[go: up one dir, main page]

CN110097488A - The generation of stealthy digital watermarking and extracting method and device - Google Patents

The generation of stealthy digital watermarking and extracting method and device Download PDF

Info

Publication number
CN110097488A
CN110097488A CN201810085009.5A CN201810085009A CN110097488A CN 110097488 A CN110097488 A CN 110097488A CN 201810085009 A CN201810085009 A CN 201810085009A CN 110097488 A CN110097488 A CN 110097488A
Authority
CN
China
Prior art keywords
watermark
information
data
webpage
host
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810085009.5A
Other languages
Chinese (zh)
Other versions
CN110097488B (en
Inventor
马越
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810085009.5A priority Critical patent/CN110097488B/en
Publication of CN110097488A publication Critical patent/CN110097488A/en
Application granted granted Critical
Publication of CN110097488B publication Critical patent/CN110097488B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a kind of generation methods of stealthy digital watermarking, comprising: obtains the data information of watermark to be generated and the data information of host's webpage;Host's web page background information is obtained according to host's webpage information;The information data of specified gray scale is differed using host's web page background information data and with the background information data as the data of barcode encoding uneven color, barcode encoding is carried out to the data information of the watermark, the watermark information after generating coding;Watermark information after coding is embedded into host's web page background information data.Small with the information storage for solving watermark in the prior art, watermark information and carrier content fix technological difficulties that are immutable and being digital watermarking that can be stealthy.

Description

The generation of stealthy digital watermarking and extracting method and device
Technical field
This application involves a kind of digital watermarks, and in particular to a kind of generation and extracting method of stealth digital watermarking.This Shen Please it is related to the generation and extraction element and a kind of generation and extraction of stealthy digital watermarking of a kind of stealthy digital watermarking simultaneously The electronic equipment of method.
Background technique
Traditional watermark is applied to paper earliest, be clipped in paper in the paper making process rather than the surface of paper, meet x ray fluoroscopy x When can see the pattern, portrait or text of light and shade texture.The manufacturing technology of this watermark is still used so far, and this Manufacturing technology always be modified improve, usual bank note, invoice, security etc. in the fabrication process using such technology, play it is anti- The purpose of pseudo-, anti-fraud.With the development of information technology, a kind of digital watermark technology, usually going out digital carrier are produced The information such as place, author, company logo as digital watermark embedding to digital carrier in, such as multimedia file, electronics text In shelves, software, and the use value of original vector is not influenced, be not easy to be modified again yet, usually state that copyright etc. uses this side Formula.
Although the prior art has widely used digital watermark technology, it is used for digital carrier, watermark content to be logical It is often text, pattern etc., content is very clear, only serves a kind of statement or label effect, and the interior empty also phase of its storage When limited, usually a bit of text or a picture, text or the company of the Business Name in digital carrier source are such as marked The pattern of logo.Although the watermark generated using this digital watermark technology can carry out stealthy watermark encrypting, storage Information content is few, and is that pre-rendered is good, can not change, carrier content is also fixed and invariable.How information storage is generated It measures big, information and carrier content is all a kind of stealthy watermark variable at any time, being still one has technical problem to be solved.
For example, application No. is: 201410217257.3, entitled " the digital image tampering detection side with stealthy watermark The Chinese patent application of method " provides a kind of detection method of stealthy watermark, specifically carries out concealed-enciphering for digital picture, Host image and encrypted watermark image are indicated in the form of picture element matrix respectively, the digital picture with stealthy watermark is solved Code is extracted and is restored, if the image after reduction is identical as host image picture element matrix, illustrates that host image is not tampered with, no Then, illustrate that host image is tampered.
Although above-mentioned present technology refers to a kind of detection method of stealthy watermark, but this detection method, usually uses In copyright protection, watermark only plays mark action, and information storage is small, and is that pre-rendered is good, can not change, Carrier content be also it is constant, be not able to satisfy, information big to information storage and carrier content all and be and is variable and can stealthy number The requirement of word watermark.
Summary of the invention
The application provides a kind of generation method for stealthy digital watermarking and a kind of for stealthy digital watermarking Extracting method, small with the information storage for solving watermark in the prior art, watermark information and carrier content are fixed immutable and are The technological difficulties of digital watermarking that can be stealthy.
A kind of generation method of stealthy digital watermarking provided by the present application, comprising:
Obtain the data information of watermark to be generated and the data information of host's webpage;
Host's web page background information is obtained according to host's webpage information;
The Information Number of specified gray scale is differed with host's web page background information data and with the background information data According to the data for barcode encoding uneven color, barcode encoding is carried out to the data information of the watermark, the watermark letter after generating coding Breath;
Watermark information after coding is embedded into host's web page background information data.
Preferably, specified gray scale is differed with host's web page background information data and with the background information data Information data be barcode encoding uneven color data, to the watermark data information carry out barcode encoding, generate coding after water Official seal breath specifically includes:
Barcode encoding is carried out to the watermark information, generates the first watermark information;
The information of specified gray scale is differed according to host's web page background information data and with the background information data Data are barcode encoding uneven color data, are adjusted to first watermark information coding, generate the second watermark information, will Second watermark information is as the watermark information after coding.
It is preferably, described that barcode encoding is carried out to the watermark data information specifically:
Bar code coding or two-dimensional bar code coding are carried out to the watermark data information.
Preferably, it is described to the watermark data information carry out barcode encoding specifically: to the watermark data information into Row two-dimensional bar code coding;
Two dimensional code coding includes following any codings: QRCode, Data Matrix, Maxi Code, Aztec, Vericode, PDF417, Ultracode, Code 49 or Code 16K.
Preferably, barcode encoding is carried out to the watermark data information, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection,
If it is not, being compressed to the watermark data information to be encoded.
Preferably, barcode encoding is carried out to the watermark data information, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection,
If it is not, the watermark data information to be encoded is uploaded to server end;
Receive the uniform resource locator for the watermark data information to be encoded storage that server end issues;
The uniform resource locator is encoded.
Preferably, to the watermark data information carry out barcode encoding before, further include to the watermark data information into Row encryption.
Preferably, host's webpage includes: the webpage that browsing device net page or APP are embedded.
Preferably, the watermark information after coding is embedded into host's web page background information data, specifically: it will Watermark information after coding is embedded into host's webpage into web page background information data with tile mode.
The application provides a kind of generating means of stealthy data watermark, comprising:
Information acquisition unit, for obtaining the data information of watermark to be generated and the data information of host's webpage;
Web page background information acquisition unit, for extracting the back of host's webpage in the information data of host's webpage Scape information;
Watermark generation unit, for according to host's web page background information data and with the background information number It is the data of barcode encoding uneven color according to the information data for differing specified gray scale, bar code is carried out to the data information of the watermark Coding, the watermark information after generating coding;
Watermark embedder unit, for the watermark information after coding to be embedded into host's web page background information data.
The application also provides a kind of electronic equipment that stealthy digital watermarking generates, comprising:
Processor;
Memory, for storing the program of stealthy watermark generation method, described program is reading execution by the processor When, it performs the following operations:
Obtain the data information of watermark to be generated and the data information of host's webpage;
Host's web page background information is obtained according to host's webpage information;
The Information Number of specified gray scale is differed with host's web page background information data and with the background information data According to the data for barcode encoding uneven color, barcode encoding is carried out to the data information of the watermark, the watermark letter after generating coding Breath;
Watermark information after coding is embedded into host's web page background information data.
The application provides a kind of extracting method of stealthy digital watermarking, comprising:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing barcode encoding;
If so, extracting the stealthy watermark of the barcode encoding contained in host's web page background;
The stealthy watermark for extracting the barcode encoding contained in host's web page background is reverted to the item of specified gray scale Code;
Obtain the data information for restoring the bar code storage of specified gray scale.
Preferably, it is described identification open webpage or webpage capture background in whether the invisible water containing barcode encoding Print, further includes:
If not containing the stealthy watermark of barcode encoding in the background of the webpage or webpage capture opened, terminate.
Preferably, the specified gray scale refers to according to the determination of the background color of host's webpage, comprising:
Read the background color of host's webpage;
If the background color of host's webpage is white, by the color of the stealthy watermark dark parts of barcode encoding Value becomes " #000000 ", and the color value of light-colored part becomes " #FFFFFF ".
It is preferably, described to obtain the data information for restoring the bar code storage of specified gray scale, comprising:
The data information of the bar code storage of specified gray scale is reverted to using decoding tool decoding;
Decoded data information is shown.
The application provides a kind of extraction element of stealthy digital watermarking, comprising:
Stealthy watermark carrier acquiring unit is used to open the carrier webpage or webpage capture of stealthy watermark;
Whether stealthy watermark recognition unit is compiled containing bar code in the background of the webpage or webpage capture opened for identification The stealthy watermark of code;
Stealthy watermark extracting unit, for extracting the stealthy watermark of the barcode encoding contained in host's web page background;
Stealthy watermark recovery unit, for the invisible water of the barcode encoding contained in host's web page background will to be extracted Print reverts to the bar code of specified gray scale;
Data information acquiring unit, for obtaining the data information for restoring the bar code storage of specified gray scale.
The application also provides a kind of electronic equipment that stealthy digital watermarking is extracted, comprising:
Processor;
Memory, for storing the program of stealthy digital watermarking extracting method, described program is read by the processor When execution, perform the following operations:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing barcode encoding;
If so, extracting the stealthy watermark of the barcode encoding contained in host's web page background;
The stealthy watermark for extracting the barcode encoding contained in host's web page background is reverted to the item of specified gray scale Code;
Obtain the data information for restoring the bar code storage of specified gray scale.
The application provides a kind of generation method of stealthy digital watermarking, it is characterised in that:
Obtain watermark data information to be generated and host's web page background data information;
Fourier transformation is carried out to host's web page background data information, generates frequency domain data;
After the data information of the watermark to be generated is encoded, it is superimposed in the frequency domain data;
Inverse Fourier transform is carried out to the frequency domain data of superposition watermark data information, generates host's web page background after transformation Data information.
It is preferably, described that Fourier transformation is carried out to host's web page background data, comprising:
Background picture is generated according to host's webpage background color information, then Fourier's change is carried out to the background picture of generation It changes, generates the picture of frequency domain data.
Preferably, the data information by the watermark to be generated encodes, and is superimposed in the frequency domain data, Include:
The data information of watermark to be generated is subjected to barcode encoding;
Watermark picture after progress barcode encoding is encoded;
Watermark picture after being encoded is superimposed to the frequency domain data picture generated with host's web page background information data On.
Preferably, the data information by watermark to be generated carries out barcode encoding, specifically:
The watermark data information is subjected to bar code coding or two-dimensional bar code coding.
Preferably, it is described to the watermark data information carry out barcode encoding specifically: to the watermark data information into Row two-dimensional bar code coding;
Two dimensional code coding includes following any codings: QRCode, Data Matrix, Maxi Code, Aztec, Vericode, PDF417, Ultracode, Code 49 or Code 16K.
Preferably, barcode encoding is carried out to the watermark data information, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection,
If it is not, being compressed to the watermark data information to be encoded.
Preferably, barcode encoding is carried out to the watermark data information, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection,
If it is not, the watermark data information to be encoded is uploaded to server end;
Receive the uniform resource locator for the watermark data information to be encoded storage that server end issues;
The uniform resource locator is encoded.
Preferably, to the watermark data information carry out barcode encoding before, further include to the watermark data information into Row encryption.
Preferably, host's webpage includes: the webpage that browsing device net page or APP are embedded.
The application provides a kind of generating means of stealthy digital watermarking, comprising:
Data information acquiring unit, for obtaining watermark data information to be generated and host's web page background data information;
Frequency domain data generation unit generates frequency for carrying out Fourier transformation to host's web page background data information Numeric field data;
Watermark data information superposition unit is superimposed to after being encoded the data information of the watermark to be generated In the frequency domain data;
Web page background data information generation unit carries out Fourier for the frequency domain data to superposition watermark data information Inverse transformation generates host's web page background data information after transformation.
The application also provides a kind of electronic equipment that stealthy digital watermarking generates, comprising:
Processor;
Memory, for storing the program of stealthy digital watermarking generation method, described program is read by the processor When execution, perform the following operations:
Obtain watermark data information to be generated and host's web page background data information;
Fourier transformation is carried out to host's web page background data information, generates frequency domain data;
After the data information of the watermark to be generated is encoded, it is superimposed in the frequency domain data;
Inverse Fourier transform is carried out to the frequency domain data of superposition watermark data information, generates host's web page background after transformation Data information.
The application provides a kind of extracting method of stealthy digital watermarking, comprising:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing Fourier transformation;
If so, to the stealthy watermark of the Fourier transformation contained in host's web page background carry out Fourier transformation and After decoding, watermarking images are obtained;
Obtain the data information of watermarking images storage.
Preferably, it is described identification open webpage or webpage capture background in whether the stealth containing Fourier transformation Watermark, further includes:
If not containing the stealthy watermark of Fourier transformation in the background of the webpage or webpage capture opened, terminate.
Preferably, the stealthy watermark to the Fourier transformation contained in host's web page background carries out Fourier Transformation and decoding, including;
Fourier transformation is carried out to the stealthy watermark of the Fourier transformation contained in host's web page background, obtains frequency Area image;
The frequency domain image is decoded, watermarking images are obtained.
Preferably, the data information for obtaining watermarking images storage, comprising: character information, pictorial information, bar code letter One or more of breath.
The application provides a kind of extraction element of stealthy digital watermarking, comprising:
Stealthy watermark carrier acquiring unit is used to open the carrier webpage or webpage capture of stealthy watermark;
Whether stealthy watermark recognition unit contains Fourier in the background of the webpage or webpage capture opened for identification The stealthy watermark of transformation;
Stealthy watermark extracting unit, for the stealthy watermark to the Fourier transformation contained in host's web page background After carrying out Fourier transformation and decoding, watermarking images are obtained;Stealthy watermark recovery unit, for host's webpage will to be extracted The stealthy watermark of the barcode encoding contained in background reverts to the bar code of specified gray scale;
Data information acquiring unit, the data information for watermarking images storage.
The application also provides a kind of electronic equipment that stealthy digital watermarking is extracted, comprising:
Processor;
Memory, for storing the program of stealthy digital watermarking extracting method, described program is read by the processor When execution, perform the following operations:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing Fourier transformation;
If so, to the stealthy watermark of the Fourier transformation contained in host's web page background carry out Fourier transformation and After decoding, watermarking images are obtained;
Obtain the data information of watermarking images storage.
Perform claim requires 1 to 9 when the application provides a kind of auto-building html files or method for refreshing, the auto-building html files or brush The generation method of any stealthy digital watermarking.
Compared with prior art, the generation method provided by the present application for stealthy watermark, the pre-generatmg watermark that will acquire Content of text converted and stored to bar code, such as two dimensional code, then by the color of bar code according to the web page background face of insertion Color is changed, and is allowed to close with background color and is not identified visually, achievees the effect that stealth, by the face of bar code when extraction Color is converted into the big color of contrast, can be identified by barcode device, and the stealthy effect operation of this bar code is simple, again Achieve the purpose that stealth, and and the information storage that solves digital watermarking is small, watermark information and carrier content fixation are immutable Digital watermark technology difficult point.
Detailed description of the invention
Fig. 1 is a kind of generation method for stealthy digital watermarking that the application first embodiment provides;
Fig. 2 is a kind of extracting method for stealthy digital watermarking that the application second embodiment provides;
Fig. 3 is a kind of generation method for stealthy digital watermarking that the application 3rd embodiment provides;
Fig. 4 is a kind of extracting method for stealthy digital watermarking that the application fourth embodiment provides;
Fig. 5 is a kind of generating means schematic diagram for stealthy data watermark that the application first embodiment provides;
Fig. 6 is the electronic equipment schematic diagram that a kind of stealthy digital watermarking that the application first embodiment provides generates;
Fig. 7 is a kind of extraction element schematic diagram for stealthy data watermark that the application second embodiment provides;
Fig. 8 is the electronic equipment schematic diagram that a kind of stealthy digital watermarking that the application second embodiment provides is extracted;
Fig. 9 is a kind of generating means schematic diagram for stealthy data watermark that the application 3rd embodiment provides;
Figure 10 is the electronic equipment schematic diagram that a kind of stealthy digital watermarking that the application 3rd embodiment provides generates;
Figure 11 is a kind of extraction element schematic diagram for stealthy data watermark that the application fourth embodiment provides;
Figure 12 is the electronic equipment schematic diagram that a kind of stealthy digital watermarking that the application fourth embodiment provides is extracted;
Specific embodiment
Many details are explained in the following description in order to fully understand the application.But the application can Implemented with being much different from other way described herein, those skilled in the art can be without prejudice to the application intension In the case of do similar popularization, therefore the application is not limited by following public specific implementation.
The application first embodiment providing method is described in detail.
Fig. 1 is please referred to, which is a kind of stealthy digital watermarking generation method that the application first embodiment provides.
Step S101 obtains the data information of watermark to be generated and the data information of host's webpage.
This step is used to obtain the data information of watermark to be generated, and host's net embedded by the watermark information generated The data information of page.
The data information of the watermark to be generated is related to webpage, is obtained from named web page, then again will The watermark of generation is embedded into the named web page for obtaining data information, the named web page i.e. host's webpage, so host Webpage namely obtains the webpage of watermark data information to be generated.
The data information of the watermark to be generated includes the various information on host's webpage, for example, due to programming original The miscue information generated by caused bugs, by the web page address of miscue information and generating routine defect Data information is collectively constituted, other information related with webpage is also possible to, for example, facility information, net for browsing webpage Background information, the user information of log-on webpage and the geographical location information of page.These data informations include Chinese character, English, various Symbol, picture etc..Above-mentioned data information is not fixed and invariable, for example, the miscue information of webpage due to modification and It disappears, so the data information obtained is possible to as sky, it is also possible to generate other defects because of modification, become in addition Miscue information;The facility information of webpage is browsed, the same webpage can be produced when browsing on different mobile phone, computer Raw different facility information;The background information of webpage irregular can also change, for example, the upgrading correcting of website, it is new specially The release of topic, background color or background picture can all change;The user information of log-on webpage and geographical status information also can be with Different user log in and change, geographical location information is also because different in different regions.
The data information of the watermark to be generated can also carry out input information by the backstage of webpage, be then embedded into In webpage, as the information on webpage, to obtain, for example, being searched the website pass that engine includes setting for the ease of website Key word.Usual website keyword will not arbitrarily change, but in some cases, such as website revision, when increasing the new space of a whole page, Also it will do it modification, so can also change by the data information of webpage backstage input.
The data information of the watermark to be generated be also possible to it is changeless, for example, the title and Zi Lan of website homepage Purpose title will not all change under normal conditions, it is possible to assert that data information is fixed and invariable.
The data information of the watermark to be generated is all relevant data information, that is, the host with host's webpage A part in webpage data information is obtained from host's webpage or by host's webpage.
Step S102 obtains host's web page background information according to host's webpage information.
This step is used for, and the background information of host's webpage is extracted in the information of host's webpage.
In the previous step, when obtaining the data information of watermark to be generated, the data of many host's webpages are also obtained Information, the back of address (url), the browser that browsing webpage uses, webpage including miscue information, webpage in webpage Next scape color, user information of login etc. just extract the background information of webpage in the data information of these webpages, Namely webpage background color information, the background color of webpage are determined in the development process of webpage by specific code Justice, it is generally the case that the code for defining webpage background color is two kinds of following literary styles, one of literary style are as follows: body {background-color:#FFFFFF;, another literary style is<body bgcolor="#FFFFFF">, # subsequent six What position hexadecimal number indicated is exactly the background color numerical value of webpage, and some colors can be replaced directly with English, such as above Written #FFFFFF, the color of expression are white, so indicating color in the both above code for defining webpage background color Part #FFFFFF can be substituted for English character white, so two kinds of literary styles above can be write as, body {background-color:white;,<body bgcolor="white">, the both of which ratio of color shown above More typically, thus extract webpage background color when, find first define webpage background color code, then in code It is middle to extract six hexadecimal numbers (FFFFFF) for indicating color or English (white).
Step S103 differs specified face with host's web page background information data and with the background information data The information data of color contrast is barcode encoding uneven color data, carries out barcode encoding to the watermark data information, generates and compile Watermark information after code.
This step is used for the background information data of host's webpage, that is, background color numerical value and with background face The color data of hue difference designated color contrast is two different colors of bar code to be generated, then to the watermark Data information carry out bar code coding, generate coding after watermark information color be exactly with the background color of host's webpage with Background color differs both colors of the color of designated color contrast.
The bar code refers to, is made of the lines or pattern of different colours, and the one kind that can store corresponding data is special The picture of form.Bar code can be by the width one-dimension code that equal multiple " items " and " sky " do not form, and the code system of one-dimension code includes Common EAN code, 39 yards, intersect 25 yards, UPC code, 128 yards, 93 yards, ISBN code and Codabar (Ku Deba code) etc..It can also To be the two dimensional code for being distributed in plane identifying recording layer symbolic information according to certain rules with certain specific geometric figure.Two dimension Code code system include common QRCode, Data Matrix, Maxi Code, Aztec, Vericode, PDF417, Ultracode, Code 49 or Code 16K, Code One etc..
Under normal conditions, the bar code of storing data information is the apparent black and white of contrast, and it is obvious to be also possible to contrast Other colors, such as blue and white, blackyellow, the colors such as red and white.
If the bar code of storing data information is one-dimension code, one-dimension code is come using " item " and " sky " of multiple and different width The binary data information for indicating the corresponding letter and number, since the data capacity of itself storage is limited, so When using one-dimension code storing data, a set of database is usually being established from the background, for storing the corresponding data of bar code.
For example, it is a set of for storing the database of web page program defect establishing from the background, every miscue information is made Prestore and be stored in database for a data, when obtaining a web page program defect, go first in database search with it is described The corresponding data of bugs prompt information, then the data encoding of the corresponding one-dimension code of the data is obtained, it then will be described Data encoding is converted into binary data and generates one-dimension code.
The data format of two dimensional code storage is the corresponding geometry of binary data indicated with 0 and 1, two dimensional code energy A variety of data formats, including Chinese, English, various symbols, picture etc. are enough stored, also just includes numerous types of data, example Such as, numeric type data, character type data etc..
If the bar code of storing data information is two dimensional code, it is necessary first to the data conversion that will acquire at binary data, For example, obtaining one section of prompt information " syntax error of current web page bugs!", then first by this section of English It is handled as a string of characters, then finds the binary numeral of the corresponding ASCII coding of each character in this string character, this Sample has just obtained the binary data of this section of prompt information, then by obtained binary data storage in two dimensional code.If worked as Do not occur bugs in preceding webpage, also just there is no miscue information, then the prompt information obtained is just empty, so that it may To illustrate not having miscue in current web page with passage, such as " without discovery error message in current web page ", then This section of text information is converted into binary data storage in two dimensional code.
Since the maximum amount of storage of two dimensional code reaches thousands of a characters, so when using two dimensional code storing data, due to it Diversity of storing data format itself and the capacity of storage have been able to satisfy primary demand, and the data information once obtained Length has exceeded the memory capacity of a two dimensional code, so that it may using the method storing data of compressed data information, for example, can Stored with the data using interception two dimensional code memory capacity, then the ground data information that can will acquire be uploaded to clothes Business device is stored, and the uniform resource locator (url) for storing the data information is then carried out code storage to two dimension Code.
One-dimension code is creating corresponding database when in use from the background, so the capacity of one-dimension code storing data information It being determined by background data base, the data format of one-dimension code storage is also determined by corresponding database, including, numeric type data, word Symbol type data etc..
Host's webpage, embedded including the webpage for using various browsers to open in various equipment and APP Webpage.
Next just the watermark data information of acquisition is encoded, such as selects two dimensional code for coding mode, if wait compile The length of the watermark data information of code is less than or equal to the maximum capacity of the code system of selection, just directly by watermark number to be encoded It is believed that breath carries out two dimensional code coding, the first watermark information is generated, the first watermark information of generation is usually what gray value differed greatly Two kinds of colors, such as black and white, next again by the first watermark information according to host's web page background information data with And it is barcode encoding uneven color data that the information data of specified gray scale is differed with the background information data, to first water Print information coding is adjusted.
Next the numerical value of webpage background color is obtained, it is generally the case that it is following for defining the code of webpage background color Two kinds of literary styles, one of literary style are as follows: body { background-color:#FFFFFF;, another literary style is <body Bgcolor=" #FFFFFF " >, what subsequent six hexadecimal numbers of # indicated is exactly the background color numerical value of webpage, and has Color can be replaced directly with English, and such as above written #FFFFFF, the color of expression is white, so both above definition Indicate that #FFFFFF can be substituted for English character white by the part of color in the code of webpage background color, so above Two kinds of literary styles can be write as, body { background-color:white;,<body bgcolor="white">, on Face indicates that the both of which of color is relatively common, if the background color of webpage is directly write as with six hexadecimal datas The RGB color of expression, then the color data of web page background can be directly read, if the background color of webpage is to use English The color that Chinese character indicates, then the English character for the expression color that will acquire is converted into being indicated with six hexadecimal datas RGB color, the numerical value of the webpage background color finally obtained be all six hexadecimal datas indicate color.
After obtaining webpage background color, the color of the bar code is carried out accordingly according to webpage background color Conversion, if the webpage background color obtained is #FFFFFF, the bar code of storing data information is two dimensional code, then will just store The color value of the deeper geometry of the two dimensional code barcoded color of data information is converted into " #FEFEFE ", the shallower geometry of color Shape is consistent with background color, and color value is " #FFFFFF ".
Barcoded color is converted for different webpage background colors according to conversion method above, for another example The background color value of webpage is #A8A8A8, so that it may it is #A7A7A7 that the deeper part of color in bar code, which is converted into color value, The shallower part of color is consistent with web page background color, color value #A8A8A8.Then the two dimensional code after conversion is embedded into institute It states in web page background.
If the bar code of storing data information is one-dimension code, just by the one-dimension code barcoded color of storing data information The color value of deeper " item " is converted into " #FEFEFE ", and the part of color shallower " sky " is consistent with background color, color value For " #FFFFFF ".
Although the color of bar code is very close with webpage background color by converting, once it is easily noticed by the users, just has The risk being cracked, so also needing to encrypt the bar code for having carried out color conversion, to prevent being cracked, for example, generating One password is set when two dimensional code, and when extracting QR code content, the content of two dimensional code could be obtained by needing to input password.Item Code color is converted according to the webpage background color, close with webpage background color, is next exactly that will carry out color Bar code after conversion is embedded into the web page background, before embedding, needs for bar code to be adjusted to suitable size, because When thread extracts bar code afterwards, if the information comprising bar code is provided by way of screenshot, screenshot is the part screenshot of webpage When, in order to there is a complete bar code in screenshot, so needing reasonably to adjust the size of bar code, and adjusting It is unlikely to make bar code modification again while size, so the best way is exactly the scaling that bar code is carried out to equal proportion, for example, The length that bar code is arranged is 90 pixels, and equal proportion is bursted forth, then the width of bar code carries out the adjustment of equal proportion, institute according to length With the one-dimension code of either long strip type or the two dimensional code of square, all will not change after carrying out equal proportion scaling.
Same reason, when rear thread extracts bar code, if the information comprising bar code is provided by way of screenshot , when screenshot is the part screenshot of webpage, in order to there is a complete bar code in screenshot, need that equal proportion scaling will be carried out Bar code tile in level with vertical direction as web page background picture, entire web page background is covered, so after tiling Bar code picture is located on former background color, and the web page background for being added to implicit type bar code is no longer simple color and becomes to carry on the back Scape picture.
At this point, naked eyes can not discover web page background since barcoded color is close with embedded webpage background color at all In be embedded in bar code, bar code has achieved the purpose that stealth in webpage, and does not influence the normal use of web page contents.
In the above-described embodiment, a kind of generation method of stealthy watermark is provided, corresponding, the application is same When a kind of generating means of stealthy digital watermarking are provided, please refer to Fig. 5.
A kind of generating means of stealthy digital watermarking provided in this embodiment, comprising:
Information acquisition unit 501, for obtaining the data information of watermark to be generated and the data information of host's webpage;
Web page background information acquisition unit 502, for extracting host's webpage in the information data of host's webpage Background information;
Watermark generation unit 503, for according to host's web page background information data and with the background information The information data that data differ specified gray scale is the data of barcode encoding uneven color, carries out item to the data information of the watermark Code coding, the watermark information after generating coding;
Watermark embedder unit 504, for the watermark information after coding to be embedded into host's web page background information data In.
The application provides a kind of electronic equipment that stealthy digital watermarking generates simultaneously, please refers to Fig. 6
The electronic equipment that a kind of stealthy digital watermarking provided by the present application generates, comprising:
Processor 601;
Memory 602, for storing the program of stealthy watermark generation method, described program is read by the processor When execution, perform the following operations:
Obtain the data information of watermark to be generated and the data information of host's webpage;
Host's web page background information is obtained according to host's webpage information;
The Information Number of specified gray scale is differed with host's web page background information data and with the background information data According to the data for barcode encoding uneven color, barcode encoding is carried out to the data information of the watermark, the watermark letter after generating coding Breath;
Watermark information after coding is embedded into host's web page background information data.
Fig. 2 is please referred to, which is a kind of extracting method for stealthy digital watermarking that the application second embodiment provides.
Step S201 opens webpage or webpage capture.
This step is used to be first turned on the medium webpage or net of bar code storage when extracting the data information of bar code storage The screenshot of page, can get bar code.
In the first embodiment the step of, bar code is converted according to the background color of webpage, and be embedded into net In page background, so being first turned on webpage or webpage for storing bar code when obtaining the data information of bar code storage and cutting Figure.
Step S202 identifies in the background of open webpage or webpage capture whether contain bar code.
This step is used to judge whether contain bar code in the background of open webpage or webpage capture.
Before extracting bar code, the screenshot for opening webpage or webpage is first had to, could judge that the webpage opened or webpage are cut Whether contain bar code in the background of figure.
The webpage, including the webpage that input network address uses browser to open, the Taobao's commodity such as opened using browser The page is also possible to the network address opening sent by other modes such as chat tools, for example, the quotient of the prosperous middle transmission of Taobao Product link, is opened and is checked using browser, further includes the webpage opened using APP, such as retrieve commodity using Taobao APP Results page or the goods links shared of friend opened by Taobao APP, and these webpages may be used to identify background In whether contain bar code.
The webpage capture is to carry out screenshot, including use corresponding device to the webpage for using browser or APP to open Shortcut key carry out screenshot, for use computer browser or APP open webpage, using quick on computer keyboard Key or Macintosh carry out screenshot and use screenshot shortcut key specific in equipment or Macintosh for other mobile devices such as mobile phone Carry out screenshot.Screenshot file can be the whole screenshot for opening webpage, be also possible to the part screenshot of key content in webpage.
After opening webpage or webpage capture, whether judge comprising bar code in webpage or webpage capture, because Bar code is possible to only be embedded into the webpage of part, so whether judge first comprising bar code in webpage or webpage capture, Since when being embedded in bar code, barcoded color and webpage background color being converted, the color of barcoded color and web page background It is worth close, so can not with the naked eye identify at all, needs further to be identified.
Step S202-1 opens webpage.This step is used to open the webpage containing bar code.After opening webpage, next It enters step in S202-2, judges whether webpage is arranged background picture.When whether including bar code in judging webpage, obtain first Web page background picture is taken, because bar code tiles as web page background picture when bar code to be embedded into webpage, covering Entire web page background, so need to only extract web page background picture when extracting, it is possible to can get bar code picture, specifically Extracting method is to provide the code that web page background picture is arranged in web page code, is generally body there are two types of literary style { background-image:url (logo.gif), wherein what url (logo.gif) was indicated is the address of background picture, another Planting literary style is<body background="picture">, wherein " picture " indicate be background picture address, if It is not provided with the code of web page background picture in web page code, also just web page background is not set by bar code, then just It can be determined that there is no bar codes in webpage, then branching to step S202-6, process terminates.Obtain the data of bar code storage The process of information terminates.If there is the code of setting web page background picture in web page code, but it can't determine Background Piece just includes bar code, so also needing further to identify, executes step S202-3, extracts the color value of background picture.Originally It is to be converted the color of bar code according to webpage background color, such as webpage background color is # when generating bar code FFFFFF, then a kind of color is identical as webpage background color in the color of bar code, color value #FFFFFF, another and net Page background color is close, color value #FEFEFE, and specific recognition methods is exactly, to the background picture of acquisition, it is each to extract picture Then the color value of a pixel will be spliced into picture as mutually putting consecutive identical color.Next step is exactly step S202-4, judges whether picture that same color is spliced into meets the shape of bar code.If according to the consecutive identical color of pixel The picture that value is spliced into meets the shape of bar code, that is, the color value that color value is #FEFEFE and #FFFFFF is spliced into Picture meets the shape of bar code, that is, meets deep mixed " item " and " sky " of one-dimension code for storing data, also with one-dimension code The data length of expression is identical, meets the geometric figure and basic configuration of the storing data of two dimensional code, so that it may determine that webpage is carried on the back Include bar code in scape picture, subsequently enter step S202-5, into the process for extracting bar code information.If continuous according to pixel The picture that identical color value is spliced into does not meet the shape of bar code, then being carried out step S202-6, process terminates.Obtain The process for the data information for taking bar code to store terminates.
There are also the mode containing bar code in being in a kind of judgement webpage, with it is following it is said judge in webpage capture whether Mode containing bar code is closely similar, that is, judges whether the picture that the color value of each pixel in web page background is spliced into accords with The shape for closing bar code, just tells about this method below.
If what is opened is a webpage capture, when whether containing bar code in judging webpage capture, webpage is extracted first The color value of each pixel in screenshot, when bar code after web page background insertion conversion, two kinds of color phases that bar code includes Closely, as such as dark part colours value is #FEFEFE, light-colored part #FFFFFF, if extracting this in webpage capture The picture that the pixel of two kinds of color values is spliced into meets the shape of bar code, that is, meets the shape of one-dimension code and two dimensional code, then It decides that in webpage capture comprising bar code, next step S203 is subsequently entered, if both extracted in webpage capture The picture that the pixel of color value is spliced into does not meet the shape of bar code, then obtains the process knot of the data information of bar code storage Beam.
Step S203, if so, extracting the stealthy watermark of the barcode encoding contained in host's web page background.This step For being extracted to the bar code got in previous step, what the gray scale by changing bar code was allowed to become to be read Bar code.
Bar code has been obtained in webpage or web page background, but the color value of bar code is close, if by bar code wash with watercolours at this time It contaminates on painting canvas, equipment can't be read by bar code and identified, so also needing further to restore bar code.
For example, the dark parts color value of the bar code got be #FEFEFE, light-colored part #FFFFFF, and if Painting canvas color value for rendering is #FFFFFF, so that it may allow bar code light-colored part and painting canvas solid colour, dark parts face Color value #FEFEFE is converted into #000000, i.e. the color of bar code dark parts becomes black, forms with the painting canvas of white fresh Bright comparison, this completes the recoveries to barcoded color contrast, then will have the bar code of sharp contrast degree to be rendered into picture On cloth.The color of painting canvas can be any, and the color contrast of bar code can carry out variation appropriate, example according to the color of painting canvas Such as, the color of painting canvas is yellow, then the color of bar code dark parts can be black, is also possible to blue, light-colored part with Painting canvas solid colour.
The painting canvas exactly has the bar code for restoring color contrast for storing, can be host's webpage thing or newly-built One webpage or the blank document temporarily opened.
Step S204 obtains the data information for restoring the bar code storage of specified gray scale.
This step be used for revert to specified gray scale bar code its storage content obtain.
In previous step, bar code has reverted to the apparent color of gray scale, next will be in bar code storage Appearance is read out.
The content of bar code is usually to decode and read by having the tool of identification bar code function.Such as smart phone, Hand-held barcode scanning terminal etc..
Smart phone opens the APP with identification bar code function, reads bar code by video camera, if it is one-dimension code, uses In storing one section of webpage miscue information, one-dimension code is parsed first, obtains data encoding, then passes through connection Database, find with the matched miscue information of data encoding, finally miscue information is shown on mobile phone, in this way The data information of one-dimension code storage is just obtained by mobile phone.
If the equipment of parsing one-dimension code is hand-held barcode scanning terminal, handheld terminal connects host computer, is connected by host computer Database is connect, handheld terminal is scanned parsing to one-dimension code, obtains data encoding, data encoding is then sent to connection Host computer, host computer installation software connect with Database, find with the matched information of data encoding, finally Information is shown on computer display screen, in this way, hand-held barcode scanning terminal, which combines to complete with computer, reads one-dimension code data information Process.
If storing data information is two dimensional code, data information is stored directly in two dimensional code, and smart phone opens tool There is the APP of identification bar code function, bar code is read by video camera, for example, two dimensional code storage is one section of webpage miscue, Smart phone APP directly parses the data information of two dimensional code storage, then shows the webpage miscue information parsed On mobile phone.If the length of the two-dimensional code data information stored at that time is greater than the maximum capacity that two dimensional code deposits mansion, read Be exactly watermark data storage uniform resource locator (url), then open uniform resource locator again, obtain final water Print the data information of storage.If the equipment of parsing two dimensional code is hand-held barcode scanning terminal, handheld terminal connects host computer, hand It holds terminal and parsing is scanned to two dimensional code, the content parsed is shown on the computer display screen of connection.
By above method, the parsing to barcode data is completed.Parse the device and method of bar code information not only There are two kinds above, for example, the APP installed on smart machine, to the bar code stored on smart machine, by way of long-pressing It can identify.The decoding program installed on computer, bar code is uploaded, and program is decoded and shown from code.
In the above-described embodiment, a kind of extracting method of stealthy watermark is provided, corresponding, the application is same When a kind of extraction element of stealthy digital watermarking is provided, please refer to Fig. 7.
A kind of extraction element of stealthy digital watermarking provided in this embodiment, comprising:
Stealthy watermark carrier acquiring unit 701 is used to open the carrier webpage or webpage capture of stealthy watermark;
Whether stealthy watermark recognition unit 702 contains bar code in the background of the webpage or webpage capture opened for identification The stealthy watermark of coding;
Stealthy watermark extracting unit 703, for extracting the invisible water of the barcode encoding contained in host's web page background Print;
Stealthy watermark recovery unit 704, for the stealth of the barcode encoding contained in host's web page background will to be extracted Watermark recovery at specified gray scale bar code;
Data information acquiring unit 705, for obtaining the data information for restoring the bar code storage of specified gray scale.
The application provides a kind of electronic equipment that stealthy digital watermarking is extracted simultaneously, please refers to Fig. 8.
The electronic equipment that a kind of stealthy digital watermarking provided by the present application is extracted, comprising:
Processor 801;
Memory 802, for storing the program of stealthy digital watermarking extracting method, described program is by the processor When reading execution, perform the following operations:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing barcode encoding;
If so, extracting the stealthy watermark of the barcode encoding contained in host's web page background;
The stealthy watermark for extracting the barcode encoding contained in host's web page background is reverted to the item of specified gray scale Code;
Obtain the data information for restoring the bar code storage of specified gray scale.
Fig. 3 is please referred to, which is a kind of generation method for stealthy digital watermarking that the application 3rd embodiment provides.
Step S301 obtains watermark data information to be generated and host's web page background data information.
Step is used for, the data information of watermark to be generated, and the number of host's webpage embedded by the watermark information generated It is believed that breath.
The data information and host's web page background data information and first of the acquisition watermark to be generated of this step are in fact It is identical with method described in step S102 and content to apply a step S101, is just not repeated herein, please refers to first embodiment Step S101 and step S102.
Step S302 carries out Fourier transformation to host's web page background data information, generates frequency domain data.
Step is used for, and is carried out Fourier transformation to host's webpage background color data information of acquisition, is generated a frequency domain Data picture.
The Fourier transformation, indicate can by some function representation met certain condition at trigonometric function (it is sinusoidal and/ Or cosine function) or they integral linear combination.
Signal has frequency, and a signal can regard the superposition of the sinusoidal signal of numerous not same order as.
Above formula is Fourier transform formula, f (t) refer to time-domain signal (for signal, we say time domain because be and when Between it is related, and image we often say airspace, it is related with space), ω refers to frequency.Airspace refers to spatial domain, we are daily Seen image is exactly airspace.Time-domain signal is just substituted for airspace signal herein, the frequency of image refers to that image grayscale becomes The strong situation changed, host's web page background data information is exactly airspace, utilizes Fourier transform formula herein, will be empty Numeric field data information is by the greyscale transformation of image at domain data information.For example, the background color of the host's webpage obtained is " #FFFFFF " then generates the picture of the background color of host's webpage, Fourier transform formula is reused, by host's net The background picture of page becomes a frequency domain data picture.
Step S303 is superimposed in the frequency domain data after being encoded the data information of the watermark to be generated
Step is used for, and the watermark picture after coding is superimposed with host's web page background picture after Fourier transformation The frequency domain picture for having watermark information is generated afterwards.
Bar code is written into the data information of watermark to be generated first, the bar code refers to, by the lines or figure of different colours Case composition, and a kind of picture of special shape of corresponding data can be stored.Bar code can be by width not equal multiple " items " The one-dimension code of " sky " composition, the code system of one-dimension code include common EAN code, 39 yards, intersection 25 yards, UPC code, 128 yards, 93 Code, ISBN code and Codabar (Ku Deba code) etc..It is also possible to be distributed according to certain rules with certain specific geometric figure The two dimensional code of plane identifying recording layer symbolic information.The code system of two dimensional code includes common QRCode, Data Matrix, Maxi Code, Aztec, Vericode, PDF417, Ultracode, Code 49 or Code 16K, Code One etc..
If the bar code of storing data information is one-dimension code, one-dimension code is come using " item " and " sky " of multiple and different width The binary data information for indicating the corresponding letter and number, since the data capacity of itself storage is limited, so When using one-dimension code storing data, a set of database is usually being established from the background, for storing the corresponding data of bar code.Due to two The dimension maximum amount of storage of code reaches thousands of a characters, so when using two dimensional code storing data, due to itself storing data lattice The diversity of formula and the capacity of storage have been able to satisfy primary demand, so not needing to additionally set up a set of database, will acquire Data information is directly stored in two dimensional code after being converted into binary data, and once if the length of the data information obtained Degree has exceeded the memory capacity of a two dimensional code, and the storage of data can be carried out using two or more two dimensional codes.? Using the method storing data of compressed data information, for example, can be deposited using the data of interception two dimensional code memory capacity Storage, then the ground data information that can will acquire be uploaded to server and stored, then will store the data information Uniform resource locator (url) carries out code storage to two dimensional code.
One-dimension code is creating corresponding database when in use from the background, so the capacity of one-dimension code storing data information It being determined by background data base, the data format of one-dimension code storage is also determined by corresponding database, including, numeric type data, word Symbol type data etc..
Host's webpage, embedded including the webpage for using various browsers to open in various equipment and APP Webpage.
Next barcode encoding just is carried out to the watermark data information of acquisition, such as selects two dimensional code for coding mode, if The length of watermark data information to barcode encoding is less than or equal to the maximum capacity of the code system of selection, just directly will be to bar code The watermark data information of coding carries out two dimensional code coding, if the bar code of storing data information is one-dimension code, will just store The carry out one-dimension code barcode encoding of data information.
Next the watermark picture after progress barcode encoding is encoded, there are two coding purposes here, first is that right Watermark is encrypted, to prevent being cracked, second is that, the Energy distribution of watermark picture is controlled, the distribution of energy includes energy substep Then watermark picture after coding is added to above web page background picture, before superposition, needs item by frequency and position Code is adjusted to suitable size, because when rear thread extracts bar code, if the information comprising bar code is provided by way of screenshot , when screenshot is the part screenshot of webpage, in order to there is a complete bar code in screenshot, so needing the size to bar code It is reasonably adjusted, and is unlikely to make bar code modification while being sized, so the best way is exactly by bar code Carry out the scaling of equal proportion, for example, the length of setting bar code is 90 pixels, equal proportion bursts forth, then the width of bar code according to Length carries out the adjustment of equal proportion, so the two dimensional code of the one-dimension code of either long strip type or square, is carrying out equal proportion It all will not change after scaling.
Same reason, when rear thread extracts bar code, if the information comprising bar code is provided by way of screenshot , when screenshot is the part screenshot of webpage, in order to there is a complete bar code in screenshot, need that equal proportion scaling will be carried out Bar code tile in level with vertical direction as web page background picture, entire web page background is covered, so after tiling Bar code picture is located on web page background frequency domain picture.
The frequency domain figure for having obtained host's web page background at this time and being superimposed after the Fourier transformation of watermark.
Step S304 carries out inverse Fourier transform to the frequency domain data of superposition watermark data information, generates host after transformation Web page background data information.
Step is used for, and carries out inverse Fourier transform to the frequency domain figure of superposition watermark data information, generating includes watermark information Host's web page background data information.
By step S302 and step S303, host's web page background frequency domain figure has been superimposed the watermark bar code figure after coding, This step just carries out inverse Fourier transform, Fu to the host's web page background frequency domain figure for the watermark bar code figure for being superimposed coding In leaf inverse transformation, be exactly the inverse operation of Fourier transformation, herein be exactly will be superimposed coding watermark bar code figure host's net Page background frequency domain figure becomes host's web page background figure, and the Background naked eyes after inverse transformation can not discover web page background at all In be embedded in bar code, bar code has achieved the purpose that stealth in webpage, and does not influence the normal use of web page contents.
In the above-described embodiment, a kind of generation method of stealthy watermark is provided, corresponding, the application is same When a kind of generating means of stealthy digital watermarking are provided, please refer to Fig. 9.
A kind of generating means of stealthy digital watermarking provided in this embodiment, comprising:
Data information acquiring unit 901, for obtaining watermark data information to be generated and host's web page background data letter Breath;
Frequency domain data generation unit 902, it is raw for carrying out Fourier transformation to host's web page background data information At frequency domain data;
Watermark data information superposition unit 903 is folded after being encoded the data information of the watermark to be generated It adds in the frequency domain data;
Web page background data information generation unit 904 carries out in Fu for the frequency domain data to superposition watermark data information Leaf inverse transformation generates host's web page background data information after transformation.
The application provides a kind of electronic equipment that stealthy digital watermarking generates simultaneously, please refers to Fig. 8.
The electronic equipment that a kind of stealthy digital watermarking provided by the present application generates, comprising:
Processor 1001;
Memory 1002, for storing the program of stealthy digital watermarking generation method, described program is by the processor When reading execution, perform the following operations:
Obtain watermark data information to be generated and host's web page background data information;
Fourier transformation is carried out to host's web page background data information, generates frequency domain data;
After the data information of the watermark to be generated is encoded, it is superimposed in the frequency domain data;
Inverse Fourier transform is carried out to the frequency domain data of superposition watermark data information, generates host's web page background after transformation Data information.
Fig. 4 is please referred to, which is a kind of extracting method for stealthy digital watermarking that the application fourth embodiment provides.
Step S401 opens webpage or webpage capture.
This step is used for, and when extracting the data information of bar code storage, is first turned on the medium webpage or net of bar code storage The screenshot of page, can get bar code.
In the third embodiment, using bar code storing data information, and bar code is embedded into web page background, so wanting When obtaining the data information of bar code storage, it is first turned on the webpage or webpage capture for storing bar code.
Step S402, identify in the background of open webpage or webpage capture whether the invisible water containing Fourier transformation Print.
This step is used for, judge in the background of open webpage or webpage capture whether the stealth containing Fourier transformation Watermark.
The webpage, including the webpage that input network address uses browser to open, the Taobao's commodity such as opened using browser The page is also possible to the network address opening sent by other modes such as chat tools, for example, the quotient of the prosperous middle transmission of Taobao Product link, is opened and is checked using browser, further includes the webpage opened using APP, such as retrieve commodity using Taobao APP Results page or the goods links shared of friend opened by Taobao APP, and these webpages may be used to identify background In whether the stealthy watermark containing Fourier transformation.
The webpage capture is to carry out screenshot, including use corresponding device to the webpage for using browser or APP to open Shortcut key carry out screenshot, for use computer browser or APP open webpage, using quick on computer keyboard Key or Macintosh carry out screenshot and use screenshot shortcut key specific in equipment or Macintosh for other mobile devices such as mobile phone Carry out screenshot.Screenshot file can be the whole screenshot for opening webpage, be also possible to the part screenshot of key content in webpage.
Whether the stealthy watermark comprising Fourier transformation is judged in the webpage or webpage capture, is exactly to use Fu In leaf transformation generate the inverse process of stealthy watermark, identify whether hidden comprising Fourier transformation in the webpage or webpage capture Shape watermark.
Step S404 carries out Fourier's change to the stealthy watermark of the Fourier transformation contained in host's web page background After changing and decoding, watermarking images are obtained.
This step is used for, and obtains the stealthy watermark of the Fourier transformation contained in host's web page background.
After opening webpage or webpage capture, in webpage or webpage capture whether include Fourier transformation stealth Watermark is judged, because the invisible water of Fourier transformation, which is printed on, to be only embedded into the webpage of part, first to webpage Or whether the stealthy watermark comprising Fourier transformation is judged in webpage capture, because the stealthy watermark of Fourier transformation is hidden Covering property is good, so can not with the naked eye identify at all, needs further to be identified.
Step S402-1 opens webpage.This step is used to open the webpage of the stealthy watermark containing Fourier transformation.It is beating It after opening webpage, next enters step in S402-2, judges whether webpage is arranged background picture.Whether wrapped in judging webpage When containing bar code, first acquisition web page background picture, because when the stealthy watermark of Fourier transformation to be embedded into webpage, Fu In the stealthy watermark of leaf transformation be laid on web page background, so need to only extract web page background picture when extracting, it is possible to It can get the invisible water impression piece of Fourier transformation, specific extracting method is to provide setting web page background figure in web page code The code of piece, general there are two types of literary style is body { background-image:url (logo.gif), wherein url (logo.gif) what is indicated is the address of background picture, and another literary style is<body background="picture">, In " picture " indicate be the address of background picture, if being not provided with the code of web page background picture in web page code, Also web page background just is not set by bar code, then it is determined that the invisible water of Fourier transformation is not present in webpage Print, then branching to step S202-5, process terminates.Obtain the data information of the stealthy watermark storage of Fourier transformation Process terminates.If there is the code of setting web page background picture in web page code, but it can't determine that background picture just wraps Stealthy watermark containing Fourier transformation executes step S402-3 so also need further to identify, the part of intercepting page into Row Fourier transformation.The best way is that do not have the interior perhaps less place of content in background, according to the stealth of Fourier transformation The position of watermark insertion carries out Fourier transformation to the web page background part of interception, has obtained frequency domain data figure.Next step It is exactly step S402-4, frequency domain data figure is encoded, the stealthy watermark of Fourier transformation has just been obtained, then again to hidden Shape watermark is decoded, and executes step S202-5, judges whether decoded stealthy watermark contains watermark bar code, if containing item Code, thens follow the steps S202-6, obtains the data information of bar code watermark.If watermark bar code cannot be obtained after decoding, that ground It is carried out step S202-7, process terminates.The invisible water bleeding off journey for obtaining bar code Fourier transformation terminates.
If what is opened is webpage capture, it is carried out S402-3, the part of intercepting page carries out Fourier transformation.It is best Method be the perhaps less place of content in not having in background, the position pair being inserted into according to the stealthy watermark of Fourier transformation The web page background part of interception carries out Fourier transformation, has obtained frequency domain data figure.Next step is exactly step S402-4, Frequency domain data figure is encoded, the stealthy watermark of Fourier transformation has just been obtained, if being then decoded again to stealthy watermark Watermark bar code cannot be obtained after decoding, that ground is carried out step S202-7, and process terminates.Obtain bar code Fourier transformation Invisible water bleeding off journey terminate.
Step S405 obtains the data information of watermarking images storage.
This step is used for, and reads the data information of the bar code storage of the stealthy watermark of Fourier transformation.
The content of bar code is usually to decode and read by having the tool of identification bar code function.Such as smart phone, Hand-held barcode scanning terminal etc..
Smart phone opens the APP with identification bar code function, reads bar code by video camera, if it is one-dimension code, uses In storing one section of webpage miscue information, one-dimension code is parsed first, obtains data encoding, then passes through connection Database, find with the matched miscue information of data encoding, finally miscue information is shown on mobile phone, in this way The data information of one-dimension code storage is just obtained by mobile phone.
If the equipment of parsing one-dimension code is hand-held barcode scanning terminal, handheld terminal connects host computer, is connected by host computer Database is connect, handheld terminal is scanned parsing to one-dimension code, obtains data encoding, data encoding is then sent to connection Host computer, host computer installation software connect with Database, find with the matched information of data encoding, finally Information is shown on computer display screen, in this way, hand-held barcode scanning terminal, which combines to complete with computer, reads one-dimension code data information Process.
If storing data information is two dimensional code, data information is stored directly in two dimensional code, and smart phone opens tool There is the APP of identification bar code function, bar code is read by video camera, for example, two dimensional code storage is one section of webpage miscue, Smart phone APP directly parses the data information of two dimensional code storage, then shows the webpage miscue information parsed On mobile phone.If the length of the two-dimensional code data information stored at that time is greater than the maximum capacity that two dimensional code deposits mansion, read Be exactly watermark data storage uniform resource locator (url), then open uniform resource locator again, obtain final water Print the data information of storage.If the equipment of parsing two dimensional code is hand-held barcode scanning terminal, handheld terminal connects host computer, hand It holds terminal and parsing is scanned to two dimensional code, the content parsed is shown on the computer display screen of connection.
By above method, the parsing to barcode data is completed.Parse the device and method of bar code information not only There are two kinds above, for example, the APP installed on smart machine, to the bar code stored on smart machine, by way of long-pressing It can identify.The decoding program installed on computer, bar code is uploaded, and program is decoded and shown from code.
In the above-described embodiment, a kind of extracting method of stealthy watermark is provided, corresponding, the application is same When a kind of extraction element of stealthy digital watermarking is provided, please refer to Figure 11.
A kind of extraction element of stealthy digital watermarking provided in this embodiment, comprising:
Stealthy watermark carrier acquiring unit 1101 is used to open the carrier webpage or webpage capture of stealthy watermark;
Whether stealthy watermark recognition unit 1102 contains Fu in the background of the webpage or webpage capture opened for identification In leaf transformation stealthy watermark;
Stealthy watermark extracting unit 1103, for the stealth to the Fourier transformation contained in host's web page background After watermark carries out Fourier transformation and decoding, watermarking images are obtained;Stealthy watermark recovery unit, for the host will to be extracted The stealthy watermark of the barcode encoding contained in web page background reverts to the bar code of specified gray scale;
Data information acquiring unit 1104, the data information for watermarking images storage.
The application provides a kind of electronic equipment that stealthy digital watermarking is extracted simultaneously, please refers to Figure 12.
The electronic equipment that a kind of stealthy digital watermarking provided by the present application is extracted, comprising:
Processor 1201;
Memory 1202, for storing the program of stealthy digital watermarking extracting method, described program is by the processor When reading execution, perform the following operations:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing Fourier transformation;
If so, to the stealthy watermark of the Fourier transformation contained in host's web page background carry out Fourier transformation and After decoding, watermarking images are obtained;
Obtain the data information of watermarking images storage.
A kind of auto-building html files or method for refreshing that the 5th embodiment of the application provides.
The present embodiment is used for, when meat page generates or refreshes, if hair variation occurs for the data information for generating watermark, just Execution regenerates the step of watermark bar code.Described the step of regenerating watermark bar code is to execute step S101- step S104.
Although the application embodiment discloses as above, it is not for limiting the application, anyone skilled in the art It is not departing from spirit and scope, possible variation and modification, therefore the protection scope of the application can be made The range that the claim of this application that should be subject to is defined.
In a typical configuration, calculate equipment include one or more processors (CPU), input/output interface, Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/ Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
1, computer-readable medium can be by any including permanent and non-permanent, removable and non-removable media Method or technique come realize information store.Information can be computer readable instructions, data structure, the module of program or other Data.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage Or other magnetic storage devices or any other non-transmission medium, it can be used for storing and can be accessed by a computing device information.It presses It is defined according to herein, computer-readable medium does not include non-temporary computer readable media (transitory media), is such as adjusted The data-signal and carrier wave of system.
2, it will be understood by those skilled in the art that embodiments herein can provide as the production of method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or implementation combining software and hardware aspects can be used in the application The form of example.Moreover, can be used can in the computer that one or more wherein includes computer usable program code by the application With the computer program product implemented in storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Form.

Claims (35)

1. a kind of generation method of stealth digital watermarking characterized by comprising
Obtain the data information of watermark to be generated and the data information of host's webpage;
Host's web page background information is obtained according to host's webpage information;
The information data that specified gray scale is differed with host's web page background information data and with the background information data is The data of barcode encoding uneven color carry out barcode encoding to the data information of the watermark, the watermark information after generating coding;
Watermark information after coding is embedded into host's web page background information data.
2. the generation method of stealth digital watermarking according to claim 1, which is characterized in that with host's web page background Information data and the information data that specified gray scale is differed with the background information data are barcode encoding uneven color data, to institute It states watermark data information and carries out barcode encoding, the watermark information after generating coding specifically includes:
Barcode encoding is carried out to the watermark information, generates the first watermark information;
The information data of specified gray scale is differed according to host's web page background information data and with the background information data For barcode encoding uneven color data, first watermark information coding is adjusted, the second watermark information is generated, by described the Two watermark informations are as the watermark information after coding.
3. the generation method of stealth digital watermarking according to claim 1 or 2, which is characterized in that described to the watermark Data information carries out barcode encoding specifically:
Bar code coding or two-dimensional bar code coding are carried out to the watermark data information.
4. the generation method of stealth digital watermarking according to claim 1 or 2, which is characterized in that described to the watermark Data information carries out barcode encoding specifically: carries out two-dimensional bar code coding to the watermark data information;
Two dimensional code coding includes following any codings: QRCode, Data Matrix, Maxi Code, Aztec, Vericode, PDF417, Ultracode, Code 49 or Code 16K.
5. the generation method of stealth digital watermarking according to claim 1 or 2, which is characterized in that the watermark data Information carries out barcode encoding, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection, if it is not, right The watermark data information to be encoded is compressed.
6. the generation method of stealth digital watermarking according to claim 1 or 2, which is characterized in that the watermark data Information carries out barcode encoding, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection, if it is not, will The watermark data information to be encoded is uploaded to server end;
Receive the uniform resource locator for the watermark data information to be encoded storage that server end issues;
The uniform resource locator is encoded.
7. the generation method of stealth digital watermarking according to claim 1 or 2, which is characterized in that the watermark data It further include that the watermark data information is encrypted before information carries out barcode encoding.
8. the generation method of stealth digital watermarking according to claim 1, which is characterized in that host's webpage includes: browsing The webpage that device webpage or APP are embedded.
9. the generation method of stealth digital watermarking according to claim 1, which is characterized in that by the watermark information after coding It is embedded into host's web page background information data, specifically: the watermark information after coding is embedded into institute with tile mode Host's webpage is stated into web page background information data.
10. a kind of generating means of stealth data watermark characterized by comprising
Information acquisition unit, for obtaining the data information of watermark to be generated and the data information of host's webpage;
Web page background information acquisition unit, for extracting the background letter of host's webpage in the information data of host's webpage Breath;
Watermark generation unit is differed for basis to host's web page background information data and with the background information data The information data of specified gray scale is the data of barcode encoding uneven color, carries out barcode encoding to the data information of the watermark, raw At the watermark information after coding;
Watermark embedder unit, for the watermark information after coding to be embedded into host's web page background information data.
11. a kind of electronic equipment that stealth digital watermarking generates characterized by comprising
Processor;
Memory, for storing the program of stealthy watermark generation method, described program is held when reading execution by the processor The following operation of row:
Obtain the data information of watermark to be generated and the data information of host's webpage;
Host's web page background information is obtained according to host's webpage information;
The information data that specified gray scale is differed with host's web page background information data and with the background information data is The data of barcode encoding uneven color carry out barcode encoding to the data information of the watermark, the watermark information after generating coding;
Watermark information after coding is embedded into host's web page background information data.
12. a kind of extracting method of stealth digital watermarking characterized by comprising
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing barcode encoding;
If so, extracting the stealthy watermark of the barcode encoding contained in host's web page background;
The stealthy watermark for extracting the barcode encoding contained in host's web page background is reverted to the bar code of specified gray scale;
Obtain the data information for restoring the bar code storage of specified gray scale.
13. the extracting method of stealth digital watermarking according to claim 12, which is characterized in that the net that the identification is opened Page or webpage capture background in whether the stealthy watermark containing barcode encoding, further includes:
If not containing the stealthy watermark of barcode encoding in the background of the webpage or webpage capture opened, terminate.
14. the extracting method of stealth digital watermarking according to claim 12, which is characterized in that the specified gray scale is Finger is determined according to the background color of host's webpage, comprising:
Read the background color of host's webpage;
If the background color of host's webpage is white, the color value of the stealthy watermark dark parts of barcode encoding is become " #000000 ", the color value of light-colored part become " #FFFFFF ".
15. the extracting method of stealth digital watermarking according to claim 12, which is characterized in that the acquisition restores specified The data information of the bar code storage of gray scale, comprising:
The data information of the bar code storage of specified gray scale is reverted to using decoding tool decoding;
Decoded data information is shown.
16. a kind of extraction element of stealth digital watermarking characterized by comprising
Stealthy watermark carrier acquiring unit is used to open the carrier webpage or webpage capture of stealthy watermark;
Stealthy watermark recognition unit, whether containing the hidden of barcode encoding in the background of the webpage or webpage capture opened for identification Shape watermark;
Stealthy watermark extracting unit, for extracting the stealthy watermark of the barcode encoding contained in host's web page background;
Stealthy watermark recovery unit, for the stealthy watermark recovery of the barcode encoding contained in host's web page background will to be extracted At the bar code of specified gray scale;
Data information acquiring unit, for obtaining the data information for restoring the bar code storage of specified gray scale.
17. a kind of electronic equipment that stealth digital watermarking is extracted characterized by comprising
Processor;
Memory, for storing the program of stealthy digital watermarking extracting method, described program is reading execution by the processor When, it performs the following operations:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing barcode encoding;
If so, extracting the stealthy watermark of the barcode encoding contained in host's web page background;
The stealthy watermark for extracting the barcode encoding contained in host's web page background is reverted to the bar code of specified gray scale;
Obtain the data information for restoring the bar code storage of specified gray scale.
18. a kind of generation method of stealth digital watermarking, it is characterised in that:
Obtain watermark data information to be generated and host's web page background data information;
Fourier transformation is carried out to host's web page background data information, generates frequency domain data;
After the data information of the watermark to be generated is encoded, it is superimposed in the frequency domain data;
Inverse Fourier transform is carried out to the frequency domain data of superposition watermark data information, host's web page background data are believed after generating transformation Breath.
19. the generation method of stealth digital watermarking according to claim 18, which is characterized in that described to host's net Page background data carries out Fourier transformation, comprising:
Background picture is generated according to host's webpage background color information, then Fourier transformation is carried out to the background picture of generation, it is raw At the picture of frequency domain data.
20. it is according to claim 18 stealth digital watermarking generation method, which is characterized in that it is described will be described to be generated The data information of watermark is encoded, and is superimposed in the frequency domain data, comprising:
The data information of watermark to be generated is subjected to barcode encoding;
Watermark picture after progress barcode encoding is encoded;
Watermark picture after being encoded is superimposed on the frequency domain data picture generated with host's web page background information data.
21. the generation method of stealth digital watermarking according to claim 20, which is characterized in that described by watermark to be generated Data information carry out barcode encoding, specifically:
The watermark data information is subjected to bar code coding or two-dimensional bar code coding.
22. the generation method of stealth digital watermarking according to claim 21, which is characterized in that described to the watermark number It is believed that breath carries out barcode encoding specifically: carry out two-dimensional bar code coding to the watermark data information;
Two dimensional code coding includes following any codings: QRCode, Data Matrix, Maxi Code, Aztec, Vericode, PDF417, Ultracode, Code 49 or Code 16K.
23. the generation method of stealth digital watermarking according to claim 1 or 2, which is characterized in that the watermark data Information carries out barcode encoding, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection, if it is not, right The watermark data information to be encoded is compressed.
24. the generation method of stealth digital watermarking according to claim 18, which is characterized in that believe the watermark data Breath carries out barcode encoding, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection, if it is not, will The watermark data information to be encoded is uploaded to server end;
Receive the uniform resource locator for the watermark data information to be encoded storage that server end issues;
The uniform resource locator is encoded.
25. the generation method of stealth digital watermarking according to claim 18, which is characterized in that believe the watermark data It further include that the watermark data information is encrypted before breath carries out barcode encoding.
26. the generation method of stealth watermark according to claim 18, which is characterized in that host's webpage includes: browser The webpage that webpage or APP are embedded.
27. a kind of generating means of stealth digital watermarking characterized by comprising
Data information acquiring unit, for obtaining watermark data information to be generated and host's web page background data information;
Frequency domain data generation unit generates frequency domain number for carrying out Fourier transformation to host's web page background data information According to;
Watermark data information superposition unit is superimposed to described after being encoded the data information of the watermark to be generated In frequency domain data;
Web page background data information generation unit carries out Fourier's inversion for the frequency domain data to superposition watermark data information It changes, generates host's web page background data information after transformation.
28. a kind of electronic equipment that stealth digital watermarking generates characterized by comprising
Processor;
Memory, for storing the program of stealthy digital watermarking generation method, described program is reading execution by the processor When, it performs the following operations:
Obtain watermark data information to be generated and host's web page background data information;
Fourier transformation is carried out to host's web page background data information, generates frequency domain data;
After the data information of the watermark to be generated is encoded, it is superimposed in the frequency domain data;
Inverse Fourier transform is carried out to the frequency domain data of superposition watermark data information, host's web page background data are believed after generating transformation Breath.
29. a kind of extracting method of stealth digital watermarking characterized by comprising
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing Fourier transformation;
If so, the stealthy watermark to the Fourier transformation contained in host's web page background carries out Fourier transformation and decoding Afterwards, watermarking images are obtained;
Obtain the data information of watermarking images storage.
30. it is according to claim 29 stealth watermark extracting method, which is characterized in that it is described identification open webpage or In the background of webpage capture whether the stealthy watermark containing Fourier transformation, further includes:
If not containing the stealthy watermark of Fourier transformation in the background of the webpage or webpage capture opened, terminate.
31. the extracting method of stealth watermark according to claim 29, which is characterized in that described to be carried on the back to host's webpage The stealthy watermark of the Fourier transformation contained in scape carries out Fourier transformation and decoding, including;
Fourier transformation is carried out to the stealthy watermark of the Fourier transformation contained in host's web page background, obtains frequency domain figure Picture;
The frequency domain image is decoded, watermarking images are obtained.
32. the extracting method of stealth watermark according to claim 29, which is characterized in that described to obtain what watermarking images stored Data information, comprising: one or more of character information, pictorial information, bar code information.
33. a kind of extraction element of stealth digital watermarking characterized by comprising
Stealthy watermark carrier acquiring unit is used to open the carrier webpage or webpage capture of stealthy watermark;
Stealthy watermark recognition unit, whether containing Fourier transformation in the background of the webpage or webpage capture opened for identification Stealthy watermark;
Stealthy watermark extracting unit carries out Fu for the stealthy watermark to the Fourier transformation contained in host's web page background In leaf transformation and decoding after, obtain watermarking images;Stealthy watermark recovery unit contains for that will extract in host's web page background The stealthy watermark of some barcode encodings reverts to the bar code of specified gray scale;
Data information acquiring unit, the data information for watermarking images storage.
34. a kind of electronic equipment that stealth digital watermarking is extracted characterized by comprising
Processor;
Memory, for storing the program of stealthy digital watermarking extracting method, described program is reading execution by the processor When, it performs the following operations:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing Fourier transformation;
If so, the stealthy watermark to the Fourier transformation contained in host's web page background carries out Fourier transformation and decoding Afterwards, watermarking images are obtained;
Obtain the data information of watermarking images storage.
35. a kind of auto-building html files or method for refreshing, which is characterized in that execute the claims 1 when the auto-building html files or brush To the generation method of 9 any stealthy digital watermarkings.
CN201810085009.5A 2018-01-29 2018-01-29 Invisible digital watermark generation and extraction method and device Active CN110097488B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810085009.5A CN110097488B (en) 2018-01-29 2018-01-29 Invisible digital watermark generation and extraction method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810085009.5A CN110097488B (en) 2018-01-29 2018-01-29 Invisible digital watermark generation and extraction method and device

Publications (2)

Publication Number Publication Date
CN110097488A true CN110097488A (en) 2019-08-06
CN110097488B CN110097488B (en) 2023-10-24

Family

ID=67442163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810085009.5A Active CN110097488B (en) 2018-01-29 2018-01-29 Invisible digital watermark generation and extraction method and device

Country Status (1)

Country Link
CN (1) CN110097488B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110909322A (en) * 2019-11-29 2020-03-24 杭州天谷信息科技有限公司 Intelligent printing document processing system and method based on HVS
CN111460399A (en) * 2020-03-16 2020-07-28 平安科技(深圳)有限公司 Watermark data processing method, device, computer equipment and storage medium
CN112581549A (en) * 2020-12-16 2021-03-30 合肥图溯信息技术有限公司 Picture tracing method, storage medium, electronic device and host device
WO2022116493A1 (en) * 2020-12-04 2022-06-09 平安科技(深圳)有限公司 Screen information protection method and apparatus, and computer device and readable storage medium
CN114692214A (en) * 2020-12-30 2022-07-01 南京南瑞继保工程技术有限公司 A method, system and storage medium for preventing tampering and leakage of key data of power wiring diagram

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889428A (en) * 2006-08-01 2007-01-03 西南交通大学 Biological characteristic data safety hidden transmitting method under network environment
CN101149779A (en) * 2007-11-06 2008-03-26 天津市阿波罗信息技术有限公司 Method for embedding government application file content in paper medium
TW200849135A (en) * 2007-06-12 2008-12-16 Univ Nat Chunghsing A robust watermarking method for high dynamic range images
CN103500350A (en) * 2013-10-11 2014-01-08 北京邮电大学 Chinese-sensible code and digital watermark-based anti-counterfeit method
CN104408684A (en) * 2014-12-13 2015-03-11 天津远目科技有限公司 Digital watermarking method with high robustness
CN107622470A (en) * 2017-09-01 2018-01-23 杭州趣维科技有限公司 A kind of real-time robust embedding algorithm and extracting method based on Quick Response Code

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889428A (en) * 2006-08-01 2007-01-03 西南交通大学 Biological characteristic data safety hidden transmitting method under network environment
TW200849135A (en) * 2007-06-12 2008-12-16 Univ Nat Chunghsing A robust watermarking method for high dynamic range images
CN101149779A (en) * 2007-11-06 2008-03-26 天津市阿波罗信息技术有限公司 Method for embedding government application file content in paper medium
CN103500350A (en) * 2013-10-11 2014-01-08 北京邮电大学 Chinese-sensible code and digital watermark-based anti-counterfeit method
CN104408684A (en) * 2014-12-13 2015-03-11 天津远目科技有限公司 Digital watermarking method with high robustness
CN107622470A (en) * 2017-09-01 2018-01-23 杭州趣维科技有限公司 A kind of real-time robust embedding algorithm and extracting method based on Quick Response Code

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110909322A (en) * 2019-11-29 2020-03-24 杭州天谷信息科技有限公司 Intelligent printing document processing system and method based on HVS
CN110909322B (en) * 2019-11-29 2020-12-11 杭州天谷信息科技有限公司 Intelligent printing document processing system and method based on HVS
CN111460399A (en) * 2020-03-16 2020-07-28 平安科技(深圳)有限公司 Watermark data processing method, device, computer equipment and storage medium
CN111460399B (en) * 2020-03-16 2025-01-10 平安科技(深圳)有限公司 Watermark data processing method, device, computer equipment and storage medium
WO2022116493A1 (en) * 2020-12-04 2022-06-09 平安科技(深圳)有限公司 Screen information protection method and apparatus, and computer device and readable storage medium
CN112581549A (en) * 2020-12-16 2021-03-30 合肥图溯信息技术有限公司 Picture tracing method, storage medium, electronic device and host device
CN114692214A (en) * 2020-12-30 2022-07-01 南京南瑞继保工程技术有限公司 A method, system and storage medium for preventing tampering and leakage of key data of power wiring diagram

Also Published As

Publication number Publication date
CN110097488B (en) 2023-10-24

Similar Documents

Publication Publication Date Title
CN110097488A (en) The generation of stealthy digital watermarking and extracting method and device
CN111191414B (en) Page watermark generation method, identification method, device, equipment and storage medium
US9177238B2 (en) Techniques for generating customized two-dimensional barcodes
US9665817B2 (en) Techniques for generating customized two-dimensional barcodes
CN106529633B (en) Generation method, coding/decoding method and the device of two dimensional code
JP4515999B2 (en) Mixed code decoding method and apparatus, and recording medium
CA2586274C (en) Mixed code, and method and apparatus for generating the same, and method and apparatus for decoding the same
JP4557866B2 (en) Mixed code, mixed code generation method and apparatus, and recording medium
CA2504299C (en) System and method for decoding digital encoded images
CN110766594B (en) Information hiding method and device, detection method and device and anti-counterfeiting tracing method
CN105447546A (en) Two-dimensional code capable of being embedded with large-ratio graph as well as coding and decoding method and device therefor
US7551752B2 (en) Systems and methods for authenticating objects using multiple-level image encoding and decoding
US9934457B2 (en) Method of securing a two-dimensional barcode
CN111680273A (en) Watermark embedding method, device, electronic equipment and readable storage medium
CN109816077A (en) A kind of hidden method of two-dimensional barcode information, device, electronic equipment and storage medium
AU2010238503B2 (en) Two dimensional information symbol
CN111160331A (en) Anti-counterfeit label authentication method, device, medium and template graph generation method
CN103902711A (en) Method and system for embedding two-dimension code images into webpages
Juan et al. Graphic QR code with the second hidden QR code by codeword rearrangement
CN107798373B (en) Two-dimensional code anti-copying method and system
Tsai et al. Auto ROI & mask R-CNN model for QR code beautification (ARM-QR)
Appiah et al. Performance Evaluation of Corrupted QR Code Scanners
CN112418371B (en) Secure three-dimensional code for blockchains and methods of generating and decoding
CN114330621A (en) Two-dimensional code anti-counterfeiting method and device based on identification information and storage medium
CN109829844B (en) Information hiding method and device based on two-dimension code and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant