Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

232 results about "Watermark algorithm" patented technology

Method for controlling file access of GIS vector data

The invention discloses a method for controlling the file access of GIS (geographical information system) vector data. The method comprises three technical links: the insertion of the copyright mark m into the GIS vector data file, the extraction of the copyright mark m and the data recovery, and the data application monitoring and the data access control, wherein, the copyright mark m is divided into copyright marks for indication and certification. When the GIS vector data products are published, an excessive amount of copyright marks are inserted into the published products by the reversible watermark algorithm and the data accuracy is intentionally reduced, therefore, on one hand, the application of data-sharing among subscribers for educational and general purposes can be supported by directly downloading the data, and on the other hand, the commercial use of data can be limited by reducing the data accuracy. When the data is applied among high-end subscribers for research and commercial purposes, the extraction of the copyright mark and the data recovery can be realized in a real-time and open manner by installing the monitoring program based on the filter driver technology, thereby not only realizing the copyright certification on a real-time basis and acquiring the original lossless data products, but also limiting the unauthorized operation of validated subscribers.
Owner:NANJING NORMAL UNIVERSITY

Multiple digital watermarking method for geographic information system (GIS) vector data

The invention discloses a multiple digital watermarking method for geographic information system (GIS) vector data, and belongs to the field of geographic information copyright protection. The watermark embedding process of the method comprises the following steps of: reading and processing the data; embedding algorithms by an odd-even method; respectively embedding watermarks into a spatial domain, a discrete wavelet transform domain, a discrete cosine transform domain of horizontal coordinates and vertical coordinates by a low-order additive method and a least significant bit substitution method; adopting a zero-watermark algorithm; and storing watermark-containing data. The watermark extraction process of the method is the inverse process of the embedding process. A practical multiple digital watermark protection method is comprehensively integrated aiming at the common attack modes of the GIS vector data and according to the principle and anti-attack performance of each single algorithm. Various embedding modes are adopted and the specific embedding position of each watermark is controlled, so that embedding and extraction are non-interfering, conflicts are avoided, the advantages of each algorithm are exerted and complemented and the anti-attack capability of digital watermarks is greatly improved.
Owner:苏州南师大智慧创意产业有限公司

Three-dimension mesh model copyright verification method

The invention provides a three-dimension mesh model copyright verification method, which comprises the following steps that S1, light holographical encryption copyright watermark information is generated; S2, a three-dimension mesh model is preprocessed; S3, a model geometrical characteristic matrix is built in a cylindrical coordinate system; S4, the geometrical characteristic matrix is subjected to QR decomposition to embed copyright watermark information; S5, the three-dimension mesh model embedded with the copyright watermark information is issued on public information platforms such as Internet; S6, the obtained three-dimension mesh model to be detected is subjected to pre-processing for carrying out QR decomposition on the geometrical characteristic matrix to extract a copyright encryption information grey-scale map, a copyright two-value watermark image is obtained through Fourier inversion and filtering by a two-order Butterworth high pass filter, and the copyright ownership of the three-dimension mesh model can be judged through human eye identification. The method belongs to an air space blind watermark algorithm, higher robustness is realized, and the obvious problems that the existing three-dimension mesh model copyright verification method can be easily cracked and copied, and the copyright anti-fake certification cannot be conveniently or effectively carried out are solved.
Owner:UNIV OF SHANGHAI FOR SCI & TECH

Robust image watermark method based on local Tchebichef moment

InactiveCN101556686AImprove detection accuracyOvercoming the problem of low detection rateImage data processing detailsImaging processingWatermark method
The invention discloses a robust image watermark new method based on a local Tchebichef moment, mainly solving the problem that a watermark arithmetic based on image characteristic at present can not effectively resist general image processing and geometry attack simultaneously. The method comprises the steps as follows: firstly, extracting characteristic points of an original image by utilizing a Harris-Laplace detection operator, and obtaining a group of stable and mutually independent round characteristic areas through characteristic selection; then obtaining a geometrically unchanged round characteristic area through principle direction alignment; and finally, calculating the Tchebichef moment in an inscribed square image block of the round characteristic area, and embedding a watermark through dithering quantized modulation to modify an amplitude value with low-level Tchebichef moment. In detection, the modified low-level Tchebichef moment is obtained through the dithering quantized modulation, and a minimum distance is utilized to realize the blind extraction of the watermark. The invention has favorable nonvisibility, excellent robust performance for general image processing, geometry attach and combined attach and superior performance to similar methods and can be used for copyright protection for different images.
Owner:XIDIAN UNIV

Image digital watermark embedding method and image digital watermark detecting method

The invention provides an image digital watermark embedding method and an image digital watermark detecting method. The watermark embedding method comprises the following steps of: dividing a source image into a center circular block and a plurality of ring belt blocks, and transforming each set of data by a transform domain watermark algorithm and embedding the image digital watermark into the source image; and the watermark detecting method comprises the following steps of: carrying out a blocking step which is as the same as the embedding process on an image to be detected, transforming by the same transform domain watermark algorithm, and extracting and comparing the watermark. After the watermark embedding method and detecting method of the invention are adopted, the technical problem that the common image digital watermark is bad in attack robust performance resistance and small in watermark information capability in the prior art can be solved, the rotation with any angles can be resisted, the zooming with larger times can be resisted, the geometrical transformation attack with larger edge cutting can be resisted, and the methods are easily combined with the other digital watermark technologies, so that the non-geometric transformation attack such as the channel noise, the filtering and the lossy compression can be resisted.
Owner:北京中盈信安科技发展有限责任公司

Time-domain digital audio watermarking method based on audio breakpoint

InactiveCN104810022AGood auditory characteristicsExcellent auditory characteristicsSpeech analysisTime domainAudio watermark
The invention provides a method for embedding and extracting digital audio watermarks in a time domain on the basis of audio breakpoints, and an energy value of an original audio is directly changed on the basis of the original audio according to a numerical value of watermark information and the energy value of the original audio. Only little change is made on the basis of an original signal, and good robustness, cutting resistance and less information increase of watermarks are guaranteed on the premise that the hearing quality of the original audio is not influenced. In a watermark extraction link, the positions of the embedded watermarks can be automatically screened by an extraction algorithm, information which looks like watermarks in numerical logic is excluded, and the capability of storing original watermark information is provided. According to the method, the watermark information is encrypted. The used watermark extraction scheme is a blind watermark algorithm and can be used for processing audio signals, protecting audio products and the like, only fragmentation information of the original audio and reconstruction parameters of watermark signals are needed, and the participation of the original audio and original watermarks is not needed.
Owner:NORTHEAST NORMAL UNIVERSITY

Space domain and frequency domain combined vector spatial data multi-blind watermarking method

ActiveCN104680472AOvercome the shortcomings of weak anti-attack abilitySmall embedding errorImage data processing detailsAlgorithmWatermarking attack
Digital watermarking is considered as an effective digital map copyright protection method. If a watermark has low robustness on a certain aspect, the watermark can be caused to be damaged or deleted, so that data protection can be lost. Currently, for a vector spatial data watermark, a vector spatial data watermark algorithm can be divided into a space domain watermark algorithm and a frequency domain watermark algorithm according to an embedded position of the watermark. However, most of the watermark algorithms adopt a single watermarking technology and each watermarking technology is realized on the basis of one algorithm routine. Vector spatial data adopt a single digital watermarking technology usually cannot resist to various different types of attacks. Aiming at the problem that the single watermark algorithm is difficult to resist to various watermarking attacks, the invention constructs a novel space domain and frequency domain combined vector spatial data multi-blind watermarking method. According to the method, by carrying out chaotic scrambling on a watermark image, a Hash one-way mapping function between the watermark and carrier data is established, and two different embedding methods are used and the watermark is sequentially embedded into a space domain and a frequency domain. The watermark is repeatedly embedded so as to implement blind extraction of the watermark.
Owner:LANZHOU JIAOTONG UNIV

General video digital watermark method

The invention discloses a general video digital watermark method mainly comprising analysis, embedding and extraction processes of a system design scheme. The analysis of the system design scheme comprises determination of a system function, watermark algorithms Ai to be embedded, embedding proportions of all algorithms and minimum extraction frame number Fmin; the watermark embedding process comprises frame distribution of a video file, watermark information pre-processing, embedding of watermark algorithms and formation of video files containing watermarks, wherein the embedding of watermark algorithms comprises the steps of: calculating embedding frame numbers, selecting embedding frames and embedding the watermark; and the watermark extracting process comprises frame distribution of the video file, selection of video frames to be detected, extraction of watermark information and calculation similarity. In the invention, the plurality of watermark algorithms are embedded at the same time and the embedding proportions can be selected, thereby the watermark method obviously enhances attack-resistant property; the watermark embedding ensures the appreciation and the embedding speed of the video file by using a non-frame-by-frame embedding way; in the watermark extracting process, the number of the detecting frames is less and the detection efficiency is improved; in addition, the general video digital watermark method also intensifies the capability of resisting frame edition.
Owner:SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN

Feature invariants based remote sensing image watermark method

The invention discloses a feature invariant based remote sensing image watermark method which is directed at overcoming the incompatibility between anti-geometric attack and anti common image processing attack of the DCT algorithm and at the same time fully exhibits the advantages of 2D code, such as large storage information amount and strong error correction. The method includes the following steps: looking for invariants in 8 x 8 subblocks converted by the DCT algorithm, calculating embedded watermark information bits by using a mapping function in combination with the invariants, marking an initial position of each 8 x 8 subblock with intermediate frequency coefficients. In the process of watermark detection, image blocks containing watermark information can be located in a rapid and accurate manner through the determination of a feature location region. According to the invention, features of pixel digital numbers of remote sensing images before and after the geometric attack are fully utilized to address the problem of desynchrony of watermark information, which substantially increases robustness of the DCT algorithm, addresses the problem of inability of current remote sensing image digital watermark algorithm to resist cropping attacks, and effectively protects copyright of remote sensing image data.
Owner:NANJING NORMAL UNIVERSITY

Image feature matching-based watermarking method and apparatus

Embodiments of the invention provide an image feature matching-based watermarking method and apparatus. The method comprises the steps of acquiring an image file sample set of to-be-embedded watermarkinformation, and extracting line features of all image files in the image file sample set; determining a stable feature point set according to the line features of all the image files; after the watermark information is embedded by modifying stable feature points in the stable feature point set, obtaining a watermark image; and after the stable feature points in the watermark image are matched, extracting and identifying the embedded watermark information. According to the method, the watermark information is embedded by modifying the stable feature points, so that the embedding of the watermark information no longer depends on a watermark font library, and the implementation process is simpler; the watermark algorithm is better in robustness, can resist the attack of zooming and unequalresolution, and is widely suitable for identification of the watermark information in images shot by equipment such as a digital camera, a mobile phone or the like; and feature information-based imagematching is adopted, so that the calculation complexity of watermark information extraction and identification is lower.
Owner:北京数科网维技术有限责任公司

The invention discloses a dData tracing method and system based on a digital watermarking technology

The invention relates to a data tracing method and system based on a digital watermarking technology, and the method comprises the steps: employing a first watermark algorithm, embedding an initial watermark in an original data set, and obtaining an initial data set; E; embedding a transaction watermark into the initial data set to be delivered by utilizing a second watermark algorithm to obtain adelivery data set and delivering the delivery data set to a delivery object; J; judging whether initial watermarks exist in the to-be-traced data set or not, if yes, judging whether transaction watermarks corresponding to the identity information of the to-be-verified candidates exist in the to-be-traced data set or not, and confirming the to-be-verified candidates pointed by the to-be-traced data set according to a judgment result. According to the invention, t, the initial watermark and the transaction watermark are embedded into the data circulated by the data obligee; I; in the data rights protection stage, rights protection audit is conducted on a data obligee through an initial watermark, declaration of a membership right is achieved, t, then in the further data tracing stage, a delivery object pointed by a to-be-traced data set is confirmed through a transaction watermark, and therefore tracing of a leakage source is achieved.
Owner:BEIJING SANSEC TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products