TW201112756A - A digital watermarking technique based on random halftoning - Google Patents

A digital watermarking technique based on random halftoning Download PDF

Info

Publication number
TW201112756A
TW201112756A TW98132192A TW98132192A TW201112756A TW 201112756 A TW201112756 A TW 201112756A TW 98132192 A TW98132192 A TW 98132192A TW 98132192 A TW98132192 A TW 98132192A TW 201112756 A TW201112756 A TW 201112756A
Authority
TW
Taiwan
Prior art keywords
watermark
image
halftone
watermarking
images
Prior art date
Application number
TW98132192A
Other languages
Chinese (zh)
Inventor
Chin-Chen Chang
Ching-Hao Lai
Hsien-Chu Wu
Original Assignee
Chin-Chen Chang
Ching-Hao Lai
Hsien-Chu Wu
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chin-Chen Chang, Ching-Hao Lai, Hsien-Chu Wu filed Critical Chin-Chen Chang
Priority to TW98132192A priority Critical patent/TW201112756A/en
Publication of TW201112756A publication Critical patent/TW201112756A/en

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

Halftone images are used in many pressworks, for example, books, magazines, the documents output from the printers and so on. The images of presswork can be easily copied, misapplied and juggled, and these actions would seriously affect the intellectual property rights of the owners. This invention presents a new watermarking technique to protect the intellectual property rights of halftone images. The proposed method combines the image halftoning and digital watermarking; moreover, it does not need the original cover image and watermark for watermark extraction such that it is more convictive and robust for proving the ownerships of images. The experimental results show that the invention can effectively extract integral watermarks for human vision even the stego-images have been attacked by shaping, modifying or cropping processing. Hence it can confirm that the proposed watermarking technique is robust and can protect the intellectual property rights of halftone images effectively.

Description

201112756 四、指定代表圖: (一)本案指定代表圖為:第(1 )圖 表圖之元件符號簡單銳m :201112756 IV. Designated representative map: (1) The representative representative figure of this case is: (1) The symbol of the chart is simple and sharp m:

原始灰階影像 藏入浮水印之程序 已藏有浮水印之半色調影像 轉換程序 印之程序 的化學式 五、本案若有化學式時,請揭示最能顯示發明特徵 六、發明說明: 【發明所屬之技術領域】The program of hiding the original grayscale image into the watermarking program has the chemical formula of the halftone image conversion program printed with the watermark. If there is a chemical formula in this case, please reveal the best indication of the invention. 6. Description of the invention: Technical field

本發明係與「資訊安全」有關,提出一個有效的數 技術(digital watermarking technique)用來偏蔓以半色調: i琴)方式呈現於印刷品上之灰階影像的智慧ς 半色調影像之應用屬面十分廣泛,不論在書籍、雜誌、、印表 機輸出文件料刷品中之影像皆使料色姆彡像方式呈現。在這 個資訊爆炸及印刷技術十分純熟㈣代裡,各式各樣的印刷私 書籍、雜誌、報紙'印表機輸出文件等在日t生活中 在這些印刷品巾’料文字無法表贴_由影像的方式 來傳達’故影像在各種印刷品巾常常佔有了A多數的版面。然 而,現今電腦及印刷技術十分純熟並且普遍地被使用著,印刷品 201112756 上的影像可以很輕易地被一般使用者複製、盜用或是窺改,此種 會嚴_彡#職_者献所有麵她 此保護影狀料職權w為—件财容緩的事。The present invention relates to "information security", and proposes an effective digital watermarking technique for applying the halftone to the grayscale image of the printed matter in halftone: i. It is very wide-ranging, and the images in the books, magazines, and printers' output documents are all presented in a way. In this information explosion and printing technology is very skillful (four) generation, a variety of printed private books, magazines, newspapers, 'printer output files, etc. in the day t life in these prints, the text can not be posted _ by the image The way to convey 'there are images in a variety of prints often occupy the majority of A's layout. However, today's computer and printing technology is very sophisticated and widely used. The images on print 201112756 can be easily copied, stolen or sneaked by ordinary users. Her protection of the shadow material authority is a matter of financial difficulties.

為了防止有版權的影像受到非法使用者的破壞及盜用,各種 =保護及其版_技術及機織之產生。數位浮水印技術 就疋其中—個十分有效且在近年被廣泛研究及使用的一項技 ί。數位浮水印技齡要是將具有賴代紐贿鄉像或文字 藏入到需要锻的影像切逹職獅護之目的。數位浮水印技 術主要可时為二種:可視财水印技術及不可浮水印技 術。可視型浮水印技齡要是將具魏顧紐的商標影像或文 ^以人齡視覺上可察覺的前提之下直接放人受保護的影像 中’故經可視型浮水㈣術處理後之影像,任何使用者皆可 地察覺置人之商標影像或文字,此知悉棘像之所有者。可 視型浮水印技術有-項缺點,那就是影像在置入浮水印後, 護之影像在人類視覺下會受到破壞(失真),故若此影像所應用 =領域是不允許影像受到破壞者,例如:博物館收藏之圖 :之原 旦、用於販賣之影像或是影像在破壞後會失去影像所要表達 意等,則此項技術將不適用。 另一項浮水印技術為不可視型浮水印技術,此項技術主要是 使用影像财術(steganagraphy)將具有練代紐的商桿影像 或文字以人·視覺上柯察覺的前提之下藏人受倾S像 中,故經此種浮水印技術處理之影像,任何使用者皆無法輕易地 察覺置人之商標影像或文字。由於其藏人之浮水印無法直接察 覺,故此種浮水印技術一般包括二個部份:浮水印藏入程序以及 浮水印取出程序。在浮水喊人部份,必須要求已藏有浮水印之 201112756 影像與原始影像在人類視覺上不能有差異而被察覺;在浮水印取 出部分,所要求的是受保護影像在受到惡意地竄改和破壞後,仍 月b取出人類視覺可識別之商標影像或文字做為版權證明之用,此 項特性稱之為強韌性(r〇bust),它是一個用於評估不可視型浮水 印技術優劣的重要指標。目前數位浮水印技術可顧的影像主要 有灰階、彩色以及半色調影像,而在印刷品上的影像皆以半色調 影像方式呈現。保護印刷品上影像賴之不可視型浮水印技術為 本發明的主要研究主題。 ^附°己本發明係屬「資訊*安全」領域,或可由「中華民國資 讯安全學會」得到相關之專業建議或協助。 、 【先前技術】 現今用於保護影像智慧財產權的技術有很多,其甲,數位浮 水印技術(digitalwatermarking)是最常使用的技術之一,目前用於 半色調影像之浮水印技術主要可分為二種,—種為可視型浮水 t其洋水印可使用肉眼直接從受倾之影像上察覺,以達到版 權宣告之目的;另-種技術為不可視型浮水印,其技術使用隱藏 #〇iidmg teehnique^f^M卩隱藏於受保護之影像中,故其浮水印 無法被肉眼所察覺’而是要經由浮水印取出技娜藏从浮水印 還原以確健證财影像之所有權,她於前_技術,此技術 較能在j覺上保制有影像之縣及完整,也缝增加一般使用 者對於洋水印惡意破壞之_度,本發明亦屬此鮮水印技術。 在近五年巾,有許㈣關練辨色鄉料水印的技術已 201112756 被研發出來M. S.Fu等人提出了—個應用於半色爾彡像之可視 型汙水印技術(CWED,〇>rrehti(m.b_ mtemrni'kiiig Error· Difflision)’此技術會先計算出一張要受保護之半色調影像 rniage)以及要藏人之黑白浮水㈣像之間_ _數(_】咖n coeffident),之後再藉由相關係數之特性將黑白浮水印影像以位 元串mbitst職〇的方式一一藏入受保謾之半色調影像中。s c Pei等人提出了 -個名為PMEDF ( par办-跑e丽以脇⑽) 技術,’此項技術為-低複雜度之浮水印技術,它所應用的半色調 • 影像類型為一個名為誤差鎌法(error diffusion)之數位灰階影 像半^調轉換技術所產生之半色婦像,此半色職轉換技術是 利用免度門植值核心(kemel)將一張灰階影像轉換為一張半色 調影像’其核心之種類有很多種,s c pd等人則是利用腳核 二以及-個值為128之門檻值(threshdd)來進行黑白浮水印隱 藏。此外’上述學者又發現了在誤差擴散法中使用NBEDF (Noise Bal_d Em)i* Diffuse)以及 k^df (Kemds Alt_ted e_In order to prevent copyrighted images from being damaged and stolen by illegal users, various = protection and its version _ technology and weaving. Digital Watermarking Technology One of them is a very effective and widely researched and used technology in recent years. If the digital watermark technology age is to hide the image or text of the Lai Daixin bribe into the image that needs to be forged, the purpose is to protect the lion. Digital floating watermarking technology can be mainly used in two types: visible financial watermarking technology and non-floating watermarking technology. The visual watermarking technology age is to directly put the image of the trademark image or text of Wei Gu New in the protected image under the premise of visually perceivable by the human age, so the image after the visual floating water (4) is processed. Any user can detect the trademark image or text of the person, which is the owner of the image. The visual watermarking technology has the disadvantage that the image will be destroyed (distorted) under human vision after the image is placed in the watermark, so if the image is applied = the field is not allowed to be destroyed by the image, For example, the map of the museum collection: the original, the image used for sale or the image will be lost after the destruction, the technology will not be applicable. Another watermarking technology is the invisible watermarking technology. This technology mainly uses the imagery technique (steganagraphy) to bring the business image or text of the training brand to the human under the premise of human perception. In the image of the tilted S image, any user can not easily detect the trademark image or text of the person who has been processed by such watermarking technology. Since the watermark of the Tibetans cannot be directly observed, the watermarking technique generally includes two parts: a watermark hiding program and a watermarking extracting program. In the screaming part of the floating water, it is necessary to require that the 201112756 image with the watermark already hidden and the original image cannot be perceived differently in human vision; in the watermarking take-out part, the protected image is subjected to malicious tampering and After the destruction, the human visually identifiable trademark image or text is taken out as a proof of copyright. This feature is called r强bust, which is used to evaluate the inferior watermarking technology. Important indicators. At present, digital watermarking technology can focus on grayscale, color, and halftone images, while images on printed matter are presented in halftone images. The invisible watermarking technique for protecting images on printed matter is the main research subject of the present invention. ^ The invention is in the field of "Information * Security" or may be subject to relevant professional advice or assistance from the "Republic of China Security Society". [Prior Art] There are many technologies used to protect the intellectual property rights of images. One of them is digital watermarking, which is one of the most commonly used techniques. Currently, the watermarking technology for halftone images can be divided into two main types. Two kinds, the kind of visible floating water, its ocean watermark can be directly detected from the image of the tilted image with the naked eye to achieve the purpose of copyright announcement; another technique is invisible watermark, its technology uses hidden #〇iidmg teehnique ^f^M卩 is hidden in the protected image, so its watermark can't be perceived by the naked eye', but it needs to be removed from the watermark via the watermark to restore the ownership of the wealthy image. Technology, this technology can protect the county and integrity of the image in the sense of j, and also increase the degree of malicious damage to the foreign watermark by the general user. The present invention also belongs to the fresh watermark technology. In the past five years, there has been a technology for watermarking in the past four years. The technology has been developed by MSFu et al., and a visual type of sewage printing technology applied to the half-color image (CWED, 〇> Rrehti (m.b_ mtemrni'kiiig Error· Difflision) 'This technique will first calculate a halftone image rniage to be protected) and the black and white floating water (four) image to be hidden between the _ _ number (_) coffee n coeffident Then, by the characteristics of the correlation coefficient, the black and white watermark image is hidden in the protected halftone image by the bit string mbitst job. Sc Pei et al. proposed a technique called PMEDF, which is a low-complexity watermarking technique that applies halftones. The image type is a name. A half-color female image produced by the digital diffusion gray-scale image half-tone conversion technique of error diffusion. This half-color conversion technology converts a grayscale image using a gammel-free core (kemel). For a halftone image, there are many types of cores. Scpd et al. use the foot core 2 and the value of 128 threshold (threshdd) for black and white watermark hiding. In addition, the above scholars have found that NBEDF (Noise Bal_d Em)i* Diffuse and k^df (Kemds Alt_ted e_) are used in the error diffusion method.

DiffiisKm)這二種不同的核心針對數位灰階影像進行轉換後所得 齡 到之半色調影像’經過快速傅利葉轉換(FastF〇urierT娜f麵, FFT)後的餘,在分布上會雜大縣異,故s c %等人在藏 入洋水印的階段中,將要藏入之黑白浮水印轉換為位元串列,並 在灰階影像半色調轉換的過程中分別使用上述之二個核心來代 表要藏入之位元為〇或!。在浮水印取出的過程中,使用快速傅 利葉轉換以判斷半色調影像中各區塊在半色調轉換時所使用之 核心’再藉由其核心所代表之位元依序取出位元 元,進而還原浮水印。 此外’ S. C. Pei等人又提出了另一個應用於數位調色式半色調影像 201112756 (dithering halftone image)之浮水印技術,此項技術會先使用一個 有序的調色半色調視窗(ordered dithering halftone window )將半色 调影像切割為數個子影像(sub-image),由於在半色調視窗中為排序 後之亮度門檻值,故使用此種方式進行半色調轉換會造成在半色 调景》像中的各個子影像内的黑色像素(black pixel)的比例會呈現 遞減的現象。在浮水印藏入的過程中會將黑白浮水印影像以位元 串列方式一一將位元藏入,隱藏的方式為二個子影像藏一個位 元,並調整子影像内黑色像素比例來藏入位元0或1 ;浮水印取出 的方式也依此來判斷所藏入之位元為〇或丨,為增加浮水印之強韌 性,本技術在浮水印取出的過程中,必須使用到原始浮水印與取 出之位7C進行AND運算,以減少因影像受到攻擊後所產生之錯 誤,但其取出之浮水印影像仍會存在失真的現象。本發明將針對 此現象進行改進’財在未賴原始浮水㈣像雜態下,在藏 有浮水印之·受到攻輕減取从類視覺可翻之浮水印。 【發明内容】 項枯提Λ —種可时半色爾彡像中藏人浮水印術,此 ft合了影像半色調的轉換與浮水印的藏人。為了達到影像 半色調轉顯藏人浮水印同時精,吾人㈣了— 识 2影像半色_換技術,由於使請IH可斜分有雜地調整 過數量’因此它有助於細象半色調轉換的 、私中R日械人可做為版權證明之浮水印 々 :紙、雜誌等印刷品上的影像都是使用半色調的方二現曰【 本發明適合應用在保護印刷品上的影像之智慧財產權。吾 201112756 人將介紹本發明所提出的以RgjH為其發展基礎之浮水印技術的 處理流程’分別包含RBIHi運作流程以及藏入和取回浮水印之 程序。 一般而言,如果直接使用單一門檻值(thresh〇ld),將一張像 素值範圍為0至255的灰階影像轉換為像素值只有〇與255的二 元影像,則會使得轉換後的二元影像與原先的灰階影像之間存在 著視覺上極大的差異,由於灰階影像的像素值所代表的是影像中 各個像素的亮度變化,為了能在二元影像巾舰表現出平滑的亮 _ 度變化,半色調影像技術就隨之而生了。半色調影像仍然屬於二 元影像’它是藉由碰影像巾黑色像素也就是像素值為G之像素 出現的頻率來模擬灰階影像的亮度變化,當灰階影像中某區域的 ^度較昏暗日植在半色婦像巾均㈣增加該區朗黑色像素 密度以達到降低亮度之效果,反之則是減少黑色像素密度。 為了有效地調整影像中各個區域内黑色像素的密度,大部份 的影像半色調轉換技術在轉換的過程中都會以正在處理的像素 為中心,切割出一塊大小固定之區塊⑽ck),每一種使用區塊方 • <之半色爾換技卿會有—侧定大小之核心(kernel),其核心 的大小與區塊的大小姻’在私t所包含的是職該區塊⑽ 有像素之權重(weight),這些權重是用來計算像素二值化之門播 值,當某像素在原灰階影像中的值大於門榧值,則此像素在半= 調影像中的值為255,反之則設為〇。核心社小與其所包 權重值對於半色調轉換後影像的品質具有十分重要之影塑力,— :來說,較小之核心可以使轉換後所得到的半色調影“: 風0 V、’ 除此之外’大部份半色調轉換技術之核心都是固定的,所以對於 201112756 說:大相同位置之像素所得到的門檻都是相同的,也就是 色調影像。技術胁—做階職对產生一種半 提出τ— χ ,σ人為了結合半色調轉換與浮水印技術, 隣藏W Γ父具雜的半色娜顧雕^Η),它可以根據所要 ^八和印位元調整像素值二值化的門檻值來控制各個區塊中 斤二之黑色像素密度。在本發日种,吾人將要藏人之浮水印定DiffiisKm) These two different cores are converted to digital halftone images and converted to halftone images. After the fast Fourier transform (FastF〇urierTna f surface, FFT), the distribution will be different. Therefore, in the stage of hiding the ocean watermark, sc% et al. convert the black and white floating watermark to be hidden into a bit string, and use the above two cores to represent the hidden color in the process of grayscale image halftone conversion. The entry is 〇 or! . In the process of taking out the watermark, the fast Fourier transform is used to determine the core used in the halftone conversion of each block in the halftone image, and then the bit element is sequentially extracted by the bit represented by the core, thereby restoring the bit element. Watermarking. In addition, SC Pei et al. proposed another watermarking technique for digitally tuned halftone image 201112756 (dithering halftone image), which uses an ordered dithering halftone. Window ) cuts a halftone image into several sub-images. Because of the sorted brightness threshold in the halftone window, halftone conversion using this method causes each in the halftone scene. The proportion of black pixels in the sub-image will be decremented. In the process of hiding the watermark, the black and white watermark image will be hidden in the bit string manner. The hidden way is to hide one bit in the two sub-images, and adjust the black pixel ratio in the sub-image to hide In place 0 or 1; the method of taking out the watermark also judges that the hidden bit is 〇 or 丨, in order to increase the toughness of the watermark, the technology must use the original in the process of taking out the watermark The watermark is ANDed with the bit 7C taken out to reduce the error caused by the image being attacked, but the watermark image taken out will still be distorted. The present invention will improve on this phenomenon. In the original floating water (four) like the miscellaneous state, in the possession of watermarking, it is subject to attack and light reduction and subtraction from the visual reversible watermark. [Summary of the Invention] The item is a kind of Tibetan watermarking in a half-color image, which is a Tibetan with halftone conversion and watermarking. In order to achieve the image halftone to reflect the Tibetan watermark at the same time, I (4) - recognize 2 image half-color _ change technology, because IH can be adjusted to have a number of miscellaneous adjustments ' so it helps to fine-tune halftone The converted, privately-owned R-day machine can be used as a watermark for copyright proofing: images on paper, magazines, etc. are all halftones. [The invention is suitable for the wisdom of images applied to protect printed matter. property. I 201112756 will introduce the processing flow of the watermarking technology based on RgjH proposed by the present invention, which respectively includes the RBIHi operation flow and the program for hiding and retrieving the watermark. In general, if you use a single threshold (thresh〇ld) directly, convert a grayscale image with a pixel value range of 0 to 255 into a binary image with a pixel value of only 255 and 255, which will result in the converted two. There is a visually significant difference between the meta-image and the original gray-scale image. Since the pixel value of the gray-scale image represents the brightness change of each pixel in the image, in order to be able to show a smooth brightness in the binary image-printing ship The _ degree changes, halftone image technology came into being. The halftone image still belongs to the binary image. It simulates the brightness change of the grayscale image by touching the black pixel of the image towel, that is, the frequency of the pixel whose pixel value is G. When the grayscale image is darker in a certain area, In the half-color women's towel (4), the black pixel density of the area is increased to reduce the brightness, and vice versa. In order to effectively adjust the density of black pixels in each area of the image, most of the image halftone conversion technology will cut a block of fixed size (10) ck) centering on the pixel being processed during the conversion process, each Use the block side • < half of the color changer will have a side-size kernel (kernel) whose core size is the size of the block. The private block contains the block (10). The weight of the pixel. These weights are used to calculate the gated value of the pixel binarization. When the value of a pixel in the original grayscale image is greater than the threshold, the value of the pixel in the half=tone image is 255. Otherwise, it is set to 〇. The core social group and its weight value have a very important influence on the quality of the image after halftone conversion, -: the smaller core can make the halftone shadow after the conversion ": wind 0 V, ' In addition, the core of most halftone conversion technologies is fixed, so for 201112756, the thresholds for pixels in the same position are the same, that is, the color image. Technical threats - do the ranks Produce a kind of semi-proposed τ- χ, σ people in order to combine halftone conversion and watermarking technology, neighboring W Γ 具 具 具 的 具 具 , , , , , , , , 调整 调整 调整 调整 调整 调整 调整 调整 调整 调整 调整 调整 调整 调整 调整 调整The threshold of binarization is used to control the black pixel density of the two blocks in each block. In this issue, we will have a Tibetan watermark

旦增七串列(bltstream评’在影像半色調的轉換之前會先將 ^刀…-些大小相同且不重疊之區塊’每個區塊都會產生一 固大小相_核心’每個核心内會有所對應的像素二值化時所使 1柯值b(/, y),這些門榼值都是隨機產生的,由於當門權值 ,大或幻、對於轉換後之影像會產生較大的誤差,故門檻值會定 義於一定的範圍_4而.)心,其中⑽與Μ為門楹值之 上限及下限值(up b_mGW bGund)。在轉換的雜中,會依 序同時針對二個轉的區塊進行半色娜換,在此同時會藏入一 個位元的浮水印’其隱藏的;^式為比較二個區塊在半色調轉換後 所包含的黑色像素數量,當要藏人·水印位福G時,第一個 區塊在半色娜換後所包含黑色像素數量要大於第二個區塊所包 含之黑色像素數量,當要藏入的位元為丨時則恰好相反。當然, 在第一次半色調轉換後,可能無法滿足這樣的規則,故當無法滿 足的狀況產生時,必彡貞要重新產生核^,直到二個區塊之狀態滿 足所隱藏之淨水印位元所需之條件為止。在本發明所提出之方法 中,二個區塊可以藏入一個浮水印位元,故用於切割影像之區塊 大小可以根據所要隱藏之浮水印位元串列大小來決定。當浮水印 愈大時,就可以用較小之區塊來切割影像以得到較多之區塊。上 201112756 ί:本出之影像半色調轉換(rbih)與藏入浮水印之簡要 1愛色傻取出部份則與藏人程序類似,可藉由各對區塊内 判斷,進而--取出所藏入之浮水印 Θ之方法雜示意圖如圖-所示。 【實施方式】Once added seven series (bltstream comment 'Before the image halftone conversion will first ^ ^ knife ... - some blocks of the same size and do not overlap ' each block will produce a solid size phase _ core 'in each core There will be a corresponding pixel binarization when the 1 ke value b (/, y), these threshold values are randomly generated, due to the gate weight, large or magic, for the converted image will produce Large error, so the threshold value will be defined in a certain range _4 and .), where (10) and Μ are the upper and lower limits of the threshold (up b_mGW bGund). In the conversion of the miscellaneous, half-color change is performed for the two rotated blocks at the same time, at the same time, a watermark of a bit is hidden in the 'his hidden; ^ is to compare the two blocks in half The number of black pixels included in the tone conversion, when the Tibetan/watermark bit is to be G, the number of black pixels included in the first block after the half color change is greater than the number of black pixels included in the second block. When the bit to be hidden is 丨, the opposite is true. Of course, after the first halftone conversion, such a rule may not be satisfied, so when an unsatisfactory condition occurs, the kernel must be regenerated until the state of the two blocks satisfies the hidden watermark. The conditions required for the bit. In the method proposed by the present invention, two blocks can be hidden in a watermarking bit, so the size of the block used to cut the image can be determined according to the size of the watermark bit string to be hidden. When the watermark is larger, the smaller block can be used to cut the image to get more blocks. On 201112756 ί: This image halftone conversion (rbih) and the hidden watermarking 1 love color silly removal part is similar to the Tibetan program, can be judged by each pair of blocks, and then - take out The schematic diagram of the method of hiding the watermark Θ is shown in the figure--. [Embodiment]

本發明為一種植基於隨機式半色調法之數位浮水印技術,包 ΐ藏ίί取贿崎水印兩大部份。本發明之詳細實施方法吾人 使用 >貝算法說明如下: 一、影像半色調轉換與藏入浮水印之演算法 步驟丨:輸人要保護之影像(e_ image)c以及要藏人之黑白浮 水印’根,影像C之寬度αν及高度與浮水印之寬 度^v及南度決定景》像區塊的大小皿,其中 及册為區塊之寬度及高度,分別可由等式⑴及⑵ 取得。 BN = CN WNx2 BM =The invention is a digital watermarking technology based on a random halftone method, and the two parts of the watermark are collected. The detailed implementation method of the present invention is as follows: 1. Image halftone conversion and algorithm for hiding watermarks 丨: input image to be protected (e_image) c and black and white floating to be Tibetan The watermark 'root, the width of the image C αν and the height and the width of the watermark ^v and the south degree determine the size of the block. The width and height of the block are obtained by equations (1) and (2) respectively. . BN = CN WNx2 BM =

CM WM ⑴(2) 步驟2 ··將黑白浮水印轉換成一個長度為L之位元串列,並使用 秘密金输沉作為隨機礼數產生器(pseud〇rand〇m number generator ’ PRNG)的種子,執行 隨 機地重新分配位元串列中所有位元的位置以増加安全 201112756 性 步驟3 =棘最前面二個尚桃歡區 則處理的主要目標,其中/e{〇,U,...,z —1}。 步驟4:隨小相同之核心叫,此二核 〜所^的值从,力可由等式(3)取得, S 塊之編號,(~)為在核心中心 人的匁心,乂)所代表的是對應區塊取6中 的像素~〇,/)值所使用之門梧值。 ’ 步驟 从,7) = random⑴,ω #,办加⑽,ό ^ {1,办⑶ :將二個區塊_像素祕舰用對應核 蛉办力進行二值化,由等式如街#_ 1妁門檻值 碼W),並分別儲存於,與^。—值化像素值 (4 '0,當八力·,Λ<夂^,y); 255,其它。 步驟6 :分別計算娜u與娜/2内像素值為〇之像素數量 與5戌,2,也就是黑色像素之數量。 1 步驟7 :讀取-個欲隱藏之浮水印位元%,將喊入笼4vc 取得办當项為“假,,時,重複執行步驟 否則’將得到的^^與5%,2當做藏有浮水 : 影像之對應區塊。 '色畜 真,當νι^ = 0以及万%,i S ; TBt 真,當 wl=l 以反 ΒΐνΙΛ>β}ν[2; 假,其它。 ’ 11 (5) 201112756 步驟8·重複執行步驟+ 步驟9:輪出藏右、κ二驟8,直到洋水印位元隱藏完畢。 及、ιηΓ7卩之半色爾彡像完成影像半色調轉換 及子水印隱藏之程序。 步驟10 :受賴f彡叙作麵财者贿财麵μ及浮水 印之尺寸mixWM。CM WM (1)(2) Step 2 · Convert the black and white watermark into a string of length L and use the secret gold sink as the random ritual generator (PRNG) Seed, perform a random re-allocation of all the bits in the bit string to add security 201112756 sex step 3 = the main target of the first two Shangtaohuan areas, where /e{〇, U,.. .,z —1}. Step 4: With the same core, the value of the second core is determined by the equation (3), the number of the S block, (~) is represented by the core of the core center, 乂) The corresponding block uses the threshold value of the pixel ~ 〇, /) value of 6. 'Steps from, 7) = random(1), ω #, 办加(10), ό ^ {1, do (3): Binary the two blocks _ pixel secret ship with the corresponding nuclear power, by the equation such as street # _ 1 槛 threshold code W), and stored in , and ^ respectively. - Valued pixel values (4 '0, when 八力·, Λ <夂^, y); 255, others. Step 6: Calculate the number of pixels in Na and U/2, respectively, and the number of pixels in 5 and 2, that is, the number of black pixels. 1 Step 7: Read - % of the watermark bit to be hidden, will be shouted into the cage 4vc to get the item as "fake, when, repeat the steps otherwise" will get ^^ and 5%, 2 as a possession There is floating water: the corresponding block of the image. 'Color animal, when νι^ = 0 and 10,000%, i S ; TBt true, when wl = l to reverse Βΐ ΙΛ ΙΛ β β β β 其它 其它 其它 其它 其它 ' ' ' ' ' ' ' 5) 201112756 Step 8· Repeat the steps + Step 9: Turn left and κ2 to 8 until the watermark bit is hidden. And, ιηΓ7卩 half-color image to complete image halftone conversion and sub-watermark hiding Procedure: Step 10: Depends on the size of the money and the size of the watermark mixWM.

術之的影料色轉換及料印隱藏技 使用之後:f完整地_水印,其轉換時所 有者善加保存 时印之尺寸請\_必須由影像之所 二、浮水印還原處理之演算法 欲使用本㈣所提出之方城料水㈣ 浮水印隱藏程序中所使用之秘密金鑰心及浮二= 。在本發財,還科水印之料輯列如下。 步驟1 :私財浮水印之半色婦像S、此影像麵行浮水印 隱藏時所使用之秘密金鑰级以及浮水 WNxWM 〇 尺寸 步驟2 :影像區塊的寬度餅及高度可將影像及浮水印之大 小代入等式(1)及(2)中取得。切割藏有浮水印影像$成為 許多不重疊且尺寸同為及Vx5M的區塊5,/b,其; / g {0,1,2,…,Z 一 1},办 e {1,2}。 步驟3 :依序讀取最前面二個尚未處理之區塊的,】與%做為目 前處理的主要目標。 ’… 步驟4 :分別計算與内像素值為〇之像素數量與 5万’U,也就是黑色像素之數量。將ββ’ζ ι與代入等 12 (6)201112756 元 式(6)中取出被藏人之浮水印位 當 BB1'幺 ββ、., 1,當 ΒΒ’'> ββ< 夺取出之浮水印位元存 如還有/ 水卩疋串列 有6未處理之區塊,重複執行步驟3至步驟5。 步驟 步驟6:透過秘密今 水印二執行,存之浮 印位-Γ 有位被置㈣制至原始浮水After the use of the shadow color conversion and material printing hidden technology: f complete _ watermark, the owner of the conversion when saving the size of the print, please \_ must be the image of the second, the watermark reduction processing algorithm Want to use the secret key key used in this (4) Fangcheng material water (4) watermark hiding program and floating two =. In this fortune, the material of the watermark is also listed below. Step 1: The half-color portrait of the private money watermark S, the secret key level used when the image surface is hidden by the watermark and the floating water WNxWM 〇 size Step 2: The width of the image block and the height can be used to image and watermark The size is substituted into equations (1) and (2). Cutting the watermarked image into a number of blocks 5, /b, which are not overlapping and of the same size and Vx5M; /g {0,1,2,...,Z-1}, do e {1,2} . Step 3: Read the first two unprocessed blocks in order, and use % as the main target for current processing. ’... Step 4: Calculate the number of pixels with an internal pixel value of 〇 and 50,000 'U, that is, the number of black pixels. Taking ββ'ζ ι and substituting 12 (6) 201112756 (6), the watermark position of the Tibetan is taken as BB1'幺ββ, ., 1, when ΒΒ''>ββ< If there are 6 unprocessed blocks in the bit/sequence, repeat steps 3 through 5. Step Step 6: Execute through the secret watermark 2, save the floating position - Γ There is a bit set (4) to the original floating water

列内相對應的位置以產生還原之浮水印位元 步驟7 :輸咖之浮水印位元串舰,,完成浮构還原程序。 、貫驗結果與分析 程中的浮水印技術是·像進行半色觸換的過 私中冋時進仃藏人林印的處理,在實驗中,吾人將評估使The corresponding position in the column to generate the restored watermark bit. Step 7: The watermark bitstream of the coffee is broken, and the floating structure restoration process is completed. The results of the continuous test and the analysis of the watermarking technique in the process are like the processing of the Tibetan Linyin when the half-color touchover is carried out. In the experiment, we will evaluate

發明所提iB之浮水印技術針對多張不同之影像遭受攻擊時的抵 抗能力,其中所採用的破壞攻擊包含:加入其他文字、加入其他 圖片、裁剪與銳化等破壞。 〃 在貫驗中’吾人選用相似度測量(SM,similarity measure)以 及位元錯誤率(BER,bit error ratio)這二個指標來做為判定浮水 印還原的完整程度之標準,其定義分別如下所示: / 相似度測量指標(SM):常用來評估兩張黑白(二元)影像或位 元串列之間的相似度,在此吾人用此指標來呈現原始浮水印y與 還原之浮水印之相似度,相似度介於-1和1之間,當二者之間 相似度愈高,則其值愈大;反之,則愈小。其公式如下: 13 201112756 su(iv^y, L-ϊ ΣχιχΊ 1=0 /=〇 V /=〇 X/,Λ:’,€ {l,-l}。 ⑺ 二中L為浮水印位元之長度,若冰,與 &lt;為妒與y内之位 疋,當W/ (M//)為0時,x,(A)設為1 ;否則,X/ (Ο設為-1。 位元錯誤率指標(BER):常用來評估兩張二元影像或位元串 歹j之間的錯誤率(%)’在此吾人用此指標來呈現原始浮水印^與 還原之浮水㈣,之差異度,錯誤率介於Q%和觸%之間,當二 者之間Μ度愈高’則錯誤率愈大;反之,則愈小。其公式如下: BER(W, W') = \- , r〇 , ; 2 —» y,ye{0,l}〇 ⑻ _二中乙為浮水印位元之長度,若%與W,/為妒與W内之位 ^ A 為〇時’乃⑹設為Q ;否則 , 少為少之補數。 像Lenn月;^驗中百先使用—張有512x512像素的灰階影 傻(‘蔺田、〇衫像,而數位浮水印則是一張9〇χ9〇的黑白影 如圖,所示),藏人浮水印後之半色調影像如圖二⑻所示: 到破壞攻擊之藏有浮水印之半色調影像中還原 t 景彡像完全相同並使H, 到攻擊後仍月所提出的方法在已藏有浮水印之影像受 令’吾人有以識別之浮水印,在本實驗 了加入其:二! ί印之+色調影像各種攻擊之實驗,包含 、子口入八他圖片、裁剪與銳化等攻擊實驗。 201112756 l影像銳化攻擊的實驗和分析 一在這個實驗中,吾人將影像經過銳化之處理(如圖三⑻所 不)’其還狀林印影像在人類視覺上爐清晰可見其原浮水印 影像(如圖王⑼所示),其相似度撕為〇 65,差異度驗為17 7%。The iB watermarking technology proposed by the invention is capable of resisting attacks when a plurality of different images are attacked, and the damage attacks used include: adding other words, adding other pictures, cutting and sharpening, and the like. 〃 In the test, 'we use the similarity measure (SM) similarity measure and the bit error ratio (BER) to determine the completeness of the watermark restoration. The definitions are as follows: Shown: / Similarity measure (SM): commonly used to evaluate the similarity between two black and white (binary) images or bit strings, here I use this indicator to present the original watermark y and restore float The similarity of the watermark, the similarity is between -1 and 1. When the similarity between the two is higher, the value is larger; otherwise, the smaller. The formula is as follows: 13 201112756 su(iv^y, L-ϊ ΣχιχΊ 1=0 /=〇V /=〇X/,Λ:',€ {l,-l}. (7) The second middle L is the watermark bit The length, if ice, and < is the position within y and y, when W/(M//) is 0, x, (A) is set to 1; otherwise, X/(Ο is set to -1. Bit Error Rate Indicator (BER): commonly used to evaluate the error rate (%) between two binary images or a bit string 歹j. Here, we use this indicator to present the difference between the original watermark^ and the restored float (4). Degree, the error rate is between Q% and touch %, the higher the error between the two is, the larger the error rate is; the smaller the error is. The formula is as follows: BER(W, W') = \- , r〇, ; 2 —» y, ye{0,l}〇(8) _二中乙 is the length of the watermark bit, if % and W, / is the position in 妒 and W ^ A is 〇 when (6) Set to Q; otherwise, less is a small complement. Like Lenn month; ^ test in the first use - Zhang has 512x512 pixel grayscale shadow silly ('蔺田, 〇 shirt image, and digital watermark is a The black and white image of Zhang 9〇χ9〇 is shown in the figure.) The halftone image of the Tibetan watermark is shown in Figure 2 (8): In the halftone image with the watermark, the restored t-image is exactly the same and H, after the attack, the method proposed by the moon is still in the watermarked image. In this experiment, I added it: II! 印印++-tone image experiments of various attacks, including sub-ports into his eight pictures, cropping and sharpening attack experiments. 201112756 l Image sharpening attack experiment and analysis one in this In the experiment, the image is sharpened by the person (as shown in Figure 3 (8)). The image of the forest-printed image is clearly visible in the human visual image (as shown in Figure 9 (9)). Tear to 〇65, the difference was 17 7%.

2.影像加入其它文字或影像攻擊的實驗和分析 β由於料刷品上的影像可能被一般使用者加入一些文字或 ^其它影像’本實驗將研究本剌所提㈣方法抵抗加入其它文 ,或影像攻擊之能力’吾人進行τ列五種情況之實驗··(一)在 $浮水印之影財加人“ΝΤΙΤ”文字,㈡在藏树水印之影 象中力:入从“LAI,对,(三)在射縣印之影像中 ^ΦΝΤΙΤ、LAI”以及“而,,文字,㈤在藏有浮水印之 m加Μ細殼樣狀影像,(五)在财浮柳之影像中 盆框。本貫驗中的五種情況之影像如圖四⑷至圖八⑷所示, 影像(如圖四⑻至圖八(b)所示)在人類視覺上仍 然β晰可見其所藏入之浮水印影像。 3.影像裁剪攻擊的實驗和分析 本實驗; 人進行下列==提(_法抵抗裁剪攻擊之能力,吾 意四個物=====娜印之影像中任 裁剪藏有浮水印之影像的下二分一 ' 印之影像錢的三分之二_。本實H⑴鋪藏有浮水 二的區域,在人類視覺上藏入二之 15 201112756 由上列的各種不同破壞攻擊的實财,可膽日林發明所提 出之浮水印技術對於上述之各種攻擊具有相當程度之抵抗能 力’故其還原之浮水印影像在人類視覺上仍具有足夠之辨識力。 上列之各項實驗還原之浮水印影像的撕與腫值,詳列於表一 中。 4.不同影像受各種攻擊的實驗和比較分析 〜為了要證明本發明可以適祕各種具有不同景物之影像,在 本實驗十,吾人除了 Lena之外,又分別使用了 _,丁游㈣, • Ρ—Γ以及Barbara四張影像來進行如上述之各種攻擊,並比較 各張影像在受到姻攻擊後,狀浮水印影像的品質是否能 保持相近之水準,各張影像受各種攻擊後其還原浮水印影像之 W與膽曲線圖分別列於圖十四及圖十五中由圖中可以發 現’各張影像不論是W或是職都十分相近,故此實驗可證明 本發明之浮水印技割目#穩定且可_於各種不同景物之影像。 四、安全性分析 • 在安全性分析方面’吾人騎賴在鱗+的浮水印是否容易被 他人刪除來做討論,由於本發明所提出的浮水印技術在藏入浮水 印時是利用秘密金錄说來打亂原浮水印位元串财各個位元之位 址以改變藏入的順序,除此之外’浮水印之尺寸也會影響到區塊 之大小,因此,只要级夠大,且沉與浮水印之尺寸這二項資訊 受到影像财者良㈣賴及保存,如此财影像中的浮水印便 不會輕易地被刪除及破壞,進而保證本發明之安全性。 16 201112756 【圖式簡單說明】 表-:係本發·狀Lena影料對各 影像的w與趣。 飾還原之》于水印 表二:係本發明使用之Bab〇on影像針對 印影像的撕與臓。十對各種攻擊所還原之浮水 表三:係树狀Tiffany f彡料對各 印影像的SM與MR。 颗賴之/予水 表四:係本發明使狀Peppers觀針對各種 印影像的SM與腫。 ^㈣之子水 表五:^本發·狀Ba_a影像針對各種絲輯原 印影像的SM與BER。 &amp; 圖一:之灰階影像艳調轉換、浮水印藏人及取出流程 圖二 _·係本發蚊狀Lena 於讀攻料 原之浮水印影像,⑻及⑼各自為尚未受到攻 影像及其取回之浮水印影像。 ° 圖 :係本發明使狀Lena縣於各種攻料之影像及盆 印影像’⑻及(b)各自為藏有浮水印影像銳化後 之半色調影像及其取回之浮水印影像。 圖五 圖四:係本發明使狀Lena影像於各觀擊叙雜及其所還 原之浮水印影像,⑻及⑼各自為藏有浮水印影像加入 NTIT”文字之半色調影像及其取回之浮水印影像。 係本發明使用之Lena影像於各種攻擊後之影像及其所還 原之浮水印影像,⑻及(b)各自為藏有浮水印影像加入 “ΝΤΓΓ”以及“ LAI,,文字之半色調影像及其取回之浮 17 201112756 影像。 圖六:係本發明使用之Lena影像於各種攻擊後之影像及 原^印⑷及⑻各自域有浮辑影像加入 之^卩^ Α “而,,文字之蝴影像及其取回 圖七.係本發明使狀Lena f彡做麵攻擊後之影像及其 原之浮水印影像,⑷及(b)各自為藏有浮水印影像力认多 個貝殼樣紅影像後之半色像及其取回之浮水印影 像。 圖\ .係本發明使用之Lena景嫌於各種攻擊後之影像及其所 ,之浮水印影像’⑻及(b)各自域有浮水印影像力认外 框之半色調影像及其取回之浮水印影像。 圖九.係本發明仙之Lena f彡像於各種攻擊後之影像及其所還 原之浮水印影像’⑻及⑼各自為裁剪藏有浮水印影像中 任意四個部分的區域之半色娜像及其取回之浮水印影 像0 y 圖十.係本發明使用之Lena影像於各種攻擊後之影像及其所還 f之巧印影像’⑻及⑼各自為裁剪藏有浮水印影像令 圖+個十字的區域之半色調影像及其㈣之浮水印影像。 .係本發贼狀Lena影像於各種攻雜之影像及其所 ^原之林印影像,⑷及(b)各自絲魏有浮水印影像 —個雙十字的㈣之半色調影像及其取回之浮水印影 像0 ,v 圖十 -·係本發明使用之Lena影像於各種攻擊後之影像及其所 還原之洋水印影像,⑻及(b)各自絲剪藏有浮水印影像 的下一分之一的區域之半色調影像及其取回之浮水印影 201112756 像。 圖十三:係本發明使用之Lena影傻y 還原之浮水印影像,⑻及及其所 r 一-之半色調=== 圖十四^本,產生之所有半色鄕像於各觀雜之影像所 還原之浮水印影像的&amp;W比較曲線圖。 圖十五y棘發明產生之所有托調影像於各種攻擊後之影像所 還原之浮水印影像的丑狀比較曲線圖。 1 原始灰階影像 2 _ — 4 3 藏入浮水印之程序 5 已藏有洋水印之半色調影像 6 黑白浮水印影像 取出浮水印之程序2. Experiments and analysis of images added to other text or image attacks. Beta may be added to some text or other images by the general user due to the image on the brush. 'This experiment will study the method proposed in this book (4) to resist the addition of other texts, or The ability of image attack 'Our people carry out the experiment of τ 五 五 · · · · 在 τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ (3) In the image of Yinxian Printing, ^ΦΝΤΙΤ, LAI" and "And,, text, (5) in the image with m water and a small shell-like image, (5) in the image of Cailiu Liu The images of the five cases in this test are shown in Figure 4 (4) to Figure 8 (4). The images (as shown in Figure 4 (8) to Figure 8 (b)) are still visible in human vision. Watermarking image. 3. Experiment and analysis of image cropping attack. This experiment is performed by the following == (the ability of the _ method to resist the cutting attack, I mean four things ===== The lower half of the image of the watermark is 'two-thirds of the image money printed. _. The real H (1) shop The area with floating water is hidden in human vision. 15 201112756 The real money from the various destruction attacks listed above, the watermarking technology proposed by the company can have a considerable degree of resistance to the above-mentioned attacks. 'Therefore, the restored watermark image still has enough discernibility in human vision. The tear and swollen values of the watermark images restored by the above experiments are listed in Table 1. 4. Different images are subject to various attacks. Experiments and comparative analysis~ In order to prove that the present invention can be used to image various images with different scenes, in this experiment ten, in addition to Lena, we used _, Ding You (4), • Ρ-Γ and Barbara The image is used to perform various attacks as described above, and whether the quality of the watermarked image can be maintained at a similar level after each image is attacked by the marriage, and the image is restored to the W and the biliary curve of the watermark image after various attacks. The figures are shown in Figure 14 and Figure 15 respectively. It can be found from the figure that 'each image is very similar whether it is W or job, so the experiment can prove the invention. The watermarking technology cuts the eye #stable and can be used in various images of different scenes. 4. Security analysis • In the aspect of security analysis, 'whether the watermark of the person riding on the scale+ is easily deleted by others, the present invention The proposed watermarking technology uses the secret gold record to confuse the address of each bit of the original watermark bit string to change the order of hiding when hiding the watermark. In addition, the size of the watermark is It also affects the size of the block. Therefore, as long as the level is large enough, and the size of the sink and the watermark is affected by the imagery, the watermark in the image will not be easily Deletion and destruction, in order to ensure the safety of the present invention. 16 201112756 [Simple description of the diagram] Table-: This is the hair and interest of each image. Watermarking Table 2: The Bab〇on image used in the present invention is for tearing and smashing of printed images. Ten pairs of floating water restored by various attacks Table 3: The SM and MR of the tree image Tiffany f 对. The smear/pre-water table 4: The present invention makes the Poppers view the SM and the swelling of various printed images. ^ (4) Son Water Table 5: ^ The hair and shape Ba_a image is for SM and BER of various silk original print images. &amp; Figure 1: Grayscale imagery, conversion, watermarking, and taking out the flow chart. _· This is the original watermark image of Lena reading the original material. (8) and (9) are not yet attacked. It retrieves the watermark image. ° Figure: This is a halftone image of the image and the print image '8' and (b) of the various types of material used by Lena County in the present invention, and the watermark image obtained by the watermark image sharpening. Figure 5: Figure 4: The present invention makes the Lena image in each of the observations and the restored watermark image, and (8) and (9) each add a watermark image to the NTIT" halftone image and its retrieval. The watermark image is the image of the Lena image used in the present invention after various attacks and the restored watermark image, and (8) and (b) respectively add "ΝΤΓΓ" and "LAI, half of the text for the watermark image. Tone image and its retrieval 17 201112756 image. Figure 6: The image of the Lena image used in the present invention after various attacks and the original image (4) and (8) have their own floating image added to the ^^^ Α ", and the butterfly image of the text and its retrieval Figure 7. The image of the invention after the face attack of Lena f彡 and its original watermark image, (4) and (b) each of which is a half-color image after capturing a plurality of shell-like red images with a watermark image. Back to the watermark image. Figure \. The Lena scene used in the present invention is suspected of various images after the attack and its watermark image '(8) and (b) each has a watermark image to recognize the halftone of the outer frame Image and its retrieved watermark image. Figure IX. The image of the Lena f彡 image of the present invention after various attacks and the restored watermark image '(8) and (9) are each for cutting the watermark image. The half-color image of the four-part area and its retrieved watermark image 0 y Figure 10. The Lena image used in the present invention is used in various images of the attack and the fingerprint images of the images ('8) and (9) To crop a halftone image of a region with a watermark image and a cross + (4) Watermarking image. This is the image of the thief-like Lena image in various kinds of images and the original forest image, (4) and (b) each of the silk has a watermark image - a half cross (four) half Tone image and its retrieved watermark image 0, v Figure 10 - The image of Lena image used in the present invention after various attacks and the restored ocean watermark image, (8) and (b) The halftone image of the next sub-region of the watermark image and the watermark image 201112756 of the retrieved image. Figure 13: The watermark image restored by Lena shadow y used by the present invention, (8) and its r - Halftone === Figure 14^ This is a comparison of all the halftones produced by the watermark images restored by the images of the various images. The ugly comparison curve of the watermark image restored by the image after various attacks. 1 Original grayscale image 2 _ — 4 3 Program for hiding watermark 5 Halftone image with ocean watermark 6 Black and white floating Watermark image fetching watermark program

Claims (1)

201112756 七 、申請專利範圍: 1. 一種植基於隨機式灰階數位影像半色調化方法的 = ^ 浮水印隱藏技術,包含藏人及取回數位浮水印兩大λ ^調數位衫像 於: 。丨伤,其特徵在 數位浮水印的藏入方法: 步驟一:針對欲保護的灰階原始影像選擇代表其著 白浮水印影像; ~ J 資訊的黑 步驟. :執行本發明之影像半色調轉換與浮水印的藏人演算法以 ^生^藏有浮水印的之半色·像;絲保存秘密金 鑰尤以及浮水印之尺寸奶Vx奶^·; “ 步驟. :將所產生财縣㈣耗娜像向公 冊,然後,合法擁有者就可以將藏有浮水印之 像置於印刷品上公佈、販賣及傳遞; ’ 數位浮水印的取回之方法: 步驟一:载入藏有浮水印之影像;取得秘密金 尺寸 WxfFAZ ; 餘尤以及浮水印之 步驟, 演算法以取得藏有浮水印 依據申請翻關第旧㈣― 利用隨機核階數财彡像半色印技術, 護的半色調影像之中。在執^ ^法來藏入黑白浮水印於欲保 藏有浮水印之影像,如此即完成子水印藏人的處理後產生了一 其主要是 了一張 影像之著作權保護,其_浮水印的 20 201112756 藏入及其取回泮水印之演算法如下: [影像半色調轉換與浮水印的藏入之演算法] [輸入]要保護之影像(cover image)C和要藏入之浮水印酽; [輸出]藏有浮水印之半色調影像 v驟1 .輸入要保3蒦之影像(cover image)c以及要藏入之黑白浮水印201112756 VII. The scope of application for patents: 1. A planting based on the randomized gray-scale digital image halftone method = ^ Watermark hiding technology, including Tibetan and retrieving the digital watermark two large λ ^ tune shirts like: Bruise, which is characterized by the digital watermark hiding method: Step 1: Selecting the white watermark image for the grayscale original image to be protected; ~J information black step. : Performing the image halftone conversion of the present invention The Tibetan algorithm with watermarking uses the halftone of the watermarked image; the silk preserves the secret key and the size of the watermark milk Vx milk^·; "Step.: The county (4) that will be produced The consumer image can be published, sold and delivered on the printed matter; the method of digital watermark retrieval: Step 1: Loading the watermark The image; the secret gold size WxfFAZ; Yu You and the step of watermarking, the algorithm to obtain the possession of the watermark based on the application of the old (4) - using the random nuclear order financial image like half-color printing technology, halftone In the image, the method of hiding the black and white watermark is used to preserve the image with the watermark, so that after the processing of the sub-watermark Tibetan is completed, a copyright protection of one image is generated. Watermark 20 201112756 The algorithm for hiding and retrieving the watermark is as follows: [Image Halftone Conversion and Watermarking Encryption Algorithm] [Input] Image to be protected (cover image) C and float to be hidden Watermark 酽; [Output] Halftone image with watermarked v. 1. Enter the image to be protected and the black and white watermark to be hidden. 根據影像C之寬度CW及高度CM與浮水印之寬度,及高 度灰从決定影像區塊的大小·χ凡1/,其中厦及為區 塊之寬度及高度’分別可由等式(丨)及(2)取得; ν驟2.將黑白孚水印轉換成一個長度為ζ之位元串列,並使用秘密 金鑰6ΆΓ作為隨機亂數產生器(pSeud〇ran(j〇m number generator ’ PRNG)的種子,執行PRNG(网隨機地重新分 配位元串列中所有位元的位置以增加安全性; 步驟3 .依序讀取最前面二個尚未處理之區塊及】與及2,做為目前處 理的主要目標,其仏{〇,l,W-i}; 步驟4 :隨機產生二個與區塊大小相同之核心㈣&amp;,此二核心所 包含的值W,y)可由等式⑶取得,其中$為任意設定之參 數,办為區塊之編號,(/,y_)為在核心中的座標位置,在核 心中的W,撕代麵是對躯塊%中的像素 所使用之門檻值; ’ ’ 將二個區塊⑽像素祕,y)使用對應核心 進行二值化,由等式(4)取得二值化像素值 儲存於B叭,1與3^2; 步驟 步驟6 : f別計算,與,内像素值為0之像素數量岣與 及氏,2,也就疋黑色像素之數量; 一 步驟7 :讀取—個欲隱藏之縣印位“,將W,代人料(5)中取得 201112756 项’當项為“假”時’重複執行步驟4至步驟7,否則, 將得到的與當做藏有浮水印之半色調影像之對應 區塊; 步驟 步驟 .重複執行步驟3至步驟8,直到浮水印位元隱藏完畢; .輪出藏有浮水印之半色調影像51,完成影像半色調轉換及浮 水印隱藏之程序; 步驟10 :受保護影像之作者或所有者保存秘密金鑰欠以及浮水印之 尺寸WNxfVAf ; [浮水印還原之演算法] [輸入]藏有= 水印之半色調影似、此影像在進行浮水印隱藏時所使用 之秘密金鑰5Ά:以及浮水印之尺寸_&gt;&lt;_ ; [輸出]還原之浮水印位元串列妒| ; 步驟1:輸入藏有浮水印之半色調影像t此影像在進行浮水印 時所使用之秘密金鑰沉以及浮水印之尺寸贈晴从. 參 步驟2: 區塊的寬度蕭及高度服可將影像及浮水印之大 入等式(1)及(2)中取得,切割藏有浮水印影像^成為許々代 疊且尺寸同為Mxw的區塊方、,其中/e{〇i 夕不重 ^6(1,2} ; ,、 乂驟3.依序讀取最前面二個尚未處理之區 理的主要目標; 心、心做為目前處 步驟4 :分別計算%與心内像素值為〇之像素數量邮1 也就是黑色像素之數量,將碼“與观,2代人 '2 ’ 被藏入之浮水印位元1 )中取出 步驟5 ··將取出之浮水印位元 &lt;位存入暫存之浮水印位元 有尚未處理之區塊,重複執行步驟3至步驟5 . ,如還 22 201112756 步驟6 :透過秘密金錄SAT的協助,執行PRNGp火),將暫存之浮水印 位元串列内之所有位元位置重新排列至原始浮水印位元串列 内相對應的位置以產生還原之浮水印位元串列^; 步驟7:輸出還原之浮水印位元串列妒',完成浮水印還原程序;According to the width CW of the image C and the height CM and the width of the watermark, and the height gray determines the size of the image block, and the width and height of the block are respectively determined by the equation (丨) and (2) Acquire; νStep 2. Convert the black and white watermark into a bit string of length ζ, and use the secret key 6ΆΓ as a random random number generator (pSeud〇ran(j〇m number generator ' PRNG) Seed, perform PRNG (the network randomly reassigns the positions of all the bits in the bit string to increase security; Step 3. Read the first two unprocessed blocks in sequence and ] and 2, as The main target of the current processing, 仏 {〇, l, Wi}; Step 4: randomly generate two cores (four) & the same size as the block, the values W, y) contained in the two cores can be obtained by equation (3), Where $ is the arbitrarily set parameter, the block number is used, (/, y_) is the coordinate position in the core, and the W in the core is the threshold value used for the pixels in the body %. ; ' ' Two blocks (10) pixel secret, y) binarized using the corresponding core, Equation (4) obtains the binarized pixel value stored in B, 1 and 3^2; Step 6: f is not calculated, and the number of pixels with an internal pixel value of 0 及 and 氏, 2, 疋The number of black pixels; a step 7: read - a county to be hidden ", will be W, on behalf of the material (5) to obtain 201112756 items 'when the item is "false" 'repeated steps 4 to 7 Otherwise, the corresponding block will be obtained as a halftone image with a watermark hidden; Steps. Repeat steps 3 to 8 until the watermark bit is hidden; Image 51, the program of image halftone conversion and watermark hiding is completed; Step 10: The author or owner of the protected image saves the secret key owed and the size of the watermark WNxfVAf; [Watermark restoration algorithm] [Input] There is a halftone of the watermark, the secret key used when the image is hidden by the watermark 5: and the size of the watermark _&gt;&lt;_; [output] restored watermark bit string 妒| Step 1: Enter a halftone image with a watermark t The size of the secret key and the size of the watermark used in the watermarking are given. Step 2: The width and height of the block can be used to enlarge the image and the watermark (1) and (2) In the middle, the cut has a watermark image ^ is the block of the stack and the size is the same as Mxw, where /e{〇i 夕不重^6(1,2} ; , , step 3. The main targets of the first two unprocessed areas are read sequentially; heart and heart are taken as the current step 4: respectively calculate the number of pixels with % and intracardiac pixel values, ie the number of black pixels, The code "and the view, 2 generations of people '2' are hidden in the watermarking bit 1). Step 5 ·· The watermarking bit &lt; the stored watermark bit is stored in the temporary storage watermark bit. Block, repeat step 3 to step 5. . If still 22 201112756 Step 6: Execute PRNGp fire with the assistance of secret transcript SAT, rearrange all the bit positions in the temporary watermark bit string. Up to the corresponding position in the original watermark bit string to generate a restored watermark bit string ^; Step 7: Loss The restored watermark bit string 妒 ', complete the watermark restore program;
TW98132192A 2009-09-23 2009-09-23 A digital watermarking technique based on random halftoning TW201112756A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW98132192A TW201112756A (en) 2009-09-23 2009-09-23 A digital watermarking technique based on random halftoning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW98132192A TW201112756A (en) 2009-09-23 2009-09-23 A digital watermarking technique based on random halftoning

Publications (1)

Publication Number Publication Date
TW201112756A true TW201112756A (en) 2011-04-01

Family

ID=44909368

Family Applications (1)

Application Number Title Priority Date Filing Date
TW98132192A TW201112756A (en) 2009-09-23 2009-09-23 A digital watermarking technique based on random halftoning

Country Status (1)

Country Link
TW (1) TW201112756A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113135043A (en) * 2021-03-10 2021-07-20 厦门喵宝科技有限公司 Watermark printing method of thermal printer, storage medium and thermal printing equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113135043A (en) * 2021-03-10 2021-07-20 厦门喵宝科技有限公司 Watermark printing method of thermal printer, storage medium and thermal printing equipment
CN113135043B (en) * 2021-03-10 2022-06-24 厦门喵宝科技有限公司 Watermark printing method of thermal printer, storage medium and thermal printing equipment

Similar Documents

Publication Publication Date Title
Li et al. Concealed attack for robust watermarking based on generative model and perceptual loss
Tang et al. Median filtering detection of small-size image based on CNN
Arnold et al. Techniques and applications of digital watermarking and content protection
Memon et al. Hybrid watermarking of medical images for ROI authentication and recovery
TWI260158B (en) Electronic watermark embedding device, electronic watermark detection device, method thereof, and program
Mishra et al. Digital image tamper detection techniques-a comprehensive study
Han et al. Content-based image authentication: current status, issues, and challenges
Hadmi et al. Perceptual image hashing
Wu et al. A simple image tamper detection and recovery based on fragile watermark with one parity section and two restoration sections
Domain A review and open issues of diverse text watermarking techniques in spatial domain
Liu et al. Watermark vaccine: Adversarial attacks to prevent watermark removal
Ren et al. ESRNet: Efficient search and recognition network for image manipulation detection
Sarma et al. A study on digital image forgery detection
CN101923700A (en) Double-effect digital watermarking method
TW201112756A (en) A digital watermarking technique based on random halftoning
Jain et al. Fragile watermarking for image authentication: survey
Das et al. Cryptanalysis of correlation-based watermarking schemes using single watermarked copy
Blue et al. Identity document authentication using steganographic techniques: the challenges of noise
Wang et al. Blockchain private key storage algorithm based on image information hiding
Naoe et al. Damageless information hiding using neural network on YCbCr domain
Sergeyev et al. Gabor filter based attack on printed documents protection methods via digital watermarks
Wazirali et al. Data hiding based on intelligent optimized edges for secure multimedia communication
Hassanein Secure digital documents using Steganography and QR Code
Pan et al. Finding needles in a haystack: A Black-Box Approach to Invisible Watermark Detection
Dadkhah et al. Efficient image authentication and tamper localization algorithm using active watermarking