CN1379324A - Digital watermark method based on integer wavelet without damage to image - Google Patents

Digital watermark method based on integer wavelet without damage to image Download PDF

Info

Publication number
CN1379324A
CN1379324A CN 02111629 CN02111629A CN1379324A CN 1379324 A CN1379324 A CN 1379324A CN 02111629 CN02111629 CN 02111629 CN 02111629 A CN02111629 A CN 02111629A CN 1379324 A CN1379324 A CN 1379324A
Authority
CN
China
Prior art keywords
data
image
histogram
wavelet
watermark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 02111629
Other languages
Chinese (zh)
Other versions
CN1141639C (en
Inventor
宣国荣
柴佩琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Rongxin Software Technology Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNB021116296A priority Critical patent/CN1141639C/en
Publication of CN1379324A publication Critical patent/CN1379324A/en
Application granted granted Critical
Publication of CN1141639C publication Critical patent/CN1141639C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain

Abstract

A nondestructive watermark method based on integer wavelets features that a computer software is used to embed data in the digital image which can be restored without destruction, and includes embedding the digital watermark and extracting it. For embedding digital watermark, the steps are first to regulate the grayscale histogram, wavelet conversion, embedding data, reverse conversion of wavelet, and the second regulation of grayscale histogram to form the addition of watermark picture. Extracting digital watermark includes such steps as the third regulation of grayscal histogram, conversion of wavelet, extracting data, reverse conversion of wavelet and the fourth regulation of grayscal histogram. It can ensure that the images before and after the watermark is embedded have the smalest visual difference.

Description

Lossless image digital watermark method based on integer wavelet
Technical field
The present invention relates to use computer software, in digital image, embed data, and can can't harm the processing of recovery." based on integer wavelet " among the present invention's " based on lossless image digital watermark method (Lossless Image DigitalWatermarking based on Integer Wavelet) of integer wavelet " is meant at visual wavelet transformed domain rather than directly embeds data at spatial domain image.Owing to adopt the Gray Histogram dynamic range to adjust measure, avoid producing distortion when making wavelet transformation." lossless image " expression is reversible process, promptly the image after adding watermark, can fully recover original data and image simultaneously." digital watermarking " is a kind of data hiding technique, and the size that embeds data front and back image is the same, and naked eyes can not be told the difference that embeds the front and back image.
Background technology
Along with the fast development of computer network, it is very outstanding that the safety problem of information seems.Digital watermark technology is the most prominent a kind of of the safety of guarantee information.Digital watermarking can fox message authenticity, integrality, the owner's of protection image entitlement, individual's the right of privacy etc.Digital watermarking development is very fast since 1996, received extensive, the close concern of academia, industry member etc.Application is well beyond the scope of intellectual property protection.Medical treatment, insurance, remote teaching, e-bank, break in traffic rules and regulations, secure communication, audio-visual products etc. have been widely used in.Wherein the lossless image digital watermarking is particularly like this.
The lossless image digital watermarking is after image embeds more data, and visual is big or small constant, and naked eyes are not seen distortion, promptly keep the feature of digital watermarking, and can fully nondestructively recover.The for example any small change of medical images may cause to produce wrong diagnosis when the doctor interprets blueprints, and also is unallowed legally.In medical magnetic resonance imaging (MRI) digital image, embed patient's case history or other data, with the use value of raising digital image, and be convenient to build stock's shelves.After the patient data took out, image can fully nondestructively recover.Image damage-free digital watermarking relevant technologies can be consulted following three pieces and be described paper.
[1]Honsinger,C.W.,Jones,P,Rabbani,M.,Stoffel,J.C.:Lossless?Recoveryof?an?Original?Image?Containing?Embedded?Data.US?Patent?application,Docket?No:77102/E-D(1999)。(work such as Honsinger: " comprising the harmless recovery of the raw image that embeds data ", United States Patent (USP) is used, notification number: No:77102/E-D (1999))
[2]Goljan,M.,Fridrich,J.,Du,R.,″Distortion-Free?Data?Embedding?forImages″,4th?Information?Hiding?Workshop,Pittsburgh,Pennsylvania,April,2001。(work such as Goljan: " undistorted data embed image ", the 4th Information hiding meeting, Pittsburgh, U.S. Binzhou, April calendar year 2001)
[3]M.Goljan?and?R.Du,″Lossless?Data?Embedding?for?All?Image?Formats″,Proc.SPIE?Photonics?West,Electronic?Imaging?2002,Security?and?Watermarking?ofMultimedia?Contents,San?Jose,Califomia,January,2002。(work such as Goljan: " lossless data embeds various pixel formats ", the safety of content of multimedia and digital watermark meeting, Optical Society of America (SPIE) western photography in 2002 and electron image collection of thesis, San Jose, California, USA, in January, 2002)
More than three pieces of papers can on internet web page,, can obtain according to the English keyword by name of article according to " Google " search engine.
Occur the lossless image digital watermarking in the world the earliest and be a patent of the Kodak that [1] literary composition in 1999 delivers, but it is few to embed the data of image.April calendar year 2001 and in January, 2002, Goljan published an article in [2], and the data that can embed image are just many.Up to now, the lossless image digital watermarking all is that it is actually the displacement of making visual gray scale the handling based on spatial domain of image, though principle is simple, perfect inadequately, the raising of its technical indicator is restricted [3].Wavelet transformation in theory with practice on all more perfect, have much potentiality, aspect digital watermarking, be widely used, but still be not used in the precedent of harmless digital watermarking.
Domestic have based on integer wavelet and digital watermarking research report: in (1) May calendar year 2001, the Hua Xiansheng of Peking University, azurite cloud deliver " embedding in the time of the multiclass watermark ", and this image digital watermark algorithm also is based on integer wavelet transformation.(2) Wu Wenjun, high hill etc., state key fundamental research development and planning project " mechanization of mathematics and automated reasoning platform " report, 2000 years.(3) Zhang Hongbin, Zhang Sujuan, " based on the digital image watermarking algorithm of embedded wavelet coding ", Chinese image graphics journal, the 7th volume, the 2nd phase, 2002 years.(1) (2) report can be on the internet, according to http://cn.yahoo.com webpage, according to two keywords " digital watermarking " and " small echo ", by finding in the search engine.Though integer wavelet is adopted in their research, does not all mention damage-free digital watermarking.
In a word, up to now, damage-free digital watermarking all is to carry out in spatial domain both at home and abroad, does not adopt any report of small echo damage-free digital watermarking.
Summary of the invention
The present invention's's " based on lossless image digital watermark method of integer wavelet " purpose is: disclose a kind of computer software method that embeds and extract the damage-free digital watermarking of data in image.This digital watermark method comprises literal, image, the voice messaging relevant with image.With the digital watermarking of this fabrication techniques, can not take place to be lost, destroys when extracting again or replaced etc. through propagating or storing, and raw image can fully nondestructively recover.After being embed digital watermark, image size is constant, and naked eyes can not be differentiated the difference of embed digital watermark front and back image.Thereby under the prerequisite of the authenticity, integrality and the security that guarantee embedding information, increased visual value, helped the foundation (for example helping setting up the imagery pack communication system) of digital image archives with software package PACS.
In order to achieve the above object, the present invention is performed such.By complex arts such as gray scale dynamic range adjustment, realize damage-free digital watermarking.Because visual wavelet transformed domain is similar to human vision, by tight theoretical analysis and actual test many times, successfully data are embedded the least responsive integer wavelet transformation territory of vision, abbreviate wavelet field as, guaranteed to embed the visual vision difference minimum of data front and back.
Method of the present invention comprises embed digital watermark and extracts the digital watermarking two large divisions.First is the coding of embed digital watermark, comprising: grey level histogram adjustment for the first time, small echo direct transform, data embedding, inverse wavelet transform, grey level histogram adjustment for the second time form the image that adds watermark at last.Second portion comprises for extracting the decoding of digital watermarking: grey level histogram adjustment for the third time, small echo direct transform, data extract, inverse wavelet transform, the 4th grey level histogram adjustment, recover initial image at last.Now be described in detail as follows:
The first of the inventive method is that the coding of embed digital watermark comprises following five steps:
The first step is grey level histogram adjustment for the first time: the purpose of histogram processing for the first time is to dwindle histogrammic gray scale dynamic range, and when preventing with aftertreatment, gray scale is overflowed the 0-255 scope.With the mathematical statistics program raw image is carried out statistics with histogram, find out and less gray scale occurs and dispose.After the first time, histogram was handled, make the Gray Histogram dynamic range compression, form the null value sideband, keep histogrammic main body.Because the gray scale dynamic range of histogram main body is dwindled, the image of (for example narrowing down to 16-240) behind the wavelet field embed digital watermark, when returning to spatial domain again, is difficult for overflowing (promptly still at 0-255), can can't harm recovery purposes thereby reach.
Second step was the small echo direct transform: by the wavelet transformation program of computer compilation, the spatial domain of histogram main body is become wavelet field.Then watermark data is embedded in high-resolution areas.Utilize the multiresolution characteristic of wavelet field, make and feel that visually distortion is little.Utilize the characteristic of the removal image correlation of wavelet field simultaneously, increase compression performance, so that embed more watermark data.
The 3rd step was that data embed, and promptly embedded data and key: before the data of embed digital watermark, adopt arithmetic coding that original bit-plane data is carried out lossless compress earlier, select bit plane that data are embedded then.The data that embed have three parts: the one, and data external to be transmitted, the 2nd, the first step of the present invention counts the gray scale sideband data beyond the histogram main body, the 3rd, the data after the original position flat compressed.The selection of the bit plane that embeds: the bit plane of embedding lower (minimum is the 8th bit plane), the number of " 1 " and " 0 " is more close, more is difficult for compression, can embed data and heal few.The real data embedding is the inferior low bit plane (for example the 5th bit plane or the 4th bit plane) at the wavelet field high frequency time.Pass through hash (hash) functional operation, embedded key at last.The effect of key has the fine setting effect to preventing to overflow except encrypting.
The 4th step was an inverse wavelet transform: after watermark data and key embed, and can be from the wavelet domain transform to the spatial domain by promoting (Lifting) integer wavelet transformation.This conversion helps the harmless recovery of data and image.
The 5th step was grey level histogram adjustment for the second time, formed to add watermark image: with digital imaging processing software histogram is carried out the cyclic shift adjustment, make the average of histogram average near raw image, make the brightness unanimity that embeds before and after the data.Actual value is as the criterion with vision.Become big if produce noise, as producing pepper and salt effect, the cyclic shift adjustment will weaken.The purpose of histogram processing for the second time is to improve signal noise ratio.If ignored for the 5th step, formation adds watermark image and just meets the requirements (naked eyes are not seen distortion), also can not do grey level histogram adjustment for the second time.
The second portion of the inventive method can be regarded the operation opposite with the step of embed digital watermark as for extracting the decoding of digital watermarking:
The 6th step was grey level histogram inverse transformation for the third time: call and the opposite software approach of grey level histogram adjustment for the second time, obtain and rightabout histogram cyclic shift of the 5th step, purpose is to recover original situation.If the 5th step was ignored, the 6th step did not carry out certainly yet.
The 7th step was the small echo direct transform: carry out the small echo direct transform by the software identical with the 4th step, space field transformation is become wavelet field, so that carry out the operation of the 8th step in wavelet field.
The 8th step was deciphering, extracted data: the employing arithmetic coding extracts the gray scale sideband data that transmits data and grey level histogram adjustment for the first time, extracts data from the specific bit plane in given resolution zone.Decipher with hash function.Recover the bit-plane data of wavelet field at last.
The 9th step was inverse wavelet transform: call the wavelet transformation program, with the wavelet field image, contravariant changes the spatial domain image of histogram main body into.
The tenth step was the 4th grey level histogram adjustment: call and the opposite software approach of grey level histogram adjustment for the first time, the histogram main body is reverted to original grey level histogram, recover original image exactly.
The present invention's's " based on lossless image digital watermark method of integer wavelet " advantage is as follows:
1. adopt complex arts such as integer wavelet embedding and the adjustment of gray scale dynamic range owing to the present invention, overflowing when preventing inverse wavelet transform, thus reach harmless recovery purposes.Gordian technique is the histogram adjustment: before the wavelet field embed digital watermark raw image has been carried out the histogram adjustment.The histogram dynamic range is dwindled in such pre-service.So the digital watermarking of making of the inventive method can fully nondestructively recover raw image, behind the extraction digital watermark data, can guarantee accurately to return to no any distortion original image.The present invention can make the digital watermarking and the raw image of information such as comprising the literal relevant with image, image, voice, all can 100% recovery.
2. the present invention utilizes the visual wavelet transformed domain characteristic similar to human vision, successfully data is embedded the least responsive zone of vision.Guarantee to embed data as much as possible under the condition of the visual vision difference minimum that embed digital watermark is forward and backward.
3. the present invention improves the storage of information, the confidentiality of propagation adopting the cipher key Hash computing.Be easy to find information dropout or malicious attack simultaneously.The present invention is applied widely, and the intellectual property protection that is particularly suitable for medical insurance, remote teaching, break in traffic rules and regulations, police and judicial, secure communication, e-bank, audio-visual products reaches the field that visual owner, personal privacy right etc. is had strict demand.
Description of drawings
Fig. 1 process flow diagram of the present invention
The synoptic diagram of the grey level histogram of raw image before Fig. 2-1 embed watermark
The histogram that Fig. 2-2 adjusts for the first time is the synoptic diagram of histogram main body
Fig. 2-3 adds the histogrammic synoptic diagram of watermark (Fig. 3) back image
The histogrammic synoptic diagram that adjust the second time of Fig. 2-4 image
The selected watermark of Fig. 3 example of the present invention
The grey level histogram of Lena raw image before Fig. 4-1 embed watermark
Fig. 4-2 histogram main body, the histogram that adjust the first time of Lena image
Fig. 4-3 adds the histogram of watermark (Fig. 3) back Lena image
The histogram that adjust the second time of Fig. 4-4 Lena image
The girl Lena raw image of Fig. 5-1 not embed watermark of the present invention
Fig. 5-2 usefulness the inventive method embeds the Lena image after Fig. 3 watermark
The capsicum Peppers raw image of Fig. 6-1 not embed watermark of the present invention
Fig. 6-2 usefulness the inventive method embeds the Peppers image after Fig. 3 watermark,
Fig. 7-1a magnetic resonance imaging medical image Mpic1
Fig. 7-1b magnetic resonance imaging medical image Mpic2
Fig. 7-1c magnetic resonance imaging medical image Mpic3
Fig. 7-1d magnetic resonance imaging medical image Mpic4
Fig. 7-1e magnetic resonance imaging medical image Mpic5
Fig. 7-1f magnetic resonance imaging medical image Mpic6
Fig. 7-1g magnetic resonance imaging medical image Mpic7
Fig. 7-1h magnetic resonance imaging medical image Mpic8
The common visual Lena of Fig. 7-2a
The common visual Peppers of Fig. 7-2b
The common visual Airplane of Fig. 7-2c
The common visual Baboon of Fig. 7-2d
The common visual Tiffany of Fig. 7-2e
The common visual Sailboat of Fig. 7-2f
The common visual Couple of Fig. 7-2g
The common visual House of Fig. 7-2h
Embodiment
The present invention is described in further detail below in conjunction with accompanying drawing, and see also accompanying drawing.The watermark operation that embeds data among Fig. 1 can be divided into 5 steps, extracts the watermark operation of data and can regard 5 opposite steps as, sees Table 1 and table 2.
Table 1 embeds the watermark operation steps of data
Step Operation Effect
1 Write the program of grey level histogram adjustment for the first time, the raw image histogram is added up, remove left and right sides gray scale, stay the histogram main body. Gray scale is not overflowed (still between 0-255) when making inverse transformation
2 Write small echo direct transform program, the spatial domain image with the histogram main body is transformed into the wavelet field image Utilize wavelet field to differentiate more and remove visual Correlation properties, reach harmless purpose
3 Embed data in wavelet field: adopt arithmetic coding, to former bit-plane data compression.Select bit plane to embed above-mentioned packed data, wait to transmit the gray scale sideband data of data and grey level histogram adjustment for the first time.With the program of hash function establishment, carry out key and embed. The embedding data arrive the embedding of hanging down bit plane (as the 5th bit plane) key in highest resolution zone except that encrypting, and also can finely tune preventing to overflow
4 Write the inverse wavelet transform program,, be transformed into the spatial domain image the wavelet field image The integer lifting wavelet inverse transformation helps data and image recovery, non-loss transformation
5 Grey level histogram conversion for the second time, formation adds watermark image, the call number imgae processing software carries out left and right sides ring shift adjustment to Gray Histogram. Adjust signal noise ratio PSNR, ring shift makes the average of histogram average near raw image, and keeps harmless
Table 2 extracts the watermark inverse operation step of data
Step Operation Effect
6 Grey level histogram inverse transformation for the third time: call the opposite software approach of grey level histogram conversion for the second time, obtain and the opposite cyclic shift of the 5th step histogram. Anti-ring shift, purpose are to recover
7 Small echo direct transform: call the wavelet transformation software identical and carry out conversion, space field transformation is become wavelet field with the 4th step. Purpose is that the deciphering in the 8th step and extraction data are carried out in wavelet field, reaches harmless.
8 Deciphering, extract data: the employing arithmetic coding extracts the gray scale sideband data that transmits data and grey level histogram adjustment for the first time, extracts data from the specific bit plane in given resolution zone.Decipher with hash function. Extract data from embedding data to the specific bit plane in highest resolution zone, recover the bit-plane data of wavelet field at last.
9 Inverse wavelet transform: call the wavelet transformation program,, be transformed into the spatial domain image with the wavelet field image. Integer lifting wavelet transform reaches harmless and recovers.
10 The 4th time histogram transformation is handled: call and the opposite program of grey level histogram conversion for the first time, recover original image Recover original grey level histogram, recover original image
Please see that Fig. 2 in the accompanying drawing-1 is to 2-4 histogram adjustment figure.Wherein Fig. 2-1 and Fig. 2-4 is respectively raw image and the histogram synoptic diagram that adds watermark.The key that lossless image is recovered behind the wavelet field embed digital watermark is to do the pre-service that histogram is adjusted.Wherein the purpose that the first time, histogram was handled of Fig. 2-2 is overflowing when preventing inverse wavelet transform.After histogram is handled for the first time, removed gray scale left and right sides sideband, made the raw image histogram become the histogram of zero gray scale sideband, or be called the main body histogram, its dynamic range is dwindled.The gray scale dynamic range is little, is difficult for overflowing (still at 0-255) when visual embed digital watermark is recovered, thereby reaches harmless recovery purposes.About the entrained information of two gray scale sidebands seldom, can handle together with external signal.
The purpose that the second time of Fig. 2-3, histogram was handled is to improve signal noise ratio PSNR.After histogram was handled for the second time, the histogram cyclic shift was adjusted, and the left side as shown in the figure is the part of removing of Gray Histogram sideband, made the average of histogram average near raw image.Actual value is as the criterion with vision.Become big if produce noise, produce pepper and salt effect, the cyclic shift adjustment will weaken.The right of Fig. 2-4 is the in-migration part of Gray Histogram sideband, and the cyclic shift direction is with to remove part opposite, and purpose is harmless recovery.
Fig. 3 is the optional watermark of the present invention in the accompanying drawing: can be that " the artificial intelligent laboratory of Tongji University's computing machine " also can other.This watermark is the binary watermarking image of 192*120.
Fig. 4 in the accompanying drawing-1 is to the histogram of 4-4 for the girl Lena figure before and after the watermark that embeds Fig. 3.Fig. 4-1 is the histogram of Lena raw image before the embed watermark, average 118.62.Fig. 4-2 is a Lena histogram main body, is grey level histogram adjustment for the first time, and average is 123.62 (gray scale sideband 0-14,241-255, histogram main body 15-240).Lena image after Fig. 4-3 adding Fig. 3 watermark, PSNR=32.21 before adjusting, average 123.62.Fig. 4-4 is histogram adjustment for the second time, and average returns to 118.62 (ring shift left 5 bit shifts) again, adjusts the PSNR=36.64 of back Lena image, than higher (can embed data 85507 bits (bit), actual data 23040 bits that embed).The selection of the bit plane that embeds: the bit plane of embedding lower (minimum is the 8th bit plane), the picture intelligence noise ratio is higher during recovery.Actual measurement explanation, bit plane is lower, " 1 " and: 0 " number more close, more be difficult for compression, can embed data and more lack.The real data embedding is the inferior low bit plane (for example the 5th bit plane or the 4th bit plane) at the wavelet field high frequency time.
Had three: one data external to be transmitted, the 2nd, gray scale sideband data, the 3rd, the data after the compression in the bit plane that data embed.It is exactly original data that the three adds up.Key is hash (hash) computing, and (modulo) finishes with modular arithmetic.The effect of key has the fine setting effect to preventing to overflow except encrypting.
Before embedding data watermark, the data of bit plane originally must be compressed.The present invention adopts arithmetic coding to carry out lossless compress and decompress(ion).
The hash formula of key is: y=(k0+kx) mod (s).
For the Lena image, k0 gets 1030, and k gets 289, and x is the natural number arranged picture, and 1 to 3 * 256 * 256, y is an arranged picture behind the hash transformation, s is the pixel sum, s=3 * 256 * 256.
Table 3 embeds " Fig. 3 watermark " to Lena image manipulation step
Step Operation Explanation
1 During grey level histogram is adjusted for the first time, get 30 and minimum gray scale occurs, merge, make in the histogram, 30 gray scales are zero, half on the left side, half on the right Before 256 * 256 Lena, 256 grades of gray scales of image (between 0-255) grey level histogram adjustment for the first time, after the grey level histogram average was 118.62 grey level histogram adjustment for the first time, the grey level histogram average became 123.62
2 Wavelet transformation " lifting (Lifting) " integer wavelet direct transform, harmless
3 Embed data and key: comprising: the gray scale sideband data of waiting to transmit data and grey level histogram adjustment for the first time Embed low bit plane (5th bit plane) key of data to highest resolution zone (s=3 * 256 * 256): hash function y=(k0+kx) mod (s) is y=(1030+289x) mod (3 * 256 * 256)
4 Inverse wavelet transform " lifting " integer wavelet inverse transformation, the harmless recovery.Embed data in wavelet field, and after the inverse transformation, before gray scale was not overflowed (still between 0-255) grey level histogram adjustment for the second time, the grey level histogram average was 123.62
5 Grey level histogram adjustment for the second time 5 of ring shift lefts, PSNR brings up to 36.64 from 32.21, and after the more consistent second time with raw image, grey level histogram was adjusted, the grey level histogram average reverted to 118.62
Fig. 5-1 and Fig. 5 the-the 2nd, and example Lena embeds the image before and after Fig. 3 watermark.From Fig. 5-1 and Fig. 5-2 as seen, naked eyes can not be differentiated the difference that embeds (raw image) and back (adding watermark image) before the data.The 5th bit plane of Lena wavelet transformed domain 3 * 256 * 256 can embed data, and according to (information that removal histogram sideband occupies is outer) after the former data arithmetic coding lossless compress, arithmetic coding lossless compress hypothesis pixel is independently.Can be and embedding data is 85507 bits, and actual embedding Fig. 3 watermark data is 23040 bits.
Fig. 6-1 and Fig. 6 the-the 2nd, and example Peppers embeds the image before and after Fig. 3 watermark.The histogram average is 119.72 before the watermark, is 134.72 behind the inverse wavelet transform.If the histogram average is returned to raw image, signal noise ratio PSNR>30, distortion will increase.For fear of pepper and salt effect, suitably weakened the cyclic shift amount.At this time, the histogram average only returns to 127.72, and PSNR can reach 29.11.Though at this time PSNR is lower slightly, vision distortion does not still recognize and, and promptly from Fig. 6-1 and Fig. 6-2, naked eyes can not be differentiated the difference that embeds (raw image) and back (adding watermark image) before the data.
Fig. 7-1a-h and Fig. 7-2a-h be for to embed Fig. 3 digital watermarking to 16 spatial resolution respectively with method of the present invention be that 512 * 512 grey levels are (being 0-255) image of 8, wherein Fig. 7-1a, b, c, d, e, f,, g, h, be the medical image (MRI) of the magnetic resonance imaging of gray scale more than 8.Fig. 7-2a, b, c, d, e, f, g, h are gray scale normal image more than 8.The maximum of Fig. 7-1a-h, Fig. 7-2a-h embeds data capacity and sees Table 4.Table 4 resolution is that 512 * 512 grey levels are that 16 images of 8 can embed data max cap. (bit)
Title Capacity
??Mpic1 ??54150
??Mpic2 ??70799
??Mpic3 ??84500
??Mpic4 ??69278
Title Capacity
Mpic5 ?88236
Mpic6 ?35183
Mpic7 ?81695
Mpic8 ?53896
Title Capacity
?Lena ?85507
?Peppers ?69285
?Airplane ?93981
?Baboon ?14916
Title Capacity
??Tiffany ??89848
??Sailboat ??44086
??Couple ??84879
??House ??77726
As seen, can embed the data max cap. and reach 14k to 93k bit in the table 4.Usually data capacity is enough usefulness to embedding text data like this.The left side two row are magnetic resonance imaging image (MRI), and the right two row are common images.For the more medical images of the higher grey level of resolution, embeddable data will be more.

Claims (3)

1. based on the lossless image digital watermark method of integer wavelet, it is characterized in that: by wavelet transformation and grey level histogram adjustment, realize the lossless image digital watermarking, this digital watermark method is divided into two parts, amounts to ten steps:
First is the coding of embed digital watermark, divides following five steps to carry out:
The first step is grey level histogram adjustment for the first time: with the mathematical statistics program raw image is carried out statistics with histogram, finding out gray scale minimum sideband occurs and disposes, after the first time, histogram was handled, make to become zero about the raw image histogram, or be called the histogram main body;
Second step was the small echo direct transform: by the wavelet transformation program of computer compilation, the spatial domain of histogram main body is become wavelet field, the characteristic of multiresolution characteristic that wavelet field has and removal image correlation, make watermark data be embedded in high-resolution areas, feel that visually distortion is just smaller, simultaneously can increase compression performance, so that embed more watermark data;
The 3rd step was to embed data and key: before the data of embed digital watermark, adopt arithmetic coding that original bit-plane data is carried out lossless compress earlier, select bit plane then, data are embedded, the data that embed have three parts: the one, and data external to be transmitted, the 2nd, the first step of the present invention counts the gray scale sideband data beyond the histogram main body, the 3rd, the data after the original position flat compressed, the selection of the bit plane that embeds: the bit plane of embedding is the inferior low bit plane of wavelet field high frequency time, the embedding of key: adopt the computing of hash hash function, finish with modular arithmetic;
The 4th step was inverse wavelet transform: after watermark data and key embed, can be from the wavelet domain transform to the spatial domain by integer lifting wavelet transform, and this conversion can't harm, and helps the harmless recovery of data in the future and image;
The 5th step was grey level histogram adjustment for the second time, form at last and add watermark image: histogram is carried out the cyclic shift adjustment with the digital imaging processing software method, make the average of histogram average near raw image, make the brightness unanimity that embeds the data front and back, purpose is to improve signal noise ratio;
Second portion can be regarded the operation opposite with the step of embed digital watermark as for extracting the decoding of digital watermarking, also divides following five steps to carry out:
The 6th step was grey level histogram inverse transformation for the third time: call and the opposite software approach of grey level histogram adjustment for the second time, obtain and opposite histogram cyclic shift of the 5th step, purpose is a restitution;
The 7th step was the small echo direct transform: carry out conversion by the wavelet transformation software identical with the 4th step, just space field transformation is become wavelet field, so that carry out the deciphering of the 8th step and extract data in wavelet field;
The 8th step was deciphering, extract data: the employing arithmetic coding extracts the gray scale sideband data that transmits data and grey level histogram adjustment for the first time, extract data from the specific bit plane in given resolution zone, deciphering:, recover the bit-plane data of wavelet field at last with the hash function deciphering;
The 9th step was inverse wavelet transform: with the wavelet field image, contravariant changes the spatial domain image of histogram main body into;
The tenth step was the 4th grey level histogram adjustment: call and the opposite software approach of grey level histogram adjustment for the first time, the histogram main body is reverted to original grey level histogram, recover original image exactly.
2. the lossless image digital watermark method based on integer wavelet according to claim 1, it is characterized in that: the grey level histogram second time in described the 5th step is adjusted, form at last and add in the watermark image process, when form add watermark image and met naked eyes and do not see that distortion requires the time, also can ignore and not do grey level histogram adjustment for the second time.
3. the lossless image digital watermark method based on integer wavelet according to claim 1 is characterized in that: the inverse transformation of grey level histogram for the third time in described the 6th step, be left in the basket when not doing when the 5th step, and this step also need not be carried out certainly.
CNB021116296A 2002-05-09 2002-05-09 Digital watermark method based on integer wavelet without damage to image Expired - Lifetime CN1141639C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB021116296A CN1141639C (en) 2002-05-09 2002-05-09 Digital watermark method based on integer wavelet without damage to image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB021116296A CN1141639C (en) 2002-05-09 2002-05-09 Digital watermark method based on integer wavelet without damage to image

Publications (2)

Publication Number Publication Date
CN1379324A true CN1379324A (en) 2002-11-13
CN1141639C CN1141639C (en) 2004-03-10

Family

ID=4741671

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB021116296A Expired - Lifetime CN1141639C (en) 2002-05-09 2002-05-09 Digital watermark method based on integer wavelet without damage to image

Country Status (1)

Country Link
CN (1) CN1141639C (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1326383C (en) * 2004-06-30 2007-07-11 佳能株式会社 Image processing apparatus, image processing method, computer program and computer readable storage medium
CN100346322C (en) * 2003-10-10 2007-10-31 刘彤 Digital image recovering method based on digital water mark technology
CN100373408C (en) * 2003-01-22 2008-03-05 皇家飞利浦电子股份有限公司 Perceptible reversible watermarks
CN100385459C (en) * 2006-07-11 2008-04-30 电子科技大学 Image watermark method based on finite ridgelet transform
CN100394443C (en) * 2006-07-07 2008-06-11 中山大学 Reversible watermark method for image certification
CN100452091C (en) * 2007-03-30 2009-01-14 西安电子科技大学 Digital watermark method against geometrical attack based on image characteristic region
CN100461213C (en) * 2007-04-05 2009-02-11 上海交通大学 Lossless digital watermark method having regioselectivity
CN101006450B (en) * 2004-03-26 2010-10-13 新泽西理工学院 System and method for reversible data hiding based on integer wavelet spread spectrum
CN101527041B (en) * 2009-04-22 2011-03-30 天津大学 Picture counterfeiting detection method based on shadow matte consistency
CN101527037B (en) * 2009-04-13 2011-05-04 天津大学 Method for denoising stationary wavelet image based on neighborhood windowing
CN102262773A (en) * 2010-05-29 2011-11-30 深圳宝嘉电子设备有限公司 Dual-threshold image lossless data embedding method
CN101661605B (en) * 2008-08-26 2012-07-04 浙江大学 Embedding and positioning tampering methods of digital watermark and device thereof
CN101990681B (en) * 2008-02-01 2012-11-21 新泽西理工学院 System and method for reversible binary image data hiding using run-length histogram modification and logical operations
CN101505421B (en) * 2007-12-21 2013-04-24 索尼株式会社 Method of high dynamic range compression with detail preservation and noise constraints
CN111444486A (en) * 2019-12-31 2020-07-24 深圳贝特莱电子科技股份有限公司 Startup self-adaptive fingerprint parameter initialization method based on android system

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100373408C (en) * 2003-01-22 2008-03-05 皇家飞利浦电子股份有限公司 Perceptible reversible watermarks
CN100346322C (en) * 2003-10-10 2007-10-31 刘彤 Digital image recovering method based on digital water mark technology
CN101006450B (en) * 2004-03-26 2010-10-13 新泽西理工学院 System and method for reversible data hiding based on integer wavelet spread spectrum
CN1326383C (en) * 2004-06-30 2007-07-11 佳能株式会社 Image processing apparatus, image processing method, computer program and computer readable storage medium
CN100394443C (en) * 2006-07-07 2008-06-11 中山大学 Reversible watermark method for image certification
CN100385459C (en) * 2006-07-11 2008-04-30 电子科技大学 Image watermark method based on finite ridgelet transform
CN100452091C (en) * 2007-03-30 2009-01-14 西安电子科技大学 Digital watermark method against geometrical attack based on image characteristic region
CN100461213C (en) * 2007-04-05 2009-02-11 上海交通大学 Lossless digital watermark method having regioselectivity
CN101505421B (en) * 2007-12-21 2013-04-24 索尼株式会社 Method of high dynamic range compression with detail preservation and noise constraints
CN101990681B (en) * 2008-02-01 2012-11-21 新泽西理工学院 System and method for reversible binary image data hiding using run-length histogram modification and logical operations
CN101661605B (en) * 2008-08-26 2012-07-04 浙江大学 Embedding and positioning tampering methods of digital watermark and device thereof
CN101527037B (en) * 2009-04-13 2011-05-04 天津大学 Method for denoising stationary wavelet image based on neighborhood windowing
CN101527041B (en) * 2009-04-22 2011-03-30 天津大学 Picture counterfeiting detection method based on shadow matte consistency
CN102262773A (en) * 2010-05-29 2011-11-30 深圳宝嘉电子设备有限公司 Dual-threshold image lossless data embedding method
CN111444486A (en) * 2019-12-31 2020-07-24 深圳贝特莱电子科技股份有限公司 Startup self-adaptive fingerprint parameter initialization method based on android system
CN111444486B (en) * 2019-12-31 2022-03-22 深圳贝特莱电子科技股份有限公司 Startup self-adaptive fingerprint parameter initialization method based on android system

Also Published As

Publication number Publication date
CN1141639C (en) 2004-03-10

Similar Documents

Publication Publication Date Title
CN1141639C (en) Digital watermark method based on integer wavelet without damage to image
Hwang et al. A reversible watermarking based on histogram shifting
Li et al. A steganographic method based upon JPEG and particle swarm optimization algorithm
US8175324B2 (en) Reversible data hiding
Yu et al. Review on semi-fragile watermarking algorithms for content authentication of digital images
Hu et al. An improved VLC-based lossless data hiding scheme for JPEG images
CN108009975A (en) Jpeg image reversible information hidden method based on two-dimensional histogram modification
CN101038661A (en) Blind watermark embedding and abstracting method based on regression support vector machine
CN1256705C (en) Small wave region digital water marking mathod based on image target region
Aberna et al. Digital image and video watermarking: methodologies, attacks, applications, and future directions
Turuk et al. A novel reversible multiple medical image watermarking for health information system
CN1184795C (en) Fragile digital water print embedding and extracting method based on address code
Lande et al. Robust image adaptive watermarking using fuzzy logic an FPGA approach
Hsiao et al. Simple and robust watermarking scheme based on square-root-modulus technique
CN1529282A (en) Method and device for uniting digital water print based on singular value analysis and spread spectrum technique
Ling et al. Watermarking for image authentication
Lee et al. Reversible data hiding based on histogram modification of prediction-error
CN100340111C (en) Medical image fragile watermark method based on wavelet transform
Singh et al. State-of-the-art techniques of image watermarking: New trends and future challenges
Emmanuel et al. A reversible watermarking scheme for JPEG-2000 compressed images
Al-Fahoum et al. Reversible data hiding using contrast enhancement approach
Arabzadeh et al. Reversible data hiding scheme based on maximum histogram gap of image blocks
Yu et al. Reliable detection of BPCS-steganography in natural images
Fan et al. A BTC-compressed domain information hiding method based on histogram modification and visual cryptography
Kim et al. An object-based video watermarking

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: SHENZHEN JIABAO ELECTRONICS EQUIPMENT CO., LTD.

Free format text: FORMER OWNER: XUAN GUORONG

Effective date: 20071102

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20071102

Address after: The South high tech Zone of Shenzhen City, Guangdong province 518057 a SKYWORTH building A805

Patentee after: Shenzhen POKA Electronic Equipment Co., Ltd.

Address before: 200092 room 155, Tongji Village, Siping Road, Shanghai, 302

Patentee before: Xuan Guorong

ASS Succession or assignment of patent right

Owner name: SHENZHEN BAOJIA SOFTWARE TECHNOLOGY CO., LTD.

Effective date: 20120417

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 518057 SHENZHEN, GUANGDONG PROVINCE TO: 518053 SHENZHEN, GUANGDONG PROVINCE

TR01 Transfer of patent right

Effective date of registration: 20120417

Address after: 518053 Guangdong city of Shenzhen province Nanshan District Qiaoxiang road Xiangnian North Plaza C block 804

Co-patentee after: Shenzhen POKA Software Technology Co., Ltd.

Patentee after: Shenzhen POKA Electronic Equipment Co., Ltd.

Address before: The South high tech Zone of Shenzhen City, Guangdong province 518057 a SKYWORTH building A805

Patentee before: Shenzhen POKA Electronic Equipment Co., Ltd.

C56 Change in the name or address of the patentee
CP03 Change of name, title or address

Address after: 518053 Guangdong city of Shenzhen province Nanshan District Qiaoxiang road Xiangnian North Plaza C block 804

Patentee after: Shenzhen POKA Electronic Equipment Co., Ltd.

Patentee after: Shenzhen Rongxin Software Technology Co., Ltd.

Address before: 518053 Guangdong city of Shenzhen province Nanshan District Qiaoxiang road Xiangnian North Plaza C block 804

Patentee before: Shenzhen POKA Electronic Equipment Co., Ltd.

Patentee before: Shenzhen POKA Software Technology Co., Ltd.

CX01 Expiry of patent term

Granted publication date: 20040310

CX01 Expiry of patent term