Digital watermarking method with robustness and transparency in optimum balance

A digital watermark, the best balanced technology, applied in the field of information security, can solve the problem of short generation time

Inactive Publication Date: 2013-09-11
SHAANXI NORMAL UNIV
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the algorithm has not been produced for a long time, there are no relevant reports on the technology of using it for digital watermarking.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital watermarking method with robustness and transparency in optimum balance
  • Digital watermarking method with robustness and transparency in optimum balance
  • Digital watermarking method with robustness and transparency in optimum balance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Using the 512×512 gray-scale image Lena.bmp in the international general digital watermarking standard test image library as the original carrier image, using the attachment drawing in the Windows XP system as a tool, to make the words "Shaanxi Normal University" in bold Song typeface on the 9th The composed 64×64 binary image Shaanxi Normal University.bmp is used as a watermark, and the binary image watermark embedding and extraction are respectively carried out as an example. The method is as follows:

[0038] 1. Binary image watermark embedding process

[0039] Such as figure 1 As shown, the specific steps of the embedding process of the binary image watermark Shaanxi Normal University.bmp are as follows:

[0040] (1) Preprocessing of the original carrier image

[0041] The 512×512 original carrier image Lena.bmp is decomposed by three-level Harr wavelet to obtain the first-level horizontal detail sub-image, the first-level vertical detail sub-image, the first-lev...

Embodiment 2

[0064] Using the 512×512 grayscale image Airplane.bmp in the international general digital watermarking standard test image library as the original carrier image, the 64×64 binary image watermark Shaanxi Normal University.bmp is the same as in Example 1, and the binary image watermark is embedded respectively And extract as an example, the method is as follows:

[0065] 1. Binary image watermark embedding process

[0066] Such as figure 1 As shown, the specific steps of the embedding process of the binary image watermark Shaanxi Normal University.bmp are as follows:

[0067] The preprocessing step (1) of the carrier image Airplane.bmp and the preprocessing step (2) of the binary image watermark Shaanxi Normal University.bmp are the same as those in Embodiment 1.

[0068] In the embedding step (3) of the watermark information bit stream, use the formula (1) to embed the watermark information bit stream in the third-level level detail sub-graph of the original carrier image A...

Embodiment 3

[0078] Using the 512×512 grayscale image Peppers.bmp in the international general digital watermarking standard test image library as the original carrier image, the 64×64 binary image watermark Shaanxi Normal University.bmp is the same as in Example 1, and the binary image watermark is embedded respectively And extract as an example, the method is as follows:

[0079] 1. Binary image watermark embedding process

[0080] Such as figure 1 As shown, the specific steps of the embedding process of the binary image watermark Shaanxi Normal University.bmp are as follows:

[0081] The preprocessing step (1) of the original carrier image Peppers.bmp and the preprocessing step (2) of the binary image watermark Shaanxi Normal University.bmp are the same as those in Embodiment 1.

[0082] In the embedding step (3) of the watermark information bit stream, use the formula (1) to embed the watermark information bit stream in the third level detail sub-image of the original carrier image ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed is a digital watermarking method with robustness and transparency in optimum balance. The digital watermarking method comprises the steps of binary image watermark embedding and binary image watermark extraction. Binary image watermark embedding is composed of the steps of original carrier image preprocessing, binary image watermark preprocessing, watermark information bit stream embedding and third-level Harr wavelet reverse transforming. Binary image watermark extraction comprises the steps of watermark-contained carrier image preprocessing, watermark information bit stream extraction and binary image watermark reconstruction. The digital watermarking method has the advantages of being strong in robustness, good in transparency, capable of realizing watermark blind detection and the like. The digital watermarking method can be used in digital product copyright protection, data safe transmission and the like.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for embedding and extracting a digital watermark. Background technique [0002] In recent years, with the rapid development of Internet technology, digital works have become easy to copy and spread, how to protect the interests of copyright owners has become an urgent problem to be solved. Digital watermarking has become an effective copyright protection technology for digital works by embedding specific information into digital works to judge copyright ownership or verify the authenticity and integrity of works. Digital watermarking generally has two basic characteristics of robustness and transparency. For example, when a digital image is used as a carrier, robustness means that the watermarked carrier image can still be correctly extracted or identified after various intentional or unintentional attacks; transparency means that the addition o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 马苗曾晴郭敏张玉梅
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products