedded into the object to be processed through a target color brightness space component algorithm to obtain a carrier object and a recovery secret key;
uploading the carrier object and the recovery key to the target blockchain.
2. The blockchain-based watermarking method of claim 1, wherein the generating a watermark to be embedded from the transaction information and the copyright information includes:
determining a transaction identification code according to the transaction information, and determining a copyright signature identification code according to the copyright information;
generating a binary sequence according to the transaction identification code and the copyright signature identification code;
and (3) carrying out rewriting and scrambling operation on the binary sequence to obtain the watermark to be embedded.
3. The blockchain-based watermarking method according to claim 1, wherein the embedding the watermark to be embedded into the object to be processed by a target color luminance space component algorithm to obtain a carrier object and a recovery key includes:
determining an inverse transformation brightness component and a recovery secret key corresponding to the object to be processed according to a target color brightness space component algorithm;
and obtaining a carrier object according to the object to be processed, the inverse transformation brightness component and the watermark to be embedded.
4. A blockchain-based watermarking method according to claim 3, wherein the determining the inverse transform luminance component and the recovery key corresponding to the object to be processed according to a target color luminance space component algorithm includes:
when the object to be processed is uploaded for the first time, performing domain conversion on the object to be processed, and extracting a brightness component;
performing target transformation on the brightness component to obtain a transformation coefficient;
grouping the transformation coefficients, and modifying target coefficients of each group to obtain modified transformation coefficients and a recovery key;
and carrying out inverse transformation on the modified transformation coefficient to obtain an inverse transformation brightness component.
5. A blockchain-based watermarking method according to claim 3, wherein the determining the inverse transform luminance component and the recovery key corresponding to the object to be processed according to a target color luminance space component algorithm includes:
when the object to be processed is not uploaded for the first time, performing domain conversion on the object to be processed, and extracting a brightness component;
performing target transformation on the brightness component to obtain a transformation coefficient;
grouping the transformation coefficients, and modifying target coefficients of each group to obtain modified transformation coefficients and a recovery key;
coefficient recovery is carried out on the modified transformation coefficient according to the recovery secret key, and a recovery transformation coefficient is obtained;
and carrying out inverse transformation on the recovery transformation coefficient to obtain an inverse transformation brightness component, and generating a new recovery secret key.
6. The blockchain-based watermarking method of claim 1, wherein after uploading the carrier object and the recovery key to the target blockchain, further comprising:
when a watermark extraction instruction is received, performing color gamut conversion on the carrier object to obtain an extracted brightness component;
performing target transformation on the extracted brightness component to obtain extraction coefficients and grouping the extraction coefficients;
calculating each group of extraction coefficients to obtain watermark information;
and performing reverse rewriting operation and scrambling recovery operation on the watermark information to obtain plaintext information.
7. The blockchain-based watermarking method according to claim 6, wherein after performing a reverse rewrite operation and a scrambling recovery operation on the watermark information to obtain plaintext information, further comprising:
when a copyright verification instruction is received, determining an object identification code according to the plaintext information;
acquiring actually embedded watermark information, and comparing the embedded watermark information with the plaintext information;
inquiring historical transaction information according to the object identification code;
and determining a copyright verification result according to the historical transaction information and the comparison result.
8. A blockchain-based watermarking apparatus, the blockchain-based watermarking apparatus comprising:
the information acquisition module is used for acquiring transaction information and copyright information of the object to be processed;
the watermark generation module is used for generating a watermark to be embedded according to the transaction information and the copyright information;
the watermark embedding module is used for embedding the watermark to be embedded into the object to be processed through a target color brightness space component algorithm to obtain a carrier object and a recovery secret key;
and the object uplink module is used for uploading the carrier object and the recovery key to the target blockchain.
9. A blockchain-based watermarking device, the blockchain-based watermarking device comprising: a memory, a processor, and a blockchain-based watermarking program stored on the memory and running on the processor, the blockchain-based watermarking program configured to implement the blockchain-based watermarking method of any of claims 1 to 7.
10. A storage medium having stored thereon a blockchain-based watermarking program that when executed by a processor implements a blockchain-based watermarking method as claimed in any of claims 1 to 7.
CN202311543482.0A 2023-11-17 2023-11-17 Block chain-based watermark processing method, device, equipment and storage medium Pending CN117494083A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311543482.0A CN117494083A (en) 2023-11-17 2023-11-17 Block chain-based watermark processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311543482.0A CN117494083A (en) 2023-11-17 2023-11-17 Block chain-based watermark processing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117494083A true CN117494083A (en) 2024-02-02

Family

ID=89672534

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311543482.0A Pending CN117494083A (en) 2023-11-17 2023-11-17 Block chain-based watermark processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117494083A (en)

Similar Documents

Publication Publication Date Title
Holliman et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
Chang et al. A watermarking-based image ownership and tampering authentication scheme
Wang et al. A majority-voting based watermarking scheme for color image tamper detection and recovery
Barni et al. Digital watermarking
Wang et al. Reversible data hiding in encrypted images with block-based adaptive MSB encoding
JP4625841B2 (en) System and method for digital content security
US8379911B2 (en) Method and system for efficient watermarking of video content
Santoso et al. An improved message capacity and security using divide and modulus function in spatial domain steganography
Chandramouli et al. Digital watermarking
Chang et al. Robust authentication scheme for protecting copyrights of images and graphics
CN111861844A (en) Reversible watermarking method based on image block authentication
CN109785222B (en) Method for quickly embedding and extracting information of webpage
Kumar et al. An Adaptive Approach for image adaptive watermarking using Elliptical curve cryptography (ECC).
Bhautmage et al. Advanced video steganography algorithm
Rai et al. Analysis of image steganography techniques: a survey
CN111882477A (en) Self-adaptive zero-watermarking method combining visual password and enhanced singular value decomposition
Hadmi et al. A robust and secure perceptual hashing system based on a quantization step analysis
Ling et al. Watermarking for image authentication
CN117494083A (en) Block chain-based watermark processing method, device, equipment and storage medium
Shady et al. Local features-based watermarking for image security in social media
Pik-Wah Digital video watermarking techniques for secure multimedia creation and delivery
Quist-Aphetsi et al. Validating of digital forensic images using SHA-256
Bhattacharyya et al. Watermarking Using Multiresolution Cosine Transformation: A Review
Liu et al. Reversible data hiding in encrypted images based on bit-plane rearrangement and Huffman coding
CN113194319B (en) Encryption and decryption method and system for exchange cipher watermark

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination