Immune and digital image watermarking method for leveled rights management of digital works

A technology for digital works and digital watermarking, applied in the field of information, can solve the problems of small controllable range, vulnerability to guessing attacks, low security, etc., and achieve the effect of simple and convenient key management, copyright protection, and high image quality.

Active Publication Date: 2017-02-15
HAINAN UNIVERSITY
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, any attack will lead to the loss of SSRC information, making it impossible to restore IA, so that the watermark has a natural "immune" feature
However, the existing immune watermarking method has the following disadvantages: (1) It is limited to the protection of rights of use, and can only implement corresponding protection of rights of use, and cannot protect the original copyright of the work, because once the user obtains the authorization key, the image will be restored After the original image is converted, the watermark is completely removed, and its copyright cannot be protected
(2) Limited to one-time protection of rights and interests, unable to implement hierarchical protection management
(3) Two key factors lead to its low security: (a) its watermark embedding formula is based on a linear relationship, the attacker can estimate the value of α according to the correlation of adjacent pixels, and crack IA';( b) Experiments show that the controllable range of the watermark embedding depth α value is small. Generally speaking, in order to ensure that the image after embedding the watermark can be restored, α should not exceed 0.3, so it is vulnerable to guessing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Immune and digital image watermarking method for leveled rights management of digital works
  • Immune and digital image watermarking method for leveled rights management of digital works
  • Immune and digital image watermarking method for leveled rights management of digital works

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0162] The following is the lena image commonly used in digital image processing (see figure 1 ) as an example to further illustrate the specific implementation results. Copyright robust watermarking selects the black-and-white binary image "Hainan University" (see figure 2 ), the hierarchical equity immune watermark selects the binary image "digital watermark" with black background and white characters ( image 3 ). Perform Arnold scrambling transformation on the two binary watermarks respectively (for specific methods, please refer to related literature), such as Figure 4 and Figure 5 .

[0163] The specific experimental operating environment is the operating system windows7, and the simulation experiment software is matlab7.0.

[0164] The subsequent image quality evaluation standard is PSNR, which is the peak signal-to-noise ratio commonly used in image processing (it is generally believed that the image quality with PSNR above 30dB is very good), and the evaluatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an immune and digital image watermarking method for leveled rights management of digital works. The method comprises a part of watermark embedded and leveled quality lock control processing and a part of leveled rights management and protection; watermark embedded and leveled quality lock control processing is composed of a watermark embedding process and a leveled quality lock control process; the watermark embedding process comprises watermark pre-processing, copyright watermark embedding, rights watermark embedding and quality lock and control thereof, and after watermark embedding, different levels of image qualities are locked and controlled in the leveled manner; and leveled rights management and protection is formed by key distribution and rights distribution. According to the invention, leveled using rights and copyright rights protection are realized, related rights are separated effectively and are thus not overlapped, attacks according to similarity of adjacent pixels can be prevented effectively, and thus, the method serves as a rights management mode in the authorization mode, is highly safe, and provides technical support for safe sharing of digital image works in a digital community.

Description

technical field [0001] The invention belongs to the field of information technology, and relates to a digital image digital watermarking method, in particular to an immune image digital watermarking method oriented to digital works hierarchical rights management. Background technique [0002] Generally speaking, digital watermarking methods for protecting digital image-related rights and interests can be divided into two categories: one is to realize the function of protecting image copyright rights and interests by embedding digital watermark information into digital images, which is the so-called robust watermarking method; Correlating the watermark information with the content of the image itself and embedding it into the easily damaged area of ​​the image can be used to protect the integrity of the image content, that is, the fragile watermark method. The basic assumption is that the watermark is invisible, that is, after the watermark is embedded, the image quality is n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
CPCG06T1/0021G06T1/0028
Inventor 姚孝明王豪
Owner HAINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products