Vulnerable watermark method for protecting electronic signet

A technology of electronic seals and fragile watermarks, applied in electrical components, image communications, encoding/decoding devices, etc., can solve problems such as embedding formulas and tampering with classification rules without success, and achieve the effect of ensuring integrity

Inactive Publication Date: 2005-12-28
SUN YAT SEN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, there is no successful precedent for the research of combining HVS's fragile watermark embedding formula and tampering classification rules.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerable watermark method for protecting electronic signet
  • Vulnerable watermark method for protecting electronic signet
  • Vulnerable watermark method for protecting electronic signet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] figure 1 Among them, the original watermark 4 is a binary image, which is divided into three levels of 1, 2, and 3 after the resolution decreasing operation.

[0065] figure 2 Example for watermark embedding. figure 2 Among them, the original watermark 4 is a binary image, which is divided into three levels 1, 2, and 3 of the watermark pyramid 11 after the resolution decreasing operation; the original image 5 is a grayscale image, and the wavelet coefficient 6 is decomposed by the three-level wavelet, according to In the aforementioned embedding scheme, one layer of the watermark pyramid 11 is embedded in the diagonal direction of the first-level wavelet decomposition (HH 1 subband) coefficient 7, embedding 2 layers of the watermark pyramid 11 in the diagonal direction of the second wavelet decomposition (HH 2 subband) coefficient 8, embedding the 3 layers of the watermark pyramid 11 into the low frequency (LL 3 Subband) coefficient 9, after the embedding is compl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a fragile watermark technology based on wavelet transform, which belongs to the field of multimedia signal processing. The invention first processes the original watermark in binary format, constructs a watermark pyramid with decreasing resolution layer by layer, and uses wavelet transform to decompose multimedia data, and then selects some special wavelet coefficients to embed watermark according to certain rules. Finally, the multimedia data embedded with watermark is obtained by inverse wavelet transform. The present invention has multi-resolution tampering detection capability, ensures accurate detection of tampering characteristics and tampering areas, and the present invention also provides a tampering classification rule, so as to distinguish malicious tampering from accidental tampering, so that the fragile watermark can resist such as JPEG Content preservation operations such as lossy compression meet actual needs. The invention can authenticate the authenticity and integrity of the multimedia data or files propagated through the network, so as to ensure the credibility of the multimedia data when it is transmitted and released through the network.

Description

technical field [0001] The invention relates to a fragile watermark technology based on wavelet transform, which belongs to the field of multimedia signal processing. Background technique [0002] Fragile watermarks are sensitive to any changes imposed on the image. It ensures the authenticity of the original image by detecting the presence, authenticity and integrity of the embedded watermark. In general, fragile watermarks need to meet the following three basic requirements: 1) high sensitivity to tampering; 2) invisibility; 3) security. In recent years, because the traditional multimedia information authentication technology: digital signature (Digital Signature) shows more and more unsatisfactory in multimedia authentication, fragile watermark has gradually become a new research hotspot of authentication technology. Fragile watermark provides a new idea for authenticity and integrity authentication of multimedia information. As an effective supplement to digital signa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G09C5/00H04N1/387
Inventor 胡军全黄继武梁卓斌黄达人
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products