CN1414778A - Watermark method using geometry calibrated anti geometry conversion image - Google Patents

Watermark method using geometry calibrated anti geometry conversion image Download PDF

Info

Publication number
CN1414778A
CN1414778A CN 02149614 CN02149614A CN1414778A CN 1414778 A CN1414778 A CN 1414778A CN 02149614 CN02149614 CN 02149614 CN 02149614 A CN02149614 A CN 02149614A CN 1414778 A CN1414778 A CN 1414778A
Authority
CN
China
Prior art keywords
watermark
image
visual
embedded
dwt
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 02149614
Other languages
Chinese (zh)
Other versions
CN1321393C (en
Inventor
康显桂
黄继武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
National Sun Yat Sen University
Original Assignee
National Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Sun Yat Sen University filed Critical National Sun Yat Sen University
Priority to CNB021496145A priority Critical patent/CN1321393C/en
Publication of CN1414778A publication Critical patent/CN1414778A/en
Application granted granted Critical
Publication of CN1321393C publication Critical patent/CN1321393C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0064Geometric transfor invariant watermarking, e.g. affine transform invariant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain

Abstract

A method for geometric correction of image and protection of digital image can realize the resynchronization detection for the information watermark which has the spread spectrum modulated and interlaced also is embedded in image DWT zone through the matching module embedded in the image DFT and the training sequence embedded in image DWT. The error-free detection for valuable information can steadily be realized, althrough the watermark image under goes the server condition of both JPEG compression and geometric deformation. The method can be used also for some other occasions where the image synchronization is needed such as satellite imagery, interlacing digital map, digital watermark, etc..

Description

Adopt the anti-geometric transformation image watermark method of geometric calibration
Technical field
The present invention relates to a kind of field of multimedia signal processing, is the method for a kind of image geometry calibration and protection digital image.
Background technology
At present, watermark Against Geometrical Attacks has the method for non-blind Detecting and blind Detecting.In general, the robustness of blind Detecting water mark method is relatively poor.But owing to do not need original picture, its range of application is wider, also has more challenge.It can be divided into two classes again: first kind method is that watermark is embedded in the image feature territory with geometric invariance, as the Fourier-Mellin territory, makes geometry deformation not influence the extraction of watermark information.But these class methods all can only be resisted RST, also have difficulties in realization, for example when the amplitude spectrum of visual DFT conversion being LPM (Log Polar Mapping), because interpolation error can cause the serious decline of image quality with ILPM (Inverse Log PolarMapping).Second class is to cause under the situation of watermark detection step-out at geometry deformation, and it is synchronous with the weight of realizing watermark detection to manage to carry out geometric correction earlier before watermark detection.This need also embed a geometric correction model watermark (template watermark) except that hiding the watermark (information watermark) of carrying user profile in image.Up to the present, also there are many problems in Against Geometrical Attacks, comprises that the hiding data amount is few, relatively poor, the anti-JPEG of the invisibility of watermark compresses and anti-affine transformation ability is weak, can not resist the combination attacks of JPEG compression and geometric transformation etc. simultaneously.In addition, many methods adopt and embed the information watermark in the DFT territories, and DFT (Discrete Fourier Transform) compares with DWT (Discrete Wavelet Transform), has the weakness of self, is difficult to become the basis of main flow water mark method.
Summary of the invention
The objective of the invention is to propose a kind of sane stealthy visual blind Detecting water mark method that can resist general signal processing such as JPEG compression and geometric transformation simultaneously, and the amount of information of hiding (quiet lotus) is big (can reach more than 200 bits), and the invisibility of watermark is better.
The method of calibration of the inventive method image geometry and protection digital image, at first the information watermark is embedded in the visual DWT territory with a training sequence through band spectrum modulation with after interweaving, again a matching template is embedded into visual DFT territory, be embedded in the heavy synchronous detecting of the information watermark in the visual DWT territory after realizing band spectrum modulation and interweave by matching template that is embedded in visual DFT territory and the training sequence that is embedded in visual DWT territory at last, specific practice is: 1) meaningful information b to be embedded (L bits) is at first carried out the spread spectrum coding modulation with a pseudo-random binary PN sequence that is produced by key, can obtain binary system watermark data W to be embedded like this, and then interweave; PN training sequence that will produce by key or all-ones, complete 0 yard directly be embedded in the LL that visual DWT conversion obtains 3In the central row of subband and central series sub-band coefficients or other sub-band coefficients, and the binary system watermark data W after embedding interweaves in all the other sub-band coefficients; By 2-D IDWT obtain embedding the watermark of DWT territory visual f ' (x, y); 2) (x y) carries out the DFT conversion, and we embed a matching template that is made of a little louder local pole in the amplitude spectrum coefficient of DFT conversion, and a little bigger position of local pole can be produced by a cipher controlled with f '; 3) detect earlier matching template, and after relatively obtaining the transformation matrix of the affine transformation that image stood and do inverse transformation recovering geometry with original matching template, do translation calibration back according to training sequence again and extract watermark information; Meaningful watermark can be digital documents such as text, numeral, figure, image, signature, audio frequency.
For detect the image stand the transformation matrix of affine transformation and recover its original geometry do inverse transformation, can embed a matching template that is made of a little louder local pole in the amplitude spectrum coefficient of visual DFT conversion, a little bigger position of local pole can be produced by a cipher controlled; Embed a training sequence simultaneously in visual DWT territory and be used for the translation calibration.
The information watermark that is embedded in the visual DWT territory through band spectrum modulation with after interweaving realizes heavy synchronous detecting by matching template that is embedded in visual DFT territory and the training sequence that is embedded in visual DWT territory; The detection two big steps that are divided into the embedding and the watermark of watermark.1, the embedding of watermark:
The present invention is embedded in the information watermark in the low frequency sub-band coefficient in visual DWT territory, and the template watermark is embedded in the amplitude spectrum intermediate frequency coefficient after the visual DFT conversion, and two parts watermark is not disturbed mutually like this, can obtain better robustness again.The image watermark embedding grammar block diagram that the present invention proposes as shown in Figure 1.2: the detection of watermark:
Do not need the auxiliary of original picture, the inventive method can detect the data of hiding and obtain from the watermark image that may suffer geometric attack and JPEG compression simultaneously.Testing process is as follows:
A) when watermark detection, at first want the watermark of application training Sequence Detection whether synchronous.If asynchronous, then must be earlier through the overweight synchronous image g that obtains synchronously *(x, y).It is heavy that to comprise that synchronously plate watermark detection, contrary affine transformation, the translation of application training sequence are touched in the DFT territory synchronous.If synchronously, directly do a step.
B) to synchronous image g *(x y) makes DWT territory watermark detection, has obtained actual hiding data.
Watermark embed process mainly contains the embedding of the DWT territory watermark preliminary treatment of (comprising information watermark, training sequence), the watermark of DWT territory and embedding three parts that the plate watermark is touched in the DFT territory.
The preliminary treatment of 1) DWT territory watermark (information watermark, training sequence): direct sequence spread spectrum is encoded, is interweaved.
The present invention introduces the robustness and the secret that hide Info with enhancing in the image watermark method with technology commonly used in some communication theories (as the direct sequence spread spectrum modulation and interweave).
Suppose that the original picture size is 512 * 512.Application length is N 1PN sign indicating number sequence m={m jJ=1 ..., N 1Information b{b to embedding iI=1 ..., L} (b wherein i∈ 0,1}) carry out the spread spectrum coding modulation." 1 " is modulated to m (bipolar sequence, m j∈ 1, positive sequence 1}), i.e. {+1 * m jJ=1 ..., N 1, " 0 " is modulated to the anti-phase sequence of m, i.e. { 1 * m j, j=1 ..., N 1.15 PN sign indicating number sequence is produced by PN sign indicating number sequencer by a key.Can obtain binary system watermark data W to be embedded like this: b i = DSSScoding &RightArrow; W i { w ij ; w ij &Element; { - 1 , + 1 } , 1 &le; j < N 1 , 1 &le; i < L }
Training sequence is that can the information watermark realize the key that translation is synchronous, and for make its influence that is subjected to visual cutting less as far as possible, it should be embedded in needs to lay special stress on protecting the low frequency sub-band position of part correspondence or the central row and the central series of low frequency sub-band in the image.Be embedded in 32 row and 32 row of low frequency sub-band as shown in Figure 2.And in the remainder of low frequency sub-band, embed through the binary system watermark data W after interweave (adopting 2-dimensional interleaving technology or other interleaving technologies).
Deposit 127 training sequences on 32 row of one 64 * 64 two-dimensional matrix and 32 column positions, all the other sequence of positions are deposited the binary system watermark data W afterwards that interweaves, and the two-dimensional matrix that obtains is become an one-dimension array by line scanning, are designated as X.The embedding and the detection method of 2) DWT territory watermark (information watermark, training sequence)
(x y) carries out three grades of DWT and decomposes, low frequency sub-band LL the embedding original picture f of DWT territory watermark 3Coefficient becomes one-dimension array by line scanning, is designated as C.By formula (1), we are added to binary data X on the low frequency coefficient C, obtain new low frequency coefficient C ':
0≤i<4096 wherein, C (i), C ' (i), x iBe respectively i the element of C, C ', X.α represents embedment strength, is satisfying under the prerequisite of invisibility, selects maximum integer value as far as possible.With the wavelet coefficient after watermarked carry out IDWT obtain embedding the watermark of DWT territory visual f ' (x, y).
The detection of DWT territory watermark is synchronous visual g *(x, the low frequency sub-band LL after y) DWT decomposes 3Coefficient becomes one-dimension array by line scanning, is designated as C *The binary data that extracts is designated as X * = { X i * } , The extraction formula is as follows:
0≤i<4096 wherein, α is an embedment strength.With the binary data X that extracts *Carry out reciprocal cross and knit the binary data sequence W that (inverse process that interweaves) recovers embedding *W then *Carry out segmentation by 15 bits, every section is carried out relevantly with the sequence m of 15 bits, if correlation is greater than 0, then to embed information bit be " 1 " in judgement, otherwise judgement embedding information bit is " 0 ".Just obtain the embedding information recovered after the despreading.
3) embedding of DFT territory template and detection
(x, DFT territory y) embeds the synchronizing information after a template is out of shape as watermark image to visual f ' after embedding DWT territory watermark.
The embedding of template divides following four steps:
A) (x, y) (512 * 512) extend to 1024 * 1024 around filling with average with f '.
B) do the DFT conversion, get the fourier coefficient range weight.(normalized frequency is 0.20~0.30) embeds 28 template points in the intermediate frequency zone, and being evenly distributed in inclination angle, DFT territory is θ 1And θ 2Two straight lines, 14 points on the every line, Fig. 2 is the schematic diagram of embedded template, the situation of 14 the template points of poincare half plane that only draw among the figure, lower half-plane also embeds 14 template points about former point symmetry.The inclination angle of straight line and the utmost point of template point footpath are produced by a key pseudorandom.
C) the mould value of increase template point place fourier coefficient, (can adopt radius is the circular window of R, maximum as shown in Figure 3) to make it to become regional area.The change amount is standard with invisible, and generally getting maximum is that local mean values adds the variance about several times to tens times.
D) calculate inverse fourier transform (IDFT) and obtain final watermark image f " (x, y).
Image will produce the corresponding linear conversion in the DFT territory in the linear transformation that spatial domain is subjected to, so just can determine the geometric deformation that image is experienced by the transformation relation of template point position.If the linear transformation of square image below spatial domain has taken place: x y &RightArrow; B x y - - - - ( 3 ) Be equivalent to so do following linear transformation in the DFT territory: u v &RightArrow; ( B - 1 ) T u v - - - - ( 4 )
For the template point on the template line, after the experience linear transformation, they still coexist one and cross on the initial point straight line.There is certain relation (as r '=Kr, K is a certain constant) in the coordinate of new template point (as utmost point footpath r ') with the coordinate (as utmost point footpath r) of original template point, and this can be used for the quick matching judgment of search procedure.
The step of template detection is as follows:
A) treating mapping resembles g (x y) does Barlette filtering.
The same during b) with embedded template, filtered image to be measured is extended to 1024 * 1024.
C) do the DFT conversion.With a radius be R ' (R '<R, the windows radius of R when embedding) circular window (as regional area) in the poincare half plane of fourier coefficient magnitude matrix, search for, extract all local maximum points.Is DFT coefficient amplitude matrix poincare half plane that the summit is divided into N with the initial point b(N b=360 or 180 or other values) individual sector region, each fan-shaped drift angle is 0.5 ° or 1 °.By angle all local maximum points are included into each sector region respectively again.
D) find with two and touch corresponding possible of printed line and touch the set of plate point.
In each sector region, at K Min<K<K MaxThe such K value of search in the scope: it makes to have N at least in this sector mIndividual local maximum point satisfies | r Ii - Kr Tj &prime; | < threshold , N wherein mBe a number of predesignating, r IiBe the utmost point footpath (i=1...N of Local Extremum among the i of sector b), r ' TjBe the utmost point footpath of touching plate point on the grand master pattern printed line j (j=1,2), threshold>0 is a threshold value.We get N in the experiment m=5, threshold=0.002, K Min=0.5 and K Max=2.0 (are 2~0.5 corresponding to the zooming parameter on the spatial domain).If find such K value, we just get off corresponding Local Extremum coordinate record.
E) by above-mentioned steps, obtain the set of possible matched line, be called " accurate matched line ", the local extremum on the line.
Point is called " accurate match point ", and coordinate is designated as (x Ij, y Ij).The coordinate of image poincare half plane corresponding primary template point be designated as (x ' Ij, y ' Ij), wherein { 1,2} represents i bar template (coupling) line to i ∈, and { 1,2, Λ, 7} represent j template (coupling) point to j ∈.Take out a set and concentrate another set of taking-up from concentrating corresponding to the accurate match point of template line 2 corresponding to the accurate match point of template line 1.A possible transformation matrix A who calculates according to the point and the corresponding relation between template point of these two set.Seek the minimum A of mean error MAE (Mean Absolute Error). MAE = 1 nummatches | | A x 11 y 11 M M x 11 y 11 x 21 y 21 M M x 21 y 21 T - x 11 &prime; y 11 &prime; M M x 11 &prime; y 11 &prime; x 21 &prime; y 21 &prime; M M x 21 &prime; y 21 &prime; T | | - - - - ( 5 ) Wherein template point for (x ' Ij, y ' Ij) and " accurate match point " be (x Ij, y Ij), nummatches is the match point number, is the error matrix of one 2 row among the operator ‖ Λ ‖.
F) will add 180 ° corresponding to the accurate match point of template line 1, repeat e), determine last frequency domain transform matrix A by the MAE value of minimum.Can get spatial domain transformation matrix B=A by formula (3) and (4) T
Use the training sequence S of extraction and the coefficient correlation of original training sequence T and determine whether image reaches the translation synchronization parameter of image synchronously.
Whether when watermark detection, it is synchronous at first will to detect watermark.If asynchronous, then must just can carry out watermark detection behind the heavy synchronization watermarking.If synchronously, then directly extract low frequency sub-band LL 3Subband hiding data and decode information.
Whether detect watermark synchronous: (x, y) resetting size is 512 * 512, then it is carried out 3 grades of DWT and decomposes, from LL with visual g to be measured 3Extract training sequence S in 32 row of subband and 32 row, calculate the coefficient correlation of it and original training sequence T &rho; T , S ( 0 ) = 1 127 &Sigma; n = 1 127 ( T n S n ) , Whether see 〉=threshl.If we think that S is real training sequence, and watermark is synchronous, can directly carry out the extraction and the decoding of the watermark of DWT territory.If<threshl thinks that then watermark is nonsynchronous, must be earlier through overweight extraction and the decoding that just can carry out the watermark of DWT territory synchronously.General desirable 0.56 (by the definite value of experiment) of threshl.Pseudo-synchronous probability promptly appears in the appearance false-alarm can be by calculating P fp = 1 2 127 &Sigma; k = 127 - e 127 C 127 k = 8.59 &times; 10 - 9 , E=round (127 * (1-threshl)/2) wherein.Round represents round.
The heavy synchronous first step is: recover original geometry.(x detects the template watermark of embedding in y), and it and original template compared obtains the affine transformation matrix B that image is stood from visual g to be measured.After obtaining affine transformation matrix B, with visual g (x to be measured, y) carry out the visual g ' (x that the image geometry inverse transformation reverts to M * N size, y) (Fig. 5 b), and then fill 0 one-tenth 512 * 512 size visual I (x, y), filled with 0 by the part of cutting, (x is y) at visual I (x, y) center (Fig. 5 c) for g '.
The heavy second synchronous step is: translation is synchronous.Promptly determine the translation synchronization parameter of image with the coefficient correlation of training sequence S that extracts and T.
Translation adoptable a kind of way synchronously is that (x y) makes following all possible translation: I with visual I t(x, y)=I ((x-x t) mod512, (y-y t) mod512); { - 1 2 ( 512 - M ) &le; x t < 1 2 ( 512 - M ) ; - 1 2 ( 512 - N ) &le; y t < 1 2 ( 512 - N ) } - - - - ( 6 ) Image after each translation is made DWT and is decomposed, from LL 332 row of subband extract training sequence S in being listed as with 32.Can determine translation parameters (x according to the training sequence that extracts and the coefficient correlation maximum of original training sequence t, y t).
Another method that the present invention proposes is that (x y) does maximum 8 * 8=64 time translation and gets final product, thereby can reduce amount of calculation greatly with visual I.According to the time-frequency local character of DWT, LL 3Each coefficient of subband is all corresponding to a part of image.Can prove (our experiment has also proved this point), if when DWT, adopt a tight wavelet filter and adopt periodic extension mode (if other continuation modes of employing then except image border, also satisfy following relationship), visual I (x, y) translation 8 * x T1Row and 8 * y T1Row (x T1, y T1Be integer), obtain translation image I t(x, y):
I t(x, y)=I ((x-8 * x T1) mod 512, (y-8 * y T1)) mod 512) (7) LL after then three grades of DWT of image decompose 3Subband is translation x also T1Row and y T1Row:
LL 3t(x, y)=LL 3((x-x T1) mod 64, (y-y T1) mod 64) (8) LL wherein 3(x, y) and LL 3t(x, y) be respectively visual I (x, y) and I t(x, y) LL 3Sub-band coefficients.LL 3Translation also takes place in the training sequence that the translation of subband causes embedding.The character that application of formula 7 and 8 provides, we can be only to I (x, y) do maximum 8 * 8 translations:
I t(x, y)=I ((x-x t) mod 512, (y-y t) mod 512); { 4≤x t, y t<4 (9) every translations once are DWT and are decomposed, and obtain LL 3Subband LL 3t(x, y).With LL 3t(x y) does translation: LL ' 3t(x, y)=LL 3t((x-x T1) mod64, (y-y T1) mod64); { T 1≤ x T1<T 1-T 2≤ y T1<T 2(10) in the following formula, T 1=round (0.5 * (512-M)/8), T 2=round (0.5 * (512-N)/8).Each translation is from LL ' 3t(x, 32 row y) and 32 row extractions training sequence S, according to and original training sequence T between maximum related value determine translation parameters.Can determine the translation parameters (8 * x of image after maximum 64 translations search t+ x T1, 8 * y t+ y T1), thereby the visual g after the acquisition translation calibration *(x, y).
The present invention has the following advantages:
1) the digital watermarking blind checking method of the DFT-DWT compositum of the present invention's proposition resists normal signal processing aspect and affine transformation aspect at the same time and has all reached stronger robustness (table 1).When compressibility factor is 15 JPEG compression (JPEG_15), can realize that zero defect detects, can resist other geometric transformations except that Rand Bending among the international watermark test platform StirMark 3.1, as to rotation (auto crop, auto scale), jitter, scaling, shearing, general linear transform etc. can both realize that zero defect detects, and can resist the combination attacks of JPEG compression and geometric transformation, as resisting combination attacks such as JPEG_50 compression, rotation, convergent-divergent, cutting, translation simultaneously.
2) water mark method that proposes of the present invention can be hidden the above information of 264 bits, and more than 40dB, the invisibility of watermark is better with respect to the PSNR of original picture for watermark image.
3) the image geometry collimation technique among the present invention, the accuracy height, and can avoid in image, embedding a visable indicia.
Table 1 the present invention proposes the result that method water seal test platform StirMark 3.1 carries out the robustness test.
????StirMark?functions ?Lena ?Baboon
????JPEG?15~100 ????0 ????0
????Gauss?filtering ????0 ????0
????sharpening ????0 ????0.02
????jitter ????0 ????0
????scaling ????0 ????0
????aspect?ratio ????0 ????0
????cropping?25 ????0 ????0
????rotation(auto-crop,scale) ????0 ????0
????general?linear?transform ????0 ????0
????shearing ????0 ????0
Description of drawings:
Fig. 1 is that watermark embeds block diagram.
Fig. 2 is training sequence and is embedded in LL 3The position of subband.
Fig. 3 is the position view that embeds 14 template points at DFT conversion amplitude spectrum poincare half plane.
Fig. 4 is the image that has embedded the watermark of DWT-DFT territory.
Fig. 5 is the robustness test that the inventive method antagonism JPEG compression and RST (rotation, cutting, convergent-divergent and translation combination attacks) gang up against.
Among Fig. 1, the 1st, need hiding bit information, the 2nd, hide Info through direct sequence spread spectrum, the 3rd, interweave, the 4th, original picture, the 5th, DWT, the 6th, data are embedded in the visual DWT sub-band coefficients, the 7th, IDWT, the 8th, embedded the watermark of DWT territory visual f ' (x, y), the 9th, with f ' (x, y) carry out the DFT conversion, the 10th, in the DFT territory, embed and touch the plate watermark.The 11st, IDFT.The 12nd, embedded the visual f of DWT-DFT territory compound watermark " (x, y).The 13rd, the training sequence that embeds.
Among Fig. 2, T 1... T 127Be that 127 training sequences are at LL 3Certain delegation in the subband and the position of a certain row.Row 32 expressions 32 row, Column 32 expressions 32 row.
Some results that are to use standard picture Lena and Baboon test that provide among Fig. 4,5.
Among Fig. 4, a) Lena watermark image (PSNR=40.1dB); B) Baboon watermark image (PSNR=39.6dB).
Among Fig. 5, and the visual g after a) the Lena watermark image is subjected to JPEG compression and RST and gangs up against (x, y).
B) figure a through the visual g ' after the calibration affine transformation (x, y).Image size is 504 * 504.
C) figure mend around the b 0 to 512 * 512 big or small I (x, y).
D) the visual g after figure c proofreaies and correct through translation *(x, y), image size is 512 * 512, filling part is
Image g (x, average y).264 bits of hiding still can detect by zero defect.
Embodiment
Embodiment:
The development of computer, printer and high-speed transmission equipment makes and becomes very convenient at enterprising row image of network and transmission of video signals.But the serious problems that transmission and storage faced of electron image, video etc. are that their duplicate and original paper is just the same, thereby copyright owner's be unwilling to propagate by this way their material.Because the internet is increasingly extensive in the application of commercial field, therefore need a kind of means that can protect electronic data in a hurry.Digital watermarking is to carry a group of owner's copyright information to distinguish means.Digital watermarking for good and all is embedded into to be used for copyright protection and to check whether data are destroyed in the multi-medium data.But present digital watermark technology just detects not come out mostly behind some very little geometry deformations of image process.Therefore great advantage of the present invention is to make the digital watermarking of embedding can resist the attack etc. of geometry deformation and image compression coding simultaneously.
The digital watermark technology that provides anti-geometric transformation below uses and tests some results that obtain at standard picture Lena and Baboon.
We embed information watermark, matching template and a training sequence that comprises 44 characters (264 bit) respectively on the image of Lena and Baboon (being 512 * 512 * 8 bits), the PSNR value is respectively 40.1dB and 39.6dB (Fig. 4).We get L=264 in the test, N 1=15, α=56, threshl=0.56, threshold=0.002, N b=180, N m=5, K Min=0.5 and K Max=2.0, and in to visual wavelet transform, use Daubechies 9/7 biorthogonal wavelet filter, training sequence is embedded in LL 332 row of subband and 32 row.Watermark embedding method of the present invention need be less than 3 second time on the P4 of 1.7G computer (windows platform, VC++ language), and detection method needs about 1~13 second.As can be seen, amount of calculation is very not big.
Table 1 is the situation that information watermark opposing StirMark3.1 attacks.Wherein BER (Bit Error Rate) is meant bit error rate.Watermark can both realize that to geometric attacks such as convergent-divergent, rotation+cutting, rotation+cutting+convergent-divergent, general linear transformation, shearing, jitter, change length-width ratio among the StirMark3.1 zero defect detects.Can realize when cropping_25, JPEG_15 attack in StirMark3.1 that zero defect detects.To Gaussian filtering, sharpening, the watermark character string also can the zero defect rate or is extracted with extremely low error rate.
In addition, we also tested be subjected at watermark image rotating arbitrarily+to shear+situation of convergent-divergent+translation (RST) under the robustness of watermark.As shown in Figure 5.Fig. 5 (a) be after the Lena watermark image is subjected to JPEG compression and RST and gangs up against visual g (x, y).Fig. 5 (b) be Fig. 5 (a) through recover after the calibration affine transformation behind its original-shape visual g ' (x, y).Image size is 504 * 504.Fig. 5 (c) is that (x, (x y), mends 0 back former visual g ' (x, the visual I that y) is positioned at (x, central authorities y) y) to fill up the visual I of 0 to 512 * 512 size on every side at visual g '.Fig. 5 (d) is that (x is y) through the visual g after the translation correction for visual I *(x, y), image size is 512 * 512.During watermark detection, (x, fill, rather than with 0 value filling, the result who does like this can improve the detection performance by average y) with visual g for filling part.Test result is that 264 bits of hiding still can detect by zero defect.

Claims (2)

1. the method for image geometry calibration and protection digital image, it is characterized in that this method at first is embedded into the information watermark in the visual DWT territory with a training sequence through band spectrum modulation with after interweaving, again a matching template is embedded into visual DFT territory, be embedded in the heavy synchronous detecting of the information watermark in the visual DWT territory after realizing band spectrum modulation and interweave by matching template that is embedded in visual DFT territory and the training sequence that is embedded in visual DWT territory at last, specific practice is: 1) meaningful information b to be embedded (L bits) is at first carried out the spread spectrum coding modulation with a pseudo-random binary PN sequence that is produced by key, can obtain binary system watermark data W to be embedded like this, and then interweave; PN training sequence that will produce by key or all-ones, complete 0 yard directly be embedded in the LL that visual DWT conversion obtains 3In the central row of subband and central series sub-band coefficients or other sub-band coefficients, and the binary system watermark data W after embedding interweaves in all the other sub-band coefficients; By 2-DIDWT obtain embedding the watermark of DWT territory visual f ' (x, y); 2) (x y) carries out the DFT conversion, and we embed a matching template that is made of a little louder local pole in the amplitude spectrum coefficient of DFT conversion, and a little bigger position of local pole can be produced by a cipher controlled with f '; 3) detect earlier matching template, and after relatively obtaining the transformation matrix of the affine transformation that image stood and do inverse transformation recovering geometry with original matching template, do translation calibration back according to training sequence again and extract watermark information; Meaningful watermark can be digital documents such as text, numeral, figure, image, signature, audio frequency.
2. a kind of method that is used for image geometry calibration and protection digital image according to claim 1, it is characterized in that in the amplitude spectrum coefficient of visual DFT conversion embedding a matching template that constitutes a little louder by local pole, be used to detect image stand the transformation matrix of affine transformation and recover its original geometry do inverse transformation; Embed a training sequence simultaneously in visual DWT territory and be used for the translation calibration.
CNB021496145A 2002-12-12 2002-12-12 Watermark method using geometry calibrated anti geometry conversion image Expired - Fee Related CN1321393C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB021496145A CN1321393C (en) 2002-12-12 2002-12-12 Watermark method using geometry calibrated anti geometry conversion image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB021496145A CN1321393C (en) 2002-12-12 2002-12-12 Watermark method using geometry calibrated anti geometry conversion image

Publications (2)

Publication Number Publication Date
CN1414778A true CN1414778A (en) 2003-04-30
CN1321393C CN1321393C (en) 2007-06-13

Family

ID=4751698

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB021496145A Expired - Fee Related CN1321393C (en) 2002-12-12 2002-12-12 Watermark method using geometry calibrated anti geometry conversion image

Country Status (1)

Country Link
CN (1) CN1321393C (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1297938C (en) * 2003-08-07 2007-01-31 国际商业机器公司 Method and apparatus for inserting and detecting watermark in picture derived from source picture
CN100353444C (en) * 2004-05-28 2007-12-05 中山大学 Digital audio-frequency anti-distorting method
CN100357971C (en) * 2006-01-18 2007-12-26 李京兵 Wavelet-based geometric attack resistant digital watermark method
CN101282457B (en) * 2005-02-06 2010-06-02 陆健 False proof detection method for real time monitoring videosignal
CN101124624B (en) * 2005-01-21 2012-01-25 无限媒体股份有限公司 Method of embedding a digital watermark in a useful signal
CN103177413A (en) * 2011-12-20 2013-06-26 深圳市腾讯计算机系统有限公司 Method and device for generating localization blind watermark and method and device for detecting localization blind watermark
CN105023235A (en) * 2015-07-09 2015-11-04 哈尔滨工程大学 Electronic chart watermarking method based on space redundancy relation
CN105072453A (en) * 2015-07-21 2015-11-18 河海大学 Video watermarking method for mobile terminal
CN109688161A (en) * 2019-02-14 2019-04-26 上海鹏越惊虹信息技术发展有限公司 A kind of network trace method, apparatus, system, equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001078010A (en) * 1999-09-02 2001-03-23 Hitachi Ltd Method for extracting electronic watermark information
EP1297492B1 (en) * 2000-06-23 2007-03-28 Koninklijke Philips Electronics N.V. Watermark embedding method and arrangement

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1297938C (en) * 2003-08-07 2007-01-31 国际商业机器公司 Method and apparatus for inserting and detecting watermark in picture derived from source picture
CN100353444C (en) * 2004-05-28 2007-12-05 中山大学 Digital audio-frequency anti-distorting method
CN101124624B (en) * 2005-01-21 2012-01-25 无限媒体股份有限公司 Method of embedding a digital watermark in a useful signal
CN101282457B (en) * 2005-02-06 2010-06-02 陆健 False proof detection method for real time monitoring videosignal
CN100357971C (en) * 2006-01-18 2007-12-26 李京兵 Wavelet-based geometric attack resistant digital watermark method
US9147223B2 (en) 2011-12-20 2015-09-29 Tencent Technology (Shenzhen) Company Limited Method and device for localized blind watermark generation and detection
CN103177413A (en) * 2011-12-20 2013-06-26 深圳市腾讯计算机系统有限公司 Method and device for generating localization blind watermark and method and device for detecting localization blind watermark
CN103177413B (en) * 2011-12-20 2016-04-13 深圳市腾讯计算机系统有限公司 The method that localization blind watermatking generates, detect and device
CN105023235A (en) * 2015-07-09 2015-11-04 哈尔滨工程大学 Electronic chart watermarking method based on space redundancy relation
CN105023235B (en) * 2015-07-09 2018-06-12 哈尔滨工程大学 A kind of electronic chart water mark method based on spatial redundancy relationship
CN105072453A (en) * 2015-07-21 2015-11-18 河海大学 Video watermarking method for mobile terminal
CN105072453B (en) * 2015-07-21 2018-07-24 河海大学 A kind of video watermark process of facing moving terminal
CN109688161A (en) * 2019-02-14 2019-04-26 上海鹏越惊虹信息技术发展有限公司 A kind of network trace method, apparatus, system, equipment and storage medium

Also Published As

Publication number Publication date
CN1321393C (en) 2007-06-13

Similar Documents

Publication Publication Date Title
Kang et al. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
Jiansheng et al. A digital watermarking algorithm based on DCT and DWT
US20030133589A1 (en) Method for the estimation and recovering of general affine transform
Gunjal et al. Discrete wavelet transform based strongly robust watermarking scheme for information hiding in digital images
US6700991B1 (en) Hidden digital watermarks in images
CN100357971C (en) Wavelet-based geometric attack resistant digital watermark method
CN102682418B (en) Method for embedding and extracting multiple zero watermarks of digital image
CN101122996B (en) Digital image embedding, extraction method and device
CN101330610A (en) Method and apparatus for embedding and extracting watermark as well as processing system
CN1941693A (en) Method for watermarking small wave threshold digital audio multiple mesh based on blind source separation
Song et al. Recent advances and classification of watermarking techniques in digital images
CN1321393C (en) Watermark method using geometry calibrated anti geometry conversion image
Kumar et al. A hybrid digital watermarking approach using wavelets and LSB
Vasudev A review on digital image watermarking and its techniques
CN102360486A (en) Medical-image robust multiple-watermark method based on DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform)
CN1246779C (en) Embedding and extracting method for wavelet domain chaotic semi-frageile digit water print
CN101093575A (en) Digital watermark method of paralleled multiple robustnesses based on multiple copyright authentications
Li et al. Blind image watermarking scheme based on wavelet tree quantization robust to geometric attacks
Halima et al. A novel approach of digital image watermarking using HDWT-DCT
Hsieh et al. Perceptual digital watermarking for image authentication in electronic commerce
CN100340111C (en) Medical image fragile watermark method based on wavelet transform
Jambhekar et al. Performance analysis of digital image steganographic algorithm
Yuan et al. A multiscale fragile watermark based on the Gaussian mixture model in the wavelet domain
CN1234230C (en) Vulnerable watermark method for protecting electronic signet
CN1889672A (en) Video-frequency identifying method based on small wave conversion and mixed watermark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070613

Termination date: 20100112