WO2014071714A1 - Watermark embedding and extracting method - Google Patents

Watermark embedding and extracting method Download PDF

Info

Publication number
WO2014071714A1
WO2014071714A1 PCT/CN2013/072468 CN2013072468W WO2014071714A1 WO 2014071714 A1 WO2014071714 A1 WO 2014071714A1 CN 2013072468 W CN2013072468 W CN 2013072468W WO 2014071714 A1 WO2014071714 A1 WO 2014071714A1
Authority
WO
WIPO (PCT)
Prior art keywords
block
watermark
image
singular value
blocks
Prior art date
Application number
PCT/CN2013/072468
Other languages
French (fr)
Chinese (zh)
Inventor
谭铁牛
董晶
王再冉
Original Assignee
中国科学院自动化研究所
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国科学院自动化研究所 filed Critical 中国科学院自动化研究所
Publication of WO2014071714A1 publication Critical patent/WO2014071714A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0061Embedding of the watermark in each block of the image, e.g. segmented watermarking

Definitions

  • the present invention is a method of embedding and extracting a watermark into a digital image, which has high robustness and can be used for copyright protection of digital images. Background technique
  • digital watermarking technology With the popularization and rapid development of information technology, digital multimedia content has been copied and distributed in an uncontrolled manner, making the copyright protection of digital products more and more important.
  • digital watermarking technology came into being and gained wide attention.
  • the digital watermarking technology directly embeds some identification information into the digital media, but does not affect the use value of the original carrier, and is not easy to be detected and modified again, but can be extracted and recognized by the embedded party to identify the copyright information of the multimedia.
  • digital watermarking technology After nearly a decade of development, digital watermarking technology has achieved certain results.
  • Digital watermarking technology mainly focuses on the following aspects: First, transparency, that is, the image quality change after embedding watermark information is imperceptible; Second, robustness, that is, after a variety of unintentional or even intentional signal processing, the number The watermark still maintains partial integrity and can be extracted correctly. Possible signal processing includes channel noise, filtering, digital/analog and analog-to-digital conversion, resampling, clipping, displacement, scaling, and lossy compression. The third is the watermark capacity, which can embed watermarks in multimedia. The maximum amount of information.
  • the present invention is a watermarking technique for digital image copyright protection.
  • Current digital image watermarking techniques fall into two main categories: the first is to embed the watermark directly in the spatial domain; the second is to embed the watermark into the transform domain.
  • the image after embedding the watermark has good transparency, but the robustness is poor, and it can be used for image integrity authentication or tamper detection, and is not suitable for copyright protection of images.
  • the second method the image is converted to the transform domain and then watermarked. Most of the current algorithms are embedded in the transform domain. The embedding of the watermark in the transform domain is more robust and more suitable for copyright protection.
  • Currently commonly used transform techniques are singular value decomposition, Fourier transform, DCT transform, wavelet transform, Contourlet transform, and the like.
  • digital watermarking techniques based on singular value decomposition are mainly divided into the following categories: The embedding of the same value vector matrix and the embedding based on the singular value matrix.
  • Watermark embedding based on singular value vector matrix may change the orthogonality of the matrix during the embedding process, thus affecting the quality of the image after embedding the watermark and the robustness of the watermark.
  • the embedding based on the singular value matrix is mainly to modify the singular value of the image to embed the watermark.
  • the feature of the present invention is that after wavelet decomposition, the low frequency coefficients are first divided, and then each block is subjected to singular value decomposition. Two blocks satisfying the qualification condition are selected according to the pseudo-randomness of the key, and the watermark is embedded by modifying the relationship between the maximum singular values of the two blocks. Summary of the invention
  • the object of the present invention is to provide a digital watermarking method with strong robustness, transparency and security to solve the copyright protection problem of current digital image products.
  • a method of embedding a watermark comprising the steps of:
  • a method for extracting a watermark includes the steps of: performing discrete wavelet decomposition on a detected image, dividing the low frequency wavelet coefficients into non-overlapping blocks; performing singular value decomposition on each block; Calculating the position of each block pair embedded in the watermark according to the largest singular array of the original image and the threshold interval;
  • the watermark is extracted by comparing the normalized distance of each block pair with a detection threshold.
  • the present invention embeds a watermark in the most stable portion of the image, thereby enhancing the robustness of the watermark.
  • the amount of modification of the image is reduced, thereby ensuring the transparency of the image after embedding the watermark.
  • Figure 1 is a flow chart of the present invention, including a watermark embedding process and a watermark extraction process.
  • Figure 2 is a flow chart of the present invention randomly selecting image block pairs from the largest singular matrix M.
  • Figure 3a shows an original image taken in an embodiment of the invention with an image size of 1500 X 2000.
  • Figure 3c shows an original watermark image used in the embodiment of the present invention, the watermark size being 32 X 32.
  • Figure 3d shows the watermark image extracted after the mean filtering of the image shown in Figure 3b, with a window size of 3 X 3 .
  • Figure 3f shows the watermark image extracted after adding Gaussian noise (mean 0, variance 0.01) to the image shown in Figure 3b.
  • Figure 3g shows a watermark image extracted after adding salt and pepper noise (probability density of 0.01) to the image shown in Figure 3b.
  • Figure 3h is a watermark image extracted after scaling the image shown in Figure 3b (reduced to 250 X 250 and then to 1500 X 2000). detailed description
  • the invention provides a high robust watermark based on discrete wavelet transform and singular value decomposition
  • the method is robust, resistant to a variety of digital image processing and attacks, and can be used for copyright protection of digital images.
  • the methods of the present invention will be described in detail below with reference to the accompanying drawings.
  • FIG. 1(a) is a main flowchart of a method for embedding a watermark according to an embodiment of the present invention.
  • Step S11 Perform L-layer discrete wavelet decomposition on the original image, extract its low-frequency wavelet coefficients, and divide the low-frequency wavelet coefficients into non-overlapping blocks, each block has a size of mxm, and then perform singular value decomposition on each sub-block. .
  • Step S12 The maximum singular value of each block is formed into an array M of maximum singular values, and two blocks satisfying the embedding condition are randomly selected to form a block pair.
  • Step S13 Modify the maximum singular value of the selected block pair to embed the watermark.
  • M is the maximum singular value of the modified image block pair
  • th3, t/i4 is the modification strength
  • Step S14 Perform singular value inverse decomposition on each sub-block, and finally perform wavelet reconstruction on the wavelet coefficients to obtain an image after embedding the watermark.
  • FIG. 1(b) is a main flowchart of a method for extracting a watermark according to an embodiment of the present invention.
  • Step S21 Perform L-layer discrete wavelet decomposition on the image to be detected, extract low-frequency wavelet coefficients, and divide the low-frequency wavelet coefficients into non-overlapping blocks, each block has a size of mxm, and then perform singular value decomposition on each sub-block. .
  • Step S22 Combining the maximum singular value of each block into a maximum singular value array M', and rooting The position of each block pair embedded in the watermark is calculated from the largest singular array M of the original image and the threshold interval [t/il, t/i2].
  • Step S23 Obtain the maximum singular value M ⁇ , M; of the block pair according to the position of each block pair, and calculate the normalized distance ⁇ '( ⁇ , ') of the two blocks.
  • Step S24 The watermark is extracted by comparing the normalized distance ⁇ ' of each block pair with the detection threshold.
  • the specific comparison method is as follows:
  • Step S121 Calculate the normalized distance DG' of each image block and any other block.
  • Step S122 Statistics are satisfied for each image block -
  • N fc The number of blocks N fc , where [t/il, t/i2] is a predetermined threshold interval. If N fc > 0, the block fc is a block that satisfies the embedding condition.
  • Step S123 randomly select a block from the block satisfying the embedding condition according to the key fceyl, and record it as .
  • Step S124 According to the key fcey2, the normalized distance from the threshold is in the threshold interval
  • Step S125 Mark the block as marked as used.
  • the used image block cannot be selected to be embedded in the watermark again.
  • each image block is subjected to singular value inverse decomposition and wavelet reconstruction to obtain an image after watermarking.
  • Fig. 3b it can be seen that the watermarked image produced by the present invention has no obvious visual difference from the original image.
  • Mean filtering is a common image processing method.
  • Figure 3d is a watermark image extracted after mean filtering.
  • the window size is 3 X 3 .
  • JPEG compression is a compression mode that is often taken when an image is transmitted.
  • Figure 3e is an extracted watermark image after JPEG compression with a compression factor of 20.
  • Figure 3f is a watermark image obtained by adding Gaussian noise to the image after the watermark is embedded, and the noise variance is 0.01.
  • Fig. 3g is a watermark image obtained by adding salt and pepper noise to the image after the watermark is printed, and the noise variance is 0. 01.
  • Fig. 3h is a watermark image after the watermarked image is reduced by 0.5 times and then enlarged to the original size.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

A watermark embedding method, comprising the steps of: conducting wavelet decomposition on a to-be-protected image, and dividing a low-frequency wavelet coefficient into non-overlapping blocks; conducting singular value decomposition on each block; randomly selecting two image blocks satisfying the condition to form a block pair; modifying the maximum singular value of the block pair to embed a watermark; conducting inverse singular value decomposition on each sub-block, and then conducting wavelet reconstruction on the wavelet coefficient. The present invention embeds a watermark at the most stable portion of an image, thus increasing the watermark robustness. The normalized distance between two image blocks is defined to select an image block pair for watermark embedding, thus reducing the amount of image modification, and ensuring the transparency of the image having the watermark embedded.

Description

水印的嵌入和提取方法 技术领域  Watermark embedding and extraction method
本发明是向数字图像嵌入和提取水印的方法, 该方法具有高鲁棒性, 可用于数字图像的版权保护。 背景技术  The present invention is a method of embedding and extracting a watermark into a digital image, which has high robustness and can be used for copyright protection of digital images. Background technique
随着信息技术的普及和快速发展, 数字多媒体内容毫无节制的复制 和肆意传播, 使数字产品的版权保护问题越来越受重视。 为了解决该问 题, 数字水印技术应运而生, 并取得广泛关注。 数字水印技术是将一些 标识信息直接嵌入数字媒体当中, 但不影响原载体的使用价值, 也不易 被探知和再次修改, 但可以由嵌入方提取并识别, 用于鉴定多媒体的版 权信息。 经过近十几年的发展, 数字水印技术取得了一定的成果。  With the popularization and rapid development of information technology, digital multimedia content has been copied and distributed in an uncontrolled manner, making the copyright protection of digital products more and more important. In order to solve this problem, digital watermarking technology came into being and gained wide attention. The digital watermarking technology directly embeds some identification information into the digital media, but does not affect the use value of the original carrier, and is not easy to be detected and modified again, but can be extracted and recognized by the embedded party to identify the copyright information of the multimedia. After nearly a decade of development, digital watermarking technology has achieved certain results.
数字水印技术主要关注以下几个方面: 一是透明性, 即嵌入水印信 息后的图像质量变化是不可感知的; 二是鲁棒性, 即在经过多种无意甚 至有意的信号处理过程后, 数字水印仍能保持部分完整性并能被正确提 取。 可能的信号处理过程包括信道噪声、 滤波、 数 /模与模 /数转换、 重 采样、 剪切、 位移、 尺度变换以及有损压缩等; 第三是水印容量, 即可 在多媒体中嵌入水印的最大信息量。  Digital watermarking technology mainly focuses on the following aspects: First, transparency, that is, the image quality change after embedding watermark information is imperceptible; Second, robustness, that is, after a variety of unintentional or even intentional signal processing, the number The watermark still maintains partial integrity and can be extracted correctly. Possible signal processing includes channel noise, filtering, digital/analog and analog-to-digital conversion, resampling, clipping, displacement, scaling, and lossy compression. The third is the watermark capacity, which can embed watermarks in multimedia. The maximum amount of information.
本发明是用于数字图像版权保护的水印技术。 当前数字图像水印技 术主要分为两大类: 第一种是直接将水印嵌入在空域中; 第二种是将水 印嵌入到变换域中。对于第一种方法而言,嵌入水印后的图像透明性好, 但鲁棒性较差, 可用于图像完整性认证或者篡改检测, 而不太适用于图 像的版权保护。 对于第二种方法而言, 将图像转换到变换域后再进行水 印嵌入, 当前大多数算法都是在变换域嵌入的。 在变换域嵌入水印的鲁 棒性较强, 更适用于版权保护。 当前常用的变换技术有奇异值分解、 傅 里叶变换、 DCT变换、 小波变换、 Contourlet变换等等。  The present invention is a watermarking technique for digital image copyright protection. Current digital image watermarking techniques fall into two main categories: the first is to embed the watermark directly in the spatial domain; the second is to embed the watermark into the transform domain. For the first method, the image after embedding the watermark has good transparency, but the robustness is poor, and it can be used for image integrity authentication or tamper detection, and is not suitable for copyright protection of images. For the second method, the image is converted to the transform domain and then watermarked. Most of the current algorithms are embedded in the transform domain. The embedding of the watermark in the transform domain is more robust and more suitable for copyright protection. Currently commonly used transform techniques are singular value decomposition, Fourier transform, DCT transform, wavelet transform, Contourlet transform, and the like.
目前, 基于奇异值分解的数字水印技术主要分为以下几类: 基于奇 异值向量矩阵的嵌入和基于奇异值矩阵的嵌入。基于奇异值向量矩阵的 水印嵌入, 在嵌入过程中可能会改变矩阵的正交性, 从而影响嵌入水印 后图像的质量和水印的鲁棒性。而基于奇异值矩阵的嵌入主要是对图像 的奇异值进行修改以嵌入水印。 刘瑞祯在 2001年发表在《电子学报》 的 文章 "基于奇异值分解的数字图像水印方法"中提出将水印图像的奇异 值加到待保护图像的奇异值中用来保护图像版权的水印方法。但由于提 取的过程需要水印图像的奇异向量矩阵, 故会造成很大的误检率。 At present, digital watermarking techniques based on singular value decomposition are mainly divided into the following categories: The embedding of the same value vector matrix and the embedding based on the singular value matrix. Watermark embedding based on singular value vector matrix may change the orthogonality of the matrix during the embedding process, thus affecting the quality of the image after embedding the watermark and the robustness of the watermark. The embedding based on the singular value matrix is mainly to modify the singular value of the image to embed the watermark. Liu Ruizhen published in the "Electronic Journal" article "Digital Image Watermarking Method Based on Singular Value Decomposition" in 2001. It proposes a watermarking method to protect the image copyright by adding the singular value of the watermark image to the singular value of the image to be protected. However, since the extraction process requires a singular vector matrix of the watermark image, it causes a large false detection rate.
Hsien-Chu Wu、 uen-Jie Jang禾卩 Yu-Chi Liu在 "A robust watermarking scheme based on singular value decomposition and quantization technique " 2010 International Computer Symposium (IC S)—文中提出对图像 的低频小波系数进行分块奇异值分解, 对每块的最大奇异值进行量化来 以嵌入水印的方法。但该方法对某些常见攻击鲁棒性较差,如 JPEG压縮 等等。 针对以上问题, 本发明提出了一种安全的、 鲁棒的基于小波变换 和奇异值分解的数字水印新方法。 本发明的特点是经过小波分解后, 先 对低频系数进行分块, 然后再对每块进行奇异值分解。 根据密钥伪随机 的选择两个满足限定条件的块, 通过修改两个块最大奇异值之间的关系 来嵌入水印。 发明内容 Hsien-Chu Wu, uen-Jie Jang, and Yu-Chi Liu, in "A robust watermarking scheme based on singular value decomposition and quantization technique" 2010 International Computer Symposium (IC S) - proposed to block the low-frequency wavelet coefficients of images. Singular value decomposition, which quantizes the maximum singular value of each block to embed a watermark. However, this method is less robust to some common attacks, such as JPEG compression and so on. In response to the above problems, the present invention proposes a secure, robust digital watermarking method based on wavelet transform and singular value decomposition. The feature of the present invention is that after wavelet decomposition, the low frequency coefficients are first divided, and then each block is subjected to singular value decomposition. Two blocks satisfying the qualification condition are selected according to the pseudo-randomness of the key, and the watermark is embedded by modifying the relationship between the maximum singular values of the two blocks. Summary of the invention
本发明的目的是提出一种鲁棒性强、 透明性好、 安全的数字水印方 法, 解决目前数字图像产品的版权保护问题。  The object of the present invention is to provide a digital watermarking method with strong robustness, transparency and security to solve the copyright protection problem of current digital image products.
按照本发明的一方面, 一种嵌入水印的方法, 包括步骤:  According to an aspect of the invention, a method of embedding a watermark, comprising the steps of:
对待保护图像进行小波分解, 将低频小波系数分成互不重叠的块; 对每块进行奇异值分解;  Perform wavelet decomposition on the protected image, and divide the low-frequency wavelet coefficients into blocks that do not overlap each other; perform singular value decomposition on each block;
随机选择两个满足条件的图像块组成块对;  Randomly selecting two image blocks that satisfy the condition to form a block pair;
通过修改块对的最大奇异值以嵌入水印;  Embedding a watermark by modifying the maximum singular value of the block pair;
对每个子块进行奇异值逆分解, 然后, 对小波系数进行小波重构。 按照本发明的另一方面, 一种提取水印的方法, 包括步骤: 对待检测图像进行离散小波分解, 将低频小波系数分成不重叠的块; 对每个块进行奇异值分解; 根据原始图像的最大奇异数组和阈值区间计算嵌入水印的每个块 对的位置; The singular value inverse decomposition is performed for each sub-block, and then the wavelet coefficients are wavelet reconstructed. According to another aspect of the present invention, a method for extracting a watermark includes the steps of: performing discrete wavelet decomposition on a detected image, dividing the low frequency wavelet coefficients into non-overlapping blocks; performing singular value decomposition on each block; Calculating the position of each block pair embedded in the watermark according to the largest singular array of the original image and the threshold interval;
根据每个块对的位置得到块对的最大奇异值, 并计算两个块的归一 化距离;  Obtaining the maximum singular value of the block pair according to the position of each block pair, and calculating the normalized distance of the two blocks;
将每个块对的归一化距离与检测阈值进行比较来提取水印。  The watermark is extracted by comparing the normalized distance of each block pair with a detection threshold.
本发明将水印嵌入在图像最稳定的部分, 从而使水印的鲁棒性得到 增强。通过限定两个图像块间的归一化距离以选择图像块对进行水印嵌 入, 减小了图像的修改量, 从而保证嵌入水印后图像的透明性。 附图说明  The present invention embeds a watermark in the most stable portion of the image, thereby enhancing the robustness of the watermark. By defining the normalized distance between the two image blocks to select the image block pair for watermark embedding, the amount of modification of the image is reduced, thereby ensuring the transparency of the image after embedding the watermark. DRAWINGS
图 1 本发明的流程图, 包括水印嵌入流程和水印提取流程。  Figure 1 is a flow chart of the present invention, including a watermark embedding process and a watermark extraction process.
图 2 本发明从最大奇异矩阵 M中随机选择图像块对的流程图。 图 3a本发明实施例中采取的原始图像, 图像大小为 1500 X 2000。 图 3b本发明实施例中嵌入水印后的图像, 其中小波分解层数为 2, 块大小为 8 X 8, 阈值 t/il = 0.02, t/i2 = 0.045, 嵌入强度 t/i3 = Figure 2 is a flow chart of the present invention randomly selecting image block pairs from the largest singular matrix M. Figure 3a shows an original image taken in an embodiment of the invention with an image size of 1500 X 2000. Figure 3b shows an image after embedding a watermark in the embodiment of the present invention, wherein the number of wavelet decomposition layers is 2, the block size is 8 X 8, the threshold t/il = 0.02, t/i2 = 0.045, and the embedding strength t/i3 =
0.02, ί/ι4 = 0.02。 0.02, ί/ι4 = 0.02.
图 3c本发明实施例中采用的原始水印图像, 水印大小为 32 X 32。 图 3d对图 3b所示图像进行均值滤波后提取的水印图像, 窗口大小 为 3 X 3。  Figure 3c shows an original watermark image used in the embodiment of the present invention, the watermark size being 32 X 32. Figure 3d shows the watermark image extracted after the mean filtering of the image shown in Figure 3b, with a window size of 3 X 3 .
图 3e对图 3b所示图像进行 JPEG压缩后提取的水印图像, 压缩因 子 Q=20。  Figure 3e shows the watermark image extracted after JPEG compression of the image shown in Figure 3b, with compression factor Q=20.
图 3f对图 3b所示图像添加高斯噪声 (均值为 0, 方差为 0.01 ) 后 提取的水印图像。  Figure 3f shows the watermark image extracted after adding Gaussian noise (mean 0, variance 0.01) to the image shown in Figure 3b.
图 3g对图 3b所示图像添加椒盐噪声(概率密度为 0.01 )后提取的 水印图像。  Figure 3g shows a watermark image extracted after adding salt and pepper noise (probability density of 0.01) to the image shown in Figure 3b.
图 3h对图 3b所示图像进行缩放 (先缩小至 250 X 250, 再放大到 1500 X 2000) 后提取的水印图像。 具体实施方式  Figure 3h is a watermark image extracted after scaling the image shown in Figure 3b (reduced to 250 X 250 and then to 1500 X 2000). detailed description
本发明提供了一种基于离散小波变换和奇异值分解的高鲁棒水印 方法, 该方法鲁棒性高, 可抵抗多种数字图像处理和攻击, 可用于数字 图像的版权保护。 下面结合附图, 对本发明的各方法进行详细说明。 The invention provides a high robust watermark based on discrete wavelet transform and singular value decomposition The method is robust, resistant to a variety of digital image processing and attacks, and can be used for copyright protection of digital images. The methods of the present invention will be described in detail below with reference to the accompanying drawings.
图 1 (a)是本发明实施例的嵌入水印的方法的主要流程图。如图所 步骤 S11:对原始图像进行 L层离散小波分解,提取其低频小波系数, 并将低频小波系数分成不重叠的块, 每块的大小为 mxm, 然后再对每 个子块进行奇异值分解。  FIG. 1(a) is a main flowchart of a method for embedding a watermark according to an embodiment of the present invention. Step S11: Perform L-layer discrete wavelet decomposition on the original image, extract its low-frequency wavelet coefficients, and divide the low-frequency wavelet coefficients into non-overlapping blocks, each block has a size of mxm, and then perform singular value decomposition on each sub-block. .
步骤 S12: 将每块的最大奇异值组成一个最大奇异值数组 M, 随机 的选择两个满足嵌入条件的块, 组成块对 。  Step S12: The maximum singular value of each block is formed into an array M of maximum singular values, and two blocks satisfying the embedding condition are randomly selected to form a block pair.
步骤 S13: 修改选定块对的最大奇异值以嵌入水印。 具体修改方法 如下- 若嵌入 '0, , 则: Mi = (Mi + Mj)/2,Mj = (Mi + Mj)/2;  Step S13: Modify the maximum singular value of the selected block pair to embed the watermark. The specific modification method is as follows - if '0, embed, then: Mi = (Mi + Mj)/2, Mj = (Mi + Mj)/2;
若嵌入 ' 1, 且 Mi≥ , 贝 (J: Μ[ = Μ; X (1 + th3),Mj' = Mj X (1 - t/i4); If '1' is embedded and Mi≥, Bay (J: Μ[ = Μ; X (1 + th3), Mj' = Mj X (1 - t/i4) ;
若嵌入 'Γ 且 < Mj, 贝 IJ: Μ[ = Mi X (1 - th3),Mj = Mj X (1 + tM)。  If '嵌入 and < Mj are embedded, IJ: Μ[ = Mi X (1 - th3), Mj = Mj X (1 + tM).
其中 M、 为修改后的图像块对的最大奇异值, th3、 t/i4为修改强 度, 且 0≤ t/i3≤ l,0≤ t/i4≤ 1。 当嵌入 '0, 时, 使两个块的最大奇异 值相等, 从而两个块间的归一化距离变为 0; 当嵌入 'Γ 时, 增大较大 的最大奇异值, 减小较小的最大奇异值, 从而拉大两个块间的归一化距 离。 本发明通过量化两个块之间的归一化距离来嵌入水印。  Where M is the maximum singular value of the modified image block pair, th3, t/i4 is the modification strength, and 0 ≤ t/i3 ≤ l, 0 ≤ t/i4 ≤ 1. When '0' is embedded, the maximum singular values of the two blocks are equal, so that the normalized distance between the two blocks becomes 0; when 'Γ is embedded, the larger maximum singular value is increased, and the smaller is reduced. The largest singular value, thus widening the normalized distance between the two blocks. The present invention embeds a watermark by quantizing the normalized distance between two blocks.
步骤 S14: 对每个子块进行奇异值逆分解, 最后对小波系数进行小 波重构, 得到嵌入水印后的图像。  Step S14: Perform singular value inverse decomposition on each sub-block, and finally perform wavelet reconstruction on the wavelet coefficients to obtain an image after embedding the watermark.
图 1 (b)是本发明实施例的提取水印的方法的主要流程图。如图所 步骤 S21:对待检测图像进行 L层离散小波分解,提取其低频小波系 数, 并将低频小波系数分成不重叠的块, 每块的大小为 mxm, 然后再 对每个子块进行奇异值分解。  FIG. 1(b) is a main flowchart of a method for extracting a watermark according to an embodiment of the present invention. Step S21: Perform L-layer discrete wavelet decomposition on the image to be detected, extract low-frequency wavelet coefficients, and divide the low-frequency wavelet coefficients into non-overlapping blocks, each block has a size of mxm, and then perform singular value decomposition on each sub-block. .
步骤 S22: 将每块的最大奇异值组成一个最大奇异值数组 M', 并根 据原始图像的最大奇异数组 M以及阈值区间 [t/il,t/i2]计算嵌入水印的 每个块对的位置。 Step S22: Combining the maximum singular value of each block into a maximum singular value array M', and rooting The position of each block pair embedded in the watermark is calculated from the largest singular array M of the original image and the threshold interval [t/il, t/i2].
步骤 S23: 根据每个块对的位置得到块对的最大奇异值 M^, M;, 并 计算两个块的归一化距离 ΰ'(ΐ,')。  Step S23: Obtain the maximum singular value M^, M; of the block pair according to the position of each block pair, and calculate the normalized distance ΰ'(ΐ, ') of the two blocks.
步骤 S24: 将每个块对的归一化距离 ΰ' 与检测阈值 比较来提 取水印, 具体比较方法如下:  Step S24: The watermark is extracted by comparing the normalized distance ΰ' of each block pair with the detection threshold. The specific comparison method is as follows:
若 D'(ij')〉 t/ι, 则提取水印位为 ;  If D'(ij')> t/ι, the watermark bit is extracted as;
若 D' i, )≤ th, 则提取水印位为 '0' 。  If D' i, ) ≤ th, the watermark bit is extracted as '0'.
最后将提取的水印位组合, 得到完整的水印信息。  Finally, the extracted watermark bits are combined to obtain complete watermark information.
步骤 S12所述的根据数组 M随机选择满足嵌入条件的两个块组成块 对的方法如图 2所示:  The method of randomly selecting two blocks forming a block pair satisfying the embedding condition according to the array M described in step S12 is as shown in FIG. 2:
步骤 S121:计算每一个图像块 与任意其它块的归一化距离 DG', 。 步骤 S122: 对每一个图像块 统计所有满足条件- Step S121: Calculate the normalized distance DG' of each image block and any other block. Step S122: Statistics are satisfied for each image block -
D j, k) e [thl,th2] D j, k) e [thl,th2]
的块的个数 Nfc,其中 [t/il,t/i2]是事先确定的阈值区间。若 Nfc > 0, 则块 fc为满足嵌入条件的块。 The number of blocks N fc , where [t/il, t/i2] is a predetermined threshold interval. If N fc > 0, the block fc is a block that satisfies the embedding condition.
步骤 S123: 根据密钥 fceyl从满足嵌入条件的块中随机的选择一个 块, 记为 。  Step S123: randomly select a block from the block satisfying the embedding condition according to the key fceyl, and record it as .
步骤 S124: 根据密钥 fcey2, 从与的归一化距离处于阈值区间  Step S124: According to the key fcey2, the normalized distance from the threshold is in the threshold interval
[t/il,t/i2]的块中随机的选择一个块, 记为 ;'。 由此组成了块对 (, )。 [t / il, t / i2 ] blocks randomly select a block, referred to as; '. This forms a block pair (, ).
步骤 S125: 将块、 标记为已用。 已用的图像块不能再次被选择嵌 入水印。  Step S125: Mark the block as marked as used. The used image block cannot be selected to be embedded in the watermark again.
实施例, 以图 3中的图像进行说明。  The embodiment will be described with reference to the image in Fig. 3.
首先, 对该图像 (图 3a, 图像大小为 1500X 2000) 进行离散小波 分解(分解层数 L = 2),提取其低频小波系数进行分块 (块大小为 8 X 8), 并对每块进行奇异值分解。  First, the image (Fig. 3a, image size is 1500X 2000) is subjected to discrete wavelet decomposition (decomposition layer number L = 2), and its low frequency wavelet coefficients are extracted for segmentation (block size is 8 X 8), and each block is performed. Singular value decomposition.
然后, 从由每个子块的最大奇异值组成的数组 M中, 按照图 2所示 的方法, 随机的选择两个满足嵌入条件的图像块组成块对。 其中 thl = 0.02, t/i2 = 0.045。  Then, from the array M consisting of the largest singular values of each sub-block, according to the method shown in Fig. 2, two image blocks satisfying the embedding condition are randomly selected to form a block pair. Where thl = 0.02, t/i2 = 0.045.
其次, 修改选定块对的最大奇异值, 以嵌入水印信息, 水印图像如 图 3c所示, 其中修改强度为: th3 = 0.02, ί/ι4 = 0.02。 Second, modify the maximum singular value of the selected block pair to embed the watermark information, such as the watermark image Figure 3c, where the modification strength is: th3 = 0.02, ί/ι4 = 0.02.
最后, 对每个图像块进行奇异值逆分解, 小波重构, 得到嵌入水印 后的图像, 如图 3b所示, 可见本发明所产生的水印化图像与原始图像 无明显的视觉差别。  Finally, each image block is subjected to singular value inverse decomposition and wavelet reconstruction to obtain an image after watermarking. As shown in Fig. 3b, it can be seen that the watermarked image produced by the present invention has no obvious visual difference from the original image.
均值滤波是常见的图像处理方式, 图 3d是经过均值滤波后提取的 水印图像, 窗口大小为 3 X 3。  Mean filtering is a common image processing method. Figure 3d is a watermark image extracted after mean filtering. The window size is 3 X 3 .
JPEG压縮是图像传输时经常会采取的压缩模式。 图 3e是经过 JPEG 压縮后的提取的水印图像, 压缩因子为 20。 图 3f是对嵌入水印后图像 添加高斯噪声后提取的水印图像, 噪声方差为 0. 01。 图 3g是对嵌入水 印后的图像添加椒盐噪声后提取的水印图像, 噪声方差为 0. 01.图 3h 是对嵌入水印后的图像缩小 0. 5倍再放大为原始大小提取后的水印图像。  JPEG compression is a compression mode that is often taken when an image is transmitted. Figure 3e is an extracted watermark image after JPEG compression with a compression factor of 20. Figure 3f is a watermark image obtained by adding Gaussian noise to the image after the watermark is embedded, and the noise variance is 0.01. Fig. 3g is a watermark image obtained by adding salt and pepper noise to the image after the watermark is printed, and the noise variance is 0. 01. Fig. 3h is a watermark image after the watermarked image is reduced by 0.5 times and then enlarged to the original size.
由以上可见, 图像作品经过常见变换(加噪、 JPEG压缩、 滤波、 缩 放) 后, 仍能提取出表明版权的水印图像。  It can be seen from the above that after the image works are subjected to common transformation (noise, JPEG compression, filtering, scaling), the watermark image indicating the copyright can still be extracted.
以上所述仅为本发明中的具体实施方式, 但本发明的保护范围并不 局限于此。任何熟悉该技术的本领域技术人员在本发明所揭露的技术范 围内, 可以进行变换或替换。 所进行的变换和替换都应涵盖在本发明的 包含范围之内。 因此, 本发明的保护范围应该以权利要求书的保护范围 为准。  The above description is only a specific embodiment of the present invention, but the scope of protection of the present invention is not limited thereto. Any person skilled in the art familiar with the art may make changes or substitutions within the technical scope of the present invention. The transformations and substitutions made are intended to be included within the scope of the invention. Therefore, the scope of protection of the present invention should be determined by the scope of the claims.

Claims

权 利 要 求 书 Claim
1 . 一种嵌入水印的方法, 包括步骤: What is claimed is: 1. A method of embedding a watermark, comprising the steps of:
对待保护图像进行小波分解, 将低频小波系数分成互不重叠的块; 对每块进行奇异值分解;  Perform wavelet decomposition on the protected image, and divide the low-frequency wavelet coefficients into blocks that do not overlap each other; perform singular value decomposition on each block;
随机选择两个满足条件的图像块组成块对;  Randomly selecting two image blocks that satisfy the condition to form a block pair;
通过修改块对的最大奇异值以嵌入水印;  Embedding a watermark by modifying the maximum singular value of the block pair;
对每个子块进行奇异值逆分解, 然后, 对小波系数进行小波重构。 The singular value inverse decomposition is performed for each sub-block, and then the wavelet coefficients are wavelet reconstructed.
2. 根据权利要求 1所述的方法,其特征在于所述随机选择两个满足 条件的图像块组成块对包括: 2. The method according to claim 1, wherein said randomly selecting two image block forming block pairs satisfying the condition comprises:
计算每一个图像块 与任意其它块的归一化距离  Calculate the normalized distance between each image block and any other block
对每一个图像块 统计所有满足条件- Count all the conditions for each image block -
D (j, k e [thl, th2] D (j, k e [thl, th2]
的块的个数 Nfc, 其中 [t/il, t/i2]是事先确定的阈值区间。 若 Nk > 0, 贝 1J 块 c为满足嵌入条件的块; The number of blocks N fc , where [t/il, t/i2] is a predetermined threshold interval. If N k > 0, the block 1J block c is a block that satisfies the embedding condition;
根据密钥 fceyl从满足嵌入条件的块中随机的选择一个块 ί ;  According to the key fceyl, a block is randomly selected from the block satisfying the embedding condition;
根据密钥 fcey2, 从与的归一化距离处于阈值区间 [t/il, t/i2]的块中 随机的选择一个块 ;  According to the key fcey2, a block is randomly selected from the block whose normalized distance is in the threshold interval [t/il, t/i2];
将块 ΰ '标记为巳用, 已用的图像块不能再次被选择嵌入水印。  The block ΰ ' is marked as 巳, and the used image block cannot be selected to be embedded in the watermark again.
3. 根据权利要求 1所述的方法,其特征在于所述通过修改块对的最 大奇异值以嵌入水印包括:  3. The method of claim 1 wherein said embedding a watermark by modifying a maximum singular value of a pair of blocks comprises:
当嵌入 0 ' 时, 修改选定块对的最大奇异值, 使两块间的归一化 距离为 0 ; 当嵌入 时, 修改两个块的最大奇异值, 使两块间的归一 化距离增大。  When 0 ' is embedded, the maximum singular value of the selected block pair is modified so that the normalized distance between the two blocks is 0; when embedding, the maximum singular value of the two blocks is modified to make the normalized distance between the two blocks Increase.
4. 一种提取水印的方法, 包括步骤- 对待检测图像进行离散小波分解, 将低频小波系数分成不重叠的块; 对每个块进行奇异值分解;  4. A method for extracting a watermark, comprising the steps of: performing discrete wavelet decomposition on a detected image, dividing the low frequency wavelet coefficients into non-overlapping blocks; performing singular value decomposition on each block;
根据原始图像的最大奇异数组和阈值区间计算嵌入水印的每个块 对的位置;  Calculating the position of each block pair embedded in the watermark based on the largest singular array of the original image and the threshold interval;
根据每个块对的位置得到块对的最大奇异值, 并计算两个块的归一 化距 ΐ Get the maximum singular value of the block pair according to the position of each block pair, and calculate the normalization of the two blocks Distance
将每个块对的归一化距离与检测阈值进行比较来提取水印。 The watermark is extracted by comparing the normalized distance of each block pair with a detection threshold.
5. 根据权利要求 4所述的方法, 其特征在于所述比较包括: 若归一化距离大于检测阈值, 则提取水印为 1 ; 5. The method according to claim 4, wherein the comparing comprises: if the normalized distance is greater than the detection threshold, extracting the watermark to 1;
若归一化距离小于检测阈值, 则提取水印为 0。  If the normalized distance is less than the detection threshold, the extracted watermark is zero.
PCT/CN2013/072468 2012-11-06 2013-03-12 Watermark embedding and extracting method WO2014071714A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210440037.7 2012-11-06
CN201210440037.7A CN102890814B (en) 2012-11-06 2012-11-06 Watermark embedding and extracting method

Publications (1)

Publication Number Publication Date
WO2014071714A1 true WO2014071714A1 (en) 2014-05-15

Family

ID=47534308

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/072468 WO2014071714A1 (en) 2012-11-06 2013-03-12 Watermark embedding and extracting method

Country Status (2)

Country Link
CN (1) CN102890814B (en)
WO (1) WO2014071714A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109543425A (en) * 2018-10-26 2019-03-29 浙江师范大学 A kind of Image Data Hiding Methods based on tensor resolution

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102890814B (en) * 2012-11-06 2014-12-10 中国科学院自动化研究所 Watermark embedding and extracting method
CN104835106B (en) * 2015-04-24 2017-12-12 华东交通大学 A kind of full frequency-domain subband data waterprint embedded method based on wavelet decomposition
CN109727179B (en) * 2018-12-29 2020-10-23 燕山大学 Zero watermark generation method and system and zero watermark extraction method and system
CN110286813B (en) 2019-05-22 2020-12-01 北京达佳互联信息技术有限公司 Icon position determining method and device
CN111932431B (en) * 2020-07-07 2023-07-18 华中科技大学 Visible watermark removing method based on watermark decomposition model and electronic equipment
CN112016900A (en) * 2020-09-02 2020-12-01 中国平安财产保险股份有限公司 Electronic policy information security management and control method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645162A (en) * 2009-09-09 2010-02-10 北京邮电大学 Printing-scanning resistance zero-watermarking algorithm
CN101923700A (en) * 2010-07-15 2010-12-22 福建师范大学 Double-effect digital watermarking method
CN102890814A (en) * 2012-11-06 2013-01-23 中国科学院自动化研究所 Watermark embedding and extracting method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604441A (en) * 2009-06-15 2009-12-16 北京邮电大学 A kind of dual transform domain image zero watermarking method with strong robustness
CN102063696A (en) * 2011-01-11 2011-05-18 浙江工商大学 Printing anti-counterfeiting watermarking algorithm based on norm and norm mean comparison
CN102129659A (en) * 2011-03-17 2011-07-20 浙江工商大学 Robust zero-watermarking algorithm based on singular value decomposition, Harr wavelet transformation and mean value calculation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645162A (en) * 2009-09-09 2010-02-10 北京邮电大学 Printing-scanning resistance zero-watermarking algorithm
CN101923700A (en) * 2010-07-15 2010-12-22 福建师范大学 Double-effect digital watermarking method
CN102890814A (en) * 2012-11-06 2013-01-23 中国科学院自动化研究所 Watermark embedding and extracting method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
YE, TIANYU: "Perfectly blind self-embedding robust quantization-based watermarking scheme in DWT-SVD domain", JOURNAL OF IMAGE AND GRAPHICS, vol. 17, no. 6, 30 June 2012 (2012-06-30), pages 644 - 650 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109543425A (en) * 2018-10-26 2019-03-29 浙江师范大学 A kind of Image Data Hiding Methods based on tensor resolution
CN109543425B (en) * 2018-10-26 2023-03-10 浙江师范大学 Image data hiding method based on tensor decomposition

Also Published As

Publication number Publication date
CN102890814A (en) 2013-01-23
CN102890814B (en) 2014-12-10

Similar Documents

Publication Publication Date Title
Subhedar et al. Current status and key issues in image steganography: A survey
Lin et al. A blind watermarking method using maximum wavelet coefficient quantization
Chamlawi et al. Digital image authentication and recovery: employing integer transform based information embedding and extraction
WO2014071714A1 (en) Watermark embedding and extracting method
CN107945097B (en) Lu-lolly image watermarking method based on joint statistical model correction
Wang et al. Digital watermarking techniques
Kumar et al. Digital Image Watermarking using Fractional Fourier transform via image compression
Chen et al. A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique
Chen et al. Adaptive watermarking using relationships between wavelet coefficients
Nguyen et al. An improved image watermarking scheme using selective curvelet scales
Surekha et al. A semi-blind image watermarking based on discrete wavelet transform and secret sharing
Ding et al. Wavelet-based semi-fragile watermarking with tamper detection
Nasir et al. Novel multiple spatial watermarking technique in color images
Majumder et al. DWT and SVD based image watermarking scheme using noise visibility and contrast sensitivity
Yan et al. Blind digital image watermarking technique based on intermediate significant bit and discrete wavelet transform
Guo et al. Prediction-based watermarking schemes using ahead/post AC prediction
Cui Dual digital watermarking algorithm for image based on fractional Fourier transform
Rewani et al. Digital image watermarking: a survey
Sharma et al. Robust image watermarking technique using contourlet transform and optimized edge detection algorithm
Tsai et al. A watermarking-based authentication with malicious detection and recovery
Pal et al. Survey Of Digital Watermarking Using Dct
Xiao et al. A semi-fragile watermarking distinguishing JPEG compression and gray-scale-transformation from malicious manipulation
Panda et al. Analysis of robustness of an image watermarking algorithm using the Dual Tree Complex Wavelet Transform and Just Noticeable Difference
Ishihara et al. A semi-fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication
Ma et al. A robust watermarking scheme based on dual quantization of wavelet significant difference

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13854049

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13854049

Country of ref document: EP

Kind code of ref document: A1