CN1421782A - Digital watermark anti-fake method for bills - Google Patents
Digital watermark anti-fake method for bills Download PDFInfo
- Publication number
- CN1421782A CN1421782A CN 01131570 CN01131570A CN1421782A CN 1421782 A CN1421782 A CN 1421782A CN 01131570 CN01131570 CN 01131570 CN 01131570 A CN01131570 A CN 01131570A CN 1421782 A CN1421782 A CN 1421782A
- Authority
- CN
- China
- Prior art keywords
- intdct
- watermark
- coefficient
- encrypted
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Complex Calculations (AREA)
Abstract
The digital watemrmark anti-fake method for bills includes integral checking of bill information, random interrupting, filling, one-dimensional DCT conversion, Rijindael enciphering, region interrupting UUEncode to obtain anti-fake code with hidden digital watermark. The digital watermark anti-fake method has limited length plain text, and thus has greatly raised system speed, reduced system software and hardware overhead. The integral checking can find out all the one-digital altering and continuous two-digit altering to protect integral data; and adopting one-dimensional DCT conversion and Rijindael enciphering of 128 bit cipher key can resist all attack to ensure the safety of data information in enciphere bill.
Description
Technical field:
The present invention relates to a kind of digital watermark anti-fake method of bill.
Background technology:
Along with popularizing of the arrival of information age, particularly Internet, the safeguard protection problem of information becomes increasingly conspicuous.Current information security technology is basically based on the cryptography theory; its protected mode all is accesses of control documents; be about to file encryption and become ciphertext; the disabled user can not be understood; along with the widespread use of multimedia technology, need encrypt, the acoustic image data of authentication and copyright protection are also more and more.Digitized acoustic image data are exactly digital signal from essence, if this class signal is also adopted the mode of password encryption, then the signal attribute of itself just has been left in the basket.Recent years, many researchists have abandoned traditional cryptographic technology path, attempt adopting various method for processing signals that the acoustic image data are carried out hidden encryption, and this technology is applied to make multimedia " digital watermarking ".
Digital watermark technology is meant with method for processing signals and embeds implicit mark that in digitized multi-medium data this mark is normally sightless, has only detecting device or reader by special use to extract.Design of Digital Watermark must satisfy the disabled user can not be discerned, and is merely able to by the legal requirement that the copyright owner confirmed.
The digital watermark processing technology can be divided into two big classes: time domain watermark processing technology and transform domain watermark processing technology.The advantage of time domain watermark processing technology is that the speed of the embedding of watermark and detection is fast, shortcoming is that attacking abilities such as antinoise, filtering, compression are poor, and embed watermark information is little, in transform domain watermark processing technology, (---DCT or wavelet transform---DWT) as discrete Fourier transform (DFT), discrete cosine transform at first the sampled data of digital signal to be carried out certain conversion.Associative transformation self characteristics and people's requirement is embedded into watermark information on the coefficient in transform domain of digital signal then, recovers the digital signal that contains watermark information by inverse transformation at last.The advantage of transform domain watermark processing technology is containing much information of embed watermark, and attacking abilities such as antinoise, filtering, compression are more intense, and the robustness of embed watermark is good, and transform domain watermark processing technology is the main flow research direction of present digital watermark processing technology.But another aspect, existing transform domain digital watermark method can not be implemented the harmless expression of digital signal, therefore can not be applied to the false proof of bill.
Summary of the invention:
The object of the present invention is to provide a kind of digital watermark anti-fake method of bill, this method can realize the harmless reconstruct of image, and have good security owing to adopted one dimension integer dct transform and the Rijndael encryption.
For achieving the above object, the step of adding watermark signal is in data image signal:
1), binary data stream to be encrypted is done CRC check one time by checker, generate the verification nuclear of two byte longs, binary data stream to be encrypted is intercepted 8n-2 byte data at random, n 〉=2, if it is full that the data intercept byte number is then filled with 0 or 1 inadequately, and high-ranking officers check the back be added on institute's data intercept stream, generate plaintext to be encrypted;
2), with plaintext input frequency domain transducer to be encrypted, the frequency domain transform device will be expressly by 8 segmentations, and make one dimension integer dct transform to every section, obtain the IntDCT coefficient;
3), the watermark inserter joins the intermediate-frequency section of IntDCT coefficient with digital watermark information, obtains containing the IntDCT coefficient of watermark information;
4), the encryption equipment IntDCT coefficient that will the contain watermark information Rijndael that carries out 128 keys encrypts, and generates ciphertext;
5), ciphertext imported randomizer carry out zone intercepting UUEncode, make it can show as discernible alphabetical information, obtained the security code of implicit digital watermarking at par at last.
Extract the step of watermark signal:
1), the security code that will imply digital watermarking is input to demoder and carries out anti-zone intercepting UUEncode, obtains ciphertext;
2), ciphertext is imported decipher carries out anti-Rijndael deciphering, output IntDCT coefficient;
3), the IntDCT coefficient is input to the watermark extracting device, obtain digital watermarking.
The advantage that the present invention had: A, adopt time-limited plaintext, can improve the speed of system greatly, and reduce that system is soft, the spending of hardware; B, the whole verification of employing can be checked out one all changes and two continuous changes, realize the protection to overall data; C, employing one dimension integer dct transform and key length are that 128 Rijndael encrypts, and can resist all attacks, guarantee the safety of ciphered data information.
The present invention is further illustrated below in conjunction with accompanying drawing.
Description of drawings:
Accompanying drawing 1 is the theory diagram that adds watermark information in digital signal.
Accompanying drawing 2 is for extracting the theory diagram of watermark information from the digital signal that contains watermark signal.
Accompanying drawing 3 is first kind 8 integer DCT process flow diagrams.
Accompanying drawing 4 is second kind of integer DCT process flow diagram.
Embodiment:
Referring to Fig. 1; watermark information to be inserted in the binary data stream to be encrypted; at first binary data stream to be encrypted is done CRC check one time by checker 1; to prevent the illegal binary data stream to be encrypted of changing; and binary data stream to be encrypted made Global Macros; generate the verification nuclear of two byte longs; binary data stream to be encrypted is intercepted 14 byte datas at random (also be chosen as 22; 30 bytes etc.; byte is short more; then system speed is fast more; and can reduce the soft of system; the hardware spending); if not enough 14 bytes are then filled 0 (or 1) to 14 bytes; and high-ranking officers check the back be added on 14 byte datas that intercept, generate 16 bytes plaintext to be encrypted.
Above-mentioned CRC check principle is as follows:
In fact the CRC inspection principle is exactly an additional r position scale-of-two check code (sequence) after a p bit binary data sequence, thus the binary sequence that to constitute a length overall be the n=p+r position, for example, p bit binary data sequence D=[d
P-1d
P-2... d
1d
0], r position scale-of-two check code R=[r
R-1r
R-2... .r
1r
0], resulting this n position binary sequence is exactly M=[d
P-1d
P-2... d
1d
0r
R-1r
R-2... .r
1r
0]; Be attached between the content of this check code after the data sequence and data sequence and exist certain specific relation.If make a mistake because of reasons such as interference make a certain position or some position in the data sequence, this particular kind of relationship will be destroyed, therefore, by checking this relation, just can realize the check to the data correctness.
Check code R gets the residue computing and obtains by the data sequence D being carried out binary division, and it is by (r+1) position binary sequence G=[g that is called generator polynomial
rg
R-1... .g
1g
0] remove, be expressed as with polynomial form
Wherein, x
rD (x) expression is with the data sequence D r position (promptly increasing r 0 at the end of D again) that moves to left, and Q (x) represents the merchant of this division gained, and R (x) is exactly required residue.This operation relation can also be expressed with formula (2)
Wherein, Re[] represent the formula in the bracket is got the residue computing.The coding of check code calculates as mentioned above, and checkout procedure then is the M sequence directly to be carried out division get the residue computing, promptly
Or be expressed as
Resulting residue R (x) is if zero expression data is correct, otherwise thinks and make a mistake.
The 16 bytes plaintext to be encrypted of checker 1 output is delivered to frequency domain transform device 2, and frequency domain transform device 2 plaintext that 16 bytes are to be encrypted is by 8 segmentations, and makes one dimension integer dct transform to every section, obtains the IntDCT coefficient.
The algorithm of above-mentioned one dimension integer dct transform is as follows:
The transformation matrix C of 8 IntDCT-II of the first kind
8 11Be defined as
And the transformation matrix C of the second class IntDCT-II
8 11Can be defined as again
Utilize non-linear nature in the definition of integer transform, for the arbitrary integer sequence, the output result of above-mentioned two kinds of IntDCT-II is generally different, therefore can choose suitable IntDCT-II as required in practical problems.Accompanying drawing 3 and accompanying drawing 4 have provided the process flow diagram of above-mentioned two kinds of 8 IntDCT-II respectively.Wherein,
Be generalized to general N=2 with 8 IntDCT-II and IntDCT-IV now with above-mentioned 4
t, the design of t 〉=3 IntDCT-II and IntDCT-IV.
Notice matrix I in the proposition 1
M, V
M, P
M, P
M (1), D, D
M, J
MThis is as the conversion of integer to integer.
The rank matrix
Can be used for recursive definition IntDCT, and matrix
Comprised
The rotation of individual plane, matrix
Can obtain by integer transform is approximate.For definition and the algorithm of the IntDCT that sets up general length, remaining is need be to matrix B now
NIn a sub-block matrix
It is approximate to make integer transform, the lemma below for this reason at first setting up.
Perhaps
(10) can directly set up with (11), as space is limited, omit herein by matrix multiplication.
Because the matrix that occurs in (10) or (11) is INTEGER MATRICES or has the matrix that promotes structure, so matrix
Can be similar to by integer transform, establishing its integer transform is K
2
Length N=2 are set up to recursion in comprehensive above-mentioned discussion
t, the IntDCT-II of t 〉=3 and IntDCT-IV matrix are as follows:
Wherein, B
N=diag (K
2, V
N-2),
Comprised
The integer lifting matrix decomposition of individual rotational transform.Certainly, utilize the symmetry of DCT-IV, can also be as 8 IntDCT-IV, define multiple integer DCT-IV and corresponding multiple integer DCT-II. reaches following algorithm with above-mentioned discussion list now.
Algorithm (1). length N=2
t, the calculating of the IntDCT-II of t 〉=3: establishing list entries is x (k), k=0,1,2, A, N-1.
The first step: calculate
Second step: difference sequence of calculation g (k) and sequences h (k)
Point IntDCT-II and IntDCT-IV establish it and are output as
With
The 3rd step: sequence is reset
Above-mentioned three steps carry out according to length N recursion ground.
(2). length N=2
t, the calculating of the IntDCT-IV of t 〉=3: establishing list entries is x (k), k=0,1,2, Λ, N-1.
The first step: for sequence
And
According to
Do to promote conversion;
Second step: reset for the latter half of of sequence H:
The 3rd step: according to
Do sequence and reset, calculate then,
The 4th step: according to
Do the sequence rearrangement and obtain needed IntDCT-IV sequence.
Notice that some matrix itself is exactly an INTEGER MATRICES in the definition of IntDCT, and it for example has against being INTEGER MATRICES also except that constant factor:
And
After frequency domain transform device 2 carried out one dimension integer dct transform, watermark inserter 3 joined the intermediate-frequency section of IntDCT coefficient with watermark information, obtained containing the IntDCT coefficient of watermark information like this; It is that 128 Rijndael encrypt that the IntDCT coefficient that encryption equipment 4 will contain watermark information carries out key length, and generates ciphertext; The ciphertext that generates is sent to UUEncode randomizer 5, adopts the UUEncode technology to carry out zone and intercepts, and it is that binary data stream is all split into the position is the data stream of unit, is a as adjacent two bytes, b.Then the result of Chai Fening is a
0a
1a
2a
3a
4a
5a
6a
7b
0b
1b
2b
3b
4b
5b
6b
7
A wherein
i, b
i=0,1} (i=0,1 ... .7).It is that a sign indicating number is formed in a unit that the contraposition data stream is chosen 6 successively, its span is 0-63, with it as sequence number, in given character set the inside value, make it can show as discernible alphabetical information, obtained the security code of implicit digital watermarking at par at last.
Above-mentioned encryption equipment 4 also can adopt other known cryptographic algorithm.
Referring to Fig. 2, the process of extracting watermark signal from the security code of implicit digital watermarking is: the security code that will imply digital watermarking is input to demoder 6 and carries out anti-zone intercepting UUEncode, obtains ciphertext; Ciphertext is delivered to decipher 7 carry out anti-Rijndael deciphering, export the IntDCT coefficient of moisture official seal breath; The IntDCT coefficient of moisture official seal breath is delivered to watermark extracting device 8, obtain digital watermarking.
Claims (4)
1. method that adds watermark signal in bill numerical information is characterized in that: may further comprise the steps into:
A, the binary data stream of bill to be encrypted is done CRC check one time by checker (1), generate the verification nuclear of two byte longs, binary data stream to be encrypted is intercepted 8n-2 byte data at random, n 〉=2, if it is full that byte is then filled with 0 inadequately, and high-ranking officers check the back be added on data intercept stream, generate plaintext to be encrypted;
B, with plaintext input frequency domain transducer (2) to be encrypted, frequency domain transform device (2) will be expressly by the segmentation of (8) point, and makes one dimension integer dct transform to every section, obtains the IntDCT coefficient;
C, watermark inserter (3) join the intermediate-frequency section of IntDCT coefficient with digital watermark information, obtain containing the IntDCT coefficient of watermark information;
D, encryption equipment (4) will contain the IntDCT coefficient encryption of watermark information, generate ciphertext;
E, ciphertext is imported randomizer (5), adopt the UUEncode technology to carry out zone and intercept, make it can show as discernible alphabetical information, obtained the security code of implicit digital watermarking at par at last.
2. a kind of method that adds watermark signal in bill numerical information according to claim 1 is characterized in that: 14 byte datas of intercepting among the described step a.
3. a kind of method that adds watermark signal in bill numerical information according to claim 1 and 2, it is characterized in that: described encryption equipment (4) is the Rijndael encryption equipment.
4. method of extracting watermark information from the security code of implicit digital watermarking is characterized in that: may further comprise the steps:
A, the security code that will imply digital watermarking are input to demoder (6) and carry out the intercepting of anti-zone, obtain ciphertext;
B, ciphertext is imported decipher (7) carry out anti-Rijndael deciphering, output IntDCT coefficient;
C, with IntDCT coefficient input watermark extracting device (8), obtain digital watermarking.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 01131570 CN1421782A (en) | 2001-11-28 | 2001-11-28 | Digital watermark anti-fake method for bills |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 01131570 CN1421782A (en) | 2001-11-28 | 2001-11-28 | Digital watermark anti-fake method for bills |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1421782A true CN1421782A (en) | 2003-06-04 |
Family
ID=4670695
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 01131570 Pending CN1421782A (en) | 2001-11-28 | 2001-11-28 | Digital watermark anti-fake method for bills |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1421782A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102254298A (en) * | 2011-08-17 | 2011-11-23 | 北京新媒传信科技有限公司 | Digital watermark encrypting/decrypting method and system |
CN1980122B (en) * | 2006-11-16 | 2012-11-14 | 北京尧天网迅科技有限公司 | Method for increasing information transmission safety |
CN112163918A (en) * | 2020-10-30 | 2021-01-01 | 重庆远见信息产业集团股份有限公司 | Lottery credential management system and method |
-
2001
- 2001-11-28 CN CN 01131570 patent/CN1421782A/en active Pending
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1980122B (en) * | 2006-11-16 | 2012-11-14 | 北京尧天网迅科技有限公司 | Method for increasing information transmission safety |
CN102254298A (en) * | 2011-08-17 | 2011-11-23 | 北京新媒传信科技有限公司 | Digital watermark encrypting/decrypting method and system |
CN102254298B (en) * | 2011-08-17 | 2013-06-19 | 北京新媒传信科技有限公司 | Digital watermark encrypting/decrypting method and system |
CN112163918A (en) * | 2020-10-30 | 2021-01-01 | 重庆远见信息产业集团股份有限公司 | Lottery credential management system and method |
CN112163918B (en) * | 2020-10-30 | 2024-05-28 | 重庆远见信息产业集团股份有限公司 | Prize-giving evidence management system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tai et al. | Image self-recovery with watermark self-embedding | |
Arboit | A method for watermarking java programs via opaque predicates | |
CN100395776C (en) | Block fragile watermark generation and authentication method based on chaos hash function | |
CN108614961B (en) | Method for embedding and protecting digital watermark in database | |
Raj et al. | A survey on fragile watermarking based image authentication schemes | |
Yan et al. | Robust secret image sharing resistant to noise in shares | |
Chanu et al. | A survey paper on secret image sharing schemes | |
Bhattacharyya et al. | A novel approach to develop a secure image based steganographic model using integer wavelet transform | |
CN114567711A (en) | Large-capacity encrypted image information hiding method based on block capacity label | |
CN114745475B (en) | Robust reversible information hiding method for encrypted image | |
CN113190866A (en) | Power plant data safety credible transmission method for enhancing digital watermarking technology | |
Xiang et al. | Robust watermarking of databases in order-preserving encrypted domain | |
Singh et al. | An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability | |
Benrhouma | Cryptanalysis and improvement of a semi-fragile watermarking technique for tamper detection and recovery | |
CN1421782A (en) | Digital watermark anti-fake method for bills | |
CN1396569A (en) | Method for adding or extracting digital watermark to or from digital image signals | |
CN115765963A (en) | Text image audit information recording and extracting method based on reversible steganography of ciphertext domain | |
Raj et al. | Security analysis of hash based fragile watermarking scheme for image integrity | |
Fan | A source coding scheme for authenticating audio signal with capability of self-recovery and anti-synchronization counterfeiting attack | |
Orucho et al. | Review of algorithms for securing data transmission in mobile banking | |
Tiwari et al. | A survey of transform domain based semifragile watermarking schemes for image authentication | |
Hongxia et al. | Watermark hiding technique based on chaotic map | |
Jassim et al. | Enhancing data transfer architecture using LSB steganography combined with reed solomon code | |
CN115277972B (en) | Image information hiding method based on cryptographic algorithm | |
Salehi et al. | An investigation on image secret sharing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |