CN105405092A - Secure digital image propagation method based on reversible watermark and mosaic technology - Google Patents
Secure digital image propagation method based on reversible watermark and mosaic technology Download PDFInfo
- Publication number
- CN105405092A CN105405092A CN201510836886.8A CN201510836886A CN105405092A CN 105405092 A CN105405092 A CN 105405092A CN 201510836886 A CN201510836886 A CN 201510836886A CN 105405092 A CN105405092 A CN 105405092A
- Authority
- CN
- China
- Prior art keywords
- image
- information
- take over
- over party
- region
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 64
- 230000002441 reversible effect Effects 0.000 title claims abstract description 60
- 238000005516 engineering process Methods 0.000 title claims abstract description 34
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 54
- 238000011084 recovery Methods 0.000 claims description 11
- 239000000284 extract Substances 0.000 claims description 10
- 238000012805 post-processing Methods 0.000 claims description 7
- 238000003780 insertion Methods 0.000 claims description 3
- 230000037431 insertion Effects 0.000 claims description 3
- 230000001360 synchronised effect Effects 0.000 claims description 3
- 238000000605 extraction Methods 0.000 claims description 2
- 238000012545 processing Methods 0.000 abstract description 2
- 230000005540 biological transmission Effects 0.000 description 9
- 230000000694 effects Effects 0.000 description 3
- 230000006378 damage Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 230000035807 sensation Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/00095—Systems or arrangements for the transmission of the picture signal
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The present invention provides a secure digital image propagation method based on a reversible watermark and a mosaic technology, and belongs to the technical field of image processing. In the method, a sender hides a plurality of regions of an image by using the mosaic technology, respectively sets a viewing authority of each region, when original image generates reversible watermark information by a reversible watermark technology after original image information of a plurality of regions is encrypted, embodies the reversible watermark information into the image obtained after hiding, and then publishes the image; and after the published image is received by a receiver, the image is determined whether to have the hidden regions capable of being used for viewing according to the viewing authority of the receiver, and if the image has the hidden regions, watermark information is extracted by utilizing the reversible watermark technology so as to recover the corresponding hidden regions. According to the method provided by the present invention, different information can be displayed by one image, and very intuitive display can be given to a user before the image is recovered, and based on interest points of the user, the hidden regions which accord with the authority of the user are selected to be recovered, so that not only are the flexibility and execution efficiency enhanced, but also the user experience is greatly enhanced.
Description
Technical field
The present invention relates to technical field of image processing, and be specifically related to a kind of secure digital image transmission method based on reversible water mark and mosaic technology.
Background technology
Along with the develop rapidly of multimedia technology, people are more and more frequent for catching of image and video, and the appearance of smart mobile phone of particularly taking pictures, makes the shooting of image, video and propagation amount reach unprecedented height.For a series of problem of share presence of these pictures, such as when not wishing that image is seen by some people, current way arranges different viewing authorities when sharing for different people, the people such as had permission can see these pictures, do not have the people of authority can't see, but this way is more loaded down with trivial details, needs to arrange different viewing authorities to different people when issuing photo, and for whole photo, photo can only can not be divided into multiple part and authority is set respectively.In addition, present existence is much by the scene of picture transmission information, in order to the security of image, image ciphering transmits by the supplier issuing image, take over party must have corresponding secret key just can decipher and see picture, such as be transferred to take over party by the other side's decompress(ion) by the mode of traditional compressed package, or take over party inputs the picture etc. that user name password just can download needs on the website of supplier.This mode has problems equally, and namely take over party cannot see the relevant information of this picture before seeing picture at all, so cannot know to be oneself interested picture, if lost interest in, so receiving also decompress(ion) is the movement of losing time; In addition, image remains overall encryption, and for piece image, can not be divided into the part of multiple different rights, checks appropriate section by different take over partys according to authority.These existing modes bring inconvenience to the propagation of image, and the non-constant of Consumer's Experience.
Summary of the invention
In order to solve the problems of the technologies described above, the present invention proposes a kind of secure digital image transmission method based on reversible water mark and mosaic technology, it is when only transmitting piece image, it can not only be the partial information that user shows this image intuitively, and fraction can be limited to different user and show different contents, and original image can not be destroyed completely.
First the present invention proposes a kind of secure digital image sending method based on reversible water mark and mosaic technology, described sending method is included in transmit leg execution: step one, opens original image and one or more hidden areas that selection will be hidden in original image; Step 2, arranges the reading authority corresponding with each region in described one or more hidden area; Step 3, extract described each region original image information and according to arrange this original image information of reading rights encryption; Step 4, utilizes mosaic technology to stamp mosaic to the one or more hidden areas that will hide, obtains the first image; Step 5, by reversible water mark technology using the original image information after the mark in each region, reading authority, positional information and encryption as reversible water mark information insertion first image, and obtain the second image; Step 6, issues the second image.
According to an aspect of the present invention, in described step one, described hidden area can be the regular figure of arbitrary size.
According to an aspect of the present invention, in described step 3, described transmit leg searches the secret key of the encryption corresponding with authority of reading, and the timing of described transmit leg upgrades the secret key of described encryption and is synchronized to the take over party with corresponding reading authority.
According to an aspect of the present invention, in described step 4, before breaking mosaic, the weight of the sender-selected described mosaic that will beat, and select the mosaic of different weight to hide this region according to the significance level in the region that will hide.
According to an aspect of the present invention, in described step 5, described reversible water mark information comprises header and image information, and wherein, described header comprises the mark in each region, the corresponding head and the tail pointer reading authority and respective image information; Comprise the respective image information in each region in image information, described respective image information comprises the positional information in this region and the original image information after encrypting
According to an aspect of the present invention, if the region that will hide is rectangle, so this positional information comprises top left co-ordinate and the lower right corner coordinate in this region; If circular, this positional information comprises home position and radius; If triangle, this positional information is the coordinate on three summits.
The invention allows for the secure digital image-receptive method based on reversible water mark and mosaic technology, described method of reseptance be included in take over party perform: step one, receives the second image issued according to the sending method of claim arbitrary in claim 1-6; Step 2, utilizes reversible water mark technology extract the reversible water mark information in described second image and revert to the first image to show take over party; Step 3, obtains reading authority and the secret key of the deciphering corresponding with this reading authority of take over party; Step 4, judges the information whether comprising the hidden area corresponding with the reading authority of take over party in described reversible water mark information, if comprised, performs step 5, otherwise performs step 7; Step 5, extracts the information of hidden area corresponding with the reading authority of take over party in reversible water mark information, and recovers described hidden area; Step 6, will recover the image shows after hidden area to user and process ends; Step 7, prompting user lack of competence checks hidden area and process ends.
According to an aspect of the present invention, between the step 2 that described method of reseptance performs take over party and step 3, also comprise user and select step, wherein after take over party have viewed the first image, determine whether to carry out Postprocessing technique according to the selection of take over party, step 3 is performed after take over party determines to carry out Postprocessing technique, otherwise process ends.
According to an aspect of the present invention, in described step 4, the information judging whether to comprise in described reversible water mark information the hidden area corresponding with the reading authority of take over party comprises and the reading authority in the reading authority of take over party and reversible water mark information being compared, and obtains the hidden area that take over party can recover.
According to an aspect of the present invention, in described step 4, the reading authority that acquisition is stored in the header of reversible water mark information also compares with the reading authority of take over party.
According to an aspect of the present invention, described step 5 comprises: obtain and take over party reads the positional information of hidden area corresponding to authority and the original image information of encryption of hidden area; Obtain the deciphering secret key corresponding with the reading authority of take over party; Original image information has been encrypted to obtain unencrypted original image information according to the secret key deciphering of described deciphering; According to the positional information of hidden area, unencrypted original image information is used to replace the mosaic of relevant position thus recover described hidden area.
According to an aspect of the present invention, the information of hidden area corresponding with the reading authority of take over party in the extraction reversible water mark information of described step 5, and before recovering described hidden area, obtain the position of the hidden area corresponding with the reading authority of take over party, and in the first image, give take over party instruction, and selected the region that will recover by take over party.
According to an aspect of the present invention, take over party's hidden area corresponding with the reading authority with take over party that instruction is included in the first image shows recovery button to described giving in the first image, describedly selects the region that will recover to comprise take over party by take over party to click the recovery button that the region that will recover is shown.
As can be seen here, the technical scheme that the present invention proposes is by hiding picture portion, utilize the information that the storage of reversible water mark technology is hidden, and by the fuzzy region that will hide of mosaic technology, can show that different information is to different users by piece image, original image can't be damaged in the process, can before recovery for user provides the relevant information of this image intuitively, user can determine whether image of interest according to this information, thus determine whether Recovery image, and can decide according to the selection of user the image recovering that region, this greatly improves now methodical dirigibility and execution efficiency, and greatly improve Consumer's Experience.
Accompanying drawing explanation
Fig. 1 is the transmission flow figure of the secure digital image transmission method that the present invention proposes;
Fig. 2 is the reception process flow diagram of the secure digital image transmission method that the present invention proposes;
Fig. 3 represents that the original image of flow process shown in Fig. 1 is changed to the exemplary plot sending image;
To be the transmission image change of flow process shown in marked graph 2 be Fig. 4 corresponds to the exemplary plot of the image of take over party's authority.
Embodiment
The object being only explanation proposes following embodiment, and these embodiments do not limit protection scope of the present invention.
First show the issue process flow diagram of safety image transmission method according to an embodiment of the invention see Fig. 1, Fig. 1, described method comprises the steps:
Step one, opens original image and one or more hidden areas that selection will be hidden in original image.
One width is had to the image of some security information, these security information are the contents that will hide, and also the content of not all needs to hide, so in the present invention, piece image entirety is not hidden, like this, take over party also can understand the related content of image substantially, thus judge whether to recover image, save user time, also improve Consumer's Experience.Upper left-hand image such as shown in Fig. 3 is original image, have in this image A, B, C tri-place be the content (shown in the image of Fig. 3 upper right side) that the publisher of picture wants to hide, such as contain the information such as such as number, special marking etc. that can identify shown house, at this moment, first publisher needs to select these three regions as region to be concealed.The shape in described one or more region can be the regular figure of arbitrary size, such as rectangle, circle, triangle etc.What such as Fig. 3 selected is rectangle.The benefit of regular figure is adopted to be the positional information can expressing this region simply.
Step 2, arranges the reading authority corresponding with each region in described one or more hidden area.
The dirigibility of method proposed by the invention is embodied in step 2, namely only some part of image is not hidden, and these parts can also be set to different reading authorities, that is, for piece image, the take over party of different reading authority can see different images, like this, can ensure that once issuing of piece image just can meet the reading demand of different rights, greatly reduce the network of issue needed for image and storage resources.
Step 3, extract each region original image information and according to arrange this original image information of reading rights encryption.
For each reading authority, all there is the corresponding secret key of encryption, like this, after setting reading authority corresponding to each region, just the raw information in described each region can be extracted and adopt the encryption secret key corresponding to reading authority to be encrypted, obtaining the information after the encryption of each region.Its object is to the security of propagating to improve image, namely after take over party receives the image of issue, not only needing authority, and need that there is the original contents that the secret key of the deciphering corresponding with this authority could recover this region.Like this, transmit leg can regular update with the corresponding secret key of encryption of reading authority with decipher secret key, and secret for deciphering key is synchronized to take over party, the situation generation be cracked to prevent the secret key of encryption and decryption.That is, authority is the first line of defence, and encrypt secret key and deciphering secret key be second defence line.
Step 4, utilizes mosaic technology to stamp mosaic to the one or more hidden areas that will hide, obtains the first image.
The object using mosaic technology not only can hide this region, and can to this region of people comparatively fuzzy and and the sensation that can't see of non-fully.The Consumer's Experience of the image using this technology to obtain is better, this is because from psychologic angle, indistinct image is larger for the attractive force of user, can inform that there is corresponding information in this region of user really, thus impel take over party to recover this region.As shown in the top right plot of Fig. 3, to hide A, B, C tri-place stamped mosaic, and as described above, the area size of A, B, C and shape can arbitrarily be arranged.Certainly, the light and heavy degree of mosaic also can be selected as required, and such as some important informations can stamp very heavy mosaic, otherwise can stamp slightly light mosaic.
Step 5, by reversible water mark technology using the original image information after the mark in each region, reading authority, position and encryption as reversible water mark information insertion first image, and obtain the second image.
An effect of digital watermark embeds some identification informations in video or image, thus whether this video traceable or image are issued by regular channel, general digital watermark is after to video or image embedding information, irreversible destruction is carried out to video or image, namely cannot revert to original video or image.Reversible water mark technology is the technology that can revert to original image or video developed on the basis of digital watermark, although namely original video or image receive destruction owing to embedded in reversible water mark information, but by reversible water mark technology, original video or image can be reverted to after extracting described reversible water mark information.Adopt reversible water mark technology to be not intended to hide the information representing publisher in the present invention, but want the information wanting protection zone in hidden image.Certainly, the present invention can adopt existing any reversible water mark technology to carry out, and owing to not relating to the improvement to reversible water mark technique algorithm itself, therefore repeats no more.Below, for the ease of understanding, by the reversible water mark information embedded by natural language description.Such as region A, B, the C shown in Fig. 3, the reversible water mark information that embed comprises:
The id of region A; The reading authority of region A; The position of region A; Original image information after the encryption of region A;
The id of region B; The reading authority of region B; The position of region B; Original image information after the encryption of region B;
The id of region C; The reading authority of region C; The position of region C; Original image information after the encryption of region C.
In order to the convenience of take over party's Recovery image, the reversible water mark information that will embed is divided into two parts, is header and image information respectively, comprises the id in each region, the corresponding head and the tail pointer reading authority and respective image information at header; Comprise the respective image information in each region in image information, described respective image information comprises position and the original image information in this region.As for why dividing like this, be described in detail in take over party's flow process hereafter.
In addition, if each region is rectangle, the positional information in so each region can comprise top left co-ordinate and lower right corner coordinate; If circular, this information can comprise home position and radius; It is the coordinate on three summits during triangle.Other figures are no longer exhaustive.
After step 5, the image of acquisition is as shown in the figure of Fig. 3 bottom.This figure is only an example, shows that the first image stamping mosaic can change, but one skilled in the art will appreciate that this change can't affect the visibility of picture too much after embedding reversible water mark information.
Step 6, issues the second image.
Thus, the subregion point authority process for image is just finished, and this image can be issued by publisher.
Below, see Fig. 2, we describe the treatment scheme of take over party.
Step one, receives the second image issued;
By mentioned earlier, the second image can once be issued by publisher, and different take over partys can receive same piece image and present different display effects.Receive the second image as shown in the figure of the bottom of Fig. 4, owing to embedded in watermark information, so impression quality declines to some extent.
Step 2, utilizes reversible water mark technology extract the reversible water mark information in described second image and revert to the first image to show take over party.
In this step, in order to not affect the perception of user, promote Consumer's Experience, what first we did is exactly use reversible water mark technology that the second image being subject to embed watermark impact is recovered, like this, first image shows that top-right for such as Fig. 4 picture rich in detail and transmit leg can be generated is to user, and then user can select whether will carry out image restoration.
That is, this step 2 and below step 3 between, also can have user and select step, namely after take over party have viewed the first image, determine whether to carry out Postprocessing technique according to the selection of take over party.Like this, when take over party finds to lose interest in by the visual information of this width image, just no longer can lose time carry out further Postprocessing technique but terminate this flow process, thus further decrease waste of time and improve Consumer's Experience.When take over party selects to carry out Postprocessing technique, perform step 3.
Step 3, obtains reading authority and the secret key of the deciphering corresponding with this reading authority of take over party.
As described above, for piece image, each hidden area wherein can have different authorities, and take over partys different like this can watch different images, thus has very large dirigibility.So, if take over party wants Recovery image, so first need to obtain the authority of take over party and judge whether to have permission and recover.In addition, the original image information required for Recovery image is encrypted, therefore can obtain the secret key of the deciphering corresponding with this authority in the lump here.Certainly, obtain in the step 5 that the acquisition of the secret key of this deciphering also can really recover below.
Step 4, judges the information whether comprising the hidden area corresponding with the reading authority of take over party in described reversible water mark information.
As described above, reversible water mark packets of information is containing the original image information after the mark in each region, authority of reading, position and encryption, and what so first will do is judge whether take over party has permission hidden area of reading.Therefore, first the reading authority in the reading authority of take over party and reversible water mark information is compared, obtain the hidden area that take over party can recover.If comprise the information of the hidden area corresponding with the reading authority of take over party in reversible water mark information, then perform step 5, otherwise perform step 7.
As described above, described reversible water mark information can comprise header and image information, comprises the id in each region, the corresponding head and the tail pointer reading authority and respective image information at header; Comprise the respective image information in each region in image information, described respective image information comprises position and the original image information in this region.This organizational form is very beneficial for the judgement of step 4.Namely only obtain header, therefrom check the reading authority whether existing and match with take over party, the execution efficiency of the method can be improved so further.
Step 5, extracts the information of hidden area corresponding with the reading authority of take over party in reversible water mark information, and recovers described hidden area.
Step 5 specifically comprises:
Obtain the positional information of hidden area and the original image information of encryption of hidden area;
Obtain the deciphering secret key corresponding with the reading authority of take over party;
Original image information has been encrypted to obtain unencrypted original image information according to the secret key deciphering of described deciphering;
According to the positional information of hidden area, unencrypted original image information is used to replace the mosaic of relevant position thus recover described hidden area.
In order to promote Consumer's Experience further, when judging the information comprising the hidden area corresponding with the reading authority of take over party in reversible water mark information, take over party can be pointed out recoverable hidden area, to be selected the hidden area that will recover by take over party.Such as step 5 " extract the information of hidden area corresponding with the reading authority of take over party in reversible water mark information; and recover described hidden area " before, first the position of recoverable hidden area is obtained, and in the first image, give take over party instruction, and clicked the region that will recover by take over party.According to an embodiment, in A, B, C region such as shown in Fig. 4, recovery button can be shown in recoverable region, after take over party clicks recovery button, this region be recovered.These means seem simple, but can significant increase Consumer's Experience, there is unforeseeable technique effect, such as in public places, take over party is when A, B, C tri-regions all have permission viewing, the fuzzy prompting that he can provide according to mosaic and its particular location select whether to watch the original image in certain region, such as some information can watch the button so can directly clicked on this region in public, can watch after a while for the region be suitable in occasion viewing privately.
Step 6, will recover the image shows after hidden area to user and process ends.
As shown in the picture left above of Fig. 4, take over party only has the reading authority to B, C region, and therefore, showing the image of take over party to be region A is still the image of mosaic.
Step 7, prompting user lack of competence checks hidden area and process ends.
When take over party does not have authority to check any one hidden area, point out this information of user and process ends.
In addition, the invention allows for a kind of device for performing said method, the unit that described device comprises is respectively used to each step or the sub-step that perform the method, repeats no more here.
Above-described embodiment proposed by the invention is only explanation of the present invention, not as limiting the scope of the invention.Those skilled in the art can modify the present invention based on above-mentioned explanation, and these amendments belong to content disclosed by the invention equally and fall within the scope of protection of the present invention.
Claims (13)
1. based on a secure digital image sending method for reversible water mark and mosaic technology, it is characterized in that, described sending method is included in that transmit leg performs:
Step one, opens original image and one or more hidden areas that selection will be hidden in original image;
Step 2, arranges the reading authority corresponding with each region in described one or more hidden area;
Step 3, extract described each region original image information and according to arrange this original image information of reading rights encryption;
Step 4, utilizes mosaic technology to stamp mosaic to the one or more hidden areas that will hide, obtains the first image;
Step 5, by reversible water mark technology using the original image information after the mark in each region, reading authority, positional information and encryption as reversible water mark information insertion first image, and obtain the second image;
Step 6, issues the second image.
2. sending method according to claim 1, is characterized in that:
In described step one, described hidden area can be the regular figure of arbitrary size.
3. sending method according to claim 1, is characterized in that:
In described step 3, described transmit leg searches the secret key of the encryption corresponding with authority of reading, and the timing of described transmit leg upgrades the secret key of described encryption and is synchronized to the take over party with corresponding reading authority.
4. sending method according to claim 1, is characterized in that:
In described step 4, before breaking mosaic, the weight of the sender-selected described mosaic that will beat, and select the mosaic of different weight to hide this region according to the significance level in the region that will hide.
5. sending method according to claim 1, is characterized in that:
In described step 5, described reversible water mark information comprises header and image information, and wherein, described header comprises the mark in each region, the corresponding head and the tail pointer reading authority and respective image information; Comprise the respective image information in each region in image information, described respective image information comprises the positional information in this region and the original image information after encrypting.
6. sending method according to claim 1 or 5, is characterized in that:
If the region hidden is rectangle, so this positional information comprises top left co-ordinate and the lower right corner coordinate in this region; If circular, this positional information comprises home position and radius; If triangle, this positional information is the coordinate on three summits.
7. based on the secure digital image-receptive method of reversible water mark and mosaic technology, it is characterized in that, described method of reseptance is included in that take over party performs:
Step one, receives the second image issued according to the sending method of claim arbitrary in claim 1-6;
Step 2, utilizes reversible water mark technology extract the reversible water mark information in described second image and revert to the first image to show take over party;
Step 3, obtains reading authority and the secret key of the deciphering corresponding with this reading authority of take over party;
Step 4, judges the information whether comprising the hidden area corresponding with the reading authority of take over party in described reversible water mark information, if comprised, performs step 5, otherwise performs step 7;
Step 5, extracts the information of hidden area corresponding with the reading authority of take over party in reversible water mark information, and recovers described hidden area;
Step 6, will recover the image shows after hidden area to user and process ends;
Step 7, prompting user lack of competence checks hidden area and process ends.
8. method of reseptance according to claim 7, is characterized in that:
Between the step 2 that described method of reseptance performs take over party and step 3, also comprise user and select step, wherein after take over party have viewed the first image, determine whether to carry out Postprocessing technique according to the selection of take over party, step 3 is performed after take over party determines to carry out Postprocessing technique, otherwise process ends.
9. method of reseptance according to claim 7, is characterized in that:
In described step 4, the information judging whether to comprise in described reversible water mark information the hidden area corresponding with the reading authority of take over party comprises and the reading authority in the reading authority of take over party and reversible water mark information being compared, and obtains the hidden area that take over party can recover.
10. method of reseptance according to claim 9, is characterized in that:
In described step 4, the reading authority that acquisition is stored in the header of reversible water mark information also compares with the reading authority of take over party.
11. method of reseptances according to claim 7, is characterized in that:
Described step 5 comprises:
To obtain and take over party reads the positional information of hidden area corresponding to authority and the original image information of encryption of hidden area;
Obtain the deciphering secret key corresponding with the reading authority of take over party;
Original image information has been encrypted to obtain unencrypted original image information according to the secret key deciphering of described deciphering;
According to the positional information of hidden area, unencrypted original image information is used to replace the mosaic of relevant position thus recover described hidden area.
12. method of reseptances according to claim 7, is characterized in that:
The information of hidden area corresponding with the reading authority of take over party in the extraction reversible water mark information of described step 5, and before recovering described hidden area, obtain the position of the hidden area corresponding with the reading authority of take over party, and in the first image, give take over party instruction, and selected the region that will recover by take over party.
13. method of reseptances according to claim 12, is characterized in that:
Take over party's hidden area corresponding with the reading authority with take over party that instruction is included in the first image shows recovery button to described giving in the first image, describedly selects the region that will recover to comprise take over party by take over party to click the recovery button that the region that will recover is shown.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510836886.8A CN105405092A (en) | 2015-11-26 | 2015-11-26 | Secure digital image propagation method based on reversible watermark and mosaic technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510836886.8A CN105405092A (en) | 2015-11-26 | 2015-11-26 | Secure digital image propagation method based on reversible watermark and mosaic technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105405092A true CN105405092A (en) | 2016-03-16 |
Family
ID=55470560
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510836886.8A Pending CN105405092A (en) | 2015-11-26 | 2015-11-26 | Secure digital image propagation method based on reversible watermark and mosaic technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105405092A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108073821A (en) * | 2016-11-09 | 2018-05-25 | 中国移动通信有限公司研究院 | Data safety processing method and device |
CN108132746A (en) * | 2016-12-01 | 2018-06-08 | 腾讯科技(北京)有限公司 | A kind of image display method, device and equipment |
CN108833921A (en) * | 2018-06-12 | 2018-11-16 | 浙江大华技术股份有限公司 | A kind of decoding method and device |
CN109889348A (en) * | 2018-12-24 | 2019-06-14 | 维沃移动通信有限公司 | An image sharing method and device |
CN110087098A (en) * | 2018-01-26 | 2019-08-02 | 优酷网络技术(北京)有限公司 | Watermark handling method and device |
CN110497852A (en) * | 2018-05-18 | 2019-11-26 | 株式会社电装 | Vehicle-mounted vidicon and camera chain |
CN110851842A (en) * | 2018-08-20 | 2020-02-28 | 珠海金山办公软件有限公司 | Document display method and device and electronic equipment |
CN111010490A (en) * | 2019-12-12 | 2020-04-14 | 上海众源网络有限公司 | Watermark adding method, watermark adding device, electronic equipment and computer readable storage medium |
CN111836065A (en) * | 2020-07-14 | 2020-10-27 | 韶关市启之信息技术有限公司 | Intelligent method for automatically hiding live broadcast trademark |
CN112634307A (en) * | 2020-12-02 | 2021-04-09 | 深圳前海微众银行股份有限公司 | Data distribution method and device based on block chain |
WO2021135614A1 (en) * | 2019-12-31 | 2021-07-08 | 杭州海康威视数字技术股份有限公司 | Video processing method, apparatus, and system |
CN113177876A (en) * | 2021-04-09 | 2021-07-27 | 作业帮教育科技(北京)有限公司 | Picture processing method and device and electronic equipment |
CN115037711A (en) * | 2022-06-07 | 2022-09-09 | 元心信息科技集团有限公司 | Data processing method and device, electronic equipment and computer readable storage medium |
RU2789856C1 (en) * | 2019-12-31 | 2023-02-14 | Ханчжоу Хиквижн Диджитал Текнолоджи Ко., Лтд. | Method, device and system for video processing |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101086754A (en) * | 2006-06-09 | 2007-12-12 | 中国科学院研究生院 | Mobile image digital copyright secure processing system based on digital watermark technology |
WO2008053545A1 (en) * | 2006-10-31 | 2008-05-08 | Fujitsu Limited | Image encryption/decryption device, method and program |
CN101355684A (en) * | 2007-07-24 | 2009-01-28 | 中国移动通信集团公司 | Image digital content sending and receiving method and its sender and receiver |
CN101370069A (en) * | 2007-05-30 | 2009-02-18 | 富士通株式会社 | Image encryption/decryption system |
CN101739657A (en) * | 2009-11-06 | 2010-06-16 | 上海第二工业大学 | DCT domain-based color image digital watermark embedding method and DCT domain-based color image digital watermark extracting method |
CN103824249A (en) * | 2014-03-21 | 2014-05-28 | 上海斐讯数据通信技术有限公司 | Picture hiding and acquiring method and intelligent terminal |
CN104680077A (en) * | 2015-01-20 | 2015-06-03 | 中兴通讯股份有限公司 | Picture encryption method and picture checking method, system and terminal |
WO2015131713A1 (en) * | 2014-09-19 | 2015-09-11 | 中兴通讯股份有限公司 | Image processing and access method and apparatus |
-
2015
- 2015-11-26 CN CN201510836886.8A patent/CN105405092A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101086754A (en) * | 2006-06-09 | 2007-12-12 | 中国科学院研究生院 | Mobile image digital copyright secure processing system based on digital watermark technology |
WO2008053545A1 (en) * | 2006-10-31 | 2008-05-08 | Fujitsu Limited | Image encryption/decryption device, method and program |
CN101370069A (en) * | 2007-05-30 | 2009-02-18 | 富士通株式会社 | Image encryption/decryption system |
CN101355684A (en) * | 2007-07-24 | 2009-01-28 | 中国移动通信集团公司 | Image digital content sending and receiving method and its sender and receiver |
CN101739657A (en) * | 2009-11-06 | 2010-06-16 | 上海第二工业大学 | DCT domain-based color image digital watermark embedding method and DCT domain-based color image digital watermark extracting method |
CN103824249A (en) * | 2014-03-21 | 2014-05-28 | 上海斐讯数据通信技术有限公司 | Picture hiding and acquiring method and intelligent terminal |
WO2015131713A1 (en) * | 2014-09-19 | 2015-09-11 | 中兴通讯股份有限公司 | Image processing and access method and apparatus |
CN104680077A (en) * | 2015-01-20 | 2015-06-03 | 中兴通讯股份有限公司 | Picture encryption method and picture checking method, system and terminal |
Non-Patent Citations (4)
Title |
---|
杨益 等: "基于DCT的彩色图像数字水印算法", 《计算技术与自动化》 * |
葛秀慧: "《信息隐藏原理及应用》", 31 October 2008, 清华大学出版社 * |
袁中兰: "利用数字水印实现资源的远程访问控制", 《2005通信理论与技术新进展——第十届全国青年通信学术会议论文集》 * |
阎毅: "《信息科学技术导论》", 31 August 2014, 西安电子科技大学出版社 * |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108073821A (en) * | 2016-11-09 | 2018-05-25 | 中国移动通信有限公司研究院 | Data safety processing method and device |
CN108132746A (en) * | 2016-12-01 | 2018-06-08 | 腾讯科技(北京)有限公司 | A kind of image display method, device and equipment |
CN110087098A (en) * | 2018-01-26 | 2019-08-02 | 优酷网络技术(北京)有限公司 | Watermark handling method and device |
CN110497852A (en) * | 2018-05-18 | 2019-11-26 | 株式会社电装 | Vehicle-mounted vidicon and camera chain |
CN108833921A (en) * | 2018-06-12 | 2018-11-16 | 浙江大华技术股份有限公司 | A kind of decoding method and device |
CN108833921B (en) * | 2018-06-12 | 2022-06-17 | 浙江大华技术股份有限公司 | Encoding and decoding method and device |
CN110851842A (en) * | 2018-08-20 | 2020-02-28 | 珠海金山办公软件有限公司 | Document display method and device and electronic equipment |
CN109889348B (en) * | 2018-12-24 | 2022-02-01 | 维沃移动通信有限公司 | Image sharing method and device |
CN109889348A (en) * | 2018-12-24 | 2019-06-14 | 维沃移动通信有限公司 | An image sharing method and device |
CN111010490A (en) * | 2019-12-12 | 2020-04-14 | 上海众源网络有限公司 | Watermark adding method, watermark adding device, electronic equipment and computer readable storage medium |
WO2021135614A1 (en) * | 2019-12-31 | 2021-07-08 | 杭州海康威视数字技术股份有限公司 | Video processing method, apparatus, and system |
RU2789856C1 (en) * | 2019-12-31 | 2023-02-14 | Ханчжоу Хиквижн Диджитал Текнолоджи Ко., Лтд. | Method, device and system for video processing |
US12026950B2 (en) | 2019-12-31 | 2024-07-02 | Hangzhou Hikvision Digital Technology Co., Ltd. | Video processing method, apparatus and system |
CN111836065A (en) * | 2020-07-14 | 2020-10-27 | 韶关市启之信息技术有限公司 | Intelligent method for automatically hiding live broadcast trademark |
CN111836065B (en) * | 2020-07-14 | 2022-04-29 | 北京场景互娱传媒科技有限公司 | Intelligent method for automatically hiding live broadcast trademark |
CN112634307A (en) * | 2020-12-02 | 2021-04-09 | 深圳前海微众银行股份有限公司 | Data distribution method and device based on block chain |
CN113177876A (en) * | 2021-04-09 | 2021-07-27 | 作业帮教育科技(北京)有限公司 | Picture processing method and device and electronic equipment |
CN115037711A (en) * | 2022-06-07 | 2022-09-09 | 元心信息科技集团有限公司 | Data processing method and device, electronic equipment and computer readable storage medium |
CN115037711B (en) * | 2022-06-07 | 2024-03-29 | 元心信息科技集团有限公司 | Data processing method, device, electronic equipment and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105405092A (en) | Secure digital image propagation method based on reversible watermark and mosaic technology | |
CN107454441B (en) | A kind of method, live streaming Platform Server and the computer readable storage medium of detection direct broadcasting room brush popularity behavior | |
JP3788056B2 (en) | Electronic still camera | |
CN104185998B (en) | The method and system controlled for the cryptographic acess of video | |
US9306744B2 (en) | Video cryptography system and method | |
Pramanik et al. | Signature image hiding in color image using steganography and cryptography based on digital signature concepts | |
CN104134022A (en) | Information hiding and protecting method based on image | |
WO2011137868A3 (en) | Method and device for instantly encrypting and decrypting messages | |
CN103442156A (en) | Image steganography and secret information extraction method based on intelligent mobile terminal | |
CN102970307A (en) | Password safety system and password safety method | |
CN102752314A (en) | Multimedia internet of thing secure communication method based on information hiding technology | |
CN108848503B (en) | A kind of smart home dynamic encryption means of communication and system transmitted using merogenesis | |
CA2803518C (en) | System and method to prevent manipulation of transmitted video data | |
CN102164303A (en) | Video copyright protection method and system as well as video publisher entity | |
CN100401769C (en) | Method for enciphering and deciphering living-broadcasting flow-medium data | |
US20240388438A1 (en) | Data processing method and apparatus, program product, computer device, and storage medium | |
TW201025070A (en) | Methods for transmitting, receiving and identifying, security processor and information-recording carrier for these methods | |
CN105635100A (en) | Information encryption method, information decryption method and terminal | |
JP3770732B2 (en) | Method for attaching information to image and method for extracting information from image | |
CN116208719A (en) | Image transmission method, device, electronic device and storage medium | |
EP2141924A1 (en) | Process to ensure massive data diffusion security, and devices associated | |
EP2728791A1 (en) | Method and system of secure service supply to a user | |
CN105069364B (en) | A kind of picture display method and mobile terminal | |
CN115134473B (en) | Image encryption method and device | |
JP2003208542A (en) | Contents delivery system, contents delivery device, contents receiver and computer program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160316 |