Image encryption method based on digital watermark

A technology of digital watermarking and encryption method, applied in image data processing, image data processing, instruments, etc., can solve the problem of repeated embedding of digital watermarks, etc., and achieve the effect of high data capacity and good robustness

Inactive Publication Date: 2017-06-06
ZHEJIANG UNIV OF TECH
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the current technology cannot solve the problem of repeatedly embedding watermarks in digital watermarks, that is, the watermarks embedded in the next time will ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on digital watermark
  • Image encryption method based on digital watermark
  • Image encryption method based on digital watermark

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Referring to the accompanying drawings, in this embodiment, "Zhejiang University of Technology" is used as encrypted information to overwrite and encrypt the image with a watermark.

[0046] Specifically use the following:

[0047] Step a, get coordinate points:

[0048] Step a1, given the watermark information sequence W "Zhejiang University of Technology", W={B 0 , B 1 , B 2 , B 3 , B 4, ..., B n},in, n is the message length 5, B 0 For "Zhejiang", B 1 is "Jiang", and so on, B5 is "Study";

[0049] Step a2, put B n The ASCII value is converted to an 8-bit byte string K=( k 0 , k 1 , ..., k i ), k i The value of is 0 or 1, i =7:

[0050] Convert the ASCII value of "浙" to an 8-bit byte string K=(01001011), and the corresponding ASCII values ​​​​of the other characters are as follows:

[0051] Zhejiang: 01001011

[0052] Jiang: 01001011

[0053] Worker: 01001011

[0054] Industry: 01001011

[0055] Big: 01001011

[0056] School: 01001011

[0057...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method in which coordinates where a watermark is embedded in an image is calculated through character type watermark information, the character type information is utilized to generate the watermark through a two-dimensional code generator, then the two-dimensional code watermark is embedded in the image, whether a two-dimensional watermark exists in an original image is detected, and a watermark repeated embedding attack is resisted. Based on mathematical theory and image data characteristics, combined with characteristics of a transform domain watermarking algorithm, the idea of an airspace algorithm is utilized, a watermark information mapping algorithm, a two-dimensional watermark distributed embedding technology and similarity detection algorithm are used as key technologies, and thus the method can achieve the purpose of resisting repeated embedding and have relatively good robustness and relatively high data capacity.

Description

technical field [0001] The invention relates to general image data processing, in particular to an image encryption method based on digital watermark. Background technique [0002] With the rapid development of Internet technology, the dissemination of digital information has reached an unprecedented speed, and all kinds of traditional information have been digitized. Digital information has the natural advantage of convenient communication, but this advantage greatly facilitates dissemination and at the same time makes the ways of forging and tampering with images increasingly diverse, which puts forward a higher test for the protection of property rights and content authentication of images. Ownership of digital works, tamper-proof issues, etc. are all hot issues worthy of attention in the Internet age. While fully enjoying the convenience of dissemination, how to use technical means to better protect the copyright of digital works has become an extensive research topic. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
Inventor 朱文忠项阳朱生鹏应雪莲俞维佳
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products