TW468124B - Method of invisible electronic signature - Google Patents

Method of invisible electronic signature Download PDF

Info

Publication number
TW468124B
TW468124B TW89109102A TW89109102A TW468124B TW 468124 B TW468124 B TW 468124B TW 89109102 A TW89109102 A TW 89109102A TW 89109102 A TW89109102 A TW 89109102A TW 468124 B TW468124 B TW 468124B
Authority
TW
Taiwan
Prior art keywords
information
electronic signature
patent application
scope
detect
Prior art date
Application number
TW89109102A
Other languages
Chinese (zh)
Inventor
Kuang-Shr Wu
Dau-Yi Shiu
Original Assignee
Chung Shan Inst Of Science
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chung Shan Inst Of Science filed Critical Chung Shan Inst Of Science
Priority to TW89109102A priority Critical patent/TW468124B/en
Application granted granted Critical
Publication of TW468124B publication Critical patent/TW468124B/en

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

There is provided a method of electronic signature which is invisible and resistant to artificial damage or distorted compression. The present invention utilizes the comparing relation among pixels, error distribution, channel coding and interlaced coding techniques to provide a novel electronic signature technique. After the electronic signature is hidden, the original signature can still be visually recognized even when the generated image is artificially damaged or distortedly compressed.

Description

五、發明說明(1) 丨1 〜 【發明領域】 i發明為一種電子簽章隱藏的方法,特別是一種將電 子簽早資訊藏入影像中,使人眼不易查覺的電子簽章方法) 發明背景】 由於電腦網路技術的快 然來臨’全面資訊化的結果 ’然而’網路上的安全問題 的保護。另外在國防的應用 統或現代化的武器設備,都 说’因此機密資訊如何在網 要而迫切需要解決的問題。 人對他人的資訊進行竊取、 能從有意義的圖像中,萃取 的電子簽章的技術。電子簽 其所探討的重點起始於能夠 品的視覺品質’並且不易被 ’使得數位著作權歸屬最終 這裡所指的電子簽章技 有意 _義的文字、影像或視訊 的過程中看出是否有隱藏資 之破壞。而在電子簽章技術 影像(host image),將資訊 的影像(watermarked image 速發展,數位化的時代已經情 使得資訊暢通,知識分享容易 亦逐漸威脅到網路智慧財產權 上,不論是指管通情的資訊系 以漸漸透過電腦網路來傳遞資 路上得到安全認證,已成為重 就實用上而言,防止非擁有權 複製與修改,使合法的使用者 出得以認證的訊息,就是所謂 章於數位著作權判定之研究, 確保加入的簽章不會改變原作 攻擊者發現而遭受篡改或移除 得到正確的判定。 術是指影像在傳送時藏入—段 ’未授權的第三者很難從傳輸 訊,這樣可避免有心人士刻意 中常見的方法是選擇一張原始 藏入其中,進而產生另一張新 )’而此含有簽章的影像從人 五、發明說明(2) 類視覺系統 難發現有其 網路上的使 資訊,因此 那些是隱藏 者而言,卻 一般電 (1)不易偵 看起來就像原圖,直 他資訊含在裡面。這 用者而言’無法分辨 在網路上的眾多資訊 有電子簽章的影像, 能夠迅速的將隱藏其 子簽章技術必須具備 察(Undetectable): 易用一般影像處理的方將其找出 肉眼看出(Invisible 人眼看上去,不易從 (2) 不易用 之影像,由 之差異。 (3) 不易刪 章不會輕易 (4 ) 抗破壞 般影像操^ 被破毀損。 電子簽 方向,在_ 效果還算不 (1)計算量 也要有相對 適合的。 =含有簽章的影像中报 伤3有簽章的影像對复他 出影像中是否隱藏有其他 中,未授權者报難區分出 但是對於—個合法的使用 中的電子簽章萃取出來。 以下特性: 即電子簽章於影像後,不 〇 )_對於已加入電子簽章 影像中看出其與原始影像 除(UndeletabU):加入原始影像中之電子簽 的經由簡單的影像處理方法而被删除。' 性(Resistant to image maipulati〇n):在一 下,甚或有心人之刻意破壞,皆不容易使資訊 早技術中’可分為空間域與頻率域兩種不同的 率域的研究中,應用展頻模式來做電子簽章的 錯’但有以下三項缺點: 太大:轉換到賴率.域需要複雜的計算,接收端 應的轉換,這點對有即時處理需求的應用是不V. Description of the invention (1) 丨 1 ~ [Field of invention] The invention is a method for hiding electronic signatures, especially an electronic signature method that hides early information of electronic signatures in the image, making it difficult for human eyes to detect) BACKGROUND OF THE INVENTION Due to the advent of computer network technology, 'the result of comprehensive information', however, 'protection of network security issues. In addition, national defense applications or modern weapons and equipment all say, ‘therefore, how confidential information is important and urgently needs to be resolved. An electronic signature technology that steals the information of others and extracts information from meaningful images. The focus of the electronic signature is on the visual quality of the product, and it is not easy to be made, so that the digital copyright belongs to the final electronic signature technology referred to here. The destruction of resources. In the case of electronic signature technology (host image), the information image (watermarked image) has been rapidly developed. The digital era has made information flow easier, and knowledge sharing has gradually threatened the intellectual property rights on the Internet. The information is gradually passed through the computer network to obtain security certification on the road. It has become important in practice to prevent non-ownership from being copied and modified, so that legitimate users can get authenticated messages. This is called Zhang Yu. Research on digital copyright judgment to ensure that the added seal will not alter the original work, and the attacker will be tampered with or removed to get the correct judgment. The technique means that the image is hidden during transmission-the section 'Unauthorized third party is difficult to remove Transmission of information, so as to avoid deliberately common methods for people with intentions is to choose one of the originals and hide it, and then create another new one. I found that there are messengers on the Internet, so for those who are hidden, but generally (1) is not easy to detect and looks like the original picture, He information contained in it. For this user, 'can't distinguish many images on the Internet with electronic signature images, can quickly hide its sub-signature technology must have detection (Undetectable): easy to use general image processing methods to find it naked eye Seeing (Invisible to human eyes, it is difficult to distinguish from (2) difficult-to-use images. (3) difficult to delete chapters and not easy (4) anti-destructive image manipulation ^ is damaged. The direction of the electronic signature, in _ The effect is not good. (1) The amount of calculation should be relatively suitable. = Injury is reported in the image containing the signature. 3 Whether the image with the signature is hidden in other images. It is difficult for unauthorized persons to distinguish But for a legal use of the electronic signature, the following characteristics are extracted: The electronic signature is after the image, not 0) _ For the electronic signature image that has been added, it can be seen that it is divided from the original image. The electronic signature in the original image is deleted through a simple image processing method. 'Resistant to image maipulati〇n: In the meantime, even intentional destruction by interested people is not easy to make information in early technology. Model to do electronic signature wrong 'but there are the following three disadvantages: Too big: conversion to Lai rate. The domain requires complex calculations, and the receiver should convert.

第5頁 αβΒ1 2 4 五、發明說明(3) 有邊緣的區塊中以避免失真性壓縮的破壞,這樣對有心的 人而言’就很容易對隱憂的資訊進行欢擊β (3)能隱蓋的資訊相對的減少:頻率域只能將資訊藏在固 定頻段,故能隱藏的資訊亦相對的比較小。 在空間域、上有一種常被運用來隱藏資訊的向量量化法 (Vector Quantization),係利用收發雙方共同擁有的編 碼簿(code book)來進行電子筆章之隱藏,在發送端的處 理過程是先由發送方將欲隱藏的影像('電子簽章)切割成&與 編碼薄中相同大小的區塊’並從編碼薄中找出相似的區塊 ,並以其'索引值代替這個區塊的資訊藏於圖中,進而傳送 到網一聲一上。噹接收端收到藏有資訊之影像圖時,便將索引 值取出解.密,再依索引值比對編碼薄後將資訊還原。這種 方法的缺點是會造成較大的實訊失真,且隱藏資訊後的影 像不易承受失真的破壞、 ,?/ 另有一種電子簽章技術是利甩!彳象像素之固定區域來 隱藏資訊’如固定區域量化法(F ixed RangePage 5 αβΒ1 2 4 V. Description of the invention (3) In the block with edges to avoid the damage of distortion compression, so that for the interested person, it is easy to hit the hidden information β (3) can The hidden information is relatively reduced: the frequency domain can only hide information in a fixed frequency band, so the information that can be hidden is relatively small. In the spatial domain, there is a Vector Quantization method that is often used to hide information. It uses a code book shared by the sender and receiver to hide the electronic pen chapter. The processing at the sending end is first The sender cuts the image to be hidden ('electronic signature) into & blocks of the same size as the codebook' and finds similar blocks from the codebook and replaces this block with its 'index value' The information is hidden in the picture, and then transmitted to the web. When the receiving end receives the image map containing the information, it takes out the index value and decrypts it, and then compares the codebook with the index value to restore the information. The disadvantage of this method is that it will cause a large distortion of the actual information, and the image after hiding the information is not easy to withstand the damage of the distortion. To hide information from a fixed area of an image pixel ’such as fixed range quantization (F ixed Range

Equal izat ion),這個方法用來隱藏資訊的影像灰階值區 分為1 6個固定區間’隱藏的資訊以b y t e為單位,依輸入值 所屬的空間’找出一點將原有的值以欲隱藏之資訊替換, 例如資訊之值馮17,則於[16〜31 ]區間中選擇一點,以17 的值替代。還有一種被稱為LSB的方法,也是最常被用來 Ife藏資訊的方法’ L S B是將電子簽章置於較低(即較不重要 )的位杏—中,因較低位元值的改變對整個像素值的影響相 對的較小,因此對影像的破壞也較不明顯。但是,上述兩Equal izat ion), this method is used to hide the image gray value of the image is divided into 16 fixed intervals 'hidden information in bytes, according to the space where the input value belongs' find a point to hide the original value to be hidden For information replacement, for example, the value of information is Feng 17, choose a point in the interval [16 ~ 31] and replace it with the value of 17. There is also a method called LSB, which is also the most commonly used method of Ife to collect information. LSB is to place the electronic signature in the lower (ie less important) position, because of the lower bit value. The effect of the change on the overall pixel value is relatively small, so the damage to the image is less obvious. However, the above two

A6 81 24 五、發明說明(4) ' '一' - =法在隱藏資訊後都無法忍受失真性的破壞。 【發明之概述及目的】 大具r王扪反农 本發明提出一猶人丁 3 士 用了數種影像.技巧覺的電子簽主.方法,係運 f t w t 勹 挺出了一個新的電子簽章方法。首先 二上衫R、G、B影像之藍原色波段(B channel)用來藏匿 貝Λ丄因為B channel對人眼較不敏感,再應用交錯編碼 、通迢編碼、像素位置關係把一資訊嵌入。利用編/解瑪 技術^相鄰像素間對關係來隱藏資訊可有效的防止資 訊被篡改’同時因為通道編碼的回復能力及相鄰像素間的 比對關係’而使本發明之方法在承受失真性壓縮後,仍然 可以正確地將資til還原。 本發明所提之方法可對資訊產生保護,且能容忍失真 性的破壞’以通道編碼技巧和善用影像前後關聯的特性, 結合部分基本的影像隱藏技身,創為$出一責電子簽章技術 的方法’以期對著作權的判定和資訊偽裝^的應用具有實 用價值的目的。 . 有關本.發明之詳細内容及技術,茲就配合圖式說明如 下: 【發明之詳細說明】 本發明所用來隱藏資訊的原始影像(Host Image ; H> 是彩色R、G、B各為大小m χ η的影像,其值為〇〜.2 5 5之間β 而欲隱藏在原始影像中之資訊為一 L坐元大小之位元串.列 ,原始影像待嵌入資訊W以下列方式表示:A6 81 24 V. Description of the invention (4) '' One '-= method can not tolerate distortional damage after hiding information. [Summary and purpose of the invention] The present invention proposes that a Jewish Ding 3 person uses several types of images. Skillful electronic signers. The method is to send a new electronic sign. Chapter method. First, the blue primary band (B channel) of the R, G, and B images of the top shirt is used to hide the shell. Because the B channel is less sensitive to the human eye, the interlaced coding, general coding, and pixel position relationship are used to embed information. . Utilizing the editing / demapping technology ^ The pairwise relationship between adjacent pixels to hide information can effectively prevent the information from being tampered with. At the same time, the method of the present invention can withstand distortion because of the channel coding recovery ability and the comparison relationship between adjacent pixels. After sexual compression, the data can still be restored correctly. The method provided by the present invention can protect information, and can tolerate distortion damage. With channel coding techniques and the good use of the characteristics of the image before and after, combined with some basic image hiding techniques, it creates an electronic signature of $ 1 responsibility. The technical method 'is intended to have a practical purpose for the determination of copyright and the application of information disguise ^. The detailed content and technology of the invention are described below in conjunction with the drawings: [Detailed description of the invention] The original image (Host Image; H >) used by the invention to hide information is a color R, G, B each size The image of m χ η has a value of β between 0 ~. 2 5 5 and the information to be hidden in the original image is a bit string of L size. The information to be embedded in the original image is expressed in the following manner :

46 81 24 五、發明說明⑸ :— H I < n^ij^fO^SS]}- W=(w, | QSiKL^^lO,!]} , *:, 對原圖中的任7像素t,圍繞其四周的右半邊4個像素, 並定義一集合 本發明所提之隱藏電子簽章的方法流裎圖如第1圖所.示, 包含三個步驟流程:資訊迴旋編碼(步驟1〇)、資訊交錯編 步驟20)及資訊.礙入圖像(步驟3〇),該方法係在藍原色 ;&(.Β channe 1 )上處理,並完成三個步驟流程後,將嵌 入圖像中的電子簽章加以傳送(步驟4 〇 )。 ,士發明的隱藏電子簽章的方法流程中,第一個步驟為進 行資訊迴旋編碼,該資訊迴旋編碼係為通道編碼的一種, 通道,碼的目^在於使資訊在編碼後能抵抗傳輸中的雜 訊,达裡利用育訊隱藏在原始影像中的特性,使得通 碼後亚不會增加原始影像的大小,而在影像壓縮或人為刻 意破壞下亦能有還原的效果。實作上是使用(2, 的迴 哮,把欲隱藏的資訊輸入迴旋編碼器而產生二倍於原資 讯的輸出,利用多餘的編碼資訊來修正傳輸過程的錯誤气 人為的雀_1裒。其中(2,1,7 )中的"2"是指編碼後之輸出為二 個位兀’ ” Γ是指輸入之資訊以一〈個俾孓為單位,,,7 "是指 有6 ( 7- 1)個暫存器。而不同複雜度的迴旋碼可以用在不^ 的硬1 ’故若硬體能提供較大的計算能力’則能使用較複 雜的迴旋绛碼器’進而產生較好的抗干擾效杲。第2圖為 本發明所提之應用迴旋碼輸出輸入功能圖,其中迴旋石馬46 81 24 V. Description of the invention ⑸: — HI < n ^ ij ^ fO ^ SS]}-W = (w, | QSiKL ^^ lO ,!]}, *: For any 7 pixels t in the original picture 4 pixels around the right half of the perimeter and define a set of the method of hiding the electronic signature of the present invention. The flow chart is shown in Figure 1. It contains three steps: information rotation coding (step 1〇 ), Information interlacing step 20), and information. Into the image (step 30), the method is processed on the blue primary color; & (.Β channe 1), and after completing the three-step process, the image will be embedded The electronic signature in the image is transmitted (step 4). In the method flow of the method of concealing electronic signatures invented by Shi, the first step is to perform information rotation coding, which is a kind of channel coding. The purpose of the channel is to make the information resistant to transmission after encoding. Dali uses the characteristics of Yuxun hidden in the original image, so that after the code is passed, Asia will not increase the size of the original image, and it can also be restored under image compression or intentional destruction. The implementation is to use (2, the wheeze) to input the information to be hidden into the rotary encoder to produce twice the output of the original information, and use the extra encoding information to correct the error in the transmission process. Among them, "2" in "2,1,7" means that the encoded output is two bits. "" Γ means that the input information is in a unit of 俾 孓, and 7 " means that there is 6 (7- 1) registers. And round codes of different complexity can be used on hardware that is not ^ 'so if the hardware can provide greater computing power, you can use more complex round coders' and then Produces better anti-jamming effect. Figure 2 is the functional diagram of the application of the gyro code in the present invention.

第8頁 4 6 812 4 五、發明說明(6) (2,二一3〇的硬體架構需要2個暫存器(50,52)。 第二個步驟為進行f訊交錯編碼,該資訊交錯編碼係使用 線性迴樣偏移記錄器(Linear Feedback Shift Register) 之IL數產生器產生一組稱為m-sequence的亂數,使用的種 數(seed)當成私用鑰匙,在接收端必需擁有這個鍮匙才能 將資訊萃取出來,這是資訊還原的第一把鑰匙,如果資訊 為8位元,則可以用如第3圖的硬體完成交錯產生,其中第 3圖為本發明所提之交錯碼產生器的硬體電路示意圖,該Page 8 4 6 812 4 V. Description of the invention (6) (2, 2130 The hardware architecture requires 2 registers (50, 52). The second step is to perform f-signal interleaving coding, the information Interleaving coding uses the IL number generator of Linear Feedback Shift Register to generate a set of random numbers called m-sequence. The seed used is used as a private key. It must be used at the receiving end. This key can be used to extract information. This is the first key for information restoration. If the information is 8 bits, it can be generated by hardware as shown in Figure 3, where Figure 3 is provided by the present invention. Hardware circuit diagram of the interleaving code generator, which

迴授函數(feedback function)為 f(xl,x2,x3)=xl+x3,可 產生一個週期為7的亂數序列,而該亂數序列之狀態圖如 第4圖所示,其中第V圖中之數位資訊如(〇丨〇 )代表著第3種 中暫存器(54,56,58)的内容,而不同的初始值可以當作 不同的種數(seed),進而產生不同次序的亂數。以這個不 同的次序將8個位元的資訊重新排列,以產生交錯的效 果。由於本方法比習知的交錯方式(矩陣讀寫)有更佳的亂 度,而且不需要後存整個表格,只需要—個初始值,即可 節省大量空間。The feedback function is f (xl, x2, x3) = xl + x3, which can generate a random number sequence with a period of 7, and the state diagram of the random number sequence is shown in Figure 4, where V The digital information in the figure such as (〇 丨 〇) represents the content of the temporary register (54, 56, 58) in the third type, and different initial values can be treated as different seed numbers (seeds) to generate different orders. Random number. The 8 bits of information are rearranged in this different order to produce an interlaced effect. Since this method has better chaos than the conventional interleaving method (matrix reading and writing), and does not need to save the entire table, only an initial value is needed, which can save a lot of space.

第三個步驟為進行資訊嵌入,該資訊嵌入的步驟是由位置 選擇立資訊植入兩.·部分組成,先經由原始影像中選擇通當 ^置,再放入欲隱藏之資訊。在每一個位元加入原始影像 時,需考慮厚始影像四週圍的影像點(像素本發明使用 一個^數產生器,對原圖由左至右、由上而下地進行濟骰 子,若.擲骰— 子成功,則該原始影像的像素點擇為資訊 加入點,若像素hu為資訊加入點’其週圍相關像素的位置The third step is to embed the information. The step of embedding the information consists of location selection and information implantation. It consists of two parts, which are selected by the original image from the original image, and then the information to be hidden. When adding the original image to each bit, you need to consider the image points around the thick image (pixels. The present invention uses a number generator to perform dice on the original image from left to right and from top to bottom. Dice — If the sub is successful, the pixel point of the original image is selected as the information adding point. If the pixel hu is the information adding point, the position of the relevant pixels around it

第9頁 五、發明說明(7) 關係如第5圖所示。 利用亂數產生器的百全比決定L (或其倍增,因迴旋碼特性 而不同)個位置作為用來加入資訊的資訊加入點,例如亂 數產生器能產生卜1 0之間的值,而待隱藏資訊的位元數佔 原圖B c h a η n e 1像素總數的百分之三十,那麼對於每..:支鄉 骰子時,擲出卜3的數字,就把這個像素點當作資訊加入 點,否則就處理下一個像素點。這個,亂數的種數則視為萃 取資訊(隱藏之電子簽章)的第二把鑰匙。 而資訊嵌入的方法係經過迴旋編碼的處理後,輸入的資訊 ... ——-------- ----- -·. 變成了 L的倍數,以迴旋碼(2,1,7)的編碼方式而言,或產 生兩倍於L的資訊,亦即2 L。若目前待加入的資訊位元為 1 — .. — w,設相對於原始影像中之資訊加入點為hi j,利用下式計 算出暫用變數h’ : —— 一----,- h-(hi.iJ.1+hijJ.1+hi.1J+1+hul>J+hiJ)/5 ^ 以下列演算法調整hy及ASET^的值: for each hrj. ASETj j do hi,!j,=hil)j, + ((h, + (2w-l)xth)-hi j)/4 ; hi j=h' + (2w-l) xth ; 此th是個門檻值,值愈大則抗破壞的能力愈強,但對影像 視覺上的失真也較嚴重,所以經過上述的所有像素的._.運 算,即能成功地把電子簽章的資訊嵌入影俸中。Page 9 5. Description of the invention (7) The relationship is shown in Figure 5. Use the random number generator's 100% ratio to determine L (or its multiplication, which is different due to the characteristics of the convolutional code) as the information adding point for adding information. For example, the random number generator can generate values between 10 and 10, And the number of bits of information to be hidden accounts for 30% of the total number of pixels in the original image B cha η ne 1, so for each ..: Zhixiang dice, roll the number of Bu 3, and treat this pixel as Information to add points, otherwise the next pixel is processed. This, the random number is regarded as the second key to extract information (hidden electronic signature). The method of information embedding is the input information after the round-robin processing. ------------ ------·. It becomes a multiple of L and the round-robin code (2, 1 , 7), or produce twice as much information as L, that is, 2 L. If the current information bit to be added is 1 — .. — w, set the information addition point relative to the original image as hi j, and use the following formula to calculate the temporary variable h ': ---- a ----,- h- (hi.iJ.1 + hijJ.1 + hi.1J + 1 + hul > J + hiJ) / 5 ^ Adjust the values of hy and ASET ^ with the following algorithm: for each hrj. ASETj j do hi ,! j, = hil) j, + ((h, + (2w-l) xth) -hi j) / 4; hi j = h '+ (2w-l) xth; this th is a threshold value, the larger the value is, the The stronger the ability to resist damage, but the visual distortion of the image is also more serious, so through the ._. Operation of all the pixels described above, the information of the electronic signature can be successfully embedded in the film.

第10頁 46 81 24 l發明說明⑻ "— -- 而第6圖為本發明之萃取電子簽章的方法流程圖,當影像 傳送至接收端接收(步驟60)後,依據上述隱藏電子簽章的 方法流程反向步驟即可將資訊萃取出來。在資訊萃取步驟 中’將含有電子簽章之圖像由左至右、由上而下地依序計 算利用第二把鑰匙將藏有資訊的位置算出(步驟7〇),對任 —資訊加入點j如同加入電子簽章資訊時一樣,利用下 式計算出h’ : 再用下式還原在這個位置的相對資訊; if(hr ^ h| j) w=l ; else w—Ο 依序還原每一個位元的資訊後’送入交錯解碼(步,驟80 )功 能。 交錯解碼是使用資訊加入時的第一把鑰匙,把經過打亂的 資訊重建回來,此把錄匙亦即上述交錯編碼之線性迴授偏 移記錄器(Linear Feedback Shift Register)之亂數產生 器所使用的種數(seed) ’以這個種數重新執行一次亂數產 生器,算出各點原來的位址,進而將資訊重新排列,回復 交錯編碼前的次序。 資訊萃取的最後一個步驟即是解迴旋碼(步驟90),採用 Vi terbi演算法將有錯誤之資訊修正回來,並可利用sof七 input來增加解碼的能力,用來解迴旋碼的格狀圖Page 10 46 81 24 l Description of the invention quot "-and Figure 6 is a flowchart of the method of extracting electronic signatures of the present invention, after the image is transmitted to the receiving end for reception (step 60), according to the above hidden electronic signature The chapter's method flow reverses the steps to extract the information. In the information extraction step, 'the image containing the electronic signature is calculated sequentially from left to right and top to bottom. Use the second key to calculate the position where the information is hidden (step 70). j is the same as adding the electronic signature information, using the following formula to calculate h ': then use the following formula to restore the relative information at this position; if (hr ^ h | j) w = l; else w—〇 sequentially restore each One bit of information is sent to the interleaved decoding (step, step 80) function. Interleaving decoding is to use the first key when information is added to reconstruct the scrambled information. This recording key is the random number generator of the above-mentioned interleaved linear feedback shift register (Linear Feedback Shift Register). The number of seeds used (seed) 'Re-run the random number generator with this number, calculate the original address of each point, then rearrange the information and restore the order before interleaving coding. The last step of information extraction is to devolve the gyro code (step 90). The Viterbi algorithm is used to correct the error information. The sof input can be used to increase the decoding ability.

46 8彳 24 玉、發明說明(9) (trel 1 is diagram)可以先建立好以便節省資訊還原的時 間,因此經過迴旋解屬功能’隱藏的資訊就能重新展現。 經過附件一至附件四的證實,加入隱藏資訊之原圖經人為 破壞或JPEG壓縮後仍能清楚地辨認電子簽章的資訊。 【發明之功效】 依據本發明所提之人眼不易查覺的電子簽章方法,可_以達 到下列功效: (1) 藉由資訊分散隱藏的技巧使得影像不易被傭察出來。 (2) 使用B channel儲存資訊,而能達到肉眼不易分辨的 效果。 (3) 在虚擬亂碼的保護下,使資訊不易被刪除。 (4) 利用迴旋編碼的功能在於修正傳輸中可能產生的錯 誤。 (5) 利用交錯編碼使資訊能充分被打散,能防止連續性錯 --—___•一一—.. 誤(burst error)的產生。 (6 )利用資訊嵌入.的方法’鄰近點分擔了單一像素所隱藏 的資訊’使資訊隱藏的方电」§·—有防止單點被破壞的能力’ 而資訊散播的功能使得原圖更不易被破壞。 (Ό利用,兩把綸匙來避免資訊遭非授權人士竊取,使安全 性多一層保障,邡為網路普及的今日提供了 一種安全傳輸 的選擇。 雖然本發明以前述之較佳實施例揭露如上,然其並非用以 限定本發明,任何熟習此技藝者,在不脫離本發明之精神 和範圍内,當可作些許之更動與潤飾,因此本發明之保護46 8 彳 24 Jade, invention description (9) (trel 1 is diagram) can be created first to save the time of information restoration, so the information hidden by the gyrolysis function can be re-displayed. As confirmed by Annexes 1 to 4, the original image with hidden information can still clearly identify the electronic signature information after being artificially damaged or JPEG compressed. [Effects of the invention] According to the electronic signature method which is difficult to detect by human eyes according to the present invention, the following effects can be achieved: (1) The technique of dispersing and hiding information makes the image difficult to detect. (2) Use B channel to store information, which can achieve the effect that it is hard to distinguish with the naked eye. (3) Under the protection of virtual garbled information, it is difficult to delete information. (4) The function of using convolutional coding is to correct errors that may occur during transmission. (5) The use of interlaced coding enables the information to be fully dispersed and prevents continuity errors ---___ • one-by- .. burst errors. (6) Using the method of information embedding, 'proximity points share the information hidden by a single pixel' to hide the power of the information '§ · —the ability to prevent single points from being destroyed' and the function of information dissemination makes the original image more difficult destroyed. (Using two keys to prevent information from being stolen by unauthorized persons, providing an extra layer of security, and providing a secure transmission option for today's Internet popularity. Although the present invention is disclosed in the aforementioned preferred embodiment, As above, however, it is not intended to limit the present invention. Any person skilled in the art can make some modifications and decorations without departing from the spirit and scope of the present invention. Therefore, the protection of the present invention

a 6 B1 2 4a 6 B1 2 4

第13頁 4 6 81 2 4 圖式簡單說明 【圖式簡單說明】 第1圖為本發明之隱藏電子簽章的方法流程圖; 第2圖為本發明所提之應用迴旋碼輸出輸入功能圖; 第3圖為本發明所提之交錯碼產生器的硬體電路示意圖; 第4圖為本發明所提之暫存器之亂數序列之狀態圖; 第5圖為本發明所提之資訊嵌入之資訊加入點及其週圍相 關像素位置圖; 第6圖為本發明之萃取電子簽章的方法流程圖; 附件一為原影像圖; 附件二為欲藏入之電子簽章資訊; 附件三為藏入資訊後之影像圖;及 附件四為經人為破壞後之影像圖。 【符號說明】 步驟1 0 資訊迴旋編碼 步驟2 0 資訊交錯編碼 步驟3 0 資訊嵌入圖像 步驟4 0 傳送 5 0,52,54,56,58 暫存器 步驟6 0 接收 步驟70 將藏有資訊的位置算出 步驟8 0 交錯解碼 步驟9 0 迴旋解碼獲得資訊Page 13 4 6 81 2 4 Schematic description [Schematic description] Figure 1 is a flowchart of the method for hiding electronic signatures of the present invention; Figure 2 is a functional diagram of the application of the gyro code input and input according to the present invention Figure 3 is a schematic diagram of the hardware circuit of the interleaving code generator of the present invention; Figure 4 is a state diagram of the random number sequence of the temporary register of the present invention; Figure 5 is the information of the present invention Figure of the embedded information adding point and its surrounding pixels; Figure 6 is a flowchart of the method for extracting the electronic signature of the present invention; Attachment 1 is the original image map; Attachment 2 is the electronic signature information to be hidden; Attachment 3 It is the image map after the information is hidden; and Attachment 4 is the image map after man-made destruction. [Symbol description] Step 1 0 Information rotation coding Step 2 0 Information interleaving coding Step 3 0 Information embedded image Step 4 0 Transmission 5 0,52,54,56,58 Register step 6 0 Receiving step 70 Information will be hidden Position calculation step 8 0 interleaving decoding step 9 0 round decoding to obtain information

第Μ頁Page M

Claims (1)

4 6 81 244 6 81 24 六、申請專利範圍 該方法至少包含下 1: 一種人眼不易查覺的電子餐章方法 列步驟: 利用資訊迴旋編碼將欲隱藏的 旋編碼器中,並產生倍數於該 利用資訊交錯編碼產生一亂數 一把鑰匙,藉由砝亂數序列將 利用一亂數產生器選擇一原始 數視為第二把鑰匙,藉由該像 加入點,及 ^電子簽章的資訊輸入一迴 資訊的編碼資訊; 序列,該亂數的種數視為第 ,'扁碼資訊重新交錯排列; 衫像的像素點,該亂數的種 素點作為該編碼資訊的資訊 點之藍原色波段 將該編瑪資訊丧入―該原始影像的該彳象素 中。 2.如申请專利靶圍第1項所述之人眼不易查覺的電子簽章 方法,其中該資訊迴旋編碼係利用該編碼資訊來修正傳· 過程的錯誤或人為的破壞。- _ 3,如申請專利範圍第1頊所述之人眼不易查覺的電子簽章 方法,其中該亂數序列係由一線性迴授偏移記錄器所產 •生0 4,如申,請專利範圍第3項所述之人眼不易查覺的電子簽章 方法’其中該線性迴授偏移記錄琴包含複數個暫存器。 5 ·如申請專利範圍第1項所述之人眼不易查覺的電子簽章 方法’更包含資訊萃取的步驟: 利用該第二把鑰匙算出該編碼資訊的嵌入位置; 利用該第一把鑰匙將該編碼資訊重新排列,回復該資訊交 錯編碼前的次序;及6. Scope of patent application The method includes at least the following steps: An electronic menu method that is difficult for human eyes to detect. The steps are as follows: using the information convolutional coding to conceal the rotary encoder, and generating a multiple of the information interleaving coding to generate a Randomly count a key, and use a random number generator to select an original number as the second key by a random number sequence. Enter the code of the information by using the image adding point and the electronic signature information Information; sequence, the number of the random number is regarded as the first, 'Flat code information is re-interlaced; the pixel points of the shirt image, the voxel point of the random number are used as the blue primary color band of the information point of the coding information Information is lost in the pixels of the original image. 2. The electronic signature method that is hard to detect by human eyes as described in the first target of the patent application, wherein the information rotation code uses the coded information to correct transmission process errors or human damage. -_ 3, as described in the first patent application scope of the human eye is not easy to detect the electronic signature method, wherein the random number sequence is produced by a linear feedback offset recorder • 0, as claimed, Please refer to the electronic signature method that is hardly detectable by human eyes as described in the third item of the patent scope, wherein the linear feedback offset recorder includes a plurality of registers. 5. The electronic signature method that is hard to detect by human eyes as described in item 1 of the scope of patent application, further includes the step of information extraction: using the second key to calculate the embedding position of the encoded information; using the first key Rearrange the encoded information to return to the order before the information was interleaved; and 4 6 8124 六、申請專利範圍 利用解迴旋碼將該編碼資訊解碼。 6.如申請專利範圍第1項所述之人眼不易查覺的電子簽章 方法,其中定義該原始影像Η為大小m X η的影像及待嵌入 該電子簽章大小為L的資訊W以下列方式表示: H=(hij I m,0^j < [0,255]} ; W={w; I 0^i< 對該原始影像中的任一像素,圍繞其四周的右半邊' i-i J- 4個像素定義一集合為:ASEmu, h i + U + l}。 7 ·如申請專利範圍第6項所述之人眼不易查覺的電子簽章 方法,其中定義一暫用變數: 8.如申請專利範圍第6項所述之人眼不易查覺的電子簽章 方法,其中包含調整huj及ASETu的值: for each h;- :, ASET: : do hi.J.-hi.J^((h, + (2w-l)xth)-hij)/4 ; hi^h' + pw- 1 ) xth。 9 .如申請專利範圍第8項所述之人眼不易查覺的電子簽章 方法,其中該th值為一門檻值。 1 〇 .如申請專利範圍第5透_0述之人眼不易查覺〜的:電土_蓋_章 方法,其中利用譎第二把鑰匙箅出_該編碼資訊的欲△位置4 6 8124 6. Scope of patent application Decode the encoded information by using the derotation code. 6. The electronic signature method that is hard to detect by the human eye as described in item 1 of the scope of patent application, wherein the original image 定义 is defined as an image of size m X η and the information to be embedded in the electronic signature size L is below W Column mode representation: H = (hij I m, 0 ^ j <[0,255]}; W = {w; I 0 ^ i < for any pixel in the original image, surround the right half of its periphery 'ii J -A set of 4 pixels is defined as: ASEmu, hi + U + l}. 7 · An electronic signature method that is difficult to detect by the human eye as described in item 6 of the scope of patent application, which defines a temporary variable: 8. The electronic signature method, as described in item 6 of the scope of patent application, which is hard to detect by human eyes, includes adjusting the values of huj and ASETu: for each h;-:, ASET :: do hi.J.-hi.J ^ ((h, + (2w-l) xth) -hij) / 4; hi ^ h '+ pw- 1) xth. 9. The electronic signature method as described in item 8 of the scope of patent application, which is not easily detectable by human eyes, wherein the th value is a threshold value. 1 〇 If the human eye described in the fifth scope of the patent application is not easy to detect ~: Electric soil _ stamp _ chapter method, in which the second key is used to _ _ the desired position of the coded information 第16頁 六、申請專利範圍 的步驟,係依據h’ 時,該電子簽章的資訊為真。 11.如申請專利範圍項所述之人眼不易查覺的電子簽章 方法,其中解迴旋碼係採用V i terb i演算法。Page 16 6. The steps of applying for a patent are based on the information of the electronic signature when h ′. 11. The electronic signature method that is hard to detect by human eyes as described in the scope of the patent application, wherein the derotation code is a Viterbi algorithm. 第17頁Page 17
TW89109102A 2000-05-12 2000-05-12 Method of invisible electronic signature TW468124B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW89109102A TW468124B (en) 2000-05-12 2000-05-12 Method of invisible electronic signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW89109102A TW468124B (en) 2000-05-12 2000-05-12 Method of invisible electronic signature

Publications (1)

Publication Number Publication Date
TW468124B true TW468124B (en) 2001-12-11

Family

ID=21659692

Family Applications (1)

Application Number Title Priority Date Filing Date
TW89109102A TW468124B (en) 2000-05-12 2000-05-12 Method of invisible electronic signature

Country Status (1)

Country Link
TW (1) TW468124B (en)

Similar Documents

Publication Publication Date Title
Tai et al. Image self-recovery with watermark self-embedding
Chang et al. A watermarking-based image ownership and tampering authentication scheme
Marvel et al. Spread spectrum image steganography
Bandyopadhyay et al. A tutorial review on steganography
Wang et al. A majority-voting based watermarking scheme for color image tamper detection and recovery
Amirtharajan et al. Colour guided colour image steganography
WO2005124681A1 (en) Systems and methods for digital content security
Gayathri et al. Study on image steganography techniques
Das et al. Multiple embedding secret key image steganography using LSB substitution and Arnold Transform
Rai et al. Analysis of image steganography techniques: a survey
Harshitha et al. Secure data hiding algorithm using encrypted secret message
Ahmed et al. Information Hiding using LSB technique
Nag et al. A Huffman code based image steganography technique
Nag et al. A weighted location based lsb image steganography technique
Singh et al. An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability
US6859545B1 (en) Information hiding method with reduced fuzziness
Wang et al. Detecting and restoring the tampered images based on iteration-free fractal compression
Czaplewski et al. Digital fingerprinting for color images based on the quaternion encryption scheme
Valarmathi et al. Secure data transfer through audio signal with LSA
Czaplewski et al. Digital fingerprinting based on quaternion encryption scheme for gray-tone images
US6813710B1 (en) Invisible electronic signature
Lee et al. A Hierarchical Fragile Watermarking with VQ Index Recovery.
Padhmavati et al. A novel scheme for mutual authentication and cheating prevention in visual cryptography using image processing
TW468124B (en) Method of invisible electronic signature
Hu et al. Reversible secret image sharing with steganography and dynamic embedding

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MK4A Expiration of patent term of an invention patent