Method for implementing image digital watermark

A technology of digital watermarking and implementation methods, applied in the field of data security, can solve problems such as insecurity, increased security certification system overhead and management risks, recorded in this book or stored in computer memory or external storage, and solves the problem of publishing Effect

Inactive Publication Date: 2010-09-29
SHANGHAI DETONG ENERGY & ENVIRONMENTAL PROTECTION TECH
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

What's more, each user must write down the keys used to communicate with other n-1 users. The number is so large that it can only be recorded in the notebook or stored in the computer memory or external storage, which is extremely unreasonable in itself. safe
[0014] It can be seen that in the traditional security authentication key system, the embedded authentication informati

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing image digital watermark
  • Method for implementing image digital watermark
  • Method for implementing image digital watermark

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The cryptography principles and concepts involved in the present invention and the specific implementation of the technical solution of the present invention will be described in detail below with reference to the accompanying drawings.

[0027] The idea of ​​public key cryptography proposed by Diffie and Hellman in the article "New Directions in Cryptography": If each user A has an encryption key Ka different from the decryption key Ka', the encryption key Ka can be made public, and Ka' Confidentiality, of course, requires that the disclosure of Ka will not affect the safety of Ka'. If B wants to send plaintext m to A in secret, he can check A’s public key Ka, and if he encrypts the ciphertext with Ka

[0028] C=E Ka (m)

[0029] After receiving C, A decrypts C with the decryption key Ka' that only A himself possesses.

[0030] m=D Ka’ (C)

[0031] Since the encryption key Ka is different from the decryption key Ka', public key cryptography is also called asymmetr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a technical scheme of image digital watermark encryption, which comprises the following steps of: acquiring a public key and a private key by a user, wherein the public key is used for performing signature verification on any other person obtaining an image, and the private key is used for signing and sealing the image; signing the information contained in the image by using the private key to obtain signature information D, signing a combination of a hash value of a data area B of the image and public key information C by using the private key to obtain a signature result D, and finally immigrating the public key information C and the signature result D into the image; and extracting the public key information C and the signature result D embedded into the data area B of the image by a basic watermark algorithm, and verifying the public key information C and the signature result D. According to the method, an ID-based signature system of an ID-based public key encryption algorithm is adopted, so the public key information can have linguistic meaning, and the release problem of the public key is correspondingly well solved.

Description

technical field [0001] The invention belongs to the technical field of data security, in particular to a method for realizing an image digital watermark. Background technique [0002] The concept of digital watermarking technology originates from the basic concept of cipher encryption technology. For cipher, it is simply a set of transformation E containing parameter k. Assuming known information m, by transforming E k get the ciphertext c, namely [0003] c=E k (m) [0004] This process is called encryption, and the parameter k is called a key. After the encryption algorithm E is determined, because the key k is different, the ciphertext c is also different. Of course not all transformations with parameter k can be used as ciphers, it requires the calculation of E k (m) is not difficult, and if the third party does not have the key k, even if the ciphertext c is intercepted, he cannot recover the information m from c, that is, it is extremely difficult to find m from ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00H04L9/30H04L9/32
Inventor 郭圣
Owner SHANGHAI DETONG ENERGY & ENVIRONMENTAL PROTECTION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products