Anti-attack robustness multiple zero watermark method

A zero-watermark, anti-attack technology, applied in the field of information security, can solve the problem of little research on zero-watermark, and achieve the effect of enhancing the performance against various attacks and improving reliability

Inactive Publication Date: 2012-08-22
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] These zero-watermark schemes proposed so far are robust to common signal processing attacks such as blurring, noise, filtering, and compression, as well as attacks such as scaling, but are very robust to attacks such as shearing, large-scal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack robustness multiple zero watermark method
  • Anti-attack robustness multiple zero watermark method
  • Anti-attack robustness multiple zero watermark method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In the process of constructing multiple zero watermarks, Harris corner detection is first performed on the image after translation and zoom invariant normalization to obtain a feature area with a radius of R; then the zero padding operation is used to map the feature domain to a size of 2R ×2R image blocks, calculate the Zernike moment magnitude of each feature block and construct feature vectors, and binarize these feature vectors to form multiple zero watermarks; finally encrypt multiple zero watermarks to enhance the zero watermark scheme The security, the encrypted multi-fold zero watermark is stored in the registration center as the basis for copyright judgment. The construction process of multiple zero watermark is as follows: figure 1 shown.

[0037] In the process of multiple zero-watermark detection, similar to the process of multiple zero-watermark construction, firstly, the Harris corner detection and zero-padding operation are performed on the detection im...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-attack robustness multiple zero watermark copyright authentication scheme. Harris corner point detection is adopted for extracting carrier image feature points, then, the feature points are expanded into feature domains with the radium being R. Zernike moment invariants of the feature domains are used for constructing feature vectors, and in addition, the feature vectors are subjected to binaryzation to form the multiple zero watermark. In the watermark detection period, the copyright attribute of detected patterns is verified through the comparison between the correctly detected watermark number and the threshold value. According to the scheme, various attacks including fuzzy, noise, median filtering, joint photographic experts group (JPEG) compression, rotation, zooming, sharing and Stirmark random bending attacks (RBAs) can be avoided. Compared with the similar scheme, the method provided by the invention has better performance.

Description

technical field [0001] The present invention designs an anti-attack robust multi-fold zero watermark scheme, which is used to solve the copyright authentication of images, especially to verify the copyright ownership of a type of image (remote sensing image and medical image) that does not allow slight modification. The technology belongs to the field of information security. Background technique [0002] At present, in order to avoid piracy, digital watermark technology is widely used in the copyright authentication of digital images. Most of the existing watermarking schemes modify the image content in the spatial domain or frequency domain, and these methods cannot be directly applied to protect the copyright of remote sensing images and medical images, because the content of such images is not allowed to be slightly modified. Recently, a lossless watermarking technique called zero watermarking has been proposed. This kind of zero watermarking will not modify the content...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
Inventor 蒋国平高光勇
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products