CN1321393C - Watermark method using geometry calibrated anti geometry conversion image - Google Patents

Watermark method using geometry calibrated anti geometry conversion image Download PDF

Info

Publication number
CN1321393C
CN1321393C CNB021496145A CN02149614A CN1321393C CN 1321393 C CN1321393 C CN 1321393C CN B021496145 A CNB021496145 A CN B021496145A CN 02149614 A CN02149614 A CN 02149614A CN 1321393 C CN1321393 C CN 1321393C
Authority
CN
China
Prior art keywords
watermark
image
visual
template
dwt
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB021496145A
Other languages
Chinese (zh)
Other versions
CN1414778A (en
Inventor
康显桂
黄继武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
National Sun Yat Sen University
Original Assignee
National Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Sun Yat Sen University filed Critical National Sun Yat Sen University
Priority to CNB021496145A priority Critical patent/CN1321393C/en
Publication of CN1414778A publication Critical patent/CN1414778A/en
Application granted granted Critical
Publication of CN1321393C publication Critical patent/CN1321393C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0064Geometric transfor invariant watermarking, e.g. affine transform invariant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain

Abstract

The present invention relates to a method for geometrically calibrating an image and protecting a digital image, which belongs to the field of multimedia signal processing. Through spread spectrum modulation and interweavement, an information watermark embedded in an image DWT domain is synchronously detected by a matching template embedded in an image DFT domain and a training sequence embedded in the image DWT domain. When a watermark image is simultaneously compressed by JPEG and geometrically deformed, the error-free detection of meaningful information can still be realized. The present invention can protect digital images or video data propagated through network, and the method for geometrically calibrating an image, which is provided by the present invention, can also be used for other occasions which need image synchronization, such as satellite imagery, interactive digital maps, digital watermarks, etc.

Description

Adopt the method for image geometry calibration and protection digital image
Technical field
The present invention relates to a kind of field of multimedia signal processing, is the method for a kind of image geometry calibration and protection digital image.
Background technology
At present, watermark Against Geometrical Attacks has the method for non-blind Detecting and blind Detecting.In general, the robustness of blind Detecting water mark method is relatively poor.But owing to do not need raw image, its range of application is wider, also has more challenge.It can be divided into two classes again: first kind method is that watermark is embedded in the image feature territory with geometric invariance, as the Fourier-Mellin territory, makes geometry deformation not influence the extraction of watermark information.But these class methods all can only be resisted RST, also have difficulties in realization, for example when the amplitude spectrum of visual DFT conversion being LPM (Log Polar Mapping), because interpolation error can cause the serious decline of image quality with ILPM (Inverse LogPolar Mapping).Second class is to cause under the situation of watermark detection step-out at geometry deformation, and it is synchronous with the weight of realizing watermark detection to manage to carry out geometry correction earlier before watermark detection.This need also embed a geometric correction model watermark (template watermark) except that hiding the watermark (information watermark) of carrying user profile in image.Up to the present, also there are many problems in Against Geometrical Attacks, comprises that the hiding data amount is few, relatively poor, the anti-JPEG of the invisibility of watermark compresses and anti-affined transformation ability is weak, can not resist the combination attacks of JPEG compression and geometric transformation etc. simultaneously.In addition, many methods adopt and embed the information watermark in the DFT territories, and DFT (Discrete FourierTransform) compares with DWT (Discrete Wavelet Transform), has the weakness of self, is difficult to become the basis of main flow water mark method.
Summary of the invention
The objective of the invention is to propose a kind of sane stealthy visual blind Detecting water mark method that can resist general signal Processing such as JPEG compression and geometric transformation simultaneously, and the quantity of information of hiding (quiet lotus) is big (can reach more than 200 bits), and the invisibility of watermark is better.
The method of calibration of the inventive method image geometry and protection digital image, at first the information watermark is embedded in the visual DWT territory with a training sequence through band spectrum modulation with after interweaving, again a matching template is embedded into visual DFT territory, be embedded in the heavy synchronous detection of the information watermark in the visual DWT territory after realizing band spectrum modulation and interweave by matching template that is embedded in visual DFT territory and the training sequence that is embedded in visual DWT territory at last, specific practice is: 1) meaningful information b to be embedded (L bits) is at first carried out the spread spectrum coding modulation with a pseudo-random binary PN sequence that is produced by key, can obtain scale-of-two watermark data W to be embedded like this, and then interweave; To adopt the method that quantizes modulation directly to be embedded in the LL that visual DWT conversion obtains by the training sequence T that the pseudo-random code that key produces is formed 3In the central row of subband and central series sub-band coefficients or other sub-band coefficients, and the method that adopts quantification to modulate in all the other sub-band coefficients embeds the scale-of-two watermark data W after interweaving; By 2-D IDWT obtain embedding the watermark of DWT territory visual f ' (x, y); 2) (x y) carries out the DFT conversion, and the method that we adopt addition to embed in the amplitude spectrum coefficient of DFT conversion embeds a matching template, and template point position is produced by a cipher controlled with f '; 3) testing process is the inverse process of telescopiny, detect matching template earlier, and after relatively obtaining the transformation matrix of the affined transformation that image stood and do inverse transformation recovering geometric configuration with original matching template, do visual translation calibration back according to training sequence again and extract watermark information.
For detect the image stand the transformation matrix of affined transformation and recover its original geometry do inverse transformation, can embed a matching template that is made of a little louder local pole in the amplitude spectrum coefficient of visual DFT conversion, a little bigger position of local pole can be produced by a cipher controlled; Embed a training sequence simultaneously in visual DWT territory and be used for the translation calibration.
The information watermark that is embedded in the visual DWT territory through band spectrum modulation with after interweaving realizes heavy synchronous detection by matching template that is embedded in visual DFT territory and the training sequence that is embedded in visual DWT territory; The detection two big steps that are divided into the embedding and the watermark of watermark.
1, the embedding of watermark:
The present invention is embedded in the information watermark in the low frequency sub-band coefficient in visual DWT territory, and the template watermark is embedded in the amplitude spectrum intermediate frequency coefficient after the visual DFT conversion, and two parts watermark is not disturbed mutually like this, can obtain better robustness again.The image watermark embedding grammar block scheme that the present invention proposes as shown in Figure 1.
2: the detection of watermark:
Do not need the auxiliary of raw image, the inventive method can detect the data of hiding and obtain from the watermark image that may suffer geometric attack and JPEG compression simultaneously.Testing process is as follows:
A) when watermark detection, at first want the watermark of application training Sequence Detection whether synchronous.If asynchronous, then must be earlier through the overweight synchronous image g that obtains synchronously *(x, y).It is heavy that to comprise that synchronously plate watermark detection, contrary affined transformation, the translation of application training sequence are touched in the DFT territory synchronous.If synchronously, directly do a step.
B) to synchronous image g *(x y) makes DWT territory watermark detection, has obtained actual hiding data.
Watermark embed process mainly contains the embedding of the DWT territory watermark pre-service of (comprising information watermark, training sequence), the watermark of DWT territory and embedding three parts that the plate watermark is touched in the DFT territory.
The pre-service of 1) DWT territory watermark (information watermark, training sequence): direct sequence spread spectrum is encoded, is interweaved.
The present invention introduces the robustness and the secret that hide Info with enhancing in the image watermark method with technology commonly used in some communication theories (as the direct sequence spread spectrum modulation and interweave).
Suppose that the raw image size is 512 * 512.Application length is N 1PN sign indicating number sequence m={m jJ=1 ..., N 1Information b{b to embedding iI=1 ..., L} (b wherein j∈ 0,1}) carry out the spread spectrum coding modulation." 1 " is modulated to m (bipolar sequence, m j∈ 1, positive sequence 1}), i.e. {+1 * m iJ=1 ..., N 1, " 0 " is modulated to the anti-phase sequence of m, i.e. { 1 * m jJ=1 ..., N 1.15 PN sign indicating number sequence is produced by PN sign indicating number sequencer by a key.Can obtain scale-of-two watermark data W to be embedded like this:
b i &RightArrow; DSSS c o d i n g W i { w ij ; w ij &Element; { - 1 , + 1 } 1 &le; j < N 1 , 1 &le; i < L }
Training sequence is that can the information watermark realize the key that translation is synchronous, and for make its influence that is subjected to visual cutting less as far as possible, it should be embedded in needs to lay special stress on protecting the low frequency sub-band position of part correspondence or the central row and the central series of low frequency sub-band in the image.Be embedded in 32 row and 32 row of low frequency sub-band as shown in Figure 2.And in the remainder of low frequency sub-band, embed through the scale-of-two watermark data W after interweave (adopting 2-dimensional interleaving technology or other interleaving technologies).
Deposit 127 training sequences on 32 row of one 64 * 64 two-dimensional matrix and 32 column positions, all the other sequence of positions are deposited the scale-of-two watermark data W afterwards that interweaves, and the two-dimensional matrix that obtains is become an one-dimension array by line scanning, are designated as X.
The embedding and the detection method of 2) DWT territory watermark (information watermark, training sequence)
(x y) carries out three grades of DWT and decomposes, low frequency sub-band LL the embedding raw image f of DWT territory watermark 3Coefficient becomes one-dimension array by line scanning, is designated as C.By formula (1), we are added to binary data X on the low frequency coefficient C, obtain new low frequency coefficient c ':
Figure C0214961400082
0≤i<4096 wherein, C (i), C ' (i), x iBe respectively i the element of C, C ', X.α represents embedment strength, is satisfying under the prerequisite of invisibility, selects maximum round values as far as possible.With the wavelet coefficient behind the embed watermark carry out IDWT obtain embedding the watermark of DWT territory visual f ' (x, y).
The detection of DWT territory watermark is synchronous visual g *(x, the low frequency sub-band LL after y) DWT decomposes 3Coefficient becomes one-dimension array by line scanning, is designated as C *The binary data that extracts is designated as X *={ x i -, it is as follows to extract formula:
x i * = + 1 , ( C * ( i ) mod a ) &GreaterEqual; a 2 x i * = - 1 , otherwise - - - ( 2 )
0≤i<4096 wherein, α is an embedment strength.With the binary data X that extracts *Carry out reciprocal cross and knit the binary data sequence W that (inverse process that interweaves) recovers embedding *W then *Carry out segmentation by 15 bits, every section is carried out relevantly with the sequence m of 15bits, if correlation is greater than 0, then to embed information bit be " 1 " in judgement, otherwise judgement embedding information bit is " 0 ".Just obtain the embedding information recovered after the despreading.
3) embedding of DFT territory template and detection
(x, DFT territory y) embeds the synchronizing information after a template is out of shape as watermark image to visual f ' after embedding DWT territory watermark.
The embedding of template divides following four steps:
A) (x, y) (512 * 512) extend to 1024 * 1024 around filling with average with f '.
B) do the DFT conversion, get the fourier coefficient range weight.(normalized frequency is 0.20~0.30) embeds 28 template points in the intermediate frequency zone, and being evenly distributed in inclination angle, DFT territory is θ 1And θ 2Two straight lines, 14 points on the every line, Fig. 2 is the synoptic diagram of embedded template, the situation of 14 the template points of poincare half plane that only draw among the figure, lower half-plane also embeds 14 template points about former point symmetry.The inclination angle of straight line and the utmost point of template point footpath are produced by a key pseudorandom.
C) the mould value of increase template point place fourier coefficient, (can adopt radius is the circular window of R, maximum value as shown in Figure 3) to make it to become regional area.The change amount is standard with invisible, and generally getting maximum value is that local mean values adds the variance about several times to tens times.
D) calculate inverse fourier transform (IDFT) and obtain final watermark image f " (x, y).
Image will produce the corresponding linear conversion in the DFT territory in the linear transformation that spatial domain is subjected to, so just can determine the geometric deformation that image is experienced by the transformation relation of template point position.If the linear transformation of square image below spatial domain has taken place:
x y &RightArrow; B x y - - - ( 3 )
Be equivalent to so do following linear transformation in the DFT territory:
u v &RightArrow; ( B - 1 ) T u v - - - ( 4 )
For the template point on the template line, after the experience linear transformation, they still coexist one and cross on the initial point straight line.There is certain relation (as r '=Kr, K is a certain constant) in the coordinate of new template point (as utmost point footpath r ') with the coordinate (as utmost point footpath r) of original template point, and this can be used for the quick matching judgment of search procedure.
The step of template detection is as follows:
A) treating mapping resembles g (x y) does Barlette filtering.
The same during b) with embedded template, filtered image to be measured is extended to 1024 * 1024.
C) do the DFT conversion.With a radius be R ' (R '<R, the windows radius of R when embedding) circular window (as regional area) in the poincare half plane of fourier coefficient magnitude matrix, search for, extract all local maximum points.Is DFT coefficient amplitude matrix poincare half plane that the summit is divided into N with the initial point b(N b=360 or 180 or other values) individual sector region, each fan-shaped drift angle is 0.5 ° or 1 °.By angle all local maximum points are included into each sector region respectively again.
D) find with two and touch corresponding possible of printed line and touch the set of plate point.
In each sector region, at K Min<K<K MaxThe such K value of search in the scope: it makes to have N at least in this sector mIndividual local maximum point satisfies | r Li-Kr Tj' |<threshold, wherein N mBe a number of predesignating, r LiBe the utmost point footpath (i=l...N of Local Extremum among the i of sector b), r Tj' be the utmost point footpath of touching plate point on the grand master pattern printed line j (j=1,2), threshold>0 is a threshold value.We get N in the experiment m=5, threshold=0.002, K Min=0.5 and K Max=2.0 (are 2~0.5 corresponding to the zooming parameter on the spatial domain).If find such K value, we just get off corresponding Local Extremum coordinate record.
E) by above-mentioned steps, obtain the set of possible matched line, be called " accurate matched line ", the Local Extremum on the line is called " accurate match point ", and coordinate is designated as (x Ij, y Ij).The coordinate of the corresponding primary template point of image poincare half plane is designated as (x Ij', y Ij'), wherein { 1,2} represents i bar template (coupling) line to i ∈, and { 1,2, Λ, 7} represent j template (coupling) point to j ∈.Take out a set and concentrate another set of taking-up from concentrating corresponding to the accurate match point of template line 2 corresponding to the accurate match point of template line 1.A possible transformation matrix A who calculates according to the point and the corresponding relation between template point of these two set.Seek the minimum A of average error MAE (Mean Absolute Error).
MAE = 1 nummatches | | A x 11 y 11 M M x 11 y 11 x 21 y 21 M M x 21 y 21 T - x 11 &prime; y 11 &prime; M M x 11 &prime; y 11 &prime; x 21 &prime; y 21 &prime; M M x 21 &prime; y 21 &prime; T | | - - - ( 5 )
Wherein template point is (x Ij', y Ij') and " accurate match point " be (x Ij, y Ij), nummatches is the match point number, is the error matrix of one 2 row among the operational symbol ‖ Λ ‖.
F) will add 180 ° corresponding to the accurate match point of template line 1, repeat e), determine last frequency domain transform matrix A by the MAE value of minimum.Can get spatial domain transformation matrix B=A by formula (3) and (4) T
Use the training sequence S of extraction and the related coefficient of original training sequence T and determine whether image reaches the translation synchronization parameter of image synchronously.
Whether when watermark detection, it is synchronous at first will to detect watermark.If asynchronous, then must just can carry out watermark detection behind the heavy synchronization watermarking.If synchronously, then directly extract low frequency sub-band LL 3Subband hiding data and decode information.
Whether detect watermark synchronous: (x, y) resetting size is 512 * 512, then it is carried out 3 grades of DWT and decomposes, from LL with visual g to be measured 3Extract training sequence S in 32 row of subband and 32 row, calculate the related coefficient of it and original training sequence T P T , S ( 0 ) = 1 127 &Sigma; n = 1 127 ( T n S n ) , Whether see 〉=threshl.If we think that S is real training sequence, and watermark is synchronous, can directly carry out the extraction and the decoding of the watermark of DWT territory.If<threshl thinks that then watermark is nonsynchronous, must be earlier through overweight extraction and the decoding that just can carry out the watermark of DWT territory synchronously.General desirable 0.56 (by the definite value of experiment) of threshl.Pseudo-synchronous probability promptly appears in the appearance false-alarm can be by calculating P fp = 1 2 127 &Sigma; k = 127 - e 127 C 127 k = 8.59 &times; 10 - 9 E=round (127 * (1-threshl)/2) wherein.Round represents round.
The heavy synchronous first step is: recover original geometry.(x detects the template watermark of embedding in y), and it and original template compared obtains the affine transformation matrix B that image is stood from visual g to be measured.After obtaining affine transformation matrix B, with visual g (x to be measured, y) carry out the visual g ' (x that the image geometry inverse transformation reverts to M * N size, y) (Fig. 5 b), and then fill 0 one-tenth 512 * 512 size visual I (x, y), filled with 0 by the part of cutting, (x is y) at visual I (x, y) center (Fig. 5 c) for g '.
The heavy second synchronous step is: translation is synchronous.Promptly determine the translation synchronization parameter of image with the related coefficient of training sequence S that extracts and T.
Translation synchronously adoptable a kind of way is, with visual I (x, y) do following all possible translation:
I t(x,y)=I(x-x t)mod512,(y-y t)mod512);
{ - 1 2 ( 512 - M ) &le; x 1 < 1 2 ( 512 - M ) ; - 1 2 ( 512 - N ) &le; y 1 < 1 2 ( 512 - N ) } - - - ( 6 )
Image after each translation is made DWT and is decomposed, from LL 332 row of subband extract training sequence S in being listed as with 32.Can determine translation parameters (x according to the training sequence that extracts and the related coefficient maximum of original training sequence t, y t).
Another method that the present invention proposes is that (x y) does maximum 8 * 8=64 time translation and gets final product, thereby can reduce calculated amount greatly with visual I.According to the time-frequency local character of DWT, LL 3Each coefficient of subband is all corresponding to a part of image.Can prove (our experiment has also proved this point), if when DWT, adopt a tight wavelet filter and adopt periodic extension mode (if other continuation modes of employing then except image border, also satisfy following relationship), visual I (x, y) translation 8 * x T1Row and 8 * y T1Row (x T1, y T1Be integer), obtain translation image I t(x, y):
I t(x,y)=I((x-8×x t1)mod512,(y-8×y t1))mod512) (7)
LL after then three grades of DWT of image decompose 3Subband is translation x also T1Row and y T1Row:
LL 3t(x,y)=LL 3((x-x t1)mod 64,(y-y t1)mod64) (8)
LL wherein 3(x, y) and LL 3t(x, y) be respectively visual I (x, y) and I t(x, y) LL 3Sub-band coefficients.LL 3Translation also takes place in the training sequence that the translation of subband causes embedding.The character that application of formula 7 and 8 provides, we can be only to I (x, y) do maximum 8 * 8 translations:
I t(x,y)=I((x-x t)mod 512,(y-y t)mod 512);{-4≤x t,y t<4 (9)
Every translation once is DWT and is decomposed, and obtains LL 3Subband LL 3t(x, y).With LL 3t(x, y) do translation:
LL 3t′(x,y)=LL 3t((x-x t1)mod64,(y-y t1)mod64);{-T 1≤x t1<T 1;-T 2≤y t1<T 2 (10)
In the following formula, T 1=round (0.5 * (512-M)/8), T 2=round (0.5 * (512-N)/8).Each translation is from LL 3t'; (x, 32 row y) and 32 row extractions training sequence S, according to and original training sequence T between maximum related value determine translation parameters.Can determine the translation parameters (8 * x of image after maximum 64 translations search t+ x T1, 8 * y t+ y T1), thereby the visual g after the acquisition translation calibration *(x, y).
The present invention has the following advantages:
1) the digital watermarking blind checking method of the DFT-DWT compositum of the present invention's proposition resists normal signal processing aspect and affined transformation aspect at the same time and has all reached stronger robustness (table 1).When compressibility factor is 15 JPEG compression (JPEG_15), can realize that zero defect detects, can resist other geometric transformations except that Rand Bending among the international watermark test platform StirMark 3.1, as to rotation (auto crop, auto scale), jitter, scaling, shearing, general linear transform etc. can both realize that zero defect detects, and can resist the combination attacks of JPEG compression and geometric transformation, as resisting combination attacks such as JPEG_50 compression, rotation, convergent-divergent, cutting, translation simultaneously.
2) water mark method that proposes of the present invention can be hidden the above information of 264 bits, and more than 40dB, the invisibility of watermark is better with respect to the PSNR of raw image for watermark image.
3) the image geometry collimation technique among the present invention, the degree of accuracy height, and can avoid in image, embedding a visable indicia.
Table 1 the present invention proposes the result that method water seal test platform StirMark 3.1 carries out the robustness test.
StirMark functions Lena Baboon
JPEG 15~100 0 0
Gauss filtering 0 0
sharpening 0 0.02
jitter 0 0
scaling 0 0
aspect ratio 0 0
cropping 25 0 0
rotation(auto-crop,scale) 0 0
general linear transform 0 0
shearing 0 0
Description of drawings:
Fig. 1 is that watermark embeds block diagram.
Fig. 2 is training sequence and is embedded in LL 3The position of subband.
Fig. 3 is the position view that embeds 14 template points at DFT conversion amplitude spectrum poincare half plane.
Fig. 4 is the image that has embedded the watermark of DWT-DFT territory.
Fig. 5 is the robustness test that the inventive method antagonism JPEG compression and RST (rotation, cutting, convergent-divergent and translation combination attacks) gang up against.
Among Fig. 1, the 1st, need hiding bit information, the 2nd, hide Info through direct sequence spread spectrum, the 3rd, interweave, the 4th, raw image, the 5th, DWT, the 6th, data are embedded in the visual DWT sub-band coefficients, the 7th, IDWT, the 8th, embedded the watermark of DWT territory visual f ' (x, y), the 9th, with f ' (x, y) carry out the DFT conversion, the 10th, in the DFT territory, embed and touch the plate watermark.The 11st, IDFT.The 12nd, embedded the visual f of DWT-DFT territory compound watermark " (x, y).The 13rd, the training sequence that embeds.
Among Fig. 2, T 1... T 127Be that 127 training sequences are at LL 3Certain delegation in the subband and the position of a certain row.Row 32 expressions 32 row, Column 32 expressions 32 row.
Some results that are to use reference image Lena and Baboon test that provide among Fig. 4,5.
Among Fig. 4, a) Lena watermark image (PSNR=40.1dB); B) Baboon watermark image (PSNR=39.6dB).
Among Fig. 5, and the visual g after a) the Lena watermark image is subjected to JPEG compression and RST and gangs up against (x, y).
B) figure a through the visual g ' after the calibration affined transformation (x, y).Image size is 504 * 504.
C) figure mend around the b 0 to 512 * 512 big or small I (x, y).
D) the visual g after figure c proofreaies and correct through translation *(x, y) image size is 512 * 512, filling part is visual g (x, average y).264 bits of hiding still can detect by zero defect.
Embodiment
Embodiment:
The development of computing machine, printer and high-speed transmission equipment makes and becomes very convenient at enterprising row image of network and transmission of video signals.But the serious problems that transmission and storage faced of electron image, video etc. are that their duplicate and original paper is just the same, thereby copyright owner's be unwilling to propagate by this way their material.Because the Internet is increasingly extensive in the application of commercial field, therefore need a kind of means that can protect electronic data in a hurry.Digital watermarking is to carry a group of owner's copyright information to distinguish means.Digital watermarking for good and all is embedded into to be used for copyright protection and to check whether data are destroyed in the multi-medium data.But present digital watermark technology just detects not come out mostly behind some very little geometry deformations of image process.Therefore great advantage of the present invention is to make the digital watermarking of embedding can resist the attack etc. of geometry deformation and image compression coding simultaneously.
The digital watermark technology that provides anti-geometric transformation below uses and tests some results that obtain at reference image Lena and Baboon.
(be on 512 * 512 * 8bits) the image and embed information watermark, matching template and a training sequence that comprises 44 characters (264 bit) respectively, the PSNR value is respectively 40.1dB and 39.6dB (Fig. 4) at Lena and Baboon for we.We get L=264 in the test, N 1=15, α=56, threshl=0.56, threshold=0.002, N b=180, N m=5, K Min=0.5 and K Max=2.0, and in to visual wavelet transform, use Daubechies 9/7 biorthogonal wavelet wave filter, training sequence is embedded in LL 332 row of subband and 32 row.Watermark embedding method of the present invention need be less than 3 second time on the P4 of 1.7G computing machine (windows platform, VC++ language), and detection method needs about 1~13 second.As can be seen, calculated amount is very not big.
Table 1 is the situation that information watermark opposing StirMark3.1 attacks.Wherein BER (Bit Error Rate) is meant bit error rate.Watermark can both realize that to geometric attacks such as convergent-divergent, rotation+cutting, rotation+cutting+convergent-divergent, general linear transformation, shearing, jitter, change length breadth ratio among the StirMark3.1 zero defect detects.Can realize when cropping_25, JPEG_15 attack in StirMark3.1 that zero defect detects.To Gaussian filtering, sharpening, the watermark character string also can the zero defect rate or is extracted with extremely low error rate.
In addition, we also tested be subjected at watermark image rotating arbitrarily+to shear+situation of convergent-divergent+translation (RST) under the robustness of watermark.As shown in Figure 5.Fig. 5 (a) be after the Lena watermark image is subjected to JPEG compression and RST and gangs up against visual g (x, y).Fig. 5 (b) be Fig. 5 (a) through recover after the calibration affined transformation behind its original-shape visual g ' (x, y).Image size is 504 * 504.Fig. 5 (c) is that (x, (x y), mends 0 back former visual g ' (x, the visual I that y) is positioned at (x, central authorities y) y) to fill up the visual I of 0 to 512 * 512 size on every side at visual g '.Fig. 5 (d) is that (x is y) through the visual g after the translation correction for visual I *(x, y), image size is 512 * 512.During watermark detection, (x, fill, rather than with 0 value filling, the result who does like this can improve the detection performance by average y) with visual g for filling part.Test result is that 264 bits of hiding still can detect by zero defect.

Claims (2)

1. the method for image geometry calibration and protection digital image; it is characterized in that this method at first is embedded into the information watermark in the visual DWT territory with a training sequence through band spectrum modulation with after interweaving; again a matching template is embedded into visual DFT territory; be embedded in the heavy synchronous detection of the information watermark in the visual DWT territory after being realized band spectrum modulation and interweaved by matching template that is embedded in visual DFT territory and the training sequence that is embedded in visual DWT territory at last, specific practice is:
1) watermark embeds: watermark embed process mainly contains the pre-service of the DWT territory watermark that comprises information watermark, training sequence, the embedding of DWT territory watermark and embedding three parts that the plate watermark is touched in the DFT territory;
I) pre-service of DWT territory watermark: direct sequence spread spectrum is encoded, is interweaved;
Application length is N 1PN sign indicating number sequence m={m jJ=1 ..., N 1Information b{b to embedding iI=1 ..., L} is b wherein i{ 0,1} carries out the spread spectrum coding modulation to ∈; " 1 " is modulated to the positive sequence of m, promptly+and 1 * m jJ=1 ..., N 1, " 0 " is modulated to the anti-phase sequence of m, i.e. { 1 * m jJ=1 ..., N 1, can obtain scale-of-two watermark data W to be embedded like this;
One with the central row of the two-dimensional matrix of the identical size of visual DWT low frequency sub-band and central series on or need to lay special stress on protecting the corresponding low frequency sub-band position of part in the image and deposit the pseudorandom training sequence T that produces by key, scale-of-two watermark data W after all the other sequence of positions are deposited and interweaved, the two-dimensional matrix that obtains is become an one-dimension array by line scanning, be designated as X;
Ii) (x y) carries out three grades of DWT and decomposes, low frequency sub-band LL the embedding raw image f of DWT territory watermark 3Coefficient becomes one-dimension array by line scanning, is designated as C; By following formula, we are added to binary data X on the low frequency coefficient C, obtain new low frequency coefficient C ':
Wherein C (i), C ' (i), x iBe respectively i the element of C, C ', X; α represents watermark embed strength; With the wavelet coefficient behind the embed watermark carry out IDWT obtain embedding the watermark of DWT territory visual f ' (x, y);
The iii) embedding of DFT territory template: (two straight lines of edge mistake initial point increase the mould value of some intermediate-frequeney point place fourier coefficients to visual f ' after embedding DWT territory watermark, make these points become the maximum value of regional area for x, DFT territory y); The change amount is standard with invisible, and generally getting maximum value is that local mean values adds the variance about several times to tens times; The local maximum point that distributes along two straight lines of these embeddings constitutes a template, as the synchronizing information after the watermark image distortion; The position of these template points can be produced by a cipher controlled; These two straight lines of crossing initial point are called the template line;
2) detection of watermark:
Testing process is as follows:
A) when watermark detection, at first want the watermark of application training Sequence Detection whether synchronous; If asynchronous, then must earlier the test image be obtained synchronous image g synchronously through weighing *(x, y), heavy to comprise that synchronously plate watermark detection, contrary affined transformation, the translation of application training sequence are touched in the DFT territory synchronous; If synchronously, directly do next step;
B) to synchronous image g *(x y) makes DWT territory watermark detection, has obtained actual hiding data;
The heavy synchronous first step is: recover original geometry; (x detects the template watermark of embedding in y), and it and original embedded template compared obtains the affine transformation matrix B that image is stood from visual g to be measured;
Suppose that the raw image size is M 1* M 1, the step of template watermark detection is as follows:
A) treating mapping resembles g (x y) does Barlette filtering;
The same during b) with embedded template, filtered image to be measured is extended to 1024 * 1024;
C) do the DFT conversion; With the circular window that a radius is R ', in the poincare half plane of fourier coefficient magnitude matrix, search for, extract all local maximum points; Is DFT coefficient amplitude matrix poincare half plane that the summit is divided into N with the initial point bIndividual sector region, each fan-shaped drift angle are 0.5 ° or 1 °; By angle all local maximum points are included into each sector region respectively again;
D) find and two possible template point set that the template line is corresponding;
In each sector region, at K Min<K<K MaxThe such K value of search in the scope: it makes to have N at least in this sector mIndividual local maximum point satisfies | r li - K r Tj &prime; | < threshold , N wherein mBe a number of predesignating, r LiBe the utmost point footpath (i=1...N of Local Extremum among the i of sector b), r Tj' be the utmost point footpath of touching plate point on the grand master pattern printed line j (j=1,2), threshold>0 is a threshold value.If find such K value, we just get off corresponding Local Extremum coordinate record;
By above-mentioned steps, obtain the set of possible matched line, be called " accurate matched line ", the Local Extremum on the line is called " accurate match point ", and coordinate is designated as (x Ij, y Ij); The coordinate of the corresponding primary template point of image poincare half plane is designated as (x Ij', y Ij'), wherein { 1,2} represents i bar template matches line to i ∈, and j ∈ { 1,2, Λ } represents j template matches point; Take out a set and concentrate another set of taking-up from concentrating corresponding to the accurate match point of template line 2 corresponding to the accurate match point of template line 1; A possible transformation matrix A who calculates according to the point and the corresponding relation between primary template point of these two set; Seek 4 of average error MAE minimum;
MAE = 1 nummatches | | A x 11 y 11 M M x 1 j y 1 j x 21 y 21 M M x 2 j y 2 j T - x 11 &prime; y 11 &prime; M M x 1 j &prime; x 1 j &prime; x 21 &prime; y 21 &prime; M M x 2 j &prime; y 2 j &prime; T | |
Wherein template point is (x Ij', y Ij') and " accurate match point " be (x Ij, y Ij), nummatches is the match point number, operational symbol || Λ || in be the error matrix of one 2 row;
F) will add 180 ° corresponding to the accurate match point of template line 1, repeat e), determine last frequency domain transform matrix A by the MAE value of minimum; Can get spatial domain transformation matrix B=A T
After obtaining affine transformation matrix B, (x y) carries out the image geometry inverse transformation and reverts to the visual g ' of M * N size (x y), and then fills 0 one-tenth M with visual g to be measured 1* M 1(x y), is filled with 0 by the part of cutting the visual I of size, and (x is y) at visual I (x, y) center for g;
The heavy second synchronous step is: translation is synchronous, promptly determines the translation synchronization parameter of image with the related coefficient of training sequence S that extracts and original training sequence T;
The translation method for synchronous be with visual I (x, y) do maximum 8 * 8=64 time translation and get final product:
I t(x,y)=I((x-x t)mod N 2,(y-y t)mod N 2);{-4≤x t,y t<4}
Every translation once is DWT and is decomposed, and obtains LL 3Subband LL 3t(x, y); With LL 3t(x, y) do translation:
L L 3 t &prime; ( x , y ) = L L 3 t ( ( x - x t 1 ) mod 64 , ( y - y t 1 ) mod 64 ) ; {-T 1≤x t1<T 1;-T 2≤y t1<T 2}
In the following formula, T 1=round (0.5 * (M 1-M)/8), T 2=round (0.5 * (M 1-N)/8), each translation is from LL 3', (x, central row y) and central series extract training sequence S, according to and original training sequence T between maximum related value determine translation parameters, can determine visual translation parameters (8 * x after maximum 64 translations search t+ x T1, 8 * y t+ y T1), thereby the synchronous image g after the acquisition translation calibration *(x, y);
The detection of DWT territory watermark: synchronous image g *(x, the low frequency sub-band LL after y) DWT decomposes 3Coefficient becomes one-dimension array by line scanning, is designated as C *The binary data that extracts is designated as X *={ x i *, it is as follows to extract formula:
x i * = + 1 , ( C * ( i ) mod &alpha; ) &GreaterEqual; &alpha; 2 x i * = - 1 , otherwise
With the binary data X that extracts *Carry out reciprocal cross and knit the binary data sequence W that (inverse process that interweaves) recovers embedding *W then *Press N 1The position bit carries out segmentation, and every section is carried out relevantly with sequence m, if correlation is greater than 0, then to embed information bit be " 1 " in judgement, is " 0 " otherwise adjudicate the embedding information bit; Just obtain the embedding information recovered after the despreading.
2. the method for a kind of image geometry calibration as claimed in claim 1 and protection digital image, it is characterized in that in the amplitude spectrum coefficient of visual DFT conversion embedding a matching template that constitutes a little louder by local pole, be used to detect image stand the transformation matrix of affined transformation and recover its original geometry do inverse transformation; Embed a training sequence simultaneously in visual DWT territory and be used for visual translation calibration.
CNB021496145A 2002-12-12 2002-12-12 Watermark method using geometry calibrated anti geometry conversion image Expired - Fee Related CN1321393C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB021496145A CN1321393C (en) 2002-12-12 2002-12-12 Watermark method using geometry calibrated anti geometry conversion image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB021496145A CN1321393C (en) 2002-12-12 2002-12-12 Watermark method using geometry calibrated anti geometry conversion image

Publications (2)

Publication Number Publication Date
CN1414778A CN1414778A (en) 2003-04-30
CN1321393C true CN1321393C (en) 2007-06-13

Family

ID=4751698

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB021496145A Expired - Fee Related CN1321393C (en) 2002-12-12 2002-12-12 Watermark method using geometry calibrated anti geometry conversion image

Country Status (1)

Country Link
CN (1) CN1321393C (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7266216B2 (en) * 2003-08-07 2007-09-04 International Business Machines Corporation Inserting and detecting watermarks in images derived from a source image
CN100353444C (en) * 2004-05-28 2007-12-05 中山大学 Digital audio-frequency anti-distorting method
ES2310773T3 (en) * 2005-01-21 2009-01-16 Unlimited Media Gmbh METHOD OF INCRUSTATION OF A DIGITAL WATER BRAND IN A USEFUL SIGNAL.
CN101282457B (en) * 2005-02-06 2010-06-02 陆健 False proof detection method for real time monitoring videosignal
CN100357971C (en) * 2006-01-18 2007-12-26 李京兵 Wavelet-based geometric attack resistant digital watermark method
CN103177413B (en) 2011-12-20 2016-04-13 深圳市腾讯计算机系统有限公司 The method that localization blind watermatking generates, detect and device
CN105023235B (en) * 2015-07-09 2018-06-12 哈尔滨工程大学 A kind of electronic chart water mark method based on spatial redundancy relationship
CN105072453B (en) * 2015-07-21 2018-07-24 河海大学 A kind of video watermark process of facing moving terminal
CN109688161A (en) * 2019-02-14 2019-04-26 上海鹏越惊虹信息技术发展有限公司 A kind of network trace method, apparatus, system, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001078010A (en) * 1999-09-02 2001-03-23 Hitachi Ltd Method for extracting electronic watermark information
CN1383528A (en) * 2000-06-23 2002-12-04 皇家菲利浦电子有限公司 Watermark embedding method and arrangement

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001078010A (en) * 1999-09-02 2001-03-23 Hitachi Ltd Method for extracting electronic watermark information
CN1383528A (en) * 2000-06-23 2002-12-04 皇家菲利浦电子有限公司 Watermark embedding method and arrangement

Also Published As

Publication number Publication date
CN1414778A (en) 2003-04-30

Similar Documents

Publication Publication Date Title
CN101533506B (en) Robust image double-watermarking method
CN101042769B (en) Active mode digital image content identification method based on wavelet and DCT dual domain
US6700991B1 (en) Hidden digital watermarks in images
CN100357971C (en) Wavelet-based geometric attack resistant digital watermark method
CN101005615A (en) Embedding and detecting method and system for image data watermark information
CN102682418B (en) Method for embedding and extracting multiple zero watermarks of digital image
CN1321393C (en) Watermark method using geometry calibrated anti geometry conversion image
CN108682425B (en) Robust digital audio watermark embedding system based on constant watermark
CN101122996B (en) Digital image embedding, extraction method and device
CN102024249A (en) Digital image watermarking method based on visual perception characteristics
CN101901470A (en) Image-tampering detection and recovery method based on energy-domain semi-fragile watermarking
Kumar et al. A hybrid digital watermarking approach using wavelets and LSB
CN103971324B (en) Asymmetric watermarking method for protecting vector map data copyright
Vasudev A review on digital image watermarking and its techniques
CN102360486A (en) Medical-image robust multiple-watermark method based on DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform)
Zhiwei et al. Steganography based on wavelet transform and modulus function
CN101093575A (en) Digital watermark method of paralleled multiple robustnesses based on multiple copyright authentications
CN102938133A (en) Robust watermarking method for medical images on basis of Arnold scrambling transformation and DWT (discrete wavelet transform)-DFT (discrete Fourier transform)
Tao et al. Robust digital image watermarking in curvelet domain
Hsieh et al. Perceptual digital watermarking for image authentication in electronic commerce
Halima et al. A novel approach of digital image watermarking using HDWT-DCT
CN100559856C (en) A kind of video-frequency identifying method based on wavelet transformation and mixed watermark
CN103258314A (en) Method for embedding and detecting cryptical code
Yuan et al. A multiscale fragile watermark based on the Gaussian mixture model in the wavelet domain
Alghoniemy et al. Progressive quantized projection approach to data hiding

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070613

Termination date: 20100112