Unlock instant, AI-driven research and patent intelligence for your innovation.

Synchronous detection method of transformed digital watermark

A technology of digital watermarking and synchronous detection, which is applied in the direction of redundant code error detection, image data processing, and response error generation. Satisfaction and other issues, to achieve good subjective quality, reduce secondary processing loss, and good compatibility

Inactive Publication Date: 2005-12-28
SHANGHAI JIAOTONG UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The digital watermarking algorithm in the space domain is often less robust to compression, filtering, and noise pollution than the algorithm in the transform domain, and the subjective quality of the digital image embedded with the watermark is also slightly worse than the method in the transform domain.
If the watermark synchronization method based on the calibration signal is synchronized to the existing transform domain watermark method, the effect is not satisfactory
[0012] To sum up, among the current robust watermarking algorithms: the transform domain algorithm has strong robustness to compression, noise pollution, etc., but is less robust to geometric transformation attacks; the space domain design is robust to geometric transformation attacks. Stick watermark, which has certain robustness to geometric transformation, but does not have the superiority of transform domain algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Synchronous detection method of transformed digital watermark
  • Synchronous detection method of transformed digital watermark
  • Synchronous detection method of transformed digital watermark

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0055] The performance of the method of the present invention is evaluated through a specific example below.

[0056] The carrier image is an 8-bit grayscale Pepper image with 512×512 pixels, and the watermark data is a 64×64-bit binary watermark image. Use logist mapping to generate the spreading code block matrix:

[0057] z n+1=α·z n ·(1-z n ),z n ∈[-1,+1] In the formula, when 3.60 =0.711, parameter α=4, and the parameter α and the initial value z 0 as part of the key. Iteratively generate a pseudo-random sequence with a length of 512×512, and quantize it into p with a value of ±1 n ; put p n Arranged into a spreading code matrix P. Divide matrix P into 64×64 subblocks P i , each sub-block is an 8×8 spreading code matrix P i . Generate another set of 64×64 pseudo-random sequences, quantize them into 0 / 1 equiprobable sequences, and use this sequence to perform modulo 2 addition operation with the 64×64 binary watermark image to obtain the encrypted water...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for synchronous detection of digital watermarking in transform domain, which uses chaotic pseudo-random sequence encryption and frequency spread watermark to embed into mid-high frequency coefficients of carrier image block DCT transform domain to form watermark-embedded image. The receiving end copies the spreading code matrix according to the key, and performs two-dimensional DCT inverse transformation on the elements except the protected part in the upper left corner to obtain the detection code matrix in the corresponding space domain. Geometric transformation is performed on the space-domain detection code matrix, so that each detection code matrix is ​​aligned with the corresponding watermark bit embedding position in the carrier image after the geometric attack. Corresponding bit watermark information is obtained by correlating the aligned detection code matrix with the carrier digital image, and the watermark information is restored after decryption and rearrangement. The invention realizes the synchronous detection of the digital watermark in the transformation domain under the attack of geometric transformation and the like by the exotic domain extraction of the watermark and the watermark tracking detection technology, and effectively improves the overall robustness of the watermark system under the conditions of signal processing such as compression and geometric attack.

Description

Technical field: [0001] The invention relates to a synchronous detection method of transform domain digital watermark, which is particularly suitable for synchronous detection of digital watermark in digital images, videos and other products under the condition of geometric transformation attack. Background technique: [0002] In recent years, with the popularization of computer and Internet technology, as well as the development of multimedia storage and transmission technology, the transmission and sharing of digital products has become very easy, but this has also brought a series of issues related to copyright disputes, such as a large number of digital products been illegally copied. In order to protect the interests of copyright owners, it is hoped that an effective method can be found to protect the intellectual property rights of these digital products. Digital watermarking is a technology that is suitable for copyright protection, release tracking and identity auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/08G06T5/00G06T9/00H04N5/913
Inventor 蒋铃鸽王东建何晨冯国瑞
Owner SHANGHAI JIAOTONG UNIV