Network image copyright real-time distinguishing method
A network image and copyright technology, applied in the field of information security, can solve the problems that the original watermark cannot be used to identify copyright, interfere with copyright identification, and it is difficult to completely prevent passive Internet attacks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0162] 1 Description of Experimental Parameters
[0163] Three grayscale images of Lena, Barbara and Elain with a size of 512×512 in 256 levels are selected as the experimental images, respectively as Figure 6 , 7 and 8 are shown. The size of the sub-blocks is 16×16, so the length of the feature watermark W is 1024bit. Logistic chaos map initial value x 0 The value is 0.28, the parameter γ is 1.5, and the first κ=200 random numbers are discarded when the Logistic chaotic sequence encrypts the characteristic watermark W. Encrypted feature watermark W e Adaptively self-embed the DCT coefficients of each sub-block in the (3, 5) and (4, 4) positions of the original Lena, Barbara and Elain images. The scale factor μ of the adaptive embedding is taken as 0.028. The resulting watermarked Lena, Barbara and Elain images are shown in Figure 9 , 10 and 11, the PSNRs between them and the original Lena, Barbara and Elain images are 35.9595, 36.1211 and 35.7637. Therefore, good ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com