Digital watermark steganography method based on scrambling transformation and morphological component analysis

A technology of morphological component analysis and digital watermarking, applied in image data processing, image data processing, instruments, etc., can solve the problem of destroying hidden information

Inactive Publication Date: 2014-08-06
FUDAN UNIV
View PDF10 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For steganography, its primary purpose is to enable the information hiding system to obtain higher security and hiding capacity, that is, in steganography, the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital watermark steganography method based on scrambling transformation and morphological component analysis
  • Digital watermark steganography method based on scrambling transformation and morphological component analysis
  • Digital watermark steganography method based on scrambling transformation and morphological component analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. The digital watermark steganography method and system based on scrambling transformation and morphological component analysis proposed by the present invention include three main processes, which are digital watermark embedding process, communication transmission process and digital watermark extraction process. The flow chart of the digital watermark steganography method based on scrambling transformation and morphological component analysis of the present invention is as follows figure 1 shown.

[0046] The specific implementation steps of the digital watermark embedding process

[0047] Step 1: Select the scrambling transformation mode to generate the first-level key

[0048] A digital image can be regarded as a two-dimensional matrix. After the scrambling transformation, the pixel positions of the image will be rearranged, so th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of encryption communication and information security, and particularly relates to a digital watermark steganography method based on scrambling transformation and morphological component analysis. The method mainly comprises three processes which are sequentially the digital watermark embedding process, the communication transmission process and the digital watermark extraction process. According to the method, the morphological component analysis theory is extended to a blind source signal separation structure, and the method has the good performance effect on embedding, hiding, communication and extraction of digital watermarks and has high attack resistance and robustness for various noise attacks. According to the method, the digital watermark embedding, extraction, encryption and decryption processes are controlled through dual keys, so that transmitted data are safer.

Description

technical field [0001] The invention relates to the technical fields of generation, embedding and extraction of digital watermarks, steganography, copyright verification, encrypted communication and information security, in particular to a digital watermark steganography method based on scrambling transformation and morphological component analysis. Background technique [0002] With the explosive development of digital imaging technology, how to effectively protect the copyright of original images and how to prosecute copyright infringers have become the focus of increasing social attention. As an effective copyright verification method, digital watermarking technology has attracted great attention in the field of information security. As a kind of copyright mark, digital watermark (DW) is a certain visual pattern overlaid on the original digital image, for example, it can be a national emblem, a company logo or a personal signature and so on. Steganography is an informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
Inventor 余翀
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products