Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

70results about How to "Increase imperceptibility" patented technology

Image watermarking embedding and extracting method based on singular value decomposition and principal component analysis

The invention discloses an image watermarking embedding method based on singular value decomposition and principal component analysis. The method includes: S1a, conducting scrambling processing on the original watermarking image W and obtaining the scrambled watermarking image W' ; S2a, conducting blocking on an original carrier image I, dividing the original carrier image I into an image block C of 8X8 and further obtaining original carrier image blocks; S3a, conducting the singular value decomposition on the original carrier image blocks C and obtaining the singular value of each image block; S4a, taking the singular value of each image block as the eigenvalue of the principal component analysis, conducting the principal component analysis on the singular value, extracting the component Y of the principal component whose the contribution rate reaches above 99.99%; and S5a, embedding watermarks in the component Y of the principal component, obtaining the component Y' of the principal component embedded with the watermarking image information, conducting inverse transformations of the principal component analysis and the singular value decomposition on Y', and obtaining the carrier image I' embedded with the watermarking.
Owner:HENAN NORMAL UNIV

Novel method of digital watermarking for protecting literary property of music works

The invention belongs to an information safety, multimedia information processing field, in particular, the invention is a new digital watermark method for protecting copyright of a music production, mainly comprises a synchronization code, a watermark embedding and detecting. At first, the invention performs information embedding by segmenting the music production and dividing each music data segment into two front and rear portions. The synchronization code is embeded into the front portion by modifying a statistical average value of a plurality of sampled values, and the rear portion is used for embedding watermark information, the embedding process comprises: performing DWT on the music data segments, then performing DCT on low-frequency coefficients in a wavelet field, embedding the encrypted watermark information in the low / middle frequency coefficients of the DCT field by a self-adaptive quantization method, finally obtaining the digital music production with embeded watermark information by a reverse converting process and re-combining the music data segments. Detecting the digital watermark is a reverse process of the embedding process. The invention can be used in music productions of different types independent of adjustment of a threshold value.
Owner:LIAONING NORMAL UNIVERSITY

Embedding and detecting hidden information

ActiveUS8311265B2Improve balanceSmoothly embeds the hidden information into a documentCharacter and pattern recognitionImage data processing detailsAlgorithm
A novel method is disclosed for embedding hidden information in a document comprising characters, including: determining hidden information to be embedded in each class of layout transformation respectively; acquiring a code sequence for each class of layout transformation by coding the hidden information to be embedded in the class of layout transformation; performing layout transformation on characters from the document according to the acquired code sequence for each class of layout transformation respectively.
Owner:BEIJING SURSEN INT TECH CO LTD

Method for hiding secret information in images

The invention discloses a method for hiding secret information in images, and mainly aims to solve the problem that consideration cannot be given to both robustness and security in the prior art. The method comprises the following steps: 1) a sender selects carrier images from a carrier image library via a shared key, conducts block segmentation on the selected carrier images, and selects a pseudorandom number generator for each block, so as to acquire the probability distribution of candidate hiding carriers; 2) the sender creates a characteristic matrix of the carrier images; 3) the sender acquires a final characteristic matrix set and the key space size; 4) the sender hides the secret information in carriers via the final characteristic matrix set and the key space size; 5) the sender sends an obtained carrier set in which the secret information is embedded to a receiver; and 6) the receiver acquires the secret information. The method can improve the security of a hiding system while guaranteeing the robustness of the hiding system, and can be used for changing the hiding position of the secret information in an image in real time when the contents of the image are changed.
Owner:西安纳容电子通讯有限公司

High-capacity image steganography method and a secret information extraction method

The invention discloses a high-capacity image steganography method. The method comprises the following steps: carrying out scrambling processing on a carrier image; Dividing the scrambled image into N* N sub-blocks and carrying out DCT (Discrete Cosine Transform); Classifying each DCT block, and selecting an embedded block; Element values at selected positions are extracted from a matrix obtainedafter the DCT coefficient of each embedded block is scanned in a Z shape, and a coefficient matrix is obtained; Extracting element values which are the same as the element values at the selected positions from a matrix obtained after Z-shaped scanning of the Q table to form a quantization matrix; Calculating a division matrix and block capacity through the quantization matrix; Dividing the bit stream of the secret information according to the block capacity; Calculating an embedded matrix for the divided bit stream; Calculating a new coefficient matrix; Replacing the DCT coefficient with theelement value in the new coefficient matrix, and carrying out inverse operation of Z-shaped scanning to obtain a new DCT coefficient; And carrying out DCT inverse transformation on each sub-block andthen carrying out inverse scrambling processing. The invention also discloses a secret message extraction method. And the image complexity is high and the embedding capacity is large.
Owner:NINGBO UNIV

Digital watermark embedding and protection methods for database

The invention discloses a digital watermark embedding method for a database. The method comprises the steps of scoring an attribute column of the target database, and according to a scoring result, selecting an attribute of performing embedding; by using a tuple selection algorithm and a binary tree-based histogram shifting algorithm, marking a tuple embedded with a digital watermark, and storingthe position of a mark through a mapping matrix; and according to the mapping matrix, embedding the digital watermark in the target database for multiple times repeatedly by using a watermarking algorithm of the binary tree-based histogram shifting algorithm. The invention furthermore discloses a protection method for the database and a watermark generation and embedding method for the internet car database. Compared with other methods, the method has the advantages that the robustness and imperceptibility of the digital watermark are improved through the algorithm; the attack resistance capability is stronger; the quantity of information which can be used for authentication is higher; and the effect of the digital watermark during specific application is enhanced.
Owner:DONGFENG PEUGEOT CITROEN AUTOMOBILE

Digital image steganography method and secret information extraction method

The invention relates to a digital image steganography method which is used for embedding a binary secret message S into an original carrier image Gc with the size of M x N. The digital image steganography method is characterized by comprising the following steps of: firstly calculating a steganography system B of the secret message; Dividing the original carrier image Gc into three continuous pixel group sequences Q which are not overlapped with one another; Converting the binary secret message S into a B-system secret message SB; Taking out a group of data from the three-pixel group sequenceQ according to a sequence; Taking out a bit of secret data dB from the B-system secret message SB according to a sequence; Determining a candidate pixel value field set [phi]B (x, y, z) of the three-dimensional space point (x, y, z), and parameters k1 and k2: searching the candidate pixel value field set [phi]B (x, y, z) to find out (x ', y', z '), and satisfying f (x', y ', z') = dB; Replacing (x, y, z) in the three-pixel-group sequence Q by using (x ', y', z ') to complete steganography embedding of the secret data dB; Compared with the prior art, the method has the advantages that a smaller mean square error can be obtained, and the non-perceptibility and safety of the steganographic image can be effectively improved.
Owner:NINGBO UNIV

High-capacity reversible image watermarking algorithm with improved difference expansion

The invention relates to image processing, the invention relates to the technical field of digital watermarking, and discloses a high-capacity reversible image watermarking algorithm with improved difference expansion. The algorithm comprises the steps of watermark embedding and watermark extraction, watermark embedding of an original image and watermark extraction of an image containing watermarks through cat face scrambling, a generalized difference expansion method, improved gray scale overflow processing and a difference quantification method. Compared with the prior art, the algorithm hasthe advantages that the pixel mean value before and after watermark embedding through a generalized difference expansion method is invariant, so that the smoothness value before and after watermark embedding is invariant, and watermark extraction is facilitated; an improved gray overflow processing method is used, on the premise that certain visual quality is guaranteed, watermark embedding can be conducted multiple times, and the watermark embedding capacity is increased; auxiliary information is embedded through a difference quantization algorithm, so that the method has relatively good imperceptibility and relatively high effective load capacity; and after the watermark is extracted, the original image can be completely recovered, the similarity between the extracted watermark and theoriginal watermark is extremely high, and the error is small.
Owner:HUAIYIN INSTITUTE OF TECHNOLOGY

Robust digital audio watermarking algorithm in view of time-frequency analysis

ActiveCN106898358AFully consider time-varying characteristicsIncrease imperceptibilitySpeech analysisTransmissionFrequency domainFourier transform
The invention provides a robust digital audio watermarking algorithm in view of time-frequency analysis. The algorithm comprises steps of: first subjecting a selected audio segment to non-overlapping short-time Fourier transform to obtain a time-frequency distribution map of an audio signal, performing windowing and blocking in the low and medium frequency range of the time-frequency distribution map, and randomly selecting a characteristic energy block with low energy as a specific position for embedding a watermark; embedding generated binary watermark bits into the corresponding characteristic energy blocks by means of an extended code by using an improved spread spectrum watermark embedding method; after the watermark embedding, obtaining the characteristic energy blocks with embedded watermark by means of a watermark embedding position conveyed by a watermark embedder, and recovering a watermark sequence by using a watermarked characteristic energy block vector and the plus or minus characteristic of spread code inner product. The algorithm can guarantee the quality of a main signal by embedding the watermark into the low-frequency and low-energy position of the frequency domain, and can still recover the watermark after the watermarked signal is subjected to quantification, noise, amplitude zooming, AAC coding compression and low-pass filtering.
Owner:WUHAN UNIV

Watermark embedding method and device, watermark detection method and device and electronic equipment

The invention discloses a watermark embedding method and a watermark detection method. The watermark embedding method comprises the steps of obtaining a noise template needing to be embedded into a to-be-embedded image; obtaining a gradient characteristic value of a pixel of the image to be embedded, and generating a zero setting mask according to the gradient characteristic value; determining a weight template according to the zero setting mask; obtaining watermark information according to the weight template and the noise template; embedding the watermark information into the image to be embedded. The watermark detection method comprises the steps of obtaining a high-frequency component of a to-be-detected image; performing first autocorrelation processing on the high-frequency componentto obtain a first autocorrelation result; performing second autocorrelation processing on the first autocorrelation result to obtain a second autocorrelation result; judging whether the to-be-detected image contains a watermark template or not according to the second autocorrelation result. By adopting the method, the digital image embedded with the watermark can resist attacks such as puzzle, matting, bottom changing and the like for the digital image.
Owner:ALIBABA GRP HLDG LTD

Method for hiding information and method for obtaining information

The application relates to a method for hiding information and a method for obtaining information. The method for hiding the information comprises the following steps: obtaining a bit sequence at a predetermined position of a source bit-stream of public information, and initializing a complex Gauss random sequence generator by means of the bit sequence to generate a complex Gauss random sequence;performing spread spectrum modulation on secret information according to the complex Gauss random sequence to obtain a Gauss spread spectrum signal; and superimposing the Gauss spread spectrum signalon a conventional spread spectrum signal of public information to obtain a mixed signal. By means of the method for hiding the information, through pseudo-gaussianizing the communication signal of thesecret information, the mixed signal embedded in the secret information tends to be the same as the signal sent without embedding the secret information in terms of time-domain characteristic components, frequency-domain characteristic components or demodulation results; therefore, the information receiving end can recover the secret information and the public information normally, the imperceptibility of the secret information is improved, and the concealment of covert communication process is improved.
Owner:GUANGZHOU HAIGE COMM GRP INC

Stereoscopic video robust watermarking method based on tensor decomposition

The invention discloses a stereoscopic video robust watermarking method based on tensor decomposition. A watermark is embedded into the watermark embedding end, the brightness components of the left viewpoint color video and the right viewpoint color video are converted into third-order tensors; tensor decomposition is carried out on the third-order tensor; the two-dimensional matrix representations of the two feature maps containing the main energy are synthesized into a three-dimensional matrix in sequence; the three-dimensional matrix is converted into a three-order tensor; tensor decomposition is carried out on the third-order tensor; non-overlapping sub-image block processing is carried out on the obtained feature map containing the main energy, to-be-embedded blocks are determined,a coefficient in a left singular matrix of each to-be-embedded block is modified according to each bit in an original binary watermark sequence to obtain a corresponding watermark-containing block, and inverse operation is carried out on the watermark-containing block to finally obtain a watermark-containing three-dimensional video; at a watermark extraction end, image block processing is performed in the same way, to-be-extracted blocks are determined according to the to-be-embedded blocks, and watermark information are extracted from each to-be-extracted block. The method has the advantages of being good in robustness and imperceptibility.
Owner:COLLEGE OF SCI & TECH NINGBO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products