Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerable watermark method for protecting electronic signet

A fragile watermark and electronic seal technology, applied in electrical components, image communication, encoding/decoding devices, etc., can solve problems such as embedding formulas and tampering with classification rules without success, and achieve the effect of ensuring integrity

Inactive Publication Date: 2004-10-27
SUN YAT SEN UNIV
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, there is no successful precedent for the research of combining HVS's fragile watermark embedding formula and tampering classification rules.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerable watermark method for protecting electronic signet
  • Vulnerable watermark method for protecting electronic signet
  • Vulnerable watermark method for protecting electronic signet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] figure 1 Among them, the original watermark 4 is a binary image, which is divided into three levels of 1, 2, and 3 after the resolution decreasing operation.

[0065] figure 2 Example for watermark embedding. figure 2 Among them, the original watermark 4 is a binary image, which is divided into three levels 1, 2, and 3 of the watermark pyramid 11 after the resolution decreasing operation; the original image 5 is a grayscale image, and the wavelet coefficient 6 is decomposed by the three-level wavelet, according to In the aforementioned embedding scheme, one layer of the watermark pyramid 11 is embedded in the diagonal direction of the first-level wavelet decomposition (HH 1 subband) coefficient 7, embedding 2 layers of the watermark pyramid 11 in the diagonal direction of the second wavelet decomposition (HH 2 subband) coefficient 8, embedding the 3 layers of the watermark pyramid 11 into the low frequency (LL 3 Subband) coefficient 9, after the embedding is compl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Treating original watermark in binary form, the invention constructs pyramidal watermark with descended resolution layer by layer. Meanwhile, using wavelet transform decomposes multimedia data. Then, according to certain rule, some special wavelet coefficients are selected to embed to watermark. Finally, multimedia data with watermark being embedded into can be obtained through wavelet inverse transform. The invention possesses capability of detecting interpolation including interpolation characteristic and region. The invention also discloses rules of classifying interpolation to distinguish occasional interpolation from vicious interpolation. Thus, vulnerable watermark can resist such as JPEG loss compression etc. content lockout operation. The invention insures reliability of multimedia data released or transferred on network so that it is applicable to authentication possibly.

Description

technical field [0001] The invention relates to a fragile watermark technology based on wavelet transform, which belongs to the field of multimedia signal processing. Background technique [0002] Fragile watermarks are sensitive to any changes imposed on the image. It ensures the authenticity of the original image by detecting the presence, authenticity and integrity of the embedded watermark. In general, fragile watermarks need to meet the following three basic requirements: 1) high sensitivity to tampering; 2) invisibility; 3) security. In recent years, because the traditional multimedia information authentication technology: digital signature (Digital Signature) shows more and more unsatisfactory in multimedia authentication, fragile watermark has gradually become a new research hotspot of authentication technology. Fragile watermark provides a new idea for authenticity and integrity authentication of multimedia information. As an effective supplement to digital signa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G09C5/00H04N1/387
Inventor 胡军全黄继武梁卓斌黄达人
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products