Double-layer frame optical watermark method based on computational ghost imaging

An optical watermarking and ghost imaging technology, applied in image watermarking, computing, image data processing, etc., can solve the problems of weak anti-attack ability and poor robustness, and achieve the goal of enhancing security, improving security, and expanding key space. Effect

Active Publication Date: 2018-12-04
XIAN UNIV OF TECH
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a double-layer frame optical watermarking method based on computational ghost imaging to solve the problems of poor robustness and weak attack resistance in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-layer frame optical watermark method based on computational ghost imaging
  • Double-layer frame optical watermark method based on computational ghost imaging
  • Double-layer frame optical watermark method based on computational ghost imaging

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0047] Such as Figure 2a , Figure 2b , in the USC-SIPI image database, the grayscale image "pepper" with a pixel size of 128×128 is used as the main image; the binary image "flower" with a pixel size of 64×64 is used as the watermark. The size of non-overlapping blocks segmented from the main image is set to 4×4 pixels, ie p=4 and q=4. Based on the singular value decomposition, the actual weighting factor for embedding the new watermark into the reference image is set to 1×10 -5 , the applied nonlinear strength was set to ρ = 0.4. Specific steps are as follows:

[0048] Step 1, use the computational ghost imaging method to encode the original watermark image "flower" into a series of measured intensity values, and rearrange these intensity data into a two-dimensional temporary image as the new watermark of the first layer, the resulting optically measured intensity The value expression is:

[0049] B i =∫∫dμdνI i (μ,ν)T(μ,ν) (1)

[0050] where T(μ,v) is the transfer ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a double-layer frame optical watermark method based on computational ghost imaging. The method comprises the following steps: 1) encoding an original watermark image into a series of intensity values by using a computational ghost imaging method, and rearranging the intensity data into two-dimensional temporary images as a new watermark of the first layer; 2) dividing a main image into a plurality of smaller blocks, dividing a watermark image into smaller blocks, and selecting some important blocks to form a reference image; identifying a reference image composed of theimportant blocks by calculating spatial frequency coefficients of the reference image; 3) embedding the reference image into the new watermark by using a singular value decomposition method; 4) performing an extraction process on which a singular value decomposition transform is performed to obtain a modulated singular value; forming mapping between the synthesized blocks and original positions of the blocks, reconstructing the newly generated watermark by using a matrix to carry out inverse singular value decomposition, and making the original watermark be restored to a verifiable image. Themethod expands the key space and improves the security.

Description

technical field [0001] The invention belongs to the technical field of digital watermarking, and relates to a double-layer frame optical watermarking method based on computational ghost imaging. Background technique [0002] Due to the rapid development of optical information processing technology and the Internet, more and more researchers use optical methods to focus on the security of information storage and transmission. As an effective means of image encryption, information hiding and optical authentication, digital watermarking has been studied in recent years. A variety of transformations have been applied to image security technologies, such as fractional Fourier transform, Fresnel transform, fractional Merlin transform, and rotary transform. Due to the inherent linearity of optical transformation, most schemes are more vulnerable to several common attacks. It has poor robustness, which leads to slow progress in the research of digital watermarking technology. Con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021G06T1/005G06T2201/0061
Inventor 隋连升程茵
Owner XIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products