CN1455578A - Image waterprint method for copyright protection - Google Patents
Image waterprint method for copyright protection Download PDFInfo
- Publication number
- CN1455578A CN1455578A CN 03113438 CN03113438A CN1455578A CN 1455578 A CN1455578 A CN 1455578A CN 03113438 CN03113438 CN 03113438 CN 03113438 A CN03113438 A CN 03113438A CN 1455578 A CN1455578 A CN 1455578A
- Authority
- CN
- China
- Prior art keywords
- piece
- illumination
- texture
- watermark
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The present invention discloses an image watermark way applied to protecting copyright. It converts two-dimensional pels matrix to a two-value sequence group, splits the original image into 8*8 pels in the pels area, and processes discrete cosine conversion to (DCT) convert every pels area to frequency area. By fake radnom selecting block texture selecting block and illumination selecting block, it can conform which area block need to embed the watermark, and can sort them Zigzag. It embeds the encryption part of the watermark sequence group into the direct-current factor position of the random selecting block, also embeds the texture part and illumination part into respective low frequency factor position.
Description
Technical field
The invention belongs to the technical field of Information hiding and information security, a kind of copy-right protection method that is used for digital publication image works of saying so more specifically.
Background technology
Along with Internet technology and multimedia develop rapidly, it is more and more convenient fast that the propagation of digital product becomes.Meanwhile, digital product has damaged digital product copyright owner's number one greatly because its numerical characteristic makes anyone can be random various electronic works are duplicated, propagate and revise.Digital watermarking can be used for identifying the copyright owner of works, the statutory copyright of works on the catch net as a branch of Information hiding in the visuality that does not influence primary products.
The practical approach that is used for digital publication image Works copyright protection need meet the following conditions: the copyright owner of (1) image works is easy to as a token of watermark is embedded among the image works that need protection; (2) the image works that embedded watermark do not have tangible influence to the quality of these image works; (3) the image works that embedded watermark are after the processing that the people copies, shearing, convergent-divergent and compression etc. are common, and the copyright owner of image works still can extract the watermark that has distinguishing mark, is used for illustrating the copyright of these image works; (4) the embedded watermark of image works has confidentiality, is difficult for being eliminated by the people.
Generally there are the following problems for present water mark method:
(1) purposes of watermark is indeterminate, and practicality is not strong.The existing watermaking system of great majority all declares to have copyright protection, true and false medium are judged and propagate tracking, copy control etc.Yet in actual applications, different according to the range of application of digital product and approach, the needed function of the watermark of its embedding is also inequality, and the necessity of original image is also not necessarily during watermark extracting.If each watermaking system all needs to reach above-mentioned all functions, the then complexity of Shi Xianing and all increases greatly that expends time in.
(2) form of watermark is comparatively taken out picture, is unfavorable for the authentication of court to image works copyright.The watermark of using in the existing watermaking system generally is the data that obtain according to certain rule, mostly is pseudo random sequence greatly.Utilize its pseudo-randomness, judge whether have watermark in the image according to the measurement of correlation.Yet this method can only obtain the existence whether conclusion of watermark, can not obtain the content of watermark, also just can't offer some clarification on property in copyright.
(3) embedding grammar is inapplicable.Above-mentioned a lot of scheme is to utilize sequence as watermark, then adopts degree of correlation detector to judge whether watermark exists in watermark detection.The just data that are used for relatively that obtain during detection do not have practical significance.And in some technology with image during as watermark, must extract image in the detection with certain resolution, accuracy for each pixel value requires to improve greatly, in order to guarantee sentience not and to the robustness of common image processing, must make full use of human visual system (HVS) characteristic during embedding, just need to calculate numerous and diverse formula, increased complexity simultaneously, amount of calculation is corresponding greatly to be improved.
(4) encryption mechanism is comparatively complicated.The watermarking project that has proposed generally utilizes certain class function to introduce encryption mechanism in watermark scramble or watermark production process, but in the utilization process of function, amount of calculation is bigger.
In a word, existing image watermark method exists that purposes is indeterminate, form is taken out picture and weak points such as embedding, encryption method complexity, is not suitable for the copyright protection and the copyright authentication of image works in the digital publication.
Summary of the invention
As mentioned above, the watermarking images that the objective of the invention is to use has legal sign, the copyright protection and the copyright authentication that clearly are used for the image works of digital publication, good concealment not only, and secrecy provision arranged, even after the common processing of copy, convergent-divergent, compression or shearing, can also keep the legal feature of original image and watermarking images; Encrypt relative simple, quick and practical with extraction in the embedding that makes watermarking images on the selecting method in original image.
The general plotting that the present invention is used for the image watermark method of copyright protection is that the illumination of utilizing watermarking images to have the concise and to the point feature of legal sign and human visual system (HVS) is sheltered and texture masking characteristics and use pseudo-random characteristics; under the prerequisite that meets the demands, abandon numerous letter of asking.The legal sign of watermarking images is all concise and to the point smart little, therefore the space of a whole page is less than original image, therefore need on whole original image, not handle, and only be selected in illumination and texture features and be easy to hidden zone and carry out, promptly when smooth region illumination is bright, hide the dark place, hide bright place when illumination is dark, texture features is to hide the texture complex region.
Through above-mentioned processing, the concise and to the point smart amount of information that needs to embed that makes for a short time of watermarking images reduces, and chooses illumination and texture complex region piece according to qualifications, encrypts also simple.Existing division is as follows:
One, the bianry image that will represent digital picture works copyright is as watermarking images, and the size of watermarking images is littler than the original image.Original image can be that gray level image also can be a coloured image.When being coloured image, only the blue component that need choose in the coloured image is modulated, because human eye is more insensitive for the variation of blue component.But it should be noted that coloured image some difference on color and luster of watermarked front and back; consider that this method is used for the copyright protection of digital publication image works; the user does not almost touch the approach of original image, so these difference of can worrying.
The RGB coloured image is chosen blue component handle, make computation amount, do not influence the embedding and the extraction authentication of the legal sign of watermarking images, used by most image watermark method.
Two, watermarking images: watermarking images has legal sign, comprises signature, seal, the trade mark marking, is meant the monochromatic mark of the trade mark of trade mark volume, and the concise and to the point invariably essence of this mark has for a short time significantly looks other feature.Therefore require watermarking images less than original image, not only the space of a whole page is little, and the amount of information of pixel is also little, and binaryzation can also keep the distinct characteristic of legal sign, and two-dimensional pixel matrix is converted into the one dimension binary sequence, and this sequence provides three partly A:A encryption part w
Encrypt, the B illumination is w partly
Texture, the C texture is w partly
Illumination, promptly
w
n=w
Encrypt+ w
Texture+ w
Illumination
Three, be that pixel domain with original image converts frequency domain in the technical method of the present invention, watermarked sequence in frequency domain, the frequency domain method of employing comprises:
A, piecemeal discrete cosine transform DCT do the pixel domain matrix of original image the discrete cosine transform of 8 * 8 piecemeals.
B, with every average illumination x behind 8 * 8 piecemeal DCT, though the calculating of every average illumination coefficient x also is prior art, adjusts in the method in Y-factor method Y and the preferred illumination piece and all be used.
C, in area block, utilize ZigZag scanning ordering, can decomposite the different frequency in each region unit.But sequential scanning goes out: the one-dimensional sequence of DC coefficient-interchange low frequency coefficient-interchange intermediate frequency coefficient-interchange high frequency coefficient.
D, above-mentioned piecemeal and the decomposition frequency position of process, find clear and definite piece position, after watermark sequence preferably embedded according to average illumination x coefficient adjustment method, carry out inverse discrete cosine transformation IDCT again, frequency domain is reverted to pixel domain image embedded the original image after the watermark, the i.e. image of watermarked.
Four, described encryption method is zone and the piece that the pseudo random number of using the secret key by the copyright holder to produce is chosen frequency domain piecemeal discrete cosine transform DCT, its piece number should with watermark sequence in encrypt partly w
EncryptNumber equate that selected each area block through ZigZag scanning, decomposes DC coefficient DC foremost in each piece again, with the w partly of the encryption in the watermark sequence
Encrypt, be embedded into successively among the DC coefficient DC position of selected each piece, carry out coefficient adjustment, the formula of its embedding is:
X '=x (1+ α
1W
Encrypt) in (1) formula, x ' and x represent to adjust the back respectively and adjust before the average illumination coefficient value, α
1For the embedment strength coefficient, be generally 10
-3The order of magnitude, w
EncryptFor encrypting partly pixel value in the watermark sequence.
Five, the method for the watermarked sequence of texture complex region piece is earlier original image to be carried out rim detection, obtains the edge image identical with original image size, and with its 8 * 8 piecemeal.Pixel summation in each piece, every pixel and, set a threshold value, itself and during greater than threshold value, show that then number of edges is many herein, can be regarded as the texture complex region, according to the order of sequence record.This is preferred embedded block, one by one selected each piece is carried out piecemeal DCT, again the gained area block is carried out ZigZag scanning, with the texture part pixel w of watermark sequence
TextureBe embedded into every residue low frequency coefficient position, carry out coefficient adjustment, its embedding formula formula (2)
x
i'=x
i+ α
2Xw
Texture(2)
X in the formula
i' and x
iBe respectively the low frequency coefficient before and after revising, α
2For the embedment strength coefficient, be generally 10
-1The order of magnitude, w
TextureBe texture part pixel value in the watermark sequence, x is average illumination coefficient in the DCT piece that embeds.
Above-mentioned rim detection is to adopt famous Canny Operator Method, this method is that the maximum principle of extracting gradient direction is carried out rim detection, can obtain trickleer complete edge, the bianry image that it equates with the original image space of a whole page, edge wherein is white, background adopts the resulting image of Canny method trickle complete for black.And calculate simply, for being provided, the measurement of texture complex area gets ready.
Six, the embedding grammar of illumination favored area piece: adopting piecemeal DCT to be divided into 8 * 8 area blocks and to calculate every average illumination x, the x coefficient is arranged by size, its aligning method is again in two kinds of situation: the method that adopts smooth region illumination in the visual discrimination image, when smooth region in the original image mostly is the illumination number when big, select dim spot to embed, be bright Zhong Zang dark place, with x coefficient sequence arrangement from small to large.Embed from dim spot earlier; Smooth region mostly is the illumination number hour in original image, with x coefficient sequence arrangement from small to large, selects bright spot to embed, and promptly hides bright place in the dark.Therefore also claim bright/dark ordering.
After piece is selected in the said method arrangement.One by one each area block is carried out ZigZag scanning ordering, and with watermark
The illumination component pixel sequence w of sequence
IlluminationBe embedded into selected interchange low frequency coefficient position, its formula is:
x
i'=x
i+ α
2Xw
Illumination(2)
X in the formula
i' and x
iBe respectively the low frequency coefficient before and after revising, α
2For the embedment strength coefficient, be generally 10
-1The order of magnitude, w
IlluminationBe illumination component pixel sequence value in the watermark sequence, x is the average illumination in the DCT piece that embeds.
No longer repeat to embed once find the region unit that the front texture had embedded, and postpone backward.
No matter be the number that secret key selects piece, illumination selects the number of piece and number that texture selects piece to mutually adjust with the number of watermark sequence and to cooperate, because the DC coefficient that frequency domain ZigZag scanning ordering produces, has only one, select the piece number to equate so require to encrypt in the watermark sequence part number with secret key, and it is more to exchange low frequency coefficient, in the preferred piece of each regional illumination and texture institute, the illumination of the watermark sequence that can embed and texture pixel partly, can suitably adjust, embedding number can be that one or several does not wait, but all leaves record.
Seven, through after above-mentioned frequency domain conversion and the watermark embedding, will be 8 * 8 piecemeal inverse discrete cosine transformation IDCT again by adjusting the amended frequency domain matrix of Y-factor method Y in frequency domain, obtain the watermarked image.
Eight, extract authentication or other when needing watermark extracting as the needs copyright owner, its process of extracting watermark is watermarked inverse process.Its step is as follows:
A, selective extraction region unit, as stated above to original image encrypt, illumination and texture select piece, determined that encryption, illumination are by bright/secretly ordering and texture complex region piece;
B, the watermarked image is made piecemeal discrete cosine transform DCT;
C, the area block of gained is pressed following formula (3), (4) extraction through ZigZag scanning back according to above-mentioned position record;
Illumination and texture part w
Texture/illumination=(x
i'-x
i)/(α
2X) (4)
Formula (3), (4) are the inverse operations of formula (1), (2).
D, the sequence that obtains is converted into two-dimensional matrix again, binaryzation obtains watermarking images again.
With above-mentioned favored area and the preferred again frequency domain position of piece, with adjusting Y-factor method Y watermark one dimension binary sequence is embedded in the original image then.Effect:
The present invention is used for the image watermark method of copyright protection; the employing gray matrix is handled; utilize encryption, illumination and three kinds of methods of texture complexity to select piece; amount of calculation is reduced the number of greatly; and select preferred chunk; use secret key to produce pseudo random number and select piece, avoided secret complexity with scramble and certain function.This algorithm is based on piecemeal discrete cosine transform DCT, the binary image watermarking sequence is embedded into direct current and low frequency component in the original image frequency domain, guaranteed its robustness, the selection of luminance area and texture complex region has then guaranteed invisibility, it is comparatively simple wherein to utilize the Canny algorithm to seek the texture complex region, can finish quickly and embed and extraction work, in a word, reached simple relatively, fast, practical, we have passed through to add and have made an uproar, compression, convergent-divergent, shear processed conventionally test, it is comparatively clear all to extract, and is enough to authenticate as law, watermarking images with legal feature, the original image after the extraction watermark is also intact.
Description of drawings
Fig. 1 is the schematic flow sheet of the overall watermark embedding method of the present invention.
Fig. 2 is frequency domain ZigZag scanning schematic diagram.
Fig. 3 .1 is an original image.
The edge image of Fig. 3 .2 for extracting with the Canny algorithm.
Fig. 4 .1 is the watermarked image.
Fig. 4 .2 is a watermarking images.
Fig. 5 .1 is for adding the image of making an uproar.
Fig. 5 .2 is the watermarking images that adds after making an uproar.
Fig. 6 .1 is a compressed image.
Fig. 6 .2 is the watermarking images after compressing.
Fig. 7 .1 is a zoomed image.
Fig. 7 .2 is the watermarking images behind the convergent-divergent.
Fig. 8 .1 is a clip image.
Fig. 8 .2 is the watermarking images after shearing.
Embodiment
Referring to accompanying drawing, 1-10 is frequency domain ZigZag scanner uni place frequency domain matrix position figure among Fig. 2.
Explanatory note is because of similar with the computer software block diagram among Fig. 1, the algorithm that has in each frame be big algorithm software bag also some is image and result, therefore label no longer.
Now Fig. 1 center figure literal is explained by flow process:
Original image is that gray level image is then directly handled, if colour is the RGB image, only selects blue component.Original image one tunnel is through 8 * 8 piecemeal DCT, picture element matrix is become the frequency domain matrix, and that usefulness is piecemeal discrete cosine transform DCT, extract the average illumination x of each piece thereafter, another road enters the piece choosing, the piece choosing has three kinds: A password, secret key---pseudo-random generator enter and select block encryption; B carries out bright/dark ordering according to the illumination visual discrimination in average illumination x and image smoothing zone, enters bright/phaeodium choosing and also claims illumination to select piece; C is from original image---the Canny operator carry out edge extracting obtain the edge image (Figure 31,32) of binaryzation white be the edge, background is for black, again through 8 * 8 common piecemeals, pixel summation in each piece, set a threshold value and get texture complex region (piece) position through arbiter, pixel both can be thought the texture complex area greater than the piece of a certain threshold value, entered the piece choosing according to the order of sequence behind the record.
Through above-mentioned three kinds of preferred area blocks of method, promptly prepare to be embedded in watermark, and the watermark bianry image of legal sign is arranged to piece, be one dimension watermark sequence w with this binarized pixel matrix conversion
n, and the one dimension watermark sequence divides three parts, both w
n=w
Encrypt+ w
Texture+ w
IlluminationThis three partly is embedded into respectively in the middle of aforementioned three kinds of piece positions of selecting piece, during embedding also must selected must get in the area block use ZigZag scanning after,------exchanging if system---exchanges high frequency coefficient to exchange low frequency coefficient can to decomposite DC coefficient in order, its ZigZag scanning schematic diagram ordering is Fig. 2, as can be seen from the figure its scanning is that the upper left corner and the lower right corner along the frequency domain matrix are axis, beginning to carry out continuous palisade from the upper left corner tiltedly sweeps, the position in the upper left corner 1 is the DC coefficient position, 2,3 for exchanging the low frequency coefficient position, so analogize, ciphering sequence in the watermark sequence is embedded into all that to encrypt the DC coefficient DC position select in the piece be among Fig. 21, watermark sequence pixel of every correspondence is carried out coefficient adjustment, and exchange not only one of low frequency position, so watermark sequence of illumination and texture, when it is sequentially added into, can add one, two, three, by the coupling decision of whole coefficient.The direct current position that the present invention only joins frequency domain with exchange low frequency partly, promptly meet human-eye visual characteristic, guaranteed robustness, also make search calculate choose fast simple.The embedding formula of encrypted watermark sequence is
X '=x (1+ α
1W
Encrypt) (1)
X ' and x represent to adjust the back respectively and adjust preceding average illumination coefficient value, α in the formula
1For the embedment strength coefficient, be generally 10
-3About the order of magnitude, w
EncryptEncrypt partly pixel sequence value for watermark sequence, the watermarked sequence of illumination and texture complex region is used formula (2) promptly:
x
i'=x
i+ α
2Xw
Texture/illumination(2)
x
i' and x
iBe respectively the low frequency coefficient before and after revising, α
2For the embedment strength coefficient, be generally 10
-1The order of magnitude, w
Texture/illuminationBe texture in the watermark sequence/illumination component pixel sequence value, x is the average illumination coefficient in the DCT piece that embeds.
After watermark sequence embeds controlled frequency domain matrix is carried out inverse discrete cosine transformation IDCT and obtain the watermarked image.
The watermarked image being carried out image extract, is the inverse operation of its embedding.
The watermarked image is carried out watermark extracting, is the inverse operation of its embedding.Its process is an A. selective extraction region unit, encrypts as stated above, illumination and texture favored area piece, has determined that encryption, illumination are by bright/secretly ordering and texture complex region piece; B. the watermarked image is piecemeal discrete cosine transform DCT; C. according to above-mentioned zone piece position record through frequency domain zigzag scanning back C, after frequency domain ZigZag scanning, press following formula (3), (4) extraction according to above-mentioned position record;
Encryption section
Illumination and texture part w
Texture ,/illumination=(x
i'-x
i)/(α
2X) (4)
Formula (3), (4) are the inverse operations of formula (1), (2).w
Texture/illuminationRepresent illumination and texture part.
D, the sequence that obtains is converted into two-dimensional matrix again, binaryzation obtains watermarking images again.Lift an example
Watermarked according to above-mentioned algorithm programming to original image.Original image is 256 grades of gray level images (Fig. 3 .1) of 256 * 256, and watermark is 40 * 40 bianry image (Fig. 4 .2).Fig. 3 .2 is the edge image that obtains by the canny operator.Observe original image and find that most of smooth region is a bright spot, so select dim spot area to embed.Fig. 4 .1 is the watermarked image, embeds the intensity α of low frequency coefficient
2Be 0.1, embed the intensity α of DC coefficient
1Be 0.006.As seen watermarked image that this method produced (Fig. 4 .1) and the no tangible vision difference of original artwork (Fig. 3 .1).
Because the image on the normal conditions lower network can produce some noises through processing such as printing, duplicating, scannings.Here replace with Gaussian noise.Fig. 5 .1 is the watermarked image that adds after making an uproar, and variance is 0.1.The watermark of Fig. 5 .2 for extracting.By Fig. 5 .2 as seen, this algorithm is comparatively strong to the repellence of noise.
The compact model of taking through regular meeting when the JPEG compression is the image transmission.Fig. 6 .1 is the watermarked image after the JPEG compression, and the compressed coefficient is 10.Fig. 6 .2 is the watermark that extracts.Because algorithm is that low frequency coefficient is adjusted, so though the JPEG compression is a lossy compression method, so the just high fdrequency component of influence is little to the watermark influence.
Fig. 7 .1 does contracting earlier of 0.5-2 to the watermarked image afterwards to put, and the watermark of extraction (Fig. 7 .2) still has bigger differentiability.
Fig. 8 .1 and 8.2 is respectively watermarked image after shearing and the watermarking images that extracts.The position of shearing and the quality of watermarking images have very big related.When having sheared texture region and spot zone, will inevitably have considerable influence to the watermark quality of extracting.
The visual picture works through common conversion (add make an uproar, JPEG compression, convergent-divergent and shearing) after, still can extract the watermarking images of explanation copyright.
Claims (7)
1, the image watermark method that is used for copyright protection is characterized in that comprising two parts of watermarking images telescopiny and watermarking images leaching process,
One, watermark embed process:
(1), selected original image, choose wherein blue component when original image is coloured image, then directly handle when being gray level image; Selected watermarking images, watermarking images is to have littler than the original image again bianry image of legal sign;
(2), change the binarized pixel matrix of watermarking images into one dimension binary sequence group, this set of watermark sequences can be divided into encrypts partly w
Encrypt, illumination w partly
IlluminationWith texture part w
TextureEmbed respectively;
(3), original image is done 8 * 8 pixel size piecemeals in pixel domain, and each piece is discrete cosine transform DCT converts frequency domain to, need to determine the region unit of watermarked image with three following rules, three rules are A: pseudorandom is selected piece, B: texture selects piece, C: illumination is selected piece;
(4), the area block that selects piece, texture to select piece, illumination to select piece to determine to pseudorandom carries out ZigZag scanning respectively, scan the one-dimensional sequence of DC coefficient-interchange low frequency coefficient-interchange intermediate frequency coefficient-interchange high frequency coefficient order, with the encryption part w of set of watermark sequences
EncryptBe embedded into pseudorandom and select the DC coefficient position of piece, with texture part w
TextureWith illumination part w
IlluminationBeing embedded into texture respectively selects piece and illumination to select the low frequency coefficient position of the determined region unit of piece;
(5), in frequency domain, after the watermarked sequence, the frequency domain matrix after the redjustment and modification is 8 * 8 inverse discrete cosine transformation IDCT is converted to pixel domain, promptly get the watermarked image;
Two, watermark extraction process:
(1), select piece, illumination to select piece and texture to select slip gauge then to determine to have embedded the region unit of watermark, position and number according to pseudorandom;
(2), the watermarked image is 8 * 8 piecemeal DCT;
(3), according to the position record that selects piece, in area block, extract watermark, the formula of extraction is
Encryption section: w
Encrypt=(x
i'-x
i)/(α
1X)
Texture and illumination part:
(4), the sequence that obtains is converted into two-dimensional matrix again, carry out binaryzation again and get watermarking images.
2, the image watermark method that is used for copyright protection according to claim 1, it is characterized in that described original image in pixel domain by piecemeal, be to adopt piecemeal discrete cosine transform DCT to be divided into 8 * 8 area blocks.
3, the image watermark method that is used for copyright protection according to claim 1 is characterized in that the encryption part w with set of watermark sequences
EncryptBe embedded into pseudorandom and select the DC coefficient position of piece, be to utilize secret key pseudorandom ground to determine to select area block, its piece number equates with encryption part number in the set of watermark sequences, selected each piece scans through ZigZag again, decompose DC coefficient DC foremost in institute's calling sequence, be x, with the part of the encryption in watermark sequence w
Encrypt, be embedded into successively among selected each piece, carry out coefficient adjustment, its embedding formula is:
X '=x (1+ α
1W
Encrypt)
Average illumination coefficient value before x ' and x represent respectively to adjust the back and adjust in the formula, α
1For the embedment strength coefficient, be generally 10
-3The order of magnitude, w
EncryptBe the pixel value that is used in the watermark sequence encrypt.
4, the image watermark method that is used for copyright protection according to claim 1 is characterized in that texture selects piece, is earlier original image to be carried out rim detection, obtains the edge image identical with original image size, with its 8 * 8 piecemeal, and the pixel value summation in each piece; Set a threshold value, and it is greater than threshold value, shows that promptly the edge is more herein, can be regarded as the texture complex region, record according to the order of sequence, and this is the preferred embedded block of texture, with texture w partly
TextureBe embedded into texture and select piece to determine that the low frequency coefficient position of region unit is one by one the preferred embedded block of texture to be carried out ZigZag scanning, with the texture part pixel w of watermark sequence
TextureBe embedded on the every low frequency coefficient, its embedding formula is:
x
i'=x
i+ α
2Xw
Texture
X in the formula
i' and x
iBe respectively the low frequency coefficient before and after revising, α
2For the embedment strength coefficient, be generally 10
-1The order of magnitude, w
TextureBe texture part pixel value in the watermark sequence, x is average illumination coefficient in the DCT piece that embeds.
5, the image watermark method that is used for copyright protection according to claim 4 is characterized in that the rim detection of original image, and what promptly adopt is famous Canny edge detection method, produces meticulous edge image.
6, the described image watermark method that is used for copyright protection according to claim 1, it is characterized in that it is the average illumination x that calculates each area block that illumination is selected piece, x is arranged by numerical values recited, it is arranged again in two kinds of situation, adopt visual discrimination image smoothing zone illumination, when smooth region in the original image mostly is the illumination number when big, x is sorted from small to large; Smooth region mostly is illumination a few hours in original image, and x is sorted from big to small, determines preferred chunk, and partly w will throw light on
IlluminationBe embedded into illumination and select piece to determine that the low frequency coefficient position of region unit is one by one the preferred area block of each illumination to be carried out ZigZag scanning, with the illumination component pixel w of watermark sequence
IlluminationBe embedded into every low frequency coefficient position, to adjust coefficient, its formula is
x
i'=x
i+ α
2Xw
Illumination
X in the formula
i' and x
iBe respectively the low frequency coefficient before and after revising, α
2For the embedment strength coefficient, be generally 10
-1The order of magnitude, w
IlluminationBe illumination component pixel sequence value in the watermark sequence, x is average illumination coefficient in the DCT piece that embeds.The piece position of selecting piece to choose when piece of choosing and texture overlaps, and just abandons this piece, selects next piece to proceed.
7, the image watermark method that is used for copyright protection according to claim 1 is characterized in that utilizing in the watermark extraction process secret key to choose the region unit position of encrypting when watermark embeds; Use with claim 4,5,6 in identical method determine the region unit position that texture selects piece and illumination to select piece to obtain in the watermarked process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031134386A CN1194530C (en) | 2003-05-10 | 2003-05-10 | Image waterprint method for copyright protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031134386A CN1194530C (en) | 2003-05-10 | 2003-05-10 | Image waterprint method for copyright protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1455578A true CN1455578A (en) | 2003-11-12 |
CN1194530C CN1194530C (en) | 2005-03-23 |
Family
ID=29260009
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB031134386A Expired - Fee Related CN1194530C (en) | 2003-05-10 | 2003-05-10 | Image waterprint method for copyright protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1194530C (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100346354C (en) * | 2004-02-18 | 2007-10-31 | 株式会社理光 | Image processing method, image processing apparatus, program and recording medium |
CN100377175C (en) * | 2006-03-20 | 2008-03-26 | 北京北大方正电子有限公司 | Self-adaptive watermark embedding method based on partial quality estimation |
CN100383822C (en) * | 2006-05-25 | 2008-04-23 | 重庆医科大学 | High-resolution detection method for image gray scale/chromaticity information for base image mining |
CN100428107C (en) * | 2004-02-11 | 2008-10-22 | 北京邮电大学 | Digital watermarking infrastructure |
CN100583191C (en) * | 2005-06-17 | 2010-01-20 | 鸿富锦精密工业(深圳)有限公司 | Text encryption system and method |
CN101286224B (en) * | 2008-05-13 | 2010-06-02 | 南京航空航天大学 | Watermark embedding and extraction method based on fractal image coding |
CN102999712A (en) * | 2012-11-21 | 2013-03-27 | 上海山景集成电路股份有限公司 | Method and system for watermark production and extraction of multimedia, and multimedia publishing system |
CN103049880A (en) * | 2012-12-19 | 2013-04-17 | 焦点科技股份有限公司 | Digital watermarking method based on discrete cosine transformation |
CN103856829A (en) * | 2012-11-30 | 2014-06-11 | 华为技术有限公司 | Video digital watermark embedding and extracting method and device thereof |
CN104063832A (en) * | 2013-03-19 | 2014-09-24 | 北大方正集团有限公司 | Watermark embedding and extraction method and device |
CN104504642A (en) * | 2014-12-17 | 2015-04-08 | 北京齐尔布莱特科技有限公司 | Method and device for adding watermark into picture and computation equipment |
CN105992072A (en) * | 2015-07-24 | 2016-10-05 | 乐视云计算有限公司 | Watermark processing method, watermark extracting method and corresponding devices |
CN106454510A (en) * | 2016-10-31 | 2017-02-22 | 广东工业大学 | Original video watermark processing method and device |
CN106485641A (en) * | 2016-08-31 | 2017-03-08 | 南京师范大学 | A kind of tile data digital watermarking based on QR code generates embedded and extracting method |
CN106982372A (en) * | 2016-01-15 | 2017-07-25 | 中国移动通信集团福建有限公司 | Image processing method and equipment |
CN107067363A (en) * | 2017-04-18 | 2017-08-18 | 海南大学 | A kind of non-blind robust Spatial Domain Image Watermark method constant based on pixel order relation |
CN107181957A (en) * | 2017-04-28 | 2017-09-19 | 安徽四创电子股份有限公司 | A kind of video watermark source tracing method based on hadoop platform architectures |
CN107507121A (en) * | 2017-07-25 | 2017-12-22 | 天津大学 | Digital image encryption and hidden method based on variation picture breakdown |
CN108307203A (en) * | 2017-12-28 | 2018-07-20 | 中国科学院自动化研究所 | Film encryption method, decryption method based on multi-projector splicing fusion |
CN108765256A (en) * | 2018-07-10 | 2018-11-06 | 天津工业大学 | Data waterprint embedded method based on a kind of dct transform that human vision is covered |
CN109671011A (en) * | 2018-11-29 | 2019-04-23 | 深圳企业云科技股份有限公司 | Embedding grammar, extracting method and the electronic equipment of copyright information |
CN111147688A (en) * | 2020-01-06 | 2020-05-12 | 中国矿业大学 | Color image encryption method based on stereo scrambling model and chaos |
CN111683271A (en) * | 2020-04-27 | 2020-09-18 | 中国科学院微电子研究所 | Video encryption method, terminal equipment and computer storage medium |
CN112017097A (en) * | 2020-08-27 | 2020-12-01 | 豪威科技(武汉)有限公司 | Watermark adding method, device, terminal and computer readable storage medium |
CN113409181A (en) * | 2021-07-20 | 2021-09-17 | 北京沃东天骏信息技术有限公司 | Watermark processing method and device for watermark carrier |
-
2003
- 2003-05-10 CN CNB031134386A patent/CN1194530C/en not_active Expired - Fee Related
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100428107C (en) * | 2004-02-11 | 2008-10-22 | 北京邮电大学 | Digital watermarking infrastructure |
CN100346354C (en) * | 2004-02-18 | 2007-10-31 | 株式会社理光 | Image processing method, image processing apparatus, program and recording medium |
CN100583191C (en) * | 2005-06-17 | 2010-01-20 | 鸿富锦精密工业(深圳)有限公司 | Text encryption system and method |
US7796778B2 (en) | 2005-06-17 | 2010-09-14 | Hong Fu Jin Precision Industry (Shen Zhen) Co., Ltd. | Digital watermarking system according to background image pixel brightness value and digital watermarking method |
CN100377175C (en) * | 2006-03-20 | 2008-03-26 | 北京北大方正电子有限公司 | Self-adaptive watermark embedding method based on partial quality estimation |
CN100383822C (en) * | 2006-05-25 | 2008-04-23 | 重庆医科大学 | High-resolution detection method for image gray scale/chromaticity information for base image mining |
CN101286224B (en) * | 2008-05-13 | 2010-06-02 | 南京航空航天大学 | Watermark embedding and extraction method based on fractal image coding |
CN102999712A (en) * | 2012-11-21 | 2013-03-27 | 上海山景集成电路股份有限公司 | Method and system for watermark production and extraction of multimedia, and multimedia publishing system |
CN103856829A (en) * | 2012-11-30 | 2014-06-11 | 华为技术有限公司 | Video digital watermark embedding and extracting method and device thereof |
CN103049880A (en) * | 2012-12-19 | 2013-04-17 | 焦点科技股份有限公司 | Digital watermarking method based on discrete cosine transformation |
CN104063832A (en) * | 2013-03-19 | 2014-09-24 | 北大方正集团有限公司 | Watermark embedding and extraction method and device |
CN104063832B (en) * | 2013-03-19 | 2017-11-21 | 北大方正集团有限公司 | A kind of watermark insertion and extracting method and device |
CN104504642B (en) * | 2014-12-17 | 2017-08-01 | 北京齐尔布莱特科技有限公司 | A kind of method, device and computing device that watermark is added in picture |
CN104504642A (en) * | 2014-12-17 | 2015-04-08 | 北京齐尔布莱特科技有限公司 | Method and device for adding watermark into picture and computation equipment |
CN105992072A (en) * | 2015-07-24 | 2016-10-05 | 乐视云计算有限公司 | Watermark processing method, watermark extracting method and corresponding devices |
CN106982372A (en) * | 2016-01-15 | 2017-07-25 | 中国移动通信集团福建有限公司 | Image processing method and equipment |
CN106982372B (en) * | 2016-01-15 | 2020-03-31 | 中国移动通信集团福建有限公司 | Image processing method and apparatus |
CN106485641A (en) * | 2016-08-31 | 2017-03-08 | 南京师范大学 | A kind of tile data digital watermarking based on QR code generates embedded and extracting method |
CN106485641B (en) * | 2016-08-31 | 2019-10-01 | 南京师范大学 | A kind of tile data digital watermarking generation insertion and extracting method based on QR code |
CN106454510A (en) * | 2016-10-31 | 2017-02-22 | 广东工业大学 | Original video watermark processing method and device |
CN106454510B (en) * | 2016-10-31 | 2019-07-16 | 广东工业大学 | A kind of original video watermark handling method and device |
CN107067363A (en) * | 2017-04-18 | 2017-08-18 | 海南大学 | A kind of non-blind robust Spatial Domain Image Watermark method constant based on pixel order relation |
CN107181957A (en) * | 2017-04-28 | 2017-09-19 | 安徽四创电子股份有限公司 | A kind of video watermark source tracing method based on hadoop platform architectures |
CN107507121A (en) * | 2017-07-25 | 2017-12-22 | 天津大学 | Digital image encryption and hidden method based on variation picture breakdown |
CN108307203A (en) * | 2017-12-28 | 2018-07-20 | 中国科学院自动化研究所 | Film encryption method, decryption method based on multi-projector splicing fusion |
CN108765256A (en) * | 2018-07-10 | 2018-11-06 | 天津工业大学 | Data waterprint embedded method based on a kind of dct transform that human vision is covered |
CN109671011A (en) * | 2018-11-29 | 2019-04-23 | 深圳企业云科技股份有限公司 | Embedding grammar, extracting method and the electronic equipment of copyright information |
CN109671011B (en) * | 2018-11-29 | 2023-01-17 | 深圳企业云科技股份有限公司 | Copyright information embedding method, copyright information extracting method and electronic equipment |
CN111147688A (en) * | 2020-01-06 | 2020-05-12 | 中国矿业大学 | Color image encryption method based on stereo scrambling model and chaos |
CN111683271A (en) * | 2020-04-27 | 2020-09-18 | 中国科学院微电子研究所 | Video encryption method, terminal equipment and computer storage medium |
CN111683271B (en) * | 2020-04-27 | 2022-05-06 | 中国科学院微电子研究所 | Video encryption method, terminal equipment and computer storage medium |
CN112017097A (en) * | 2020-08-27 | 2020-12-01 | 豪威科技(武汉)有限公司 | Watermark adding method, device, terminal and computer readable storage medium |
CN112017097B (en) * | 2020-08-27 | 2024-03-08 | 豪威科技(武汉)有限公司 | Watermark adding method, watermark adding device, terminal and computer readable storage medium |
CN113409181A (en) * | 2021-07-20 | 2021-09-17 | 北京沃东天骏信息技术有限公司 | Watermark processing method and device for watermark carrier |
Also Published As
Publication number | Publication date |
---|---|
CN1194530C (en) | 2005-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1194530C (en) | Image waterprint method for copyright protection | |
CN102750660B (en) | A kind of method and apparatus embedding and extract digital watermarking | |
Zhang et al. | Reference sharing mechanism for watermark self-embedding | |
Kumar et al. | Image transformation technique using steganography methods using LWT technique | |
CN1290047C (en) | File anti-fake method and its device based on digital water print | |
CN101038661A (en) | Blind watermark embedding and abstracting method based on regression support vector machine | |
CN102024249A (en) | Digital image watermarking method based on visual perception characteristics | |
CN1725244A (en) | Generating and vertification method for electronic seal based on vulnerable water mark | |
US10958926B2 (en) | Digitally watermarked compressed video image sequences | |
CN1960428A (en) | Implementation method of anti printing and scanning meaningful digital watermark with large capacity | |
CN1517855A (en) | Image digital watermark method | |
Hassan et al. | A semi-fragile watermarking scheme for color image authentication | |
CN101833745A (en) | Method for detecting embedding and extracting of multiple binary embedded watermarks of digital image | |
US7062067B2 (en) | Protecting images with multiple image watermarks | |
Wang et al. | Review on self-embedding fragile watermarking for image authentication and self-recovery | |
Mathkour et al. | A novel approach for hiding messages in images | |
CN1975780A (en) | Robust digital watermark inserting and detecting method based on supporting vector | |
CN1598877A (en) | Positioning vulnerable water print generating and recognizing method capable of distigushing image and watermark distortion | |
CN1710610A (en) | Digital watermark anti fake method in anti-digital-to-analog conversion process | |
Chareyron et al. | Watermarking of color images based on segmentation of the XYZ color space | |
Wajid et al. | Robust and imperceptible image watermarking using full counter propagation neural networks | |
Wang et al. | Review on digital image watermarking based on singular value decomposition | |
Lubis et al. | Analysis of LSB Algorithm Modification with Bit Inverse and Insertion based on Length of Message | |
Cheddad et al. | A comparative analysis of steganographic tools | |
US7336800B2 (en) | Method and a device for detecting a watermark in digital data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20050323 Termination date: 20100510 |