Security watermark algorithm combining cryptography

A security and cryptography technology, applied in the direction of image communication, electrical components, etc., can solve the problem of collusion attack of double watermarking mechanism

Inactive Publication Date: 2016-02-03
UNIVERSITY OF CHINESE ACADEMY OF SCIENCES
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The proposal and application of the double watermark mechanism is mainly to solve the problem of collusion attack, and its watermark system model is different from the traditional watermark system model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security watermark algorithm combining cryptography
  • Security watermark algorithm combining cryptography
  • Security watermark algorithm combining cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Various details involved in the method provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0035] 1. Embedding of watermark information

[0036] The specific implementation scheme of watermark information embedding provided by the present invention is as follows:

[0037] 1) Extraction of side information

[0038]The introduction of side information associates the watermark with the carrier, which can resist copy attacks and same-origin detection attacks. Because the side information is extracted from the carrier and participates in the encryption process of the watermark, the watermark extraction process also needs to use the side information. This means that the edge information extraction algorithm must extract the same information from the carrier before and after embedding the watermark, otherwise it cannot be decrypted correctly. Therefore, the side information must be a relatively stable feature ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention mainly aims to solve the security attack problem of watermarks, and provides a high-security watermark algorithm by further referring to an encryption mechanism and a dual-watermark mechanism on the basis of making full use of a password thought and a theory of error-correcting codes specific to different security attack characteristics. In the algorithm, a watermark embedding link is partitioned into a private watermark embedding part and a public watermark embedding part. Private watermarks are embedded through an adaptive spatial domain watermark algorithm; original watermarks are encrypted by further referring to a carrier feature sequence on an information layer; error correction coding is performed on an encrypted sequence through Hamming error correcting coding in order to cope with copy attacks; and watermark embedding positions and embedding strengths are encrypted on a transmission layer in order to cope with homologous detection attacks. Public watermark embedding is finished through an adaptive watermark algorithm which has high robustness and is based on DCT (Discrete Cosine Transform), so that detection of collusion attacks can be realized. As proved by a test result, the problem of security attacks to the watermarks can be well solved.

Description

technical field [0001] The invention belongs to the field of communication and information systems, and relates to technologies such as information theory, covert communication, cryptography and coding, image processing, and in particular to digital image watermarking technology. Background technique [0002] As an important carrier of information dissemination, digital media is widely disseminated on the Internet, creating huge economic and social value for the society. Because digital media is easy to copy, tamper, imitate, distribute, and difficult to track, there are more and more infringements against digital media, which have brought huge economic losses to the country and individuals. It is in this environment that digital watermarking technology emerges at the historic moment. Usually, copyright protection watermarking technology is to permanently embed the information identifying the owner of the work into the work, which is invisible and difficult to remove. In t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32
CPCH04N1/32288
Inventor 肖俊李登宇王颖
Owner UNIVERSITY OF CHINESE ACADEMY OF SCIENCES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products