Wavelet-based geometric attack resistant digital watermark method

An anti-geometric attack and digital watermarking technology, applied in the field of digital watermarking and multimedia data protection, can solve the problems of complex embedding and extraction methods, no anti-attack methods, templates are vulnerable to attacks, etc., to achieve invisibility and robustness Sexual Paradoxical Effects

Inactive Publication Date: 2006-07-26
李京兵
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In recent years, some foreign scholars have done some theoretical research on watermarking algorithms against geometric attacks, but the effect is not ideal.
Pereira et al. used the template insertion method, but the template embedding and extraction method is more complicated, the embedded information capacity is small, and the embedded template is vulnerable to attack; O'Ruanaidh et al. based on the Fourier-Mellin transform, using this transform to have RST (Rotate, Scalling, Tran

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wavelet-based geometric attack resistant digital watermark method
  • Wavelet-based geometric attack resistant digital watermark method
  • Wavelet-based geometric attack resistant digital watermark method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096] The present invention will be further described below in conjunction with accompanying drawing:

[0097] Using 1000 sets of independent binary pseudo-random sequences (values ​​+1 or -1), each set of sequence length is 32bit, in these 1000 sets of data, we randomly select a set (here we choose the 500th set), as The embedded watermark sequence. The original image is shown in Figure 3(a). The original image is denoted as F(i, j), where 1≤i≤512, 1≤j≤512. First, it undergoes a layer of wavelet decomposition, and then embeds a watermark in its low-frequency approximation sub-image , and then perform full-image DCT transformation on the approximate sub-image embedded with the watermark, and the corresponding DCT coefficient matrix is ​​FD(i, j), where 1≤i≤256, 1≤j≤256, and it is obtained after Zig_Zag scanning The sorted DCT sequence number is Y(j), the first value Y(1) represents the DC component of the image, and then arranged in order from low to high frequency. Conside...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a digital watermarking technique based on wavelet transformation, which comprises: taking wavelet transformation to original image to embed a watermark into the coefficient of an approximate subgraph for global DCT operation to find out an image feature vector robust to geometrical attack; taking wavelet transformation to the tested image and global DCT operation to the approximate subgraph to find out a feature vector of the tested image for its watermark extracting. This invention has well resistant performance to rotation, reduce and enlarge, and distortion.

Description

technical field [0001] The invention relates to a digital watermark technology based on discrete wavelet transform (DWT) and image visual features, is a multimedia data protection method, and belongs to the field of multimedia signal processing. technical background [0002] At present, digital watermarking is one of the effective methods to protect digital media copyright. At present, most watermarks can only resist conventional attacks such as compression and filtering, and are helpless against common or even tiny geometric attacks. In recent years, some foreign scholars have done some theoretical research on anti-geometric attack watermarking algorithm, but the effect is not ideal. Pereira et al. used the template insertion method, but the template embedding and extraction method is more complicated, the embedded information capacity is small, and the embedded template is vulnerable to attack; O'Ruanaidh et al. based on the Fourier-Mellin transform, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
Inventor 李京兵
Owner 李京兵
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products