Chaos based robustness invisible implanting and extracting method

A technology of watermark embedding and extraction method, applied in color TV parts, TV system parts, TV and other directions, can solve the problems of easy removal or forgery of watermarks, unsafe watermarks, etc., and achieve easy real-time operation, copyright Protection, security and invisibility

Inactive Publication Date: 2005-03-30
SHANGHAI JIAOTONG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the above watermarking schemes each have their own advantages, the common problem is that once the seed key of the random sequence generated for sampling is deciphered, the watermark is easily removed or forged, making the watermark insecure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chaos based robustness invisible implanting and extracting method
  • Chaos based robustness invisible implanting and extracting method
  • Chaos based robustness invisible implanting and extracting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0026] 1. Watermark scrambling:

[0027] The binary watermark W with a size of M×N is first reduced to a one-dimensional vector V by row scanning o Given the chaotic initial parameter (Key1), use a one-dimensional discrete chaotic map (such as Logistic-map) to generate a chaotic pseudo-random sequence of length M×N from 1 to M×N, process it with a static Hash table, and get The sequence is a 1~M×N random full permutation {q k}. use {q k}Scramble the watermark to get the out-of-order watermark bit stream

[0028] V p ={v p (k)=v(q k ), k=1, 2,..., M×N}

[0029] Since the chaotic sequence is processed by a static Hash table, the scrambling mapping is a one-to-one mapping.

[0030] 2. Watermark embedding:

[0031] The original image is first transformed by DCT to obtain the DCT coefficient matrix of the image. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a method for embedding and extracting the blind water mark with the Robustness on the basis of the Chaos property. The method disturbs the water mark using a Chaos sequence processed by a static Hash table first, then selects randomly a little referent points in the frequency domain based on the Chaos sequence and embeds in batch the disturbed water mark in its adjacent domain using the odd-even quantization which remains the decimal part of the original coefficient. During extracting the water mark, the method seeks the referent points using the same secret key as that in the embedding process after the discrete cosine conversion of the image into which the water mark is embedded, determines the number of the bits of the water mark hidden in the adjacent domain of each referent point, extracts the bits of the water mark through examine the odd-even area of the modified coefficient of the cosine conversino in the adjacent

Description

technical field [0001] The invention relates to a robust blind watermark embedding and extraction method based on chaotic characteristics, which is a digital watermark method suitable for copyright authentication of digital image products and preventing illegal copying. Background technique [0002] At present, with the rapid development of computer network and information technology, many digital products are widely distributed, transmitted and bought and sold online, so it is easier to cause digital products to be illegally copied and used. In order to solve this problem, digital watermark is used as a multimedia data New techniques of copyright protection followed. Embedding, detection and extraction of watermark are the core issues of digital watermarking technology. According to different loading methods, watermarking schemes can generally be divided into two categories: spatial / temporal watermarking and transform domain watermarking. Generally speaking, transform doma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04N5/76H04N5/913
Inventor 何晨王宏霞蒋铃鸽丁科
Owner SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products