[go: up one dir, main page]

CN101437163A - Multi-watermark technology based on network information theory - Google Patents

Multi-watermark technology based on network information theory Download PDF

Info

Publication number
CN101437163A
CN101437163A CNA2009100007071A CN200910000707A CN101437163A CN 101437163 A CN101437163 A CN 101437163A CN A2009100007071 A CNA2009100007071 A CN A2009100007071A CN 200910000707 A CN200910000707 A CN 200910000707A CN 101437163 A CN101437163 A CN 101437163A
Authority
CN
China
Prior art keywords
watermark
information
carrier
embedding
correlation value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2009100007071A
Other languages
Chinese (zh)
Other versions
CN101437163B (en
Inventor
肖俊
王颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Chinese Academy of Sciences
Original Assignee
University of Chinese Academy of Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Chinese Academy of Sciences filed Critical University of Chinese Academy of Sciences
Priority to CN 200910000707 priority Critical patent/CN101437163B/en
Publication of CN101437163A publication Critical patent/CN101437163A/en
Application granted granted Critical
Publication of CN101437163B publication Critical patent/CN101437163B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

本发明提供一种多水印方法,其基本原理是将多水印的实现过程视为一种含边信息的多用户通信过程,利用相关信源编码定理和多用户通信理论等理论分析并获得通信过程中可利用的边信息,包括水印嵌入和提取两个过程,包括步骤:利用载体的对应分块与各水印编码信号之间的最大线性相关值作为边信息选择嵌入位置、检测阈值和嵌入强度;利用感知模型对水印信号进行感知成形;通过固定载体与水印编码信号之间的线性相关值来调节水印嵌入强度获得含水印载体;通过线性相关检测器进行检测。本方案可有效避免多个水印之间的相互干扰,并具有较好的鲁棒性,可用于网络出版、操作跟踪等场合的版权管理中。The present invention provides a multi-watermarking method, the basic principle of which is to regard the realization process of multi-watermarking as a multi-user communication process with side information, and use the relevant information source coding theorem and multi-user communication theory to analyze and obtain the communication process The side information available in , including two processes of watermark embedding and extraction, includes the steps of: using the maximum linear correlation value between the corresponding block of the carrier and each watermark coded signal as the side information to select the embedding position, detection threshold and embedding strength; The watermark signal is perceptually formed by using the perceptual model; the watermark embedding strength is adjusted by fixing the linear correlation value between the carrier and the watermark coded signal to obtain the watermark carrier; the linear correlation detector is used for detection. This scheme can effectively avoid mutual interference between multiple watermarks, and has better robustness, and can be used in copyright management in network publishing, operation tracking and other occasions.

Description

The multi-watermark technology of information theory Network Based
Technical field
The invention belongs to the Communication and Information Systems field, relate to technology such as information theory and coding and image processing, particularly the digital figure watermark technology.
Background technology
Digital watermarking is considered " last line of defense " of multi-media safety as a kind of technology that rises because of copyright protection, has played important function in the transmission of copyright and preservation process.If in a Digital Media, only embedded an information, then be referred to as single watermark; If embedded two or more information, then be referred to as many watermarks.Along with concrete use increasingly extensive of works transaction, usage track, Web publishing etc. under the network environment, demand to multi-watermark technology is urgent day by day, what the present invention relates to mainly is many watermarks field, is characterized in many watermaking systems are considered as the multi-user communication process of an information theory Network Based.
Multi-watermark technology has been obtained certain achievement in research, and wherein the most representative method can be divided three classes: repeat embedding, piecemeal embedding and merge to embed.
Repeating to embed (Re-Watermarking) is direct, the most tangible method, it is directly transplanted by single watermarking algorithm, thereby in fact be exactly repeatedly to adopt single watermarking algorithm that a plurality of watermark informations are embedded one by one, the watermark quantity that this method embeds directly influences the quality of carrier works, and after adopting this method to embed a plurality of watermarks, when detecting i watermark, must have the i time watermarked after, the i+1 time data before watermarked, this will limit its availability in a lot of practical applications.
Piecemeal embed (Segmented Watermarking) with repeat to embed different, it is cut apart being used for watermarked space, each subspace embeds a different watermark information, thereby realizes the embedding of a plurality of watermark informations, and can detect simultaneously.The restricted number of cutting apart can be with this theoretical watermark quantity that embeds, when cutting apart quantity and increase, each subspace will reduce simultaneously, this moment is the watermarked difficulty more that just becomes in each subspace.And the great advantage of this method is to embed a plurality of watermark informations simultaneously, needn't carry out in order, and can detect simultaneously, therefore uses more in practice.
With watermarked different a kind of scheme one by one is earlier each watermark to be merged, and then the single watermark embedded mode of synthetic watermark according to routine is embedded in the carrier, promptly merges to embed.This method can be broken away from the carrier capacity preferably and embed the restriction of algorithm to watermarked number, but these class methods require good application image integration technology, could obtain effect preferably, and require a plurality of watermarks to embed simultaneously, be not suitable for the situation that to predict watermark number and all watermark informations, comparatively speaking, this type of algorithm is less.But it should be noted that a transform method of these class methods---quadrature watermark method, use more.So-called quadrature watermark method is meant that the watermark of embedding is the pseudo random sequence of quadrature, when coherent detection, can not influence each other like this; This just is equivalent to as a whole embedding is done in the advanced line linearity stack of the pseudo random sequence of a plurality of quadratures then, and the process of this process and fusion is very similar.And when detecting watermark, because mutually orthogonal between each watermark, can the phase mutual interference, but the existence that this method can only detect watermark information usually is whether, and must quadrature or nearly orthogonal between each watermark, this is restricted in actual applications.
To sum up, existing many water mark methods mostly are the simple deformation of single watermarking algorithm, remain to be further developed at aspect of performances such as capacity, validity, robustnesss.
Containing the side information watermark is to produce on the basis of side information theory, network source encoding theory and dirty paper code theory.Cox equals first watermark to be regarded as in 1999 a kind of communication that contains side information.At present, contain the advantage of side information watermaking system, obtain people's approval gradually at aspects such as capacity, robustness, validity.
The present invention is applied to many watermarks field with side information thought, and a kind of new many water mark methods are provided.
Summary of the invention
Prior theory research and experimental study show that all the use of side information can improve the performance of watermaking system really.Yet the application of side information thought in the watermark field mainly concentrates in single watermark, fully used as yet in many watermarks.
Main purpose of the present invention provides a kind of new many water mark methods, its basic principle is that the implementation procedure with many watermarks is considered as a kind of multi-user communication process that contains side information, make full use of the side information that can from entities such as carrier and watermark, obtain in the embodiment side information ideologize watermark implementation procedures such as network source encoding theory and multi-user communication theory, and utilize these side informations to realize the embedding and the extraction of many watermarks.
The multi-watermark technology that the present invention proposes comprises that a kind of information theory Network Based realizes the many water mark methods of piecemeal of the method and an information theory Network Based of many watermarks.
1. information theory Network Based realizes the method for many watermarks
Prior theory research and experimental study show that all the use of side information can improve the performance of watermaking system really, but what adopt at present only is the simplest side information form, promptly for information source X 1With information source X 2, at transmission information source X 1The time, detector only is concerned about whether can effectively detect X 1, and be indifferent to and can detect X 2, as shown in Figure 1; Equally, at transmission information source X 2The time, detector only is concerned about whether can effectively detect X 2, can the pass is indifferent to detect X 1Contain in the side information list watermaking system existing, just as supplementary, more effectively transmit watermark with auxiliary watermaking system from the side information of carrier, this is quite reasonable in single watermaking system.And in many watermaking systems, more than one of the watermark information that need to embed, if still only consider side information between carrier and the different watermarks, the side information thought in so single watermaking system can be applied directly in many watermaking systems; Yet, in fact, may also have correlation between a plurality of watermark informations, and this correlation can be utilized mutually also, and this moment be in identical status between a plurality of watermark informations, it is more reasonable to utilize correlated source coding theorem in the network information theory that it is carried out analysis meeting.Because in the correlated source coding theory, a plurality of information sources are of equal importance, and detector requires to detect effectively all information, and what Fig. 2 showed is a kind of typical correlated source traffic model.
We are on the basis of analyzing network information theories such as correlated source coding theorem, multi-user communication, the implementation procedure of many watermarks is analogized to multi-user communication process based on side information, and the information theory Network Based that provides Fig. 3 to show realizes the embedding grammar of many watermarks.In the method,, from carrier and a plurality of watermark information, extract side information, each watermark information is contained the coding or the preliminary treatment of side information in the watermark encoder stage; Embed the stage in watermark, still fully excavate the side information in carrier and each watermark, to determine embedded location, embedment strength effectively.And, need utilize some side informations in watermark encoder and the watermark embed process to determine detection threshold equally in the watermark detection stage.
2. many water mark methods of the piecemeal of information theory Network Based
Traditional many water mark methods of typical piecemeal are directed to single watermarking algorithm, carrier is carried out piecemeal after, not enough to the correlation utilization between a plurality of of carrier and the many watermarks, be also referred to as blind many watermarking algorithms, performances such as its validity are not high.
We utilize the relevant information between carrier works and watermark information and a plurality of watermark to optimize watermark embedded location, watermark embed strength and watermark detection threshold value, proposed a kind of many water mark methods of piecemeal that make full use of the information theory Network Based of various side informations, what Fig. 4 showed is the block diagram that watermark embeds and extracts.This method replaces a watermark information with big reference templates such as carrier works piecemeal and generation and piecemeals with a reference template, carries out the watermark information preliminary treatment and obtains the watermark information template; Utilize the Watson sensor model to calculate the perception gap, and utilize the perception gap that the watermark information template is carried out the perception shaping and handle,, reduce embedding distortion to improve the fidelity of carrier to greatest extent; Utilize carrier works side information to seek the optimum position that watermark embeds in the mode of maximum correlation, make that the interference between carrier and a plurality of watermark information reaches minimum, the validity when guaranteeing watermark detection; Utilize the carrier side information to determine embedment strength in the mode that fixed linear is relevant, making has fixing linear correlation values between carrier partition and the corresponding watermark information, thereby further guarantees the validity of watermark detection.
Description of drawings
Fig. 1 utilizes form for the simplest side information, and this also is that side information the most frequently used in single watermaking system utilizes mode.
Fig. 2 is a kind of typical correlated source traffic model.
Fig. 3 realizes the block diagram that many watermarks embed for information theory Network Based provided by the invention.
Fig. 4 is many water mark methods of piecemeal schematic diagram of information theory Network Based provided by the invention.
The validity test result of method when selecting carrier image at random that Fig. 5 proposes for the present invention.
The validity test result of method when selecting watermark information at random that Fig. 6 proposes for the present invention.
Embodiment
Describe each detailed problem that relates in the method provided by the present invention in detail below in conjunction with accompanying drawing.
1. information theory Network Based realizes the method for many watermarks
As shown in Figure 3, the information theory Network Based provided by the invention specific embodiments that realizes many watermarks is as follows:
(1) analyze a plurality of watermark m[i to be embedded] (1≤i≤N) and support C oBetween correlation and the correlation between a plurality of watermark information, be that side information is to watermark information m[i with these passes] contain the coding of side information, obtain watermark encoder signal W i, wherein N represents the watermark number that needs embed.
(2) in conjunction with the embedding strategy of fixing robustness, fixedly the embedding strategy etc. of fidelity contains the embedding strategy of side information, according to support C oWith all watermark encoder signal W i(relation between 1≤i≤N) realizes W 1Embedding, in telescopiny, comprise and utilize side information to select embedded location, embedment strength, finally obtain moisture seal signal C W1
(3) repeat above-mentioned steps, all be encoded and embed, finally obtain moisture seal signal C up to all watermark signals W
According to foregoing description, among the present invention watermark encoder with embed device and routine and contain identical in the side information list watermaking system, can adopt various codings and embedded mode, and watermark extraction process also with routine to contain the watermark of side information list identical, its special character is, relates to a plurality of watermarks in the telescopiny, thereby from the angle analysis problem of multi-user communication, and, set up the method that realizes that many watermarks embed based on the correlated source coding theory with a plurality of watermark information fair plays.Compare with existing many water mark methods, its difference is: in the process of a plurality of watermark informations being encoded and embedding, encoder and embedding device have made full use of the correlation between carrier and watermark and a plurality of watermark, and this is the embodiment of network source encoding theory.
2. many water mark methods of the piecemeal of information theory Network Based
As shown in Figure 4, the many water mark methods of piecemeal provided by the invention at first utilize the corresponding piecemeal of carrier works and the maximum linear correlation between the watermark signal to select embedded location as side information, the detection threshold and the embedment strength factor, secondly the carrier works gap array correspondence that will utilize the Watson model to obtain is assigned to its perception is shaped, obtain the watermark encoder signal, regulate watermark embed strength by linear correlation values between immobilization carrier works and the watermark encoder signal then, finish telescopiny, utilize the linear correlation detector to detect at last, the output watermark information.Relate generally to following 4 kinds of modes of utilizing side information in the implementation process:
(1) utilize the corresponding piecemeal of carrier and the maximum linear correlation between the watermark information to select embedded location, detection threshold and embedment strength as side information;
(2) utilize the Watson model to extract the carrier side information, use the gap array that the information model of representing watermark is carried out perception and be shaped, obtain the watermark encoder signal;
(3) utilize carrier to make linear correlation values between the watermark encoder signal, regulate watermark embed strength in the mode of linear correlation values between immobilization carrier and the watermark encoder signal as side information;
(4) detection threshold of determining according to the maximum linear correlation between corresponding piecemeal of carrier and the watermark information detects watermark information in the mode of linear correlation.
Select the implementation step of embedded location, detection threshold and embedment strength 2.1 utilize side information
(1) establish carrier image size and be M1 * N1, watermark quantity to be embedded is N, then according to formula (1) to k watermark m[k] carry out preliminary treatment and obtain watermark information template w m[k],
w m [ k ] = w r [ k ] , m [ k ] = 1 - w r [ k ] , m [ k ] = 0 - - - ( 1 )
W wherein r[k] (1≤k≤N) be size for M * M and between [0,1] pseudo random sequence of Normal Distribution, w r[k, i, j] (1≤i, k value that sequence is located at [i, j] of the expression of j≤M).
(2), carrier is divided into the piece of size for M * M and non-overlapping copies according to watermark quantity
Figure A200910000707D0008145653QIETU
, and use c 0[t, x, y] (1≤i, pixel value in every of the expression of j≤M).
(3) calculate the information model w that represents k watermark mAll piecemeals of [k] and carrier
Figure A200910000707D0008131520QIETU
Between linear correlation values, if watermark m[k]=1, then select and w m[k] has the piece of maximum linear correlation as embedded location, and with maximum related value and the yardstick zoom factor β [k] of time difference of big correlation as watermark, simultaneously will time big correlation threshold tau during as watermark detection Lc[k]; If m[k]=0, then select and w m[k] has the piece of minimal linear correlation as embedded location, and with the difference of minimum correlation value and time little correlation yardstick zoom factor β [k] as watermark, simultaneously will time little correlation threshold tau during as watermark detection Lc[k].Wherein zoom factor β [k] is used for follow-up definite embedment strength.
2.2 utilize the Watson model to extract the implementation step that side information carries out watermark encoder
(1), utilize DC coefficient after each piecemeal discrete cosine transform of carrier to the predefined frequency sensitive kilsyth basalt of Watson model t[i, j according to formula (2)] adjust, obtain brightness and shelter function threshold t L[k, i, j],
t L [ k , i , j ] = t [ i , j ] ( C o [ k , 0,0 ] / C 0,0 ) α T - - - ( 2 )
α wherein TBe a constant, value is 0.649 usually, C o[k, 0,0] is the DC coefficient of k piecemeal after discrete cosine transform in the carrier image, C 0,0Be the mean value of all piecemeal DC coefficient of carrier image, also can be set at the constant of representative image expection intensity.
(2) calculate contrast masking threshold s[k, i, j according to formula (3)],
s[k,i,j]=max{t L[k,i,j],|C o[k,i,j]| w[i,j]t L[k,i,j] 1-w[i,j]} (3)
W[i in the formula, j] be a constant between 0 and 1, and can be different because of the difference of coefficient of frequency, all w[i in the Watson model, j] all be taken as 0.7.Final thresholding s[k, i, j] estimated be every variation size that in a just perceptible scope, can stand of piece discrete cosine transform, also be called the gap.
(3) utilize the gap that the watermark information template is carried out perception and be shaped, promptly at first the watermark information template is carried out discrete cosine transform and obtain W m[k] utilizes formula (4) to W then m[k] carries out perception and is shaped and obtains perception shaping information W under the discrete cosine transform domain s[k],
W s[k]=W m[k]s[k] (4)
At last to W s[k] carries out inverse discrete cosine transform and obtains spatial domain shaping template w s[k], i.e. watermark encoder signal.
Determine the implementation step of embedment strength 2.3 utilize side information
(1) embedment strength of supposing k watermark is α [k], then watermark encoder signal w s[k] will be embedded in the corresponding piecemeal by formula (5),
c w[k]=c o[k]+α[k]w s[k] (5)
At this moment, can calculate moisture seal signal c according to formula (6) w[k] and watermark information template w mLinear correlation values between [k],
z lc(w m[k],c w[k])=(C 0[k]·w m[k]+w a[k]·w m[k])/(M×M) (6)
W wherein α[k] determines according to formula (7).
w a[k]=α[k]w s[k] (7)
In formula (6), use τ Lc[k]+β [k] replaces z Lc(w m[k], c w[k]), can obtain watermark embed strength and be
α [ k ] = L ( τ lc [ k ] + β [ k ] ) - c 0 [ k ] · w m [ k ] w s [ k ] · w m [ k ] - - - ( 8 )
(2) embedment strength that adopts (8) formula to obtain obtains containing watermarking images according to formula (5) embed watermark information.
2.4 extract the implementation step of watermark in conjunction with side information
(1) adopt with telescopiny in identical mode to carrier c to be detected nCarry out piecemeal, and obtain each piecemeal c n[t]
Figure A200910000707D0009131841QIETU
(2) with the embedded location in the telescopiny as key, may contain the piecemeal c of watermark information according to formula (9) nDetect watermark information in [k],
Z wherein Lc(w r[k], c n[k]) expression carrier block c n[k] and watermark information w rLinear correlation values between [k], τ Lc[k] is the detection threshold that utilizes the linear correlation values between carrier partition and the watermark information template to determine in the telescopiny.
3. test result
We are applied in the method that is proposed under the multiple situations such as different images, different watermark informations, have carried out sufficient experiment, have verified the validity of many water mark methods proposed by the invention.Provide below with the method for the present invention's proposition and the experiment comparative result of the many water mark methods of conventional blind piecemeal.In the experiment, the carrier of employing is 256 * 256 gray level image, and the watermark quantity of embedding is 128.The many water mark methods of conventional blind piecemeal are divided into the piece of 256 non-overlapping copies with gray level image, and every block size is 16 * 16, selects 128 piecemeals to be used to embed 128 watermark informations then from 256 piecemeals at random, and identical embedment strength is adopted in all watermarks.
(1) validity of carrier image experiment at random
Consider that different images may have certain influence at random to experiment, in order to prove absolutely the broad applicability of this method, we test carrier at random, and it is constant promptly to fix 128 watermark informations, 1000 experiments are carried out in the continuous conversion of carrier image in 1000 width of cloth images.
Fig. 5 is the distribution situation of the average error rate of the watermark information that extracts of two kinds of methods, experimental result shows: under the situation that carrier image is selected at random, the average error rate of this method mainly is distributed near 0, can obtain good validity, and the average error rate of the many water mark methods of conventional blind piecemeal mainly is distributed on 0.6, and its validity is relatively poor.
(2) random watermark validity experiment
Consider that different watermarks also may affect to experiment, in order to prove absolutely the broad applicability of this method, we test random watermark, and promptly the immobilization carrier image is constant, 128 watermark informations constantly change, and 1000 groups of watermark informations are carried out 1000 experiments.
Fig. 6 is the distribution situation of the average error rate of the watermark information that extracts of two kinds of methods, experimental result shows: under the situation that watermark is selected at random, the average error rate of the method that the present invention proposes is distributed near 0, can obtain good validity, and the average error rate of the many water mark methods of conventional blind piecemeal is distributed between 0.5 and 0.6, and its validity is relatively poor.
(3) robustness experiment
In order further to test the performance of method provided by the invention, we test the robustness of this method, and what table 1 showed is that various common images are handled the attack average error rate of a plurality of watermarks of extraction down.As seen from Table 1, handle under the attack at normal image, method provided by the invention can obtain the lower error rate, promptly has robustness preferably.
To sum up, many water mark methods that the present invention proposes have good validity, and normal image processing attack is had robustness preferably.
The robustness of table 1. this method under the normal image processing is attacked
Attack The error rate
Amplify 2 times 0
Dwindle 1/2 0.023
Low-pass filtering (3 * 3) 0.257
Medium filtering (3 * 3) 0.047
Shear 1/9 0.148
JPEG compresses (50%) 0.035
JPEG compresses (70%) 0.092
Gas noise (0.0008) 0.098

Claims (5)

1.一种基于网络信息理论实现多水印的方法,其特征是:1. A method for realizing multiple watermarks based on network information theory, characterized in that: 将多水印视为一种含边信息的多用户通信过程,利用相关信源编码定理和多用户通信理论分析载体、多个水印、信道和检测器的特性,根据边信息的基本思想从这些特性中提取水印编码、水印嵌入和提取阶段的边信息,并利用这些边信息实现多水印的编码、嵌入和提取。Multi-watermarking is regarded as a multi-user communication process with side information, and the characteristics of carrier, multiple watermarks, channels and detectors are analyzed by using the correlation source coding theorem and multi-user communication theory. Extract the side information of watermark encoding, watermark embedding and extraction stages, and use these side information to realize multi-watermark encoding, embedding and extraction. 2.根据权利要求1所述的方法,其特征在于多水印嵌入的步骤是:2. The method according to claim 1, wherein the step of embedding multiple watermarks is: (1)利用各个水印信息m[i](1≤i≤N)与载体Co之间的相互关系对水印信息m[i]进行含边信息的编码,得到水印编码信号Wi,其中N表示需要嵌入的水印数;(1) Use the relationship between each watermark information m[i] (1≤i≤N) and the carrier C o to encode the watermark information m[i] with side information, and obtain the watermark encoded signal W i , where N Indicates the number of watermarks to be embedded; (2)利用含边信息的嵌入策略,根据载体Co与所有水印编码信号Wi(1≤i≤N)之间的关系实现W1的嵌入,得到含水印信号CW1(2) Using the embedding strategy with side information, realize the embedding of W 1 according to the relationship between the carrier C o and all watermarked signals W i (1≤i≤N), and obtain the watermarked signal C W1 ; (3)重复上述步骤,直到所有水印信号全部嵌入,最终得到含水印信号CW(3) Repeat the above steps until all the watermark signals are embedded, and finally obtain the watermarked signal C W . 3.一种基于网络信息理论的分块多水印方法,其特征是:3. A block multi-watermarking method based on network information theory, characterized in that: (1)利用载体的对应分块与水印信息之间的最大线性相关值作为边信息选择嵌入位置、检测阈值和嵌入强度;(1) Use the maximum linear correlation value between the corresponding block of the carrier and the watermark information as side information to select the embedding position, detection threshold and embedding strength; (2)利用Watson模型提取载体边信息,使用间隙数组对代表水印的信息模板进行感知成形,得到水印编码信号;(2) Use the Watson model to extract the side information of the carrier, and use the gap array to perform perceptual shaping on the information template representing the watermark to obtain the watermark coded signal; (3)利用载体与水印编码信号之间的线性相关值作为边信息,以固定载体与水印编码信号之间线性相关值的方式调节水印嵌入强度。(3) Using the linear correlation value between the carrier and the watermark coded signal as side information, the watermark embedding strength is adjusted by fixing the linear correlation value between the carrier and the watermark coded signal. 4.根据权利要求3,实现多个水印嵌入的具体步骤是:4. according to claim 3, the concrete steps that realize a plurality of watermark embeddings are: (1)设载体图像大小为M1×N1,待嵌入的水印数量为N,则根据式(1)对第k个水印信息m[k]进行预处理得到水印信息模板wm[k],(1) Suppose the size of the carrier image is M1×N1, and the number of watermarks to be embedded is N, then preprocess the kth watermark information m[k] according to formula (1) to obtain the watermark information template w m [k], ww mm [[ kk ]] == ww rr [[ kk ]] ,, mm [[ kk ]] == 11 -- ww rr [[ kk ]] ,, mm [[ kk ]] == 00 -- -- -- (( 11 )) 其中wr[k](1≤k≤N)是大小为M×M且在[0,1]间服从正态分布的伪随机序列,wr[k,i,j](1≤i,j≤M)表示第k个序列在[i,j]处的取值;Where w r [k] (1≤k≤N) is a pseudo-random sequence with a size of M×M and a normal distribution between [0, 1], w r [k, i, j] (1≤i, j≤M) indicates the value of the kth sequence at [i, j]; (2)根据待嵌入的水印数量,将载体分为大小为M×M且互不重叠的块
Figure A200910000707C00022
Figure A200910000707C00023
并用c0[t,x,y](1≤i,j≤M)表示每块中的象素值;
(2) According to the number of watermarks to be embedded, the carrier is divided into blocks with a size of M×M and non-overlapping blocks
Figure A200910000707C00022
Figure A200910000707C00023
And use c 0 [t, x, y] (1≤i, j≤M) to represent the pixel value in each block;
(3)利用载体分块与水印信息模板之间的线性相关值确定水印嵌入位置和检测阈值,即计算代表第k个水印信息的信息模板wm[k]与载体的所有分块
Figure A200910000707C00024
之间的线性相关值,如果水印信息m[k]=1,则选择与wm[k]具有最大线性相关值的块作为嵌入位置,并将最大相关值与次大相关值之差作为水印的尺度缩放因子β[k],同时将次大相关值作为水印检测时的阈值τlc[k];如果m[k]=0,则选择与wm[k]具有最小线性相关值的块作为嵌入位置,并将最小相关值与次小相关值之差作为水印的尺度缩放因子β[k],同时将次小相关值作为水印检测时的阈值τlc[k],其中缩放因子β[k]用于后续确定嵌入强度;
(3) Use the linear correlation value between the carrier block and the watermark information template to determine the watermark embedding position and detection threshold, that is, calculate the information template w m [k] representing the kth watermark information and all the blocks of the carrier
Figure A200910000707C00024
The linear correlation value between, if the watermark information m[k]=1, select the block with the largest linear correlation value with w m [k] as the embedding position, and use the difference between the largest correlation value and the second largest correlation value as the watermark The scaling factor β[k] of , and the second largest correlation value is used as the threshold τ lc [k] for watermark detection; if m[k]=0, select the block with the smallest linear correlation value with w m [k] As the embedding position, the difference between the minimum correlation value and the second smallest correlation value is used as the scaling factor β[k] of the watermark, and the second smallest correlation value is used as the threshold τ lc [k] for watermark detection, where the scaling factor β[ k] for subsequent determination of embedding strength;
(4)根据Watson模型提取边信息,利用间隙对水印信息模板进行感知成形,即首先对水印信息模板进行离散余弦变换得到Wm[k],然后利用式(2)对Wm[k]进行感知成形得到离散余弦变换域下的感知成形信息Ws[k],(4) Extract the side information according to the Watson model, and use the gap to perceptually shape the watermark information template, that is, first perform discrete cosine transform on the watermark information template to obtain W m [k], and then use formula (2) to perform W m [k] Perceptual shaping obtains perceptual shaping information W s [k] in the discrete cosine transform domain, Ws[k]=Wm[k]s[k]   (2)W s [k]=W m [k]s[k] (2) 其中s[k]表示载体块c0[k]的总体感知距离,最后对Ws[k]进行逆离散余弦变换得到空域的感知成形模板ws[k],即水印编码信号;Where s[k] represents the overall perceptual distance of the carrier block c 0 [k], and finally inverse discrete cosine transform is performed on W s [k] to obtain the perceptual shaping template w s [k] in the spatial domain, that is, the watermark coded signal; (5)假设第k个水印的嵌入强度为α[k],则水印编码信号ws[k]将按式(3)嵌入到对应分块中,(5) Assuming that the embedding strength of the kth watermark is α[k], then the encoded watermark signal w s [k] will be embedded into the corresponding block according to formula (3), cw[k]=co[k]+α[k]ws[k]   (3)c w [k]=c o [k]+α[k]w s [k] (3) 此时,可以根据式(4)计算含水印信号cw[k]和水印信息模板wm[k]之间的线性相关值,At this time, the linear correlation value between the watermarked signal c w [k] and the watermark information template w m [k] can be calculated according to formula (4), zlc(wm[k],cw[k])=(c0[k]·wm[k]+wa[k]·wm[k])/(M×M)   (4)z lc (w m [k], c w [k]) = (c 0 [k]·w m [k]+w a [k]·w m [k])/(M×M) (4) 其中wα[k]根据式(5)确定;Where w α [k] is determined according to formula (5); wa[k]=α[k]ws[k]   (5)w a [k]=α[k]w s [k] (5) 在式(4)中,用τlc[k]+β[k]代替zlc(wm[k],cw[k]),即可获得水印嵌入强度α[k];In formula (4), replace z lc (w m [k], c w [k]) with τ lc [k]+β[k] to obtain the watermark embedding strength α[k]; αα [[ kk ]] == LL (( ττ lclc [[ kk ]] ++ ββ [[ kk ]] )) -- cc 00 [[ kk ]] ·· ww mm [[ kk ]] ww sthe s [[ kk ]] ·&Center Dot; ww mm [[ kk ]] -- -- -- (( 66 )) (6)采用式(6)获得的嵌入强度,根据式(3)嵌入水印信息。(6) Use the embedding strength obtained by formula (6), and embed watermark information according to formula (3).
5.根据权利要求3,实现多个水印提取的具体步骤是:5. according to claim 3, the concrete steps that realize that a plurality of watermarks are extracted are: (1)采用与嵌入过程中相同的方式对待检测载体cn进行分块,并记各个分块为
Figure A200910000707C00032
Figure A200910000707C00033
(1) Use the same method as in the embedding process to divide the carrier c n to be detected into blocks, and record each block as
Figure A200910000707C00032
Figure A200910000707C00033
(2)以嵌入过程中的嵌入位置作为密钥,根据式(7)在可能含有水印信息的分块cn[k]中检测水印信息,(2) Use the embedding position in the embedding process as the key, and detect the watermark information in the block c n [k] that may contain watermark information according to formula (7), mm &prime;&prime; [[ kk ]] == 11 zz 11 cc (( ww rr [[ kk ]] ,, cc nno [[ kk ]] )) >> &tau;&tau; lclc [[ kk ]] no watermarkno watermark || zz lclc (( ww rr [[ kk ]] ,, cc nno [[ kk ]] )) || &le;&le; &tau;&tau; lclc [[ kk ]] 00 zz lclc (( ww rr [[ kk ]] ,, cc nno [[ kk ]] )) << -- &tau;&tau; lclc [[ kk ]] -- -- -- (( 77 )) 其中zlc(wr[k],cn[k])表示载体块cn[k]与用来对水印进行预处理的伪随机序列wr[k]之间的线性相关值,τlc[k]是嵌入过程中利用载体分块与水印信息模板之间的线性相关值确定的检测阈值。where z lc (w r [k], c n [k]) represents the linear correlation value between the carrier block c n [k] and the pseudo-random sequence w r [k] used to preprocess the watermark, τ lc [k] is the detection threshold determined by the linear correlation value between the carrier block and the watermark information template during the embedding process.
CN 200910000707 2009-01-08 2009-01-08 Multi-Watermarking Technology Based on Network Information Theory Expired - Fee Related CN101437163B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910000707 CN101437163B (en) 2009-01-08 2009-01-08 Multi-Watermarking Technology Based on Network Information Theory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910000707 CN101437163B (en) 2009-01-08 2009-01-08 Multi-Watermarking Technology Based on Network Information Theory

Publications (2)

Publication Number Publication Date
CN101437163A true CN101437163A (en) 2009-05-20
CN101437163B CN101437163B (en) 2013-05-29

Family

ID=40711350

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910000707 Expired - Fee Related CN101437163B (en) 2009-01-08 2009-01-08 Multi-Watermarking Technology Based on Network Information Theory

Country Status (1)

Country Link
CN (1) CN101437163B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101707718A (en) * 2009-11-18 2010-05-12 北京中星微电子有限公司 Method and device for controlling discrete cosine transform
CN103404164A (en) * 2011-01-14 2013-11-20 耶德托公司 Multiparty watermarking method and system
CN105631434A (en) * 2016-01-18 2016-06-01 天津大学 Method for modeling based on robustness Hash function content identification

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1527257A (en) * 2003-09-18 2004-09-08 上海交通大学 Object-Oriented Self-Synchronization Watermark Detection Method in Multimedia Products
US20040234099A1 (en) * 2001-04-24 2004-11-25 Microsoft Corporation Robust and stealthy video watermarking
CN101288098A (en) * 2005-10-13 2008-10-15 皇家飞利浦电子股份有限公司 Remote informed watermark detection system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040234099A1 (en) * 2001-04-24 2004-11-25 Microsoft Corporation Robust and stealthy video watermarking
CN1527257A (en) * 2003-09-18 2004-09-08 上海交通大学 Object-Oriented Self-Synchronization Watermark Detection Method in Multimedia Products
CN101288098A (en) * 2005-10-13 2008-10-15 皇家飞利浦电子股份有限公司 Remote informed watermark detection system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
肖俊, 王颍: "含边信息的多水印模型", 第十四届全国图象图形学学术会议论文集 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101707718A (en) * 2009-11-18 2010-05-12 北京中星微电子有限公司 Method and device for controlling discrete cosine transform
CN103404164A (en) * 2011-01-14 2013-11-20 耶德托公司 Multiparty watermarking method and system
CN103404164B (en) * 2011-01-14 2017-02-08 爱迪德技术有限公司 Multiparty watermarking method and system
US9667688B2 (en) 2011-01-14 2017-05-30 Irdeto Bv Method and system for providing watermarked content to multiple end user devices
CN105631434A (en) * 2016-01-18 2016-06-01 天津大学 Method for modeling based on robustness Hash function content identification
CN105631434B (en) * 2016-01-18 2018-12-28 天津大学 A method of the content recognition based on robust hashing function is modeled

Also Published As

Publication number Publication date
CN101437163B (en) 2013-05-29

Similar Documents

Publication Publication Date Title
Al-Qershi et al. Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold
Kumar et al. Image transformation technique using steganography methods using LWT technique
CN1411591A (en) Method and arrangement for embedding watermark in information signal
CN108682425B (en) A Robust Digital Audio Watermark Embedding System Based on Constant Watermark
Wu et al. Self-synchronized audio watermark in DWT domain
CN1889176A (en) Anti-DA/AD converting audio-frequency watermark processing method
CN102890814B (en) Watermark embedding and extracting method
CN103050120B (en) high-capacity digital audio reversible watermark processing method
CN100556136C (en) Video watermark process based on the location, moving region
CN101437163A (en) Multi-watermark technology based on network information theory
CN106409302B (en) Audio-frequency water mark method and system based on insertion regional choice
CN101271568B (en) Iteration self-adapting quantizing index modulation watermark method based on vision model
CN101872398A (en) Anti-collusion Digital Fingerprint Method Based on Code Division Multiple Access and Diversity Technology
Sarker et al. FFT-based audio watermarking method with a gray image for copyright protection
Xiao et al. Toward a better understanding of DCT coefficients in watermarking
Khademi et al. Audio watermarking based on quantization index modulation in the frequency domain
CN104637484A (en) MP3 audio steganography detection method based on co-occurrence matrix analysis
Stanković et al. An approach to optimal watermark detection
CN105895109A (en) Digital voice evidence collection and tamper recovery method based on DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform)
Peng et al. Optimal audio watermarking scheme using genetic optimization
Himeur et al. Secure and robust audio watermarking system for copyright protection
Dutta et al. An adaptive robust watermarking algorithm for audio signals using SVD
Xiao et al. Multiple watermarking with side information
CN100512440C (en) Water mark method and device for digital video signal and detecting method and device
Yue et al. Rights protection for trajectory streams

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130529

Termination date: 20150108

EXPY Termination of patent right or utility model