Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Three-dimensional discrete cosine transform (DCT)-based geometric attack resistant volume data watermark realization method

A technology of anti-geometric attack and implementation method, applied in the field of multimedia signal processing, to achieve strong anti-geometric attack ability, strong anti-conventional attack ability, and wide application range

Inactive Publication Date: 2011-06-15
HAINAN UNIVERSITY
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In short, the algorithm for embedding a digital watermark in 3D volume data that is resistant to geometric attacks such as rotation, scaling, translation, shearing, and distortion is still blank and has not been publicly reported.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-dimensional discrete cosine transform (DCT)-based geometric attack resistant volume data watermark realization method
  • Three-dimensional discrete cosine transform (DCT)-based geometric attack resistant volume data watermark realization method
  • Three-dimensional discrete cosine transform (DCT)-based geometric attack resistant volume data watermark realization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a three-dimensional discrete cosine transform (DCT)-based geometric attack resistant volume data watermark realization method, which belongs to the field of multimedia signal processing. The method comprises the steps of watermark embedding and watermark extraction. The watermark embedding step further comprises the following steps of: (1) performing global three-dimensional DCT on original volume data, and extracting a geometric attack resistant characteristic vector from a transform coefficient; and (2) obtaining a binary logic sequence through a Hash function by utilizing the characteristic vector and watermarks to be embedded, and storing the binary sequence to a third party. The watermark extraction step further comprises the following steps of: (3) performing the global three-dimensional DCT on tested volume data, and extracting the geometric attack resistant characteristic vector from the object; and (4) extracting the watermarks by utilizing the characteristics of the Hash function and the binary logic sequence stored in the third party. The method relates to a three-dimensional DCT-based volume data digital watermarking technology, is proved by experiments to have relatively higher geometric and conventional attach resistance, also relates to a zero-watermark technology, and avoids the watermark embedding changing the contents of the volume data.

Description

A Realization Method of Volume Data Watermarking Based on 3D DCT Against Geometry Attack technical field The invention relates to a digital watermark technology based on three-dimensional DCT transformation and volume data image features, is a multimedia data protection method, and belongs to the field of multimedia signal processing. technical background With the rapid development of digital technology and Internet technology, various digital media such as text, image, sound, video, etc. can be transmitted quickly and conveniently through the Internet. It also makes the tampering and piracy of these information very easy. How to protect the copyright of digital products and maintain the security of network information has become a top priority. As an effective means, digital watermark technology realizes the copyright protection of digital works. Therefore, this technology has become a research hotspot in the field of multimedia information security. But most research...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00
Inventor 李京兵杜文才陈延伟
Owner HAINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products