Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Semi-fragile unique image watermark embedding method for integrity protection and semi-fragile unique image watermark extraction method for integrity protection

A technology of integrity protection and image watermarking, which is applied in image data processing, image data processing, recording carriers used by machines, etc., to achieve the effect of integrity protection

Inactive Publication Date: 2017-08-29
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the defects of existing image semi-fragile watermarks, the purpose of the present invention is to provide a semi-fragile and unique image watermark embedding and extraction method for integrity protection from the semi-fragile watermark of images, which is effective and feasible, and can authenticate Image integrity, and the scheme is simple and efficient, which overcomes many defects of the existing image semi-fragile watermark, and is of great significance to the integrity protection of digital images

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semi-fragile unique image watermark embedding method for integrity protection and semi-fragile unique image watermark extraction method for integrity protection
  • Semi-fragile unique image watermark embedding method for integrity protection and semi-fragile unique image watermark extraction method for integrity protection
  • Semi-fragile unique image watermark embedding method for integrity protection and semi-fragile unique image watermark extraction method for integrity protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0038] In one embodiment, a semi-fragile and unique image watermark embedding method and extraction method for integrity protection are provided, and its main implementation process can be summarized as follows:

[0039] Generation of watermark image, scrambling of watermark image, embedding of watermark, distribution of carrier embedded with watermark, extraction of watermark, recovery of scrambling of watermark, verification of watermark.

[0040] Each step is specifically described below in conjunction with the accompanying drawings:

[0041] For the generation of watermark images, the owner of the carrier image can genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a semi-fragile unique image watermark embedding method for integrity protection from the semi-fragile watermark of an image. The method comprises the following steps: 1) generating a two-dimensional code image watermark according to the watermark information of a carrier image; 2) performing scrambling processing of the two-dimensional code image watermark, and obtaining a safety watermark; 3) embedding the safety watermark into the wavelet transform domain of the carrier image, obtaining an image embedded with the watermark, and generating an extraction watermark secret key; and 4) distributing the image embedded with the watermark and the extraction watermark secret key at the same time. The present invention provides an extraction method aiming at the embedding method mentioned above. The semi-fragile unique image watermark embedding method for integrity protection and the semi-fragile unique image watermark extraction method for integrity protection are effective and feasible and can authenticate the image integrity, the scheme is concise and efficient, many defects of a current image semi-fragile watermark are overcome, and the semi-fragile unique image watermark embedding method for integrity protection and the semi-fragile unique image watermark extraction method for integrity protection have important meanings for the integrity protection of digital images.

Description

technical field [0001] The invention relates to digital watermark technology, in particular to a semi-fragile and unique image watermark embedding and extraction method for integrity protection. Background technique [0002] With the rapid development and wide application of multimedia technology and network technology, the protection of multimedia content such as images, audio and video has become an urgent problem to be solved. The protection of multimedia content is generally divided into the following two aspects: one is copyright protection; the other is content integrity (authenticity) protection, that is, authentication (or called "tampering reminder"). Digital watermarks used for copyright protection require strong robustness and security; watermarks used for authenticity identification (or tampering prompts) of multimedia content are generally called fragile watermarks or fragile watermarks. Invisible information is embedded in the content, and at the same time, it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00G06K19/06G06K7/14
CPCG06T1/0042G06K7/1417G06K19/06037
Inventor 韩春玲薛锐
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products