Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Embedding and Extraction of Copyright Characters in Vector Graphics

A technology of vector graphics and characters, which is applied in the field of embedding and extraction of copyright characters of vector graphics, which can solve the problems of losing copyright character fragments, increasing the difficulty of copyright characters resisting attacks, and having no transformation domain, etc.

Inactive Publication Date: 2017-02-15
厦门合立道工程设计集团股份有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (2) There is not a relatively stable transformation domain available for embedding copyright characters;
[0010] (3) It is easy to perform geometric operations and cause loss of copyright character fragments;
[0011] Therefore, embedding copyright characters in vector graphics is much more difficult than embedding copyright characters in files such as bitmaps, videos, audios, grids, etc., especially when feature (3) aggravates the difficulty of copyright characters resisting attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedding and Extraction of Copyright Characters in Vector Graphics
  • Embedding and Extraction of Copyright Characters in Vector Graphics
  • Embedding and Extraction of Copyright Characters in Vector Graphics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] 1. Embedding

[0055] Step 1.1

[0056] In this embodiment, the vector graphic to be embedded with copyright characters includes N graphic elements, and its length is N. The copyright holder is represented by the string "#xmhd". In order to prevent the character string from being illegally identified, the character string "#xmhd" is encrypted. Preferably, the existing encryption algorithm uses the character string "#xmhd" as input to obtain an encrypted character string. In this embodiment, the length of the encrypted character string remains unchanged, that is, 5 bytes. Divide the encrypted character string into L consecutive digital fragments, that is, the character fragment e, and obtain the 1 ~e L The character sequence E, the number of bits of the character fragment e is its length t. For security reasons, the character fragment e can also be further encrypted, which is omitted in this embodiment. Calculate the ratio of the length N of the vector graphics to ...

Embodiment 2

[0145] 1. Embedding

[0146] Compared with the first embodiment, the steps 1.1 to 1.4 of this embodiment are the same; starting from step 1.5, the difference is that the first embodiment is to modify the primitives whose alignment order is earlier, and this embodiment is to modify the primitives For the graphics primitives in the center and the sequence, and thus different, the extraction steps of this embodiment are different. When this embodiment embeds traversal, it also embeds one by one according to the character sequence E. After embedding a set of character sequence E, continue to embed the traversal point and continue to embed a new set of character sequence E, the same as Embodiment 1. After the embedding of this embodiment is completed, the entire vector The graph contains G complete character sequences E.

[0147] This implementation intends to use Figure 10 The 12 primitives in the graph are exaggerated, and the schematic diagram changes before and after embeddi...

Embodiment 3

[0152] This embodiment is not intended to exemplify embedding and extraction. This embodiment mainly explains how the present invention can resist geometric attacks and why it is robust to interference attacks.

[0153] 1. Resistance to geometric attacks

[0154] Geometry attacks refer to global scaling, rotating, translating, or a combination of the above operations on the entire vector graphics, in order to modify the primitive function parameters and intend to destroy the character fragments embedded in the function parameters; due to global scaling, rotating, and translating Or after the combination operation, although the graph element function parameters are changed, the graph as a whole remains unchanged, which does not affect the reading, so this method is the first choice for attackers.

[0155] The present invention constructs a complex vector operator, calculates the complex ratio of the primitive pair, and embeds character fragments into the complex ratio. Fragmen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for embedding and extracting vector graph copyright characters. A copyright character embedding method at present is difficult to resist geometrical attacks of translation, rotation, scaling and combination thereof, and is more difficult to resist interference attacks aimed at primitive addition, modification, deletion and combination thereof. The method for embedding and extracting the vector graph copyright characters perform complex proportioning on a vector graph according to a handle value, copyright characters are embedded in the complex proportion, resistance of the copyright characters to geometrical attacks is guaranteed, a plurality of groups of copyright characters are embedded in the vector graph, so that the method in the invention has robustness for interference attacks.

Description

technical field [0001] The invention relates to copyright encryption protection technology of vector graphics, in particular to a method for embedding and extracting copyright characters of vector graphics. The method of the invention can embed the copyright characters representing the copyright information into the vector graphics file in an invisible manner, and can extract the copyright characters in a specific way to prove the copyright owner of the graphics. Background technique [0002] Vector graphics refer to the representation of computer graphics using geometric primitives based on mathematical expressions such as points, lines, curves, and polygons. Unlike bitmaps, since vector graphics are depicted with mathematical features, bitmap-style mosaic features will not appear after scaling. Vector graphics are widely used in construction, machinery, textile, electrical, civil engineering, artistic creation and other fields due to their undistorted scaling characterist...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00G06F21/10
Inventor 杜伟军
Owner 厦门合立道工程设计集团股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products