Reversible database watermark embedding and extracting method based on integral wavelet transformation

A technology of wavelet transform and extraction method, applied in the direction of digital data protection, program/content distribution protection, etc., can solve the problems of poor watermark invisibility and weak robustness

Active Publication Date: 2014-02-12
GUILIN UNIVERSITY OF TECHNOLOGY
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The copyright and integrity protection of database products currently used in specific fields (such as finance, law, and military, etc.) are all studied from

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reversible database watermark embedding and extracting method based on integral wavelet transformation
  • Reversible database watermark embedding and extracting method based on integral wavelet transformation
  • Reversible database watermark embedding and extracting method based on integral wavelet transformation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In this embodiment, the Le Gall5 / 3 filter is used to realize the first-level integer wavelet transform, the watermark adopts a pseudo-random binary sequence, the size of the data group is 8×8, and the coefficient vector parameter coefficient k i Take 2 or 4, embedding strength β j Take 2 or 4.

[0020] The specific steps are:

[0021] Step 1 watermark generation: generate a binary watermark sequence W1 from the owner and user information, use the key k1 to generate a binary chaotic sequence L, their length is nw, perform chaotic modulation on W1 by L, and get the watermark signal W to be embedded, Then by the watermark W i Generate a sub-watermark sequence {w i0 ,w i1 ,L,w i(t-1)}, whose length is t. where 0≤i≤nw-1, here Indicates XOR, and the sub-watermark generation rules are as follows:

[0022] w ij = 0 W ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a reversible database watermark embedding and extracting method based on integral wavelet transformation. In a database carrier, numeric attribution values are selected randomly to form a data set, the data set is divided into data subsets of the same size, and accordingly data arrays are formed; according to an overflow prevention mechanism, type groups where the data arrays belong to are determined; furthermore, watermark hiding models are adopted for the data arrays of different types so that watermarks of different intensities are embedded into wavelet domains of the data arrays to form a watermark database; finally, the watermarks are extracted by judging parity of expressions, and a watermark carrier coefficient vector translates reversely in a space formed by orthogonal vectors to restore the database carrier. According to the method, watermark information can be evenly distributed in each part of data in a database to achieve the aims of weakening influences of the watermark information on the database and improving invisibility and robustness of watermarks, and the method is suitable for copyright and integrity protection of a specific database.

Description

technical field [0001] The invention relates to the technical field of specific multimedia data copyright and integrity protection, in particular to a method for embedding and extracting a reversible database watermark by integer wavelet transform. Background technique [0002] Information hiding (Information Hiding) is to hide secret information in another public media for secret communication or tracking infringement, and provide evidence for legal protection. For the Internet digital age, its media form can be any kind of digital media, Such as database, text, image, audio and video, etc. Information hiding not only requires that the hidden information is difficult to find, but also requires that even if the hidden secret information is detected, the secret information hidden in the digital media cannot be obtained under the premise that the key is unknown. Therefore, information hiding technology has its unique advantages. [0003] Digital watermarking technology is an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/16G06F21/64
CPCG06F21/16G06F21/64
Inventor 姜传贤程小辉葛云生董明刚杨铁军
Owner GUILIN UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products