CN1421782A - Digital watermark anti-fake method for bills - Google Patents

Digital watermark anti-fake method for bills Download PDF

Info

Publication number
CN1421782A
CN1421782A CN 01131570 CN01131570A CN1421782A CN 1421782 A CN1421782 A CN 1421782A CN 01131570 CN01131570 CN 01131570 CN 01131570 A CN01131570 A CN 01131570A CN 1421782 A CN1421782 A CN 1421782A
Authority
CN
China
Prior art keywords
intdct
watermark
coefficient
encrypted
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 01131570
Other languages
Chinese (zh)
Inventor
田力
鲍家文
罗永�
成礼智
毛紫阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIACHENG ANTI-COUNTERFEIT SCIENCE AND TECHNOLOGY (SHENZHEN) Co Ltd
Original Assignee
JIACHENG ANTI-COUNTERFEIT SCIENCE AND TECHNOLOGY (SHENZHEN) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIACHENG ANTI-COUNTERFEIT SCIENCE AND TECHNOLOGY (SHENZHEN) Co Ltd filed Critical JIACHENG ANTI-COUNTERFEIT SCIENCE AND TECHNOLOGY (SHENZHEN) Co Ltd
Priority to CN 01131570 priority Critical patent/CN1421782A/en
Publication of CN1421782A publication Critical patent/CN1421782A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Complex Calculations (AREA)

Abstract

The digital watemrmark anti-fake method for bills includes integral checking of bill information, random interrupting, filling, one-dimensional DCT conversion, Rijindael enciphering, region interrupting UUEncode to obtain anti-fake code with hidden digital watermark. The digital watermark anti-fake method has limited length plain text, and thus has greatly raised system speed, reduced system software and hardware overhead. The integral checking can find out all the one-digital altering and continuous two-digit altering to protect integral data; and adopting one-dimensional DCT conversion and Rijindael enciphering of 128 bit cipher key can resist all attack to ensure the safety of data information in enciphere bill.

Description

A kind of digital watermark anti-fake method of bill
Technical field:
The present invention relates to a kind of digital watermark anti-fake method of bill.
Background technology:
Along with popularizing of the arrival of information age, particularly Internet, the safeguard protection problem of information becomes increasingly conspicuous.Current information security technology is basically based on the cryptography theory; its protected mode all is accesses of control documents; be about to file encryption and become ciphertext; the disabled user can not be understood; along with the widespread use of multimedia technology, need encrypt, the acoustic image data of authentication and copyright protection are also more and more.Digitized acoustic image data are exactly digital signal from essence, if this class signal is also adopted the mode of password encryption, then the signal attribute of itself just has been left in the basket.Recent years, many researchists have abandoned traditional cryptographic technology path, attempt adopting various method for processing signals that the acoustic image data are carried out hidden encryption, and this technology is applied to make multimedia " digital watermarking ".
Digital watermark technology is meant with method for processing signals and embeds implicit mark that in digitized multi-medium data this mark is normally sightless, has only detecting device or reader by special use to extract.Design of Digital Watermark must satisfy the disabled user can not be discerned, and is merely able to by the legal requirement that the copyright owner confirmed.
The digital watermark processing technology can be divided into two big classes: time domain watermark processing technology and transform domain watermark processing technology.The advantage of time domain watermark processing technology is that the speed of the embedding of watermark and detection is fast, shortcoming is that attacking abilities such as antinoise, filtering, compression are poor, and embed watermark information is little, in transform domain watermark processing technology, (---DCT or wavelet transform---DWT) as discrete Fourier transform (DFT), discrete cosine transform at first the sampled data of digital signal to be carried out certain conversion.Associative transformation self characteristics and people's requirement is embedded into watermark information on the coefficient in transform domain of digital signal then, recovers the digital signal that contains watermark information by inverse transformation at last.The advantage of transform domain watermark processing technology is containing much information of embed watermark, and attacking abilities such as antinoise, filtering, compression are more intense, and the robustness of embed watermark is good, and transform domain watermark processing technology is the main flow research direction of present digital watermark processing technology.But another aspect, existing transform domain digital watermark method can not be implemented the harmless expression of digital signal, therefore can not be applied to the false proof of bill.
Summary of the invention:
The object of the present invention is to provide a kind of digital watermark anti-fake method of bill, this method can realize the harmless reconstruct of image, and have good security owing to adopted one dimension integer dct transform and the Rijndael encryption.
For achieving the above object, the step of adding watermark signal is in data image signal:
1), binary data stream to be encrypted is done CRC check one time by checker, generate the verification nuclear of two byte longs, binary data stream to be encrypted is intercepted 8n-2 byte data at random, n 〉=2, if it is full that the data intercept byte number is then filled with 0 or 1 inadequately, and high-ranking officers check the back be added on institute's data intercept stream, generate plaintext to be encrypted;
2), with plaintext input frequency domain transducer to be encrypted, the frequency domain transform device will be expressly by 8 segmentations, and make one dimension integer dct transform to every section, obtain the IntDCT coefficient;
3), the watermark inserter joins the intermediate-frequency section of IntDCT coefficient with digital watermark information, obtains containing the IntDCT coefficient of watermark information;
4), the encryption equipment IntDCT coefficient that will the contain watermark information Rijndael that carries out 128 keys encrypts, and generates ciphertext;
5), ciphertext imported randomizer carry out zone intercepting UUEncode, make it can show as discernible alphabetical information, obtained the security code of implicit digital watermarking at par at last.
Extract the step of watermark signal:
1), the security code that will imply digital watermarking is input to demoder and carries out anti-zone intercepting UUEncode, obtains ciphertext;
2), ciphertext is imported decipher carries out anti-Rijndael deciphering, output IntDCT coefficient;
3), the IntDCT coefficient is input to the watermark extracting device, obtain digital watermarking.
The advantage that the present invention had: A, adopt time-limited plaintext, can improve the speed of system greatly, and reduce that system is soft, the spending of hardware; B, the whole verification of employing can be checked out one all changes and two continuous changes, realize the protection to overall data; C, employing one dimension integer dct transform and key length are that 128 Rijndael encrypts, and can resist all attacks, guarantee the safety of ciphered data information.
The present invention is further illustrated below in conjunction with accompanying drawing.
Description of drawings:
Accompanying drawing 1 is the theory diagram that adds watermark information in digital signal.
Accompanying drawing 2 is for extracting the theory diagram of watermark information from the digital signal that contains watermark signal.
Accompanying drawing 3 is first kind 8 integer DCT process flow diagrams.
Accompanying drawing 4 is second kind of integer DCT process flow diagram.
Embodiment:
Referring to Fig. 1; watermark information to be inserted in the binary data stream to be encrypted; at first binary data stream to be encrypted is done CRC check one time by checker 1; to prevent the illegal binary data stream to be encrypted of changing; and binary data stream to be encrypted made Global Macros; generate the verification nuclear of two byte longs; binary data stream to be encrypted is intercepted 14 byte datas at random (also be chosen as 22; 30 bytes etc.; byte is short more; then system speed is fast more; and can reduce the soft of system; the hardware spending); if not enough 14 bytes are then filled 0 (or 1) to 14 bytes; and high-ranking officers check the back be added on 14 byte datas that intercept, generate 16 bytes plaintext to be encrypted.
Above-mentioned CRC check principle is as follows:
In fact the CRC inspection principle is exactly an additional r position scale-of-two check code (sequence) after a p bit binary data sequence, thus the binary sequence that to constitute a length overall be the n=p+r position, for example, p bit binary data sequence D=[d P-1d P-2... d 1d 0], r position scale-of-two check code R=[r R-1r R-2... .r 1r 0], resulting this n position binary sequence is exactly M=[d P-1d P-2... d 1d 0r R-1r R-2... .r 1r 0]; Be attached between the content of this check code after the data sequence and data sequence and exist certain specific relation.If make a mistake because of reasons such as interference make a certain position or some position in the data sequence, this particular kind of relationship will be destroyed, therefore, by checking this relation, just can realize the check to the data correctness.
Check code R gets the residue computing and obtains by the data sequence D being carried out binary division, and it is by (r+1) position binary sequence G=[g that is called generator polynomial rg R-1... .g 1g 0] remove, be expressed as with polynomial form x r D ( x ) G ( x ) = Q ( x ) + R ( x ) G ( x ) - - - - ( 1 )
Wherein, x rD (x) expression is with the data sequence D r position (promptly increasing r 0 at the end of D again) that moves to left, and Q (x) represents the merchant of this division gained, and R (x) is exactly required residue.This operation relation can also be expressed with formula (2) R ( x ) = Re [ x r D ( x ) G ( x ) ] - - - - ( 2 ) Wherein, Re[] represent the formula in the bracket is got the residue computing.The coding of check code calculates as mentioned above, and checkout procedure then is the M sequence directly to be carried out division get the residue computing, promptly M ( x ) G ( x ) = Q ( x ) + R ( x ) G ( x ) - - - - ( 3 )
Or be expressed as R ( x ) = Re [ M ( x ) G ( x ) ] - - - - ( 4 )
Resulting residue R (x) is if zero expression data is correct, otherwise thinks and make a mistake.
The 16 bytes plaintext to be encrypted of checker 1 output is delivered to frequency domain transform device 2, and frequency domain transform device 2 plaintext that 16 bytes are to be encrypted is by 8 segmentations, and makes one dimension integer dct transform to every section, obtains the IntDCT coefficient.
The algorithm of above-mentioned one dimension integer dct transform is as follows:
The transformation matrix C of 8 IntDCT-II of the first kind 8 11Be defined as C ‾ 8 11 = P 8 ( 1 ) I 4 J 4 I 5 R ‾ - π 4 1 P 4 ( 1 ) P 4 ( 1 ) I 2 J 2 1 1 1 - 1 - 1 1 1 1 x R ‾ π 4 R ‾ π 8 T ~ - 4 1 1 - 1 - 1 1 - 1 - 1 1 I 2 I 2 I 4 J 4 I 4 - J 4 , ( 8 )
And the transformation matrix C of the second class IntDCT-II 8 11Can be defined as again C 8 11 = P 8 ( 1 ) I 4 - J 2 J 2 P 4 ( 1 ) T ~ - 4 I 2 J 2 1 1 1 - 1 I 2 - I 2 R - π 4 R - π 8 I 4 x 1 1 - 1 - 1 1 - 1 - 1 1 P 4 ( 1 ) I 5 R ‾ π 4 1 I 4 I 4 I 4 - J 4 , ( 9 )
Utilize non-linear nature in the definition of integer transform, for the arbitrary integer sequence, the output result of above-mentioned two kinds of IntDCT-II is generally different, therefore can choose suitable IntDCT-II as required in practical problems.Accompanying drawing 3 and accompanying drawing 4 have provided the process flow diagram of above-mentioned two kinds of 8 IntDCT-II respectively.Wherein, I ~ 2 ( 1 ) = diag { 1 , - 1 } , I ~ 2 ( 2 ) = diag { - 1,1 } , I ~ 2 ( 3 ) = diag { - 1 , - 1 } .
Be generalized to general N=2 with 8 IntDCT-II and IntDCT-IV now with above-mentioned 4 t, the design of t 〉=3 IntDCT-II and IntDCT-IV.
Notice matrix I in the proposition 1 M, V M, P M, P M (1), D, D M, J MThis is as the conversion of integer to integer.
Figure A0113157000092
The rank matrix
Figure A0113157000093
Can be used for recursive definition IntDCT, and matrix Comprised The rotation of individual plane, matrix
Figure A0113157000096
Can obtain by integer transform is approximate.For definition and the algorithm of the IntDCT that sets up general length, remaining is need be to matrix B now NIn a sub-block matrix
Figure A0113157000097
It is approximate to make integer transform, the lemma below for this reason at first setting up.
Lemma 1 matrix
Figure A0113157000098
There are following two kinds of decomposed forms diag ( 2 , 2 ) = R π 4 1 1 - 1 1 , ( 10 )
Perhaps diag ( 2 , 2 ) = 2 2 - 2 0 1 1 1 1 1 2 - 1 1 1 0 - 1 2 1 , ( 11 )
(10) can directly set up with (11), as space is limited, omit herein by matrix multiplication.
Because the matrix that occurs in (10) or (11) is INTEGER MATRICES or has the matrix that promotes structure, so matrix
Figure A01131570000911
Can be similar to by integer transform, establishing its integer transform is K 2
Length N=2 are set up to recursion in comprehensive above-mentioned discussion t, the IntDCT-II of t 〉=3 and IntDCT-IV matrix are as follows: C ‾ N II = P N ( 1 ) I N / 2 0 0 J N / 2 C ‾ N / 2 II C ‾ N / 2 IV I N / 2 J N / 2 I N / 2 - J N / 2 . ( 4.12 ) C ‾ N IV = P N ( 2 ) B ‾ N P N ( 2 ) P N ( 1 ) C ‾ N / 2 II C ‾ N / 2 II I N / 2 D N / 2 J N / 2 T ~ ‾ N I N 2 - I N 2 , ( 13 )
Wherein, B N=diag (K 2, V N-2), Comprised The integer lifting matrix decomposition of individual rotational transform.Certainly, utilize the symmetry of DCT-IV, can also be as 8 IntDCT-IV, define multiple integer DCT-IV and corresponding multiple integer DCT-II. reaches following algorithm with above-mentioned discussion list now.
Algorithm (1). length N=2 t, the calculating of the IntDCT-II of t 〉=3: establishing list entries is x (k), k=0,1,2, A, N-1.
The first step: calculate g ( k ) = x ( k ) + x ( N - k - 1 ) , h ( k ) = x ( k ) - x ( N - k - 1 ) , k = 0,1,2 , Λ , N 2 - 1 ;
Second step: difference sequence of calculation g (k) and sequences h (k)
Figure A0113157000106
Point IntDCT-II and IntDCT-IV establish it and are output as H 1 ( k ) , 0 ≤ k ≤ N 2 - 1 With H 1 ( k ) , N 2 ≤ k ≤ N - 1 .
The 3rd step: sequence is reset X = P N ( 1 ) I N / 2 0 0 J N / 2 [ H 1 , ( 0 ) , H 1 ( 1 ) , Λ , H 1 ( N - 1 ) ] ′ .
Above-mentioned three steps carry out according to length N recursion ground.
(2). length N=2 t, the calculating of the IntDCT-IV of t 〉=3: establishing list entries is x (k), k=0,1,2, Λ, N-1.
The first step: for sequence x ( k ) , 0 ≤ k ≤ N 2 - 1 And - x ( k ) , N 2 ≤ k ≤ N - 1 , According to H = [ h ( 0 ) , h ( 1 ) , Λ , h ( N - 1 ) ] ′ = T ~ ‾ N [ x ( 0 ) , x ( 1 ) , Λ , x ( N 2 - 1 ) , - x ( N 2 ) , Λ , - x ( N - 1 ) ] ′ Do to promote conversion;
Second step: reset for the latter half of of sequence H: [ h ( N 2 ) , h ( N 2 + 1 ) , Λ , h ( N - 1 ) ] ′ : = [ h ( N - 1 ) , - h ( N - 2 ) , h ( N - 3 ) , - h ( N - 4 ) , Λ , - h ( N 2 ) ] ′
Calculate respectively then h ( k ) , 0 ≤ k ≤ N 2 - 1 With h ( k ) , N 2 ≤ k ≤ N - 1
Figure A0113157000115
Point IntDCT-II establishes it and is output as H 2 ( k ) , 0 ≤ k ≤ N 2 - 1 With H 2 ( k ) , N 2 ≤ k ≤ N - 1 ;
The 3rd step: according to Y = P N ( 2 ) P N ( 1 ) [ H 2 ( 0 ) , H 2 ( 1 ) , Λ , H 2 ( N - 1 ) ] ′ Do sequence and reset, calculate then, y ( 2 ) y ( N - 1 ) : = 1 1 - 1 1 , y ( 2 k + 1 ) y ( 2 k + 2 ) : = 1 1 - 1 1 y ( 2 k + 1 ) y ( 2 k + 2 ) , k = 1,2 , N / 2 - 2 ;
The 4th step: according to X = P N ( 2 ) Y Do the sequence rearrangement and obtain needed IntDCT-IV sequence.
Notice that some matrix itself is exactly an INTEGER MATRICES in the definition of IntDCT, and it for example has against being INTEGER MATRICES also except that constant factor: V M - 1 = 1 2 V m , P N ( 1 ) - 1 = P M ( 1 ) ′ , P N ( 2 ) - 1 = P N ( 2 ) , J N - 1 = J N , ( D M J M ) - 1 = D M J M And I N 2 J N 2 I N 2 - J N 2 = 1 2 I N 2 I N 2 J N 2 - J N 2 .
After frequency domain transform device 2 carried out one dimension integer dct transform, watermark inserter 3 joined the intermediate-frequency section of IntDCT coefficient with watermark information, obtained containing the IntDCT coefficient of watermark information like this; It is that 128 Rijndael encrypt that the IntDCT coefficient that encryption equipment 4 will contain watermark information carries out key length, and generates ciphertext; The ciphertext that generates is sent to UUEncode randomizer 5, adopts the UUEncode technology to carry out zone and intercepts, and it is that binary data stream is all split into the position is the data stream of unit, is a as adjacent two bytes, b.Then the result of Chai Fening is a 0a 1a 2a 3a 4a 5a 6a 7b 0b 1b 2b 3b 4b 5b 6b 7
A wherein i, b i=0,1} (i=0,1 ... .7).It is that a sign indicating number is formed in a unit that the contraposition data stream is chosen 6 successively, its span is 0-63, with it as sequence number, in given character set the inside value, make it can show as discernible alphabetical information, obtained the security code of implicit digital watermarking at par at last.
Above-mentioned encryption equipment 4 also can adopt other known cryptographic algorithm.
Referring to Fig. 2, the process of extracting watermark signal from the security code of implicit digital watermarking is: the security code that will imply digital watermarking is input to demoder 6 and carries out anti-zone intercepting UUEncode, obtains ciphertext; Ciphertext is delivered to decipher 7 carry out anti-Rijndael deciphering, export the IntDCT coefficient of moisture official seal breath; The IntDCT coefficient of moisture official seal breath is delivered to watermark extracting device 8, obtain digital watermarking.

Claims (4)

1. method that adds watermark signal in bill numerical information is characterized in that: may further comprise the steps into:
A, the binary data stream of bill to be encrypted is done CRC check one time by checker (1), generate the verification nuclear of two byte longs, binary data stream to be encrypted is intercepted 8n-2 byte data at random, n 〉=2, if it is full that byte is then filled with 0 inadequately, and high-ranking officers check the back be added on data intercept stream, generate plaintext to be encrypted;
B, with plaintext input frequency domain transducer (2) to be encrypted, frequency domain transform device (2) will be expressly by the segmentation of (8) point, and makes one dimension integer dct transform to every section, obtains the IntDCT coefficient;
C, watermark inserter (3) join the intermediate-frequency section of IntDCT coefficient with digital watermark information, obtain containing the IntDCT coefficient of watermark information;
D, encryption equipment (4) will contain the IntDCT coefficient encryption of watermark information, generate ciphertext;
E, ciphertext is imported randomizer (5), adopt the UUEncode technology to carry out zone and intercept, make it can show as discernible alphabetical information, obtained the security code of implicit digital watermarking at par at last.
2. a kind of method that adds watermark signal in bill numerical information according to claim 1 is characterized in that: 14 byte datas of intercepting among the described step a.
3. a kind of method that adds watermark signal in bill numerical information according to claim 1 and 2, it is characterized in that: described encryption equipment (4) is the Rijndael encryption equipment.
4. method of extracting watermark information from the security code of implicit digital watermarking is characterized in that: may further comprise the steps:
A, the security code that will imply digital watermarking are input to demoder (6) and carry out the intercepting of anti-zone, obtain ciphertext;
B, ciphertext is imported decipher (7) carry out anti-Rijndael deciphering, output IntDCT coefficient;
C, with IntDCT coefficient input watermark extracting device (8), obtain digital watermarking.
CN 01131570 2001-11-28 2001-11-28 Digital watermark anti-fake method for bills Pending CN1421782A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 01131570 CN1421782A (en) 2001-11-28 2001-11-28 Digital watermark anti-fake method for bills

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 01131570 CN1421782A (en) 2001-11-28 2001-11-28 Digital watermark anti-fake method for bills

Publications (1)

Publication Number Publication Date
CN1421782A true CN1421782A (en) 2003-06-04

Family

ID=4670695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 01131570 Pending CN1421782A (en) 2001-11-28 2001-11-28 Digital watermark anti-fake method for bills

Country Status (1)

Country Link
CN (1) CN1421782A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254298A (en) * 2011-08-17 2011-11-23 北京新媒传信科技有限公司 Digital watermark encrypting/decrypting method and system
CN1980122B (en) * 2006-11-16 2012-11-14 北京尧天网迅科技有限公司 Method for increasing information transmission safety
CN112163918A (en) * 2020-10-30 2021-01-01 重庆远见信息产业集团股份有限公司 Lottery credential management system and method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980122B (en) * 2006-11-16 2012-11-14 北京尧天网迅科技有限公司 Method for increasing information transmission safety
CN102254298A (en) * 2011-08-17 2011-11-23 北京新媒传信科技有限公司 Digital watermark encrypting/decrypting method and system
CN102254298B (en) * 2011-08-17 2013-06-19 北京新媒传信科技有限公司 Digital watermark encrypting/decrypting method and system
CN112163918A (en) * 2020-10-30 2021-01-01 重庆远见信息产业集团股份有限公司 Lottery credential management system and method
CN112163918B (en) * 2020-10-30 2024-05-28 重庆远见信息产业集团股份有限公司 Prize-giving evidence management system and method

Similar Documents

Publication Publication Date Title
Tai et al. Image self-recovery with watermark self-embedding
Arboit A method for watermarking java programs via opaque predicates
CN100395776C (en) Block fragile watermark generation and authentication method based on chaos hash function
CN108614961B (en) Method for embedding and protecting digital watermark in database
Raj et al. A survey on fragile watermarking based image authentication schemes
Yan et al. Robust secret image sharing resistant to noise in shares
Chanu et al. A survey paper on secret image sharing schemes
Bhattacharyya et al. A novel approach to develop a secure image based steganographic model using integer wavelet transform
CN114567711A (en) Large-capacity encrypted image information hiding method based on block capacity label
CN114745475B (en) Robust reversible information hiding method for encrypted image
CN113190866A (en) Power plant data safety credible transmission method for enhancing digital watermarking technology
Xiang et al. Robust watermarking of databases in order-preserving encrypted domain
Singh et al. An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability
Benrhouma Cryptanalysis and improvement of a semi-fragile watermarking technique for tamper detection and recovery
CN1421782A (en) Digital watermark anti-fake method for bills
CN1396569A (en) Method for adding or extracting digital watermark to or from digital image signals
CN115765963A (en) Text image audit information recording and extracting method based on reversible steganography of ciphertext domain
Raj et al. Security analysis of hash based fragile watermarking scheme for image integrity
Fan A source coding scheme for authenticating audio signal with capability of self-recovery and anti-synchronization counterfeiting attack
Orucho et al. Review of algorithms for securing data transmission in mobile banking
Tiwari et al. A survey of transform domain based semifragile watermarking schemes for image authentication
Hongxia et al. Watermark hiding technique based on chaotic map
Jassim et al. Enhancing data transfer architecture using LSB steganography combined with reed solomon code
CN115277972B (en) Image information hiding method based on cryptographic algorithm
Salehi et al. An investigation on image secret sharing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication