Image waterprint method for copyright protection

An image watermarking and copyright protection technology, applied in the fields of information hiding and information security, can solve the problems of abstract embedding, inability to clearly state copyright ownership, large amount of calculation, etc.

Inactive Publication Date: 2005-03-23
HEFEI UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If each watermarking system needs to achieve all the above functions, the complexity and time-consuming of the implementation will be greatly increased
[0006] (2) The form of the watermark is relatively abstract, which is not conducive to the court's certification of the copyright of the image work
However, this method can only obtain the conclusion of the existence or non-existence of the watermark, but cannot obtain the content of the watermark, and cannot clearly state the copyright ownership
[0007] (3) The embedding method does not apply
What is obtained during the test is only a data for relative comparison, which has no practical significance
In some technologies, when an image is used as a watermark, an image with a certain resolution must be extracted in the detection, and the accuracy requirements for each pixel value are greatly improved. In order to ensure imperceptibility and robustness to common image processing, when embedding It is necessary to make full use of the characteristics of the human visual system (HVS), and it is necessary to calculate complicated formulas, which increases the complexity and greatly increases the amount of calculation.
[0008] (4) The encryption mechanism is more complicated
The proposed watermarking scheme generally uses some kind of function to introduce encryption mechanism in the process of watermark scrambling or watermark generation, but in the process of using the function, the amount of calculation is large
[0009] In short, the existing image watermarking methods have shortcomings such as unclear use, abstraction and embedding, complex encryption methods, etc., and are not suitable for copyright protection and copyright certification of image works in digital publications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image waterprint method for copyright protection
  • Image waterprint method for copyright protection
  • Image waterprint method for copyright protection

Examples

Experimental program
Comparison scheme
Effect test

example

[0082]According to the above algorithm programming, the watermark is embedded in the original image. The original image is a 256×256 256-level grayscale image (Figure 3.1), and the watermark is a 40×40 binary image (Figure 4.2). Figure 3.2 is the edge image obtained by the canny operator. Observing the original image, it is found that most of the smooth areas are bright spots, so the dark spot areas are selected for embedding. Figure 4.1 is a watermarked image, the intensity α of the embedded low-frequency coefficient is 0.1, and the intensity α of the embedded DC coefficient is 0.006. It can be seen that the watermarked image generated by this method (Figure 4.1) has no obvious visual difference from the original work (Figure 3.1).

[0083] Because usually the images on the network are processed by printing, copying, scanning, etc., some noise will be generated. Gaussian noise is used here instead. Figure 5.1 is the watermarked image after adding noise, with a variance of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an image watermark way applied to protecting copyright. It converts two-dimensional pels matrix to a two-value sequence group, splits the original image into 8*8 pels in the pels area, and processes discrete cosine conversion to (DCT) convert every pels area to frequency area. By fake radnom selecting block texture selecting block and illumination selecting block, it can conform which area block need to embed the watermark, and can sort them Zigzag. It embeds the encryption part of the watermark sequence group into the direct-current factor position of the random selecting block, also embeds the texture part and illumination part into respective low frequency factor position.

Description

technical field [0001] The invention belongs to the technical field of information hiding and information security, and more specifically relates to a copyright protection method for image works in digital publications. Background technique [0002] With the rapid development of Internet technology and multimedia, the dissemination of digital products has become more convenient and faster. At the same time, due to its digital characteristics, digital products allow anyone to copy, disseminate and modify various electronic works at will, which greatly damages the interests of digital product copyright owners. As a branch of information hiding, digital watermarking can be used to identify the copyright owner of the work without affecting the visibility of the original product, and protect the legal copyright of online works. [0003] A practical method for the copyright protection of image works in digital publications needs to meet the following conditions: (1) the copyright...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00H04N1/387H04N5/913
Inventor 高隽曹薇
Owner HEFEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products