CN110097488A - The generation of stealthy digital watermarking and extracting method and device - Google Patents
The generation of stealthy digital watermarking and extracting method and device Download PDFInfo
- Publication number
- CN110097488A CN110097488A CN201810085009.5A CN201810085009A CN110097488A CN 110097488 A CN110097488 A CN 110097488A CN 201810085009 A CN201810085009 A CN 201810085009A CN 110097488 A CN110097488 A CN 110097488A
- Authority
- CN
- China
- Prior art keywords
- watermark
- information
- data
- webpage
- host
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 103
- 238000003860 storage Methods 0.000 claims abstract description 74
- 230000009466 transformation Effects 0.000 claims description 97
- 238000000605 extraction Methods 0.000 claims description 13
- 239000000284 extract Substances 0.000 claims description 10
- 238000011084 recovery Methods 0.000 claims description 9
- 239000011159 matrix material Substances 0.000 claims description 8
- 230000008569 process Effects 0.000 description 16
- 230000008859 change Effects 0.000 description 13
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 13
- 239000003086 colorant Substances 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 9
- 230000006870 function Effects 0.000 description 9
- 238000010422 painting Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 238000006243 chemical reaction Methods 0.000 description 7
- 230000004048 modification Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 6
- 238000013500 data storage Methods 0.000 description 4
- 230000007547 defect Effects 0.000 description 4
- 238000001514 detection method Methods 0.000 description 4
- 238000004519 manufacturing process Methods 0.000 description 4
- 241001269238 Data Species 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000003780 insertion Methods 0.000 description 3
- 230000037431 insertion Effects 0.000 description 3
- 230000000740 bleeding effect Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000003825 pressing Methods 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000010009 beating Methods 0.000 description 1
- 238000005520 cutting process Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 238000002594 fluoroscopy Methods 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 235000013372 meat Nutrition 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000001172 regenerating effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention discloses a kind of generation methods of stealthy digital watermarking, comprising: obtains the data information of watermark to be generated and the data information of host's webpage;Host's web page background information is obtained according to host's webpage information;The information data of specified gray scale is differed using host's web page background information data and with the background information data as the data of barcode encoding uneven color, barcode encoding is carried out to the data information of the watermark, the watermark information after generating coding;Watermark information after coding is embedded into host's web page background information data.Small with the information storage for solving watermark in the prior art, watermark information and carrier content fix technological difficulties that are immutable and being digital watermarking that can be stealthy.
Description
Technical field
This application involves a kind of digital watermarks, and in particular to a kind of generation and extracting method of stealth digital watermarking.This Shen
Please it is related to the generation and extraction element and a kind of generation and extraction of stealthy digital watermarking of a kind of stealthy digital watermarking simultaneously
The electronic equipment of method.
Background technique
Traditional watermark is applied to paper earliest, be clipped in paper in the paper making process rather than the surface of paper, meet x ray fluoroscopy x
When can see the pattern, portrait or text of light and shade texture.The manufacturing technology of this watermark is still used so far, and this
Manufacturing technology always be modified improve, usual bank note, invoice, security etc. in the fabrication process using such technology, play it is anti-
The purpose of pseudo-, anti-fraud.With the development of information technology, a kind of digital watermark technology, usually going out digital carrier are produced
The information such as place, author, company logo as digital watermark embedding to digital carrier in, such as multimedia file, electronics text
In shelves, software, and the use value of original vector is not influenced, be not easy to be modified again yet, usually state that copyright etc. uses this side
Formula.
Although the prior art has widely used digital watermark technology, it is used for digital carrier, watermark content to be logical
It is often text, pattern etc., content is very clear, only serves a kind of statement or label effect, and the interior empty also phase of its storage
When limited, usually a bit of text or a picture, text or the company of the Business Name in digital carrier source are such as marked
The pattern of logo.Although the watermark generated using this digital watermark technology can carry out stealthy watermark encrypting, storage
Information content is few, and is that pre-rendered is good, can not change, carrier content is also fixed and invariable.How information storage is generated
It measures big, information and carrier content is all a kind of stealthy watermark variable at any time, being still one has technical problem to be solved.
For example, application No. is: 201410217257.3, entitled " the digital image tampering detection side with stealthy watermark
The Chinese patent application of method " provides a kind of detection method of stealthy watermark, specifically carries out concealed-enciphering for digital picture,
Host image and encrypted watermark image are indicated in the form of picture element matrix respectively, the digital picture with stealthy watermark is solved
Code is extracted and is restored, if the image after reduction is identical as host image picture element matrix, illustrates that host image is not tampered with, no
Then, illustrate that host image is tampered.
Although above-mentioned present technology refers to a kind of detection method of stealthy watermark, but this detection method, usually uses
In copyright protection, watermark only plays mark action, and information storage is small, and is that pre-rendered is good, can not change,
Carrier content be also it is constant, be not able to satisfy, information big to information storage and carrier content all and be and is variable and can stealthy number
The requirement of word watermark.
Summary of the invention
The application provides a kind of generation method for stealthy digital watermarking and a kind of for stealthy digital watermarking
Extracting method, small with the information storage for solving watermark in the prior art, watermark information and carrier content are fixed immutable and are
The technological difficulties of digital watermarking that can be stealthy.
A kind of generation method of stealthy digital watermarking provided by the present application, comprising:
Obtain the data information of watermark to be generated and the data information of host's webpage;
Host's web page background information is obtained according to host's webpage information;
The Information Number of specified gray scale is differed with host's web page background information data and with the background information data
According to the data for barcode encoding uneven color, barcode encoding is carried out to the data information of the watermark, the watermark letter after generating coding
Breath;
Watermark information after coding is embedded into host's web page background information data.
Preferably, specified gray scale is differed with host's web page background information data and with the background information data
Information data be barcode encoding uneven color data, to the watermark data information carry out barcode encoding, generate coding after water
Official seal breath specifically includes:
Barcode encoding is carried out to the watermark information, generates the first watermark information;
The information of specified gray scale is differed according to host's web page background information data and with the background information data
Data are barcode encoding uneven color data, are adjusted to first watermark information coding, generate the second watermark information, will
Second watermark information is as the watermark information after coding.
It is preferably, described that barcode encoding is carried out to the watermark data information specifically:
Bar code coding or two-dimensional bar code coding are carried out to the watermark data information.
Preferably, it is described to the watermark data information carry out barcode encoding specifically: to the watermark data information into
Row two-dimensional bar code coding;
Two dimensional code coding includes following any codings: QRCode, Data Matrix, Maxi Code, Aztec,
Vericode, PDF417, Ultracode, Code 49 or Code 16K.
Preferably, barcode encoding is carried out to the watermark data information, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection,
If it is not, being compressed to the watermark data information to be encoded.
Preferably, barcode encoding is carried out to the watermark data information, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection,
If it is not, the watermark data information to be encoded is uploaded to server end;
Receive the uniform resource locator for the watermark data information to be encoded storage that server end issues;
The uniform resource locator is encoded.
Preferably, to the watermark data information carry out barcode encoding before, further include to the watermark data information into
Row encryption.
Preferably, host's webpage includes: the webpage that browsing device net page or APP are embedded.
Preferably, the watermark information after coding is embedded into host's web page background information data, specifically: it will
Watermark information after coding is embedded into host's webpage into web page background information data with tile mode.
The application provides a kind of generating means of stealthy data watermark, comprising:
Information acquisition unit, for obtaining the data information of watermark to be generated and the data information of host's webpage;
Web page background information acquisition unit, for extracting the back of host's webpage in the information data of host's webpage
Scape information;
Watermark generation unit, for according to host's web page background information data and with the background information number
It is the data of barcode encoding uneven color according to the information data for differing specified gray scale, bar code is carried out to the data information of the watermark
Coding, the watermark information after generating coding;
Watermark embedder unit, for the watermark information after coding to be embedded into host's web page background information data.
The application also provides a kind of electronic equipment that stealthy digital watermarking generates, comprising:
Processor;
Memory, for storing the program of stealthy watermark generation method, described program is reading execution by the processor
When, it performs the following operations:
Obtain the data information of watermark to be generated and the data information of host's webpage;
Host's web page background information is obtained according to host's webpage information;
The Information Number of specified gray scale is differed with host's web page background information data and with the background information data
According to the data for barcode encoding uneven color, barcode encoding is carried out to the data information of the watermark, the watermark letter after generating coding
Breath;
Watermark information after coding is embedded into host's web page background information data.
The application provides a kind of extracting method of stealthy digital watermarking, comprising:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing barcode encoding;
If so, extracting the stealthy watermark of the barcode encoding contained in host's web page background;
The stealthy watermark for extracting the barcode encoding contained in host's web page background is reverted to the item of specified gray scale
Code;
Obtain the data information for restoring the bar code storage of specified gray scale.
Preferably, it is described identification open webpage or webpage capture background in whether the invisible water containing barcode encoding
Print, further includes:
If not containing the stealthy watermark of barcode encoding in the background of the webpage or webpage capture opened, terminate.
Preferably, the specified gray scale refers to according to the determination of the background color of host's webpage, comprising:
Read the background color of host's webpage;
If the background color of host's webpage is white, by the color of the stealthy watermark dark parts of barcode encoding
Value becomes " #000000 ", and the color value of light-colored part becomes " #FFFFFF ".
It is preferably, described to obtain the data information for restoring the bar code storage of specified gray scale, comprising:
The data information of the bar code storage of specified gray scale is reverted to using decoding tool decoding;
Decoded data information is shown.
The application provides a kind of extraction element of stealthy digital watermarking, comprising:
Stealthy watermark carrier acquiring unit is used to open the carrier webpage or webpage capture of stealthy watermark;
Whether stealthy watermark recognition unit is compiled containing bar code in the background of the webpage or webpage capture opened for identification
The stealthy watermark of code;
Stealthy watermark extracting unit, for extracting the stealthy watermark of the barcode encoding contained in host's web page background;
Stealthy watermark recovery unit, for the invisible water of the barcode encoding contained in host's web page background will to be extracted
Print reverts to the bar code of specified gray scale;
Data information acquiring unit, for obtaining the data information for restoring the bar code storage of specified gray scale.
The application also provides a kind of electronic equipment that stealthy digital watermarking is extracted, comprising:
Processor;
Memory, for storing the program of stealthy digital watermarking extracting method, described program is read by the processor
When execution, perform the following operations:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing barcode encoding;
If so, extracting the stealthy watermark of the barcode encoding contained in host's web page background;
The stealthy watermark for extracting the barcode encoding contained in host's web page background is reverted to the item of specified gray scale
Code;
Obtain the data information for restoring the bar code storage of specified gray scale.
The application provides a kind of generation method of stealthy digital watermarking, it is characterised in that:
Obtain watermark data information to be generated and host's web page background data information;
Fourier transformation is carried out to host's web page background data information, generates frequency domain data;
After the data information of the watermark to be generated is encoded, it is superimposed in the frequency domain data;
Inverse Fourier transform is carried out to the frequency domain data of superposition watermark data information, generates host's web page background after transformation
Data information.
It is preferably, described that Fourier transformation is carried out to host's web page background data, comprising:
Background picture is generated according to host's webpage background color information, then Fourier's change is carried out to the background picture of generation
It changes, generates the picture of frequency domain data.
Preferably, the data information by the watermark to be generated encodes, and is superimposed in the frequency domain data,
Include:
The data information of watermark to be generated is subjected to barcode encoding;
Watermark picture after progress barcode encoding is encoded;
Watermark picture after being encoded is superimposed to the frequency domain data picture generated with host's web page background information data
On.
Preferably, the data information by watermark to be generated carries out barcode encoding, specifically:
The watermark data information is subjected to bar code coding or two-dimensional bar code coding.
Preferably, it is described to the watermark data information carry out barcode encoding specifically: to the watermark data information into
Row two-dimensional bar code coding;
Two dimensional code coding includes following any codings: QRCode, Data Matrix, Maxi Code, Aztec,
Vericode, PDF417, Ultracode, Code 49 or Code 16K.
Preferably, barcode encoding is carried out to the watermark data information, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection,
If it is not, being compressed to the watermark data information to be encoded.
Preferably, barcode encoding is carried out to the watermark data information, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection,
If it is not, the watermark data information to be encoded is uploaded to server end;
Receive the uniform resource locator for the watermark data information to be encoded storage that server end issues;
The uniform resource locator is encoded.
Preferably, to the watermark data information carry out barcode encoding before, further include to the watermark data information into
Row encryption.
Preferably, host's webpage includes: the webpage that browsing device net page or APP are embedded.
The application provides a kind of generating means of stealthy digital watermarking, comprising:
Data information acquiring unit, for obtaining watermark data information to be generated and host's web page background data information;
Frequency domain data generation unit generates frequency for carrying out Fourier transformation to host's web page background data information
Numeric field data;
Watermark data information superposition unit is superimposed to after being encoded the data information of the watermark to be generated
In the frequency domain data;
Web page background data information generation unit carries out Fourier for the frequency domain data to superposition watermark data information
Inverse transformation generates host's web page background data information after transformation.
The application also provides a kind of electronic equipment that stealthy digital watermarking generates, comprising:
Processor;
Memory, for storing the program of stealthy digital watermarking generation method, described program is read by the processor
When execution, perform the following operations:
Obtain watermark data information to be generated and host's web page background data information;
Fourier transformation is carried out to host's web page background data information, generates frequency domain data;
After the data information of the watermark to be generated is encoded, it is superimposed in the frequency domain data;
Inverse Fourier transform is carried out to the frequency domain data of superposition watermark data information, generates host's web page background after transformation
Data information.
The application provides a kind of extracting method of stealthy digital watermarking, comprising:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing Fourier transformation;
If so, to the stealthy watermark of the Fourier transformation contained in host's web page background carry out Fourier transformation and
After decoding, watermarking images are obtained;
Obtain the data information of watermarking images storage.
Preferably, it is described identification open webpage or webpage capture background in whether the stealth containing Fourier transformation
Watermark, further includes:
If not containing the stealthy watermark of Fourier transformation in the background of the webpage or webpage capture opened, terminate.
Preferably, the stealthy watermark to the Fourier transformation contained in host's web page background carries out Fourier
Transformation and decoding, including;
Fourier transformation is carried out to the stealthy watermark of the Fourier transformation contained in host's web page background, obtains frequency
Area image;
The frequency domain image is decoded, watermarking images are obtained.
Preferably, the data information for obtaining watermarking images storage, comprising: character information, pictorial information, bar code letter
One or more of breath.
The application provides a kind of extraction element of stealthy digital watermarking, comprising:
Stealthy watermark carrier acquiring unit is used to open the carrier webpage or webpage capture of stealthy watermark;
Whether stealthy watermark recognition unit contains Fourier in the background of the webpage or webpage capture opened for identification
The stealthy watermark of transformation;
Stealthy watermark extracting unit, for the stealthy watermark to the Fourier transformation contained in host's web page background
After carrying out Fourier transformation and decoding, watermarking images are obtained;Stealthy watermark recovery unit, for host's webpage will to be extracted
The stealthy watermark of the barcode encoding contained in background reverts to the bar code of specified gray scale;
Data information acquiring unit, the data information for watermarking images storage.
The application also provides a kind of electronic equipment that stealthy digital watermarking is extracted, comprising:
Processor;
Memory, for storing the program of stealthy digital watermarking extracting method, described program is read by the processor
When execution, perform the following operations:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing Fourier transformation;
If so, to the stealthy watermark of the Fourier transformation contained in host's web page background carry out Fourier transformation and
After decoding, watermarking images are obtained;
Obtain the data information of watermarking images storage.
Perform claim requires 1 to 9 when the application provides a kind of auto-building html files or method for refreshing, the auto-building html files or brush
The generation method of any stealthy digital watermarking.
Compared with prior art, the generation method provided by the present application for stealthy watermark, the pre-generatmg watermark that will acquire
Content of text converted and stored to bar code, such as two dimensional code, then by the color of bar code according to the web page background face of insertion
Color is changed, and is allowed to close with background color and is not identified visually, achievees the effect that stealth, by the face of bar code when extraction
Color is converted into the big color of contrast, can be identified by barcode device, and the stealthy effect operation of this bar code is simple, again
Achieve the purpose that stealth, and and the information storage that solves digital watermarking is small, watermark information and carrier content fixation are immutable
Digital watermark technology difficult point.
Detailed description of the invention
Fig. 1 is a kind of generation method for stealthy digital watermarking that the application first embodiment provides;
Fig. 2 is a kind of extracting method for stealthy digital watermarking that the application second embodiment provides;
Fig. 3 is a kind of generation method for stealthy digital watermarking that the application 3rd embodiment provides;
Fig. 4 is a kind of extracting method for stealthy digital watermarking that the application fourth embodiment provides;
Fig. 5 is a kind of generating means schematic diagram for stealthy data watermark that the application first embodiment provides;
Fig. 6 is the electronic equipment schematic diagram that a kind of stealthy digital watermarking that the application first embodiment provides generates;
Fig. 7 is a kind of extraction element schematic diagram for stealthy data watermark that the application second embodiment provides;
Fig. 8 is the electronic equipment schematic diagram that a kind of stealthy digital watermarking that the application second embodiment provides is extracted;
Fig. 9 is a kind of generating means schematic diagram for stealthy data watermark that the application 3rd embodiment provides;
Figure 10 is the electronic equipment schematic diagram that a kind of stealthy digital watermarking that the application 3rd embodiment provides generates;
Figure 11 is a kind of extraction element schematic diagram for stealthy data watermark that the application fourth embodiment provides;
Figure 12 is the electronic equipment schematic diagram that a kind of stealthy digital watermarking that the application fourth embodiment provides is extracted;
Specific embodiment
Many details are explained in the following description in order to fully understand the application.But the application can
Implemented with being much different from other way described herein, those skilled in the art can be without prejudice to the application intension
In the case of do similar popularization, therefore the application is not limited by following public specific implementation.
The application first embodiment providing method is described in detail.
Fig. 1 is please referred to, which is a kind of stealthy digital watermarking generation method that the application first embodiment provides.
Step S101 obtains the data information of watermark to be generated and the data information of host's webpage.
This step is used to obtain the data information of watermark to be generated, and host's net embedded by the watermark information generated
The data information of page.
The data information of the watermark to be generated is related to webpage, is obtained from named web page, then again will
The watermark of generation is embedded into the named web page for obtaining data information, the named web page i.e. host's webpage, so host
Webpage namely obtains the webpage of watermark data information to be generated.
The data information of the watermark to be generated includes the various information on host's webpage, for example, due to programming original
The miscue information generated by caused bugs, by the web page address of miscue information and generating routine defect
Data information is collectively constituted, other information related with webpage is also possible to, for example, facility information, net for browsing webpage
Background information, the user information of log-on webpage and the geographical location information of page.These data informations include Chinese character, English, various
Symbol, picture etc..Above-mentioned data information is not fixed and invariable, for example, the miscue information of webpage due to modification and
It disappears, so the data information obtained is possible to as sky, it is also possible to generate other defects because of modification, become in addition
Miscue information;The facility information of webpage is browsed, the same webpage can be produced when browsing on different mobile phone, computer
Raw different facility information;The background information of webpage irregular can also change, for example, the upgrading correcting of website, it is new specially
The release of topic, background color or background picture can all change;The user information of log-on webpage and geographical status information also can be with
Different user log in and change, geographical location information is also because different in different regions.
The data information of the watermark to be generated can also carry out input information by the backstage of webpage, be then embedded into
In webpage, as the information on webpage, to obtain, for example, being searched the website pass that engine includes setting for the ease of website
Key word.Usual website keyword will not arbitrarily change, but in some cases, such as website revision, when increasing the new space of a whole page,
Also it will do it modification, so can also change by the data information of webpage backstage input.
The data information of the watermark to be generated be also possible to it is changeless, for example, the title and Zi Lan of website homepage
Purpose title will not all change under normal conditions, it is possible to assert that data information is fixed and invariable.
The data information of the watermark to be generated is all relevant data information, that is, the host with host's webpage
A part in webpage data information is obtained from host's webpage or by host's webpage.
Step S102 obtains host's web page background information according to host's webpage information.
This step is used for, and the background information of host's webpage is extracted in the information of host's webpage.
In the previous step, when obtaining the data information of watermark to be generated, the data of many host's webpages are also obtained
Information, the back of address (url), the browser that browsing webpage uses, webpage including miscue information, webpage in webpage
Next scape color, user information of login etc. just extract the background information of webpage in the data information of these webpages,
Namely webpage background color information, the background color of webpage are determined in the development process of webpage by specific code
Justice, it is generally the case that the code for defining webpage background color is two kinds of following literary styles, one of literary style are as follows: body
{background-color:#FFFFFF;, another literary style is<body bgcolor="#FFFFFF">, # subsequent six
What position hexadecimal number indicated is exactly the background color numerical value of webpage, and some colors can be replaced directly with English, such as above
Written #FFFFFF, the color of expression are white, so indicating color in the both above code for defining webpage background color
Part #FFFFFF can be substituted for English character white, so two kinds of literary styles above can be write as, body
{background-color:white;,<body bgcolor="white">, the both of which ratio of color shown above
More typically, thus extract webpage background color when, find first define webpage background color code, then in code
It is middle to extract six hexadecimal numbers (FFFFFF) for indicating color or English (white).
Step S103 differs specified face with host's web page background information data and with the background information data
The information data of color contrast is barcode encoding uneven color data, carries out barcode encoding to the watermark data information, generates and compile
Watermark information after code.
This step is used for the background information data of host's webpage, that is, background color numerical value and with background face
The color data of hue difference designated color contrast is two different colors of bar code to be generated, then to the watermark
Data information carry out bar code coding, generate coding after watermark information color be exactly with the background color of host's webpage with
Background color differs both colors of the color of designated color contrast.
The bar code refers to, is made of the lines or pattern of different colours, and the one kind that can store corresponding data is special
The picture of form.Bar code can be by the width one-dimension code that equal multiple " items " and " sky " do not form, and the code system of one-dimension code includes
Common EAN code, 39 yards, intersect 25 yards, UPC code, 128 yards, 93 yards, ISBN code and Codabar (Ku Deba code) etc..It can also
To be the two dimensional code for being distributed in plane identifying recording layer symbolic information according to certain rules with certain specific geometric figure.Two dimension
Code code system include common QRCode, Data Matrix, Maxi Code, Aztec, Vericode, PDF417,
Ultracode, Code 49 or Code 16K, Code One etc..
Under normal conditions, the bar code of storing data information is the apparent black and white of contrast, and it is obvious to be also possible to contrast
Other colors, such as blue and white, blackyellow, the colors such as red and white.
If the bar code of storing data information is one-dimension code, one-dimension code is come using " item " and " sky " of multiple and different width
The binary data information for indicating the corresponding letter and number, since the data capacity of itself storage is limited, so
When using one-dimension code storing data, a set of database is usually being established from the background, for storing the corresponding data of bar code.
For example, it is a set of for storing the database of web page program defect establishing from the background, every miscue information is made
Prestore and be stored in database for a data, when obtaining a web page program defect, go first in database search with it is described
The corresponding data of bugs prompt information, then the data encoding of the corresponding one-dimension code of the data is obtained, it then will be described
Data encoding is converted into binary data and generates one-dimension code.
The data format of two dimensional code storage is the corresponding geometry of binary data indicated with 0 and 1, two dimensional code energy
A variety of data formats, including Chinese, English, various symbols, picture etc. are enough stored, also just includes numerous types of data, example
Such as, numeric type data, character type data etc..
If the bar code of storing data information is two dimensional code, it is necessary first to the data conversion that will acquire at binary data,
For example, obtaining one section of prompt information " syntax error of current web page bugs!", then first by this section of English
It is handled as a string of characters, then finds the binary numeral of the corresponding ASCII coding of each character in this string character, this
Sample has just obtained the binary data of this section of prompt information, then by obtained binary data storage in two dimensional code.If worked as
Do not occur bugs in preceding webpage, also just there is no miscue information, then the prompt information obtained is just empty, so that it may
To illustrate not having miscue in current web page with passage, such as " without discovery error message in current web page ", then
This section of text information is converted into binary data storage in two dimensional code.
Since the maximum amount of storage of two dimensional code reaches thousands of a characters, so when using two dimensional code storing data, due to it
Diversity of storing data format itself and the capacity of storage have been able to satisfy primary demand, and the data information once obtained
Length has exceeded the memory capacity of a two dimensional code, so that it may using the method storing data of compressed data information, for example, can
Stored with the data using interception two dimensional code memory capacity, then the ground data information that can will acquire be uploaded to clothes
Business device is stored, and the uniform resource locator (url) for storing the data information is then carried out code storage to two dimension
Code.
One-dimension code is creating corresponding database when in use from the background, so the capacity of one-dimension code storing data information
It being determined by background data base, the data format of one-dimension code storage is also determined by corresponding database, including, numeric type data, word
Symbol type data etc..
Host's webpage, embedded including the webpage for using various browsers to open in various equipment and APP
Webpage.
Next just the watermark data information of acquisition is encoded, such as selects two dimensional code for coding mode, if wait compile
The length of the watermark data information of code is less than or equal to the maximum capacity of the code system of selection, just directly by watermark number to be encoded
It is believed that breath carries out two dimensional code coding, the first watermark information is generated, the first watermark information of generation is usually what gray value differed greatly
Two kinds of colors, such as black and white, next again by the first watermark information according to host's web page background information data with
And it is barcode encoding uneven color data that the information data of specified gray scale is differed with the background information data, to first water
Print information coding is adjusted.
Next the numerical value of webpage background color is obtained, it is generally the case that it is following for defining the code of webpage background color
Two kinds of literary styles, one of literary style are as follows: body { background-color:#FFFFFF;, another literary style is <body
Bgcolor=" #FFFFFF " >, what subsequent six hexadecimal numbers of # indicated is exactly the background color numerical value of webpage, and has
Color can be replaced directly with English, and such as above written #FFFFFF, the color of expression is white, so both above definition
Indicate that #FFFFFF can be substituted for English character white by the part of color in the code of webpage background color, so above
Two kinds of literary styles can be write as, body { background-color:white;,<body bgcolor="white">, on
Face indicates that the both of which of color is relatively common, if the background color of webpage is directly write as with six hexadecimal datas
The RGB color of expression, then the color data of web page background can be directly read, if the background color of webpage is to use English
The color that Chinese character indicates, then the English character for the expression color that will acquire is converted into being indicated with six hexadecimal datas
RGB color, the numerical value of the webpage background color finally obtained be all six hexadecimal datas indicate color.
After obtaining webpage background color, the color of the bar code is carried out accordingly according to webpage background color
Conversion, if the webpage background color obtained is #FFFFFF, the bar code of storing data information is two dimensional code, then will just store
The color value of the deeper geometry of the two dimensional code barcoded color of data information is converted into " #FEFEFE ", the shallower geometry of color
Shape is consistent with background color, and color value is " #FFFFFF ".
Barcoded color is converted for different webpage background colors according to conversion method above, for another example
The background color value of webpage is #A8A8A8, so that it may it is #A7A7A7 that the deeper part of color in bar code, which is converted into color value,
The shallower part of color is consistent with web page background color, color value #A8A8A8.Then the two dimensional code after conversion is embedded into institute
It states in web page background.
If the bar code of storing data information is one-dimension code, just by the one-dimension code barcoded color of storing data information
The color value of deeper " item " is converted into " #FEFEFE ", and the part of color shallower " sky " is consistent with background color, color value
For " #FFFFFF ".
Although the color of bar code is very close with webpage background color by converting, once it is easily noticed by the users, just has
The risk being cracked, so also needing to encrypt the bar code for having carried out color conversion, to prevent being cracked, for example, generating
One password is set when two dimensional code, and when extracting QR code content, the content of two dimensional code could be obtained by needing to input password.Item
Code color is converted according to the webpage background color, close with webpage background color, is next exactly that will carry out color
Bar code after conversion is embedded into the web page background, before embedding, needs for bar code to be adjusted to suitable size, because
When thread extracts bar code afterwards, if the information comprising bar code is provided by way of screenshot, screenshot is the part screenshot of webpage
When, in order to there is a complete bar code in screenshot, so needing reasonably to adjust the size of bar code, and adjusting
It is unlikely to make bar code modification again while size, so the best way is exactly the scaling that bar code is carried out to equal proportion, for example,
The length that bar code is arranged is 90 pixels, and equal proportion is bursted forth, then the width of bar code carries out the adjustment of equal proportion, institute according to length
With the one-dimension code of either long strip type or the two dimensional code of square, all will not change after carrying out equal proportion scaling.
Same reason, when rear thread extracts bar code, if the information comprising bar code is provided by way of screenshot
, when screenshot is the part screenshot of webpage, in order to there is a complete bar code in screenshot, need that equal proportion scaling will be carried out
Bar code tile in level with vertical direction as web page background picture, entire web page background is covered, so after tiling
Bar code picture is located on former background color, and the web page background for being added to implicit type bar code is no longer simple color and becomes to carry on the back
Scape picture.
At this point, naked eyes can not discover web page background since barcoded color is close with embedded webpage background color at all
In be embedded in bar code, bar code has achieved the purpose that stealth in webpage, and does not influence the normal use of web page contents.
In the above-described embodiment, a kind of generation method of stealthy watermark is provided, corresponding, the application is same
When a kind of generating means of stealthy digital watermarking are provided, please refer to Fig. 5.
A kind of generating means of stealthy digital watermarking provided in this embodiment, comprising:
Information acquisition unit 501, for obtaining the data information of watermark to be generated and the data information of host's webpage;
Web page background information acquisition unit 502, for extracting host's webpage in the information data of host's webpage
Background information;
Watermark generation unit 503, for according to host's web page background information data and with the background information
The information data that data differ specified gray scale is the data of barcode encoding uneven color, carries out item to the data information of the watermark
Code coding, the watermark information after generating coding;
Watermark embedder unit 504, for the watermark information after coding to be embedded into host's web page background information data
In.
The application provides a kind of electronic equipment that stealthy digital watermarking generates simultaneously, please refers to Fig. 6
The electronic equipment that a kind of stealthy digital watermarking provided by the present application generates, comprising:
Processor 601;
Memory 602, for storing the program of stealthy watermark generation method, described program is read by the processor
When execution, perform the following operations:
Obtain the data information of watermark to be generated and the data information of host's webpage;
Host's web page background information is obtained according to host's webpage information;
The Information Number of specified gray scale is differed with host's web page background information data and with the background information data
According to the data for barcode encoding uneven color, barcode encoding is carried out to the data information of the watermark, the watermark letter after generating coding
Breath;
Watermark information after coding is embedded into host's web page background information data.
Fig. 2 is please referred to, which is a kind of extracting method for stealthy digital watermarking that the application second embodiment provides.
Step S201 opens webpage or webpage capture.
This step is used to be first turned on the medium webpage or net of bar code storage when extracting the data information of bar code storage
The screenshot of page, can get bar code.
In the first embodiment the step of, bar code is converted according to the background color of webpage, and be embedded into net
In page background, so being first turned on webpage or webpage for storing bar code when obtaining the data information of bar code storage and cutting
Figure.
Step S202 identifies in the background of open webpage or webpage capture whether contain bar code.
This step is used to judge whether contain bar code in the background of open webpage or webpage capture.
Before extracting bar code, the screenshot for opening webpage or webpage is first had to, could judge that the webpage opened or webpage are cut
Whether contain bar code in the background of figure.
The webpage, including the webpage that input network address uses browser to open, the Taobao's commodity such as opened using browser
The page is also possible to the network address opening sent by other modes such as chat tools, for example, the quotient of the prosperous middle transmission of Taobao
Product link, is opened and is checked using browser, further includes the webpage opened using APP, such as retrieve commodity using Taobao APP
Results page or the goods links shared of friend opened by Taobao APP, and these webpages may be used to identify background
In whether contain bar code.
The webpage capture is to carry out screenshot, including use corresponding device to the webpage for using browser or APP to open
Shortcut key carry out screenshot, for use computer browser or APP open webpage, using quick on computer keyboard
Key or Macintosh carry out screenshot and use screenshot shortcut key specific in equipment or Macintosh for other mobile devices such as mobile phone
Carry out screenshot.Screenshot file can be the whole screenshot for opening webpage, be also possible to the part screenshot of key content in webpage.
After opening webpage or webpage capture, whether judge comprising bar code in webpage or webpage capture, because
Bar code is possible to only be embedded into the webpage of part, so whether judge first comprising bar code in webpage or webpage capture,
Since when being embedded in bar code, barcoded color and webpage background color being converted, the color of barcoded color and web page background
It is worth close, so can not with the naked eye identify at all, needs further to be identified.
Step S202-1 opens webpage.This step is used to open the webpage containing bar code.After opening webpage, next
It enters step in S202-2, judges whether webpage is arranged background picture.When whether including bar code in judging webpage, obtain first
Web page background picture is taken, because bar code tiles as web page background picture when bar code to be embedded into webpage, covering
Entire web page background, so need to only extract web page background picture when extracting, it is possible to can get bar code picture, specifically
Extracting method is to provide the code that web page background picture is arranged in web page code, is generally body there are two types of literary style
{ background-image:url (logo.gif), wherein what url (logo.gif) was indicated is the address of background picture, another
Planting literary style is<body background="picture">, wherein " picture " indicate be background picture address, if
It is not provided with the code of web page background picture in web page code, also just web page background is not set by bar code, then just
It can be determined that there is no bar codes in webpage, then branching to step S202-6, process terminates.Obtain the data of bar code storage
The process of information terminates.If there is the code of setting web page background picture in web page code, but it can't determine Background
Piece just includes bar code, so also needing further to identify, executes step S202-3, extracts the color value of background picture.Originally
It is to be converted the color of bar code according to webpage background color, such as webpage background color is # when generating bar code
FFFFFF, then a kind of color is identical as webpage background color in the color of bar code, color value #FFFFFF, another and net
Page background color is close, color value #FEFEFE, and specific recognition methods is exactly, to the background picture of acquisition, it is each to extract picture
Then the color value of a pixel will be spliced into picture as mutually putting consecutive identical color.Next step is exactly step
S202-4, judges whether picture that same color is spliced into meets the shape of bar code.If according to the consecutive identical color of pixel
The picture that value is spliced into meets the shape of bar code, that is, the color value that color value is #FEFEFE and #FFFFFF is spliced into
Picture meets the shape of bar code, that is, meets deep mixed " item " and " sky " of one-dimension code for storing data, also with one-dimension code
The data length of expression is identical, meets the geometric figure and basic configuration of the storing data of two dimensional code, so that it may determine that webpage is carried on the back
Include bar code in scape picture, subsequently enter step S202-5, into the process for extracting bar code information.If continuous according to pixel
The picture that identical color value is spliced into does not meet the shape of bar code, then being carried out step S202-6, process terminates.Obtain
The process for the data information for taking bar code to store terminates.
There are also the mode containing bar code in being in a kind of judgement webpage, with it is following it is said judge in webpage capture whether
Mode containing bar code is closely similar, that is, judges whether the picture that the color value of each pixel in web page background is spliced into accords with
The shape for closing bar code, just tells about this method below.
If what is opened is a webpage capture, when whether containing bar code in judging webpage capture, webpage is extracted first
The color value of each pixel in screenshot, when bar code after web page background insertion conversion, two kinds of color phases that bar code includes
Closely, as such as dark part colours value is #FEFEFE, light-colored part #FFFFFF, if extracting this in webpage capture
The picture that the pixel of two kinds of color values is spliced into meets the shape of bar code, that is, meets the shape of one-dimension code and two dimensional code, then
It decides that in webpage capture comprising bar code, next step S203 is subsequently entered, if both extracted in webpage capture
The picture that the pixel of color value is spliced into does not meet the shape of bar code, then obtains the process knot of the data information of bar code storage
Beam.
Step S203, if so, extracting the stealthy watermark of the barcode encoding contained in host's web page background.This step
For being extracted to the bar code got in previous step, what the gray scale by changing bar code was allowed to become to be read
Bar code.
Bar code has been obtained in webpage or web page background, but the color value of bar code is close, if by bar code wash with watercolours at this time
It contaminates on painting canvas, equipment can't be read by bar code and identified, so also needing further to restore bar code.
For example, the dark parts color value of the bar code got be #FEFEFE, light-colored part #FFFFFF, and if
Painting canvas color value for rendering is #FFFFFF, so that it may allow bar code light-colored part and painting canvas solid colour, dark parts face
Color value #FEFEFE is converted into #000000, i.e. the color of bar code dark parts becomes black, forms with the painting canvas of white fresh
Bright comparison, this completes the recoveries to barcoded color contrast, then will have the bar code of sharp contrast degree to be rendered into picture
On cloth.The color of painting canvas can be any, and the color contrast of bar code can carry out variation appropriate, example according to the color of painting canvas
Such as, the color of painting canvas is yellow, then the color of bar code dark parts can be black, is also possible to blue, light-colored part with
Painting canvas solid colour.
The painting canvas exactly has the bar code for restoring color contrast for storing, can be host's webpage thing or newly-built
One webpage or the blank document temporarily opened.
Step S204 obtains the data information for restoring the bar code storage of specified gray scale.
This step be used for revert to specified gray scale bar code its storage content obtain.
In previous step, bar code has reverted to the apparent color of gray scale, next will be in bar code storage
Appearance is read out.
The content of bar code is usually to decode and read by having the tool of identification bar code function.Such as smart phone,
Hand-held barcode scanning terminal etc..
Smart phone opens the APP with identification bar code function, reads bar code by video camera, if it is one-dimension code, uses
In storing one section of webpage miscue information, one-dimension code is parsed first, obtains data encoding, then passes through connection
Database, find with the matched miscue information of data encoding, finally miscue information is shown on mobile phone, in this way
The data information of one-dimension code storage is just obtained by mobile phone.
If the equipment of parsing one-dimension code is hand-held barcode scanning terminal, handheld terminal connects host computer, is connected by host computer
Database is connect, handheld terminal is scanned parsing to one-dimension code, obtains data encoding, data encoding is then sent to connection
Host computer, host computer installation software connect with Database, find with the matched information of data encoding, finally
Information is shown on computer display screen, in this way, hand-held barcode scanning terminal, which combines to complete with computer, reads one-dimension code data information
Process.
If storing data information is two dimensional code, data information is stored directly in two dimensional code, and smart phone opens tool
There is the APP of identification bar code function, bar code is read by video camera, for example, two dimensional code storage is one section of webpage miscue,
Smart phone APP directly parses the data information of two dimensional code storage, then shows the webpage miscue information parsed
On mobile phone.If the length of the two-dimensional code data information stored at that time is greater than the maximum capacity that two dimensional code deposits mansion, read
Be exactly watermark data storage uniform resource locator (url), then open uniform resource locator again, obtain final water
Print the data information of storage.If the equipment of parsing two dimensional code is hand-held barcode scanning terminal, handheld terminal connects host computer, hand
It holds terminal and parsing is scanned to two dimensional code, the content parsed is shown on the computer display screen of connection.
By above method, the parsing to barcode data is completed.Parse the device and method of bar code information not only
There are two kinds above, for example, the APP installed on smart machine, to the bar code stored on smart machine, by way of long-pressing
It can identify.The decoding program installed on computer, bar code is uploaded, and program is decoded and shown from code.
In the above-described embodiment, a kind of extracting method of stealthy watermark is provided, corresponding, the application is same
When a kind of extraction element of stealthy digital watermarking is provided, please refer to Fig. 7.
A kind of extraction element of stealthy digital watermarking provided in this embodiment, comprising:
Stealthy watermark carrier acquiring unit 701 is used to open the carrier webpage or webpage capture of stealthy watermark;
Whether stealthy watermark recognition unit 702 contains bar code in the background of the webpage or webpage capture opened for identification
The stealthy watermark of coding;
Stealthy watermark extracting unit 703, for extracting the invisible water of the barcode encoding contained in host's web page background
Print;
Stealthy watermark recovery unit 704, for the stealth of the barcode encoding contained in host's web page background will to be extracted
Watermark recovery at specified gray scale bar code;
Data information acquiring unit 705, for obtaining the data information for restoring the bar code storage of specified gray scale.
The application provides a kind of electronic equipment that stealthy digital watermarking is extracted simultaneously, please refers to Fig. 8.
The electronic equipment that a kind of stealthy digital watermarking provided by the present application is extracted, comprising:
Processor 801;
Memory 802, for storing the program of stealthy digital watermarking extracting method, described program is by the processor
When reading execution, perform the following operations:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing barcode encoding;
If so, extracting the stealthy watermark of the barcode encoding contained in host's web page background;
The stealthy watermark for extracting the barcode encoding contained in host's web page background is reverted to the item of specified gray scale
Code;
Obtain the data information for restoring the bar code storage of specified gray scale.
Fig. 3 is please referred to, which is a kind of generation method for stealthy digital watermarking that the application 3rd embodiment provides.
Step S301 obtains watermark data information to be generated and host's web page background data information.
Step is used for, the data information of watermark to be generated, and the number of host's webpage embedded by the watermark information generated
It is believed that breath.
The data information and host's web page background data information and first of the acquisition watermark to be generated of this step are in fact
It is identical with method described in step S102 and content to apply a step S101, is just not repeated herein, please refers to first embodiment
Step S101 and step S102.
Step S302 carries out Fourier transformation to host's web page background data information, generates frequency domain data.
Step is used for, and is carried out Fourier transformation to host's webpage background color data information of acquisition, is generated a frequency domain
Data picture.
The Fourier transformation, indicate can by some function representation met certain condition at trigonometric function (it is sinusoidal and/
Or cosine function) or they integral linear combination.
Signal has frequency, and a signal can regard the superposition of the sinusoidal signal of numerous not same order as.
Above formula is Fourier transform formula, f (t) refer to time-domain signal (for signal, we say time domain because be and when
Between it is related, and image we often say airspace, it is related with space), ω refers to frequency.Airspace refers to spatial domain, we are daily
Seen image is exactly airspace.Time-domain signal is just substituted for airspace signal herein, the frequency of image refers to that image grayscale becomes
The strong situation changed, host's web page background data information is exactly airspace, utilizes Fourier transform formula herein, will be empty
Numeric field data information is by the greyscale transformation of image at domain data information.For example, the background color of the host's webpage obtained is
" #FFFFFF " then generates the picture of the background color of host's webpage, Fourier transform formula is reused, by host's net
The background picture of page becomes a frequency domain data picture.
Step S303 is superimposed in the frequency domain data after being encoded the data information of the watermark to be generated
Step is used for, and the watermark picture after coding is superimposed with host's web page background picture after Fourier transformation
The frequency domain picture for having watermark information is generated afterwards.
Bar code is written into the data information of watermark to be generated first, the bar code refers to, by the lines or figure of different colours
Case composition, and a kind of picture of special shape of corresponding data can be stored.Bar code can be by width not equal multiple " items "
The one-dimension code of " sky " composition, the code system of one-dimension code include common EAN code, 39 yards, intersection 25 yards, UPC code, 128 yards, 93
Code, ISBN code and Codabar (Ku Deba code) etc..It is also possible to be distributed according to certain rules with certain specific geometric figure
The two dimensional code of plane identifying recording layer symbolic information.The code system of two dimensional code includes common QRCode, Data Matrix, Maxi
Code, Aztec, Vericode, PDF417, Ultracode, Code 49 or Code 16K, Code One etc..
If the bar code of storing data information is one-dimension code, one-dimension code is come using " item " and " sky " of multiple and different width
The binary data information for indicating the corresponding letter and number, since the data capacity of itself storage is limited, so
When using one-dimension code storing data, a set of database is usually being established from the background, for storing the corresponding data of bar code.Due to two
The dimension maximum amount of storage of code reaches thousands of a characters, so when using two dimensional code storing data, due to itself storing data lattice
The diversity of formula and the capacity of storage have been able to satisfy primary demand, so not needing to additionally set up a set of database, will acquire
Data information is directly stored in two dimensional code after being converted into binary data, and once if the length of the data information obtained
Degree has exceeded the memory capacity of a two dimensional code, and the storage of data can be carried out using two or more two dimensional codes.?
Using the method storing data of compressed data information, for example, can be deposited using the data of interception two dimensional code memory capacity
Storage, then the ground data information that can will acquire be uploaded to server and stored, then will store the data information
Uniform resource locator (url) carries out code storage to two dimensional code.
One-dimension code is creating corresponding database when in use from the background, so the capacity of one-dimension code storing data information
It being determined by background data base, the data format of one-dimension code storage is also determined by corresponding database, including, numeric type data, word
Symbol type data etc..
Host's webpage, embedded including the webpage for using various browsers to open in various equipment and APP
Webpage.
Next barcode encoding just is carried out to the watermark data information of acquisition, such as selects two dimensional code for coding mode, if
The length of watermark data information to barcode encoding is less than or equal to the maximum capacity of the code system of selection, just directly will be to bar code
The watermark data information of coding carries out two dimensional code coding, if the bar code of storing data information is one-dimension code, will just store
The carry out one-dimension code barcode encoding of data information.
Next the watermark picture after progress barcode encoding is encoded, there are two coding purposes here, first is that right
Watermark is encrypted, to prevent being cracked, second is that, the Energy distribution of watermark picture is controlled, the distribution of energy includes energy substep
Then watermark picture after coding is added to above web page background picture, before superposition, needs item by frequency and position
Code is adjusted to suitable size, because when rear thread extracts bar code, if the information comprising bar code is provided by way of screenshot
, when screenshot is the part screenshot of webpage, in order to there is a complete bar code in screenshot, so needing the size to bar code
It is reasonably adjusted, and is unlikely to make bar code modification while being sized, so the best way is exactly by bar code
Carry out the scaling of equal proportion, for example, the length of setting bar code is 90 pixels, equal proportion bursts forth, then the width of bar code according to
Length carries out the adjustment of equal proportion, so the two dimensional code of the one-dimension code of either long strip type or square, is carrying out equal proportion
It all will not change after scaling.
Same reason, when rear thread extracts bar code, if the information comprising bar code is provided by way of screenshot
, when screenshot is the part screenshot of webpage, in order to there is a complete bar code in screenshot, need that equal proportion scaling will be carried out
Bar code tile in level with vertical direction as web page background picture, entire web page background is covered, so after tiling
Bar code picture is located on web page background frequency domain picture.
The frequency domain figure for having obtained host's web page background at this time and being superimposed after the Fourier transformation of watermark.
Step S304 carries out inverse Fourier transform to the frequency domain data of superposition watermark data information, generates host after transformation
Web page background data information.
Step is used for, and carries out inverse Fourier transform to the frequency domain figure of superposition watermark data information, generating includes watermark information
Host's web page background data information.
By step S302 and step S303, host's web page background frequency domain figure has been superimposed the watermark bar code figure after coding,
This step just carries out inverse Fourier transform, Fu to the host's web page background frequency domain figure for the watermark bar code figure for being superimposed coding
In leaf inverse transformation, be exactly the inverse operation of Fourier transformation, herein be exactly will be superimposed coding watermark bar code figure host's net
Page background frequency domain figure becomes host's web page background figure, and the Background naked eyes after inverse transformation can not discover web page background at all
In be embedded in bar code, bar code has achieved the purpose that stealth in webpage, and does not influence the normal use of web page contents.
In the above-described embodiment, a kind of generation method of stealthy watermark is provided, corresponding, the application is same
When a kind of generating means of stealthy digital watermarking are provided, please refer to Fig. 9.
A kind of generating means of stealthy digital watermarking provided in this embodiment, comprising:
Data information acquiring unit 901, for obtaining watermark data information to be generated and host's web page background data letter
Breath;
Frequency domain data generation unit 902, it is raw for carrying out Fourier transformation to host's web page background data information
At frequency domain data;
Watermark data information superposition unit 903 is folded after being encoded the data information of the watermark to be generated
It adds in the frequency domain data;
Web page background data information generation unit 904 carries out in Fu for the frequency domain data to superposition watermark data information
Leaf inverse transformation generates host's web page background data information after transformation.
The application provides a kind of electronic equipment that stealthy digital watermarking generates simultaneously, please refers to Fig. 8.
The electronic equipment that a kind of stealthy digital watermarking provided by the present application generates, comprising:
Processor 1001;
Memory 1002, for storing the program of stealthy digital watermarking generation method, described program is by the processor
When reading execution, perform the following operations:
Obtain watermark data information to be generated and host's web page background data information;
Fourier transformation is carried out to host's web page background data information, generates frequency domain data;
After the data information of the watermark to be generated is encoded, it is superimposed in the frequency domain data;
Inverse Fourier transform is carried out to the frequency domain data of superposition watermark data information, generates host's web page background after transformation
Data information.
Fig. 4 is please referred to, which is a kind of extracting method for stealthy digital watermarking that the application fourth embodiment provides.
Step S401 opens webpage or webpage capture.
This step is used for, and when extracting the data information of bar code storage, is first turned on the medium webpage or net of bar code storage
The screenshot of page, can get bar code.
In the third embodiment, using bar code storing data information, and bar code is embedded into web page background, so wanting
When obtaining the data information of bar code storage, it is first turned on the webpage or webpage capture for storing bar code.
Step S402, identify in the background of open webpage or webpage capture whether the invisible water containing Fourier transformation
Print.
This step is used for, judge in the background of open webpage or webpage capture whether the stealth containing Fourier transformation
Watermark.
The webpage, including the webpage that input network address uses browser to open, the Taobao's commodity such as opened using browser
The page is also possible to the network address opening sent by other modes such as chat tools, for example, the quotient of the prosperous middle transmission of Taobao
Product link, is opened and is checked using browser, further includes the webpage opened using APP, such as retrieve commodity using Taobao APP
Results page or the goods links shared of friend opened by Taobao APP, and these webpages may be used to identify background
In whether the stealthy watermark containing Fourier transformation.
The webpage capture is to carry out screenshot, including use corresponding device to the webpage for using browser or APP to open
Shortcut key carry out screenshot, for use computer browser or APP open webpage, using quick on computer keyboard
Key or Macintosh carry out screenshot and use screenshot shortcut key specific in equipment or Macintosh for other mobile devices such as mobile phone
Carry out screenshot.Screenshot file can be the whole screenshot for opening webpage, be also possible to the part screenshot of key content in webpage.
Whether the stealthy watermark comprising Fourier transformation is judged in the webpage or webpage capture, is exactly to use Fu
In leaf transformation generate the inverse process of stealthy watermark, identify whether hidden comprising Fourier transformation in the webpage or webpage capture
Shape watermark.
Step S404 carries out Fourier's change to the stealthy watermark of the Fourier transformation contained in host's web page background
After changing and decoding, watermarking images are obtained.
This step is used for, and obtains the stealthy watermark of the Fourier transformation contained in host's web page background.
After opening webpage or webpage capture, in webpage or webpage capture whether include Fourier transformation stealth
Watermark is judged, because the invisible water of Fourier transformation, which is printed on, to be only embedded into the webpage of part, first to webpage
Or whether the stealthy watermark comprising Fourier transformation is judged in webpage capture, because the stealthy watermark of Fourier transformation is hidden
Covering property is good, so can not with the naked eye identify at all, needs further to be identified.
Step S402-1 opens webpage.This step is used to open the webpage of the stealthy watermark containing Fourier transformation.It is beating
It after opening webpage, next enters step in S402-2, judges whether webpage is arranged background picture.Whether wrapped in judging webpage
When containing bar code, first acquisition web page background picture, because when the stealthy watermark of Fourier transformation to be embedded into webpage, Fu
In the stealthy watermark of leaf transformation be laid on web page background, so need to only extract web page background picture when extracting, it is possible to
It can get the invisible water impression piece of Fourier transformation, specific extracting method is to provide setting web page background figure in web page code
The code of piece, general there are two types of literary style is body { background-image:url (logo.gif), wherein url
(logo.gif) what is indicated is the address of background picture, and another literary style is<body background="picture">,
In " picture " indicate be the address of background picture, if being not provided with the code of web page background picture in web page code,
Also web page background just is not set by bar code, then it is determined that the invisible water of Fourier transformation is not present in webpage
Print, then branching to step S202-5, process terminates.Obtain the data information of the stealthy watermark storage of Fourier transformation
Process terminates.If there is the code of setting web page background picture in web page code, but it can't determine that background picture just wraps
Stealthy watermark containing Fourier transformation executes step S402-3 so also need further to identify, the part of intercepting page into
Row Fourier transformation.The best way is that do not have the interior perhaps less place of content in background, according to the stealth of Fourier transformation
The position of watermark insertion carries out Fourier transformation to the web page background part of interception, has obtained frequency domain data figure.Next step
It is exactly step S402-4, frequency domain data figure is encoded, the stealthy watermark of Fourier transformation has just been obtained, then again to hidden
Shape watermark is decoded, and executes step S202-5, judges whether decoded stealthy watermark contains watermark bar code, if containing item
Code, thens follow the steps S202-6, obtains the data information of bar code watermark.If watermark bar code cannot be obtained after decoding, that ground
It is carried out step S202-7, process terminates.The invisible water bleeding off journey for obtaining bar code Fourier transformation terminates.
If what is opened is webpage capture, it is carried out S402-3, the part of intercepting page carries out Fourier transformation.It is best
Method be the perhaps less place of content in not having in background, the position pair being inserted into according to the stealthy watermark of Fourier transformation
The web page background part of interception carries out Fourier transformation, has obtained frequency domain data figure.Next step is exactly step S402-4,
Frequency domain data figure is encoded, the stealthy watermark of Fourier transformation has just been obtained, if being then decoded again to stealthy watermark
Watermark bar code cannot be obtained after decoding, that ground is carried out step S202-7, and process terminates.Obtain bar code Fourier transformation
Invisible water bleeding off journey terminate.
Step S405 obtains the data information of watermarking images storage.
This step is used for, and reads the data information of the bar code storage of the stealthy watermark of Fourier transformation.
The content of bar code is usually to decode and read by having the tool of identification bar code function.Such as smart phone,
Hand-held barcode scanning terminal etc..
Smart phone opens the APP with identification bar code function, reads bar code by video camera, if it is one-dimension code, uses
In storing one section of webpage miscue information, one-dimension code is parsed first, obtains data encoding, then passes through connection
Database, find with the matched miscue information of data encoding, finally miscue information is shown on mobile phone, in this way
The data information of one-dimension code storage is just obtained by mobile phone.
If the equipment of parsing one-dimension code is hand-held barcode scanning terminal, handheld terminal connects host computer, is connected by host computer
Database is connect, handheld terminal is scanned parsing to one-dimension code, obtains data encoding, data encoding is then sent to connection
Host computer, host computer installation software connect with Database, find with the matched information of data encoding, finally
Information is shown on computer display screen, in this way, hand-held barcode scanning terminal, which combines to complete with computer, reads one-dimension code data information
Process.
If storing data information is two dimensional code, data information is stored directly in two dimensional code, and smart phone opens tool
There is the APP of identification bar code function, bar code is read by video camera, for example, two dimensional code storage is one section of webpage miscue,
Smart phone APP directly parses the data information of two dimensional code storage, then shows the webpage miscue information parsed
On mobile phone.If the length of the two-dimensional code data information stored at that time is greater than the maximum capacity that two dimensional code deposits mansion, read
Be exactly watermark data storage uniform resource locator (url), then open uniform resource locator again, obtain final water
Print the data information of storage.If the equipment of parsing two dimensional code is hand-held barcode scanning terminal, handheld terminal connects host computer, hand
It holds terminal and parsing is scanned to two dimensional code, the content parsed is shown on the computer display screen of connection.
By above method, the parsing to barcode data is completed.Parse the device and method of bar code information not only
There are two kinds above, for example, the APP installed on smart machine, to the bar code stored on smart machine, by way of long-pressing
It can identify.The decoding program installed on computer, bar code is uploaded, and program is decoded and shown from code.
In the above-described embodiment, a kind of extracting method of stealthy watermark is provided, corresponding, the application is same
When a kind of extraction element of stealthy digital watermarking is provided, please refer to Figure 11.
A kind of extraction element of stealthy digital watermarking provided in this embodiment, comprising:
Stealthy watermark carrier acquiring unit 1101 is used to open the carrier webpage or webpage capture of stealthy watermark;
Whether stealthy watermark recognition unit 1102 contains Fu in the background of the webpage or webpage capture opened for identification
In leaf transformation stealthy watermark;
Stealthy watermark extracting unit 1103, for the stealth to the Fourier transformation contained in host's web page background
After watermark carries out Fourier transformation and decoding, watermarking images are obtained;Stealthy watermark recovery unit, for the host will to be extracted
The stealthy watermark of the barcode encoding contained in web page background reverts to the bar code of specified gray scale;
Data information acquiring unit 1104, the data information for watermarking images storage.
The application provides a kind of electronic equipment that stealthy digital watermarking is extracted simultaneously, please refers to Figure 12.
The electronic equipment that a kind of stealthy digital watermarking provided by the present application is extracted, comprising:
Processor 1201;
Memory 1202, for storing the program of stealthy digital watermarking extracting method, described program is by the processor
When reading execution, perform the following operations:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing Fourier transformation;
If so, to the stealthy watermark of the Fourier transformation contained in host's web page background carry out Fourier transformation and
After decoding, watermarking images are obtained;
Obtain the data information of watermarking images storage.
A kind of auto-building html files or method for refreshing that the 5th embodiment of the application provides.
The present embodiment is used for, when meat page generates or refreshes, if hair variation occurs for the data information for generating watermark, just
Execution regenerates the step of watermark bar code.Described the step of regenerating watermark bar code is to execute step S101- step
S104.
Although the application embodiment discloses as above, it is not for limiting the application, anyone skilled in the art
It is not departing from spirit and scope, possible variation and modification, therefore the protection scope of the application can be made
The range that the claim of this application that should be subject to is defined.
In a typical configuration, calculate equipment include one or more processors (CPU), input/output interface,
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/
Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
1, computer-readable medium can be by any including permanent and non-permanent, removable and non-removable media
Method or technique come realize information store.Information can be computer readable instructions, data structure, the module of program or other
Data.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory
(SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only
Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage
Or other magnetic storage devices or any other non-transmission medium, it can be used for storing and can be accessed by a computing device information.It presses
It is defined according to herein, computer-readable medium does not include non-temporary computer readable media (transitory media), is such as adjusted
The data-signal and carrier wave of system.
2, it will be understood by those skilled in the art that embodiments herein can provide as the production of method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or implementation combining software and hardware aspects can be used in the application
The form of example.Moreover, can be used can in the computer that one or more wherein includes computer usable program code by the application
With the computer program product implemented in storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Form.
Claims (35)
1. a kind of generation method of stealth digital watermarking characterized by comprising
Obtain the data information of watermark to be generated and the data information of host's webpage;
Host's web page background information is obtained according to host's webpage information;
The information data that specified gray scale is differed with host's web page background information data and with the background information data is
The data of barcode encoding uneven color carry out barcode encoding to the data information of the watermark, the watermark information after generating coding;
Watermark information after coding is embedded into host's web page background information data.
2. the generation method of stealth digital watermarking according to claim 1, which is characterized in that with host's web page background
Information data and the information data that specified gray scale is differed with the background information data are barcode encoding uneven color data, to institute
It states watermark data information and carries out barcode encoding, the watermark information after generating coding specifically includes:
Barcode encoding is carried out to the watermark information, generates the first watermark information;
The information data of specified gray scale is differed according to host's web page background information data and with the background information data
For barcode encoding uneven color data, first watermark information coding is adjusted, the second watermark information is generated, by described the
Two watermark informations are as the watermark information after coding.
3. the generation method of stealth digital watermarking according to claim 1 or 2, which is characterized in that described to the watermark
Data information carries out barcode encoding specifically:
Bar code coding or two-dimensional bar code coding are carried out to the watermark data information.
4. the generation method of stealth digital watermarking according to claim 1 or 2, which is characterized in that described to the watermark
Data information carries out barcode encoding specifically: carries out two-dimensional bar code coding to the watermark data information;
Two dimensional code coding includes following any codings: QRCode, Data Matrix, Maxi Code, Aztec,
Vericode, PDF417, Ultracode, Code 49 or Code 16K.
5. the generation method of stealth digital watermarking according to claim 1 or 2, which is characterized in that the watermark data
Information carries out barcode encoding, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection, if it is not, right
The watermark data information to be encoded is compressed.
6. the generation method of stealth digital watermarking according to claim 1 or 2, which is characterized in that the watermark data
Information carries out barcode encoding, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection, if it is not, will
The watermark data information to be encoded is uploaded to server end;
Receive the uniform resource locator for the watermark data information to be encoded storage that server end issues;
The uniform resource locator is encoded.
7. the generation method of stealth digital watermarking according to claim 1 or 2, which is characterized in that the watermark data
It further include that the watermark data information is encrypted before information carries out barcode encoding.
8. the generation method of stealth digital watermarking according to claim 1, which is characterized in that host's webpage includes: browsing
The webpage that device webpage or APP are embedded.
9. the generation method of stealth digital watermarking according to claim 1, which is characterized in that by the watermark information after coding
It is embedded into host's web page background information data, specifically: the watermark information after coding is embedded into institute with tile mode
Host's webpage is stated into web page background information data.
10. a kind of generating means of stealth data watermark characterized by comprising
Information acquisition unit, for obtaining the data information of watermark to be generated and the data information of host's webpage;
Web page background information acquisition unit, for extracting the background letter of host's webpage in the information data of host's webpage
Breath;
Watermark generation unit is differed for basis to host's web page background information data and with the background information data
The information data of specified gray scale is the data of barcode encoding uneven color, carries out barcode encoding to the data information of the watermark, raw
At the watermark information after coding;
Watermark embedder unit, for the watermark information after coding to be embedded into host's web page background information data.
11. a kind of electronic equipment that stealth digital watermarking generates characterized by comprising
Processor;
Memory, for storing the program of stealthy watermark generation method, described program is held when reading execution by the processor
The following operation of row:
Obtain the data information of watermark to be generated and the data information of host's webpage;
Host's web page background information is obtained according to host's webpage information;
The information data that specified gray scale is differed with host's web page background information data and with the background information data is
The data of barcode encoding uneven color carry out barcode encoding to the data information of the watermark, the watermark information after generating coding;
Watermark information after coding is embedded into host's web page background information data.
12. a kind of extracting method of stealth digital watermarking characterized by comprising
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing barcode encoding;
If so, extracting the stealthy watermark of the barcode encoding contained in host's web page background;
The stealthy watermark for extracting the barcode encoding contained in host's web page background is reverted to the bar code of specified gray scale;
Obtain the data information for restoring the bar code storage of specified gray scale.
13. the extracting method of stealth digital watermarking according to claim 12, which is characterized in that the net that the identification is opened
Page or webpage capture background in whether the stealthy watermark containing barcode encoding, further includes:
If not containing the stealthy watermark of barcode encoding in the background of the webpage or webpage capture opened, terminate.
14. the extracting method of stealth digital watermarking according to claim 12, which is characterized in that the specified gray scale is
Finger is determined according to the background color of host's webpage, comprising:
Read the background color of host's webpage;
If the background color of host's webpage is white, the color value of the stealthy watermark dark parts of barcode encoding is become
" #000000 ", the color value of light-colored part become " #FFFFFF ".
15. the extracting method of stealth digital watermarking according to claim 12, which is characterized in that the acquisition restores specified
The data information of the bar code storage of gray scale, comprising:
The data information of the bar code storage of specified gray scale is reverted to using decoding tool decoding;
Decoded data information is shown.
16. a kind of extraction element of stealth digital watermarking characterized by comprising
Stealthy watermark carrier acquiring unit is used to open the carrier webpage or webpage capture of stealthy watermark;
Stealthy watermark recognition unit, whether containing the hidden of barcode encoding in the background of the webpage or webpage capture opened for identification
Shape watermark;
Stealthy watermark extracting unit, for extracting the stealthy watermark of the barcode encoding contained in host's web page background;
Stealthy watermark recovery unit, for the stealthy watermark recovery of the barcode encoding contained in host's web page background will to be extracted
At the bar code of specified gray scale;
Data information acquiring unit, for obtaining the data information for restoring the bar code storage of specified gray scale.
17. a kind of electronic equipment that stealth digital watermarking is extracted characterized by comprising
Processor;
Memory, for storing the program of stealthy digital watermarking extracting method, described program is reading execution by the processor
When, it performs the following operations:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing barcode encoding;
If so, extracting the stealthy watermark of the barcode encoding contained in host's web page background;
The stealthy watermark for extracting the barcode encoding contained in host's web page background is reverted to the bar code of specified gray scale;
Obtain the data information for restoring the bar code storage of specified gray scale.
18. a kind of generation method of stealth digital watermarking, it is characterised in that:
Obtain watermark data information to be generated and host's web page background data information;
Fourier transformation is carried out to host's web page background data information, generates frequency domain data;
After the data information of the watermark to be generated is encoded, it is superimposed in the frequency domain data;
Inverse Fourier transform is carried out to the frequency domain data of superposition watermark data information, host's web page background data are believed after generating transformation
Breath.
19. the generation method of stealth digital watermarking according to claim 18, which is characterized in that described to host's net
Page background data carries out Fourier transformation, comprising:
Background picture is generated according to host's webpage background color information, then Fourier transformation is carried out to the background picture of generation, it is raw
At the picture of frequency domain data.
20. it is according to claim 18 stealth digital watermarking generation method, which is characterized in that it is described will be described to be generated
The data information of watermark is encoded, and is superimposed in the frequency domain data, comprising:
The data information of watermark to be generated is subjected to barcode encoding;
Watermark picture after progress barcode encoding is encoded;
Watermark picture after being encoded is superimposed on the frequency domain data picture generated with host's web page background information data.
21. the generation method of stealth digital watermarking according to claim 20, which is characterized in that described by watermark to be generated
Data information carry out barcode encoding, specifically:
The watermark data information is subjected to bar code coding or two-dimensional bar code coding.
22. the generation method of stealth digital watermarking according to claim 21, which is characterized in that described to the watermark number
It is believed that breath carries out barcode encoding specifically: carry out two-dimensional bar code coding to the watermark data information;
Two dimensional code coding includes following any codings: QRCode, Data Matrix, Maxi Code, Aztec,
Vericode, PDF417, Ultracode, Code 49 or Code 16K.
23. the generation method of stealth digital watermarking according to claim 1 or 2, which is characterized in that the watermark data
Information carries out barcode encoding, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection, if it is not, right
The watermark data information to be encoded is compressed.
24. the generation method of stealth digital watermarking according to claim 18, which is characterized in that believe the watermark data
Breath carries out barcode encoding, comprising:
Selection coding code system;
Judge whether the length of watermark data information to be encoded is less than or equal to the maximum capacity of the code system of selection, if it is not, will
The watermark data information to be encoded is uploaded to server end;
Receive the uniform resource locator for the watermark data information to be encoded storage that server end issues;
The uniform resource locator is encoded.
25. the generation method of stealth digital watermarking according to claim 18, which is characterized in that believe the watermark data
It further include that the watermark data information is encrypted before breath carries out barcode encoding.
26. the generation method of stealth watermark according to claim 18, which is characterized in that host's webpage includes: browser
The webpage that webpage or APP are embedded.
27. a kind of generating means of stealth digital watermarking characterized by comprising
Data information acquiring unit, for obtaining watermark data information to be generated and host's web page background data information;
Frequency domain data generation unit generates frequency domain number for carrying out Fourier transformation to host's web page background data information
According to;
Watermark data information superposition unit is superimposed to described after being encoded the data information of the watermark to be generated
In frequency domain data;
Web page background data information generation unit carries out Fourier's inversion for the frequency domain data to superposition watermark data information
It changes, generates host's web page background data information after transformation.
28. a kind of electronic equipment that stealth digital watermarking generates characterized by comprising
Processor;
Memory, for storing the program of stealthy digital watermarking generation method, described program is reading execution by the processor
When, it performs the following operations:
Obtain watermark data information to be generated and host's web page background data information;
Fourier transformation is carried out to host's web page background data information, generates frequency domain data;
After the data information of the watermark to be generated is encoded, it is superimposed in the frequency domain data;
Inverse Fourier transform is carried out to the frequency domain data of superposition watermark data information, host's web page background data are believed after generating transformation
Breath.
29. a kind of extracting method of stealth digital watermarking characterized by comprising
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing Fourier transformation;
If so, the stealthy watermark to the Fourier transformation contained in host's web page background carries out Fourier transformation and decoding
Afterwards, watermarking images are obtained;
Obtain the data information of watermarking images storage.
30. it is according to claim 29 stealth watermark extracting method, which is characterized in that it is described identification open webpage or
In the background of webpage capture whether the stealthy watermark containing Fourier transformation, further includes:
If not containing the stealthy watermark of Fourier transformation in the background of the webpage or webpage capture opened, terminate.
31. the extracting method of stealth watermark according to claim 29, which is characterized in that described to be carried on the back to host's webpage
The stealthy watermark of the Fourier transformation contained in scape carries out Fourier transformation and decoding, including;
Fourier transformation is carried out to the stealthy watermark of the Fourier transformation contained in host's web page background, obtains frequency domain figure
Picture;
The frequency domain image is decoded, watermarking images are obtained.
32. the extracting method of stealth watermark according to claim 29, which is characterized in that described to obtain what watermarking images stored
Data information, comprising: one or more of character information, pictorial information, bar code information.
33. a kind of extraction element of stealth digital watermarking characterized by comprising
Stealthy watermark carrier acquiring unit is used to open the carrier webpage or webpage capture of stealthy watermark;
Stealthy watermark recognition unit, whether containing Fourier transformation in the background of the webpage or webpage capture opened for identification
Stealthy watermark;
Stealthy watermark extracting unit carries out Fu for the stealthy watermark to the Fourier transformation contained in host's web page background
In leaf transformation and decoding after, obtain watermarking images;Stealthy watermark recovery unit contains for that will extract in host's web page background
The stealthy watermark of some barcode encodings reverts to the bar code of specified gray scale;
Data information acquiring unit, the data information for watermarking images storage.
34. a kind of electronic equipment that stealth digital watermarking is extracted characterized by comprising
Processor;
Memory, for storing the program of stealthy digital watermarking extracting method, described program is reading execution by the processor
When, it performs the following operations:
Open webpage or webpage capture;
Identify open webpage or webpage capture background in whether the stealthy watermark containing Fourier transformation;
If so, the stealthy watermark to the Fourier transformation contained in host's web page background carries out Fourier transformation and decoding
Afterwards, watermarking images are obtained;
Obtain the data information of watermarking images storage.
35. a kind of auto-building html files or method for refreshing, which is characterized in that execute the claims 1 when the auto-building html files or brush
To the generation method of 9 any stealthy digital watermarkings.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810085009.5A CN110097488B (en) | 2018-01-29 | 2018-01-29 | Invisible digital watermark generation and extraction method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810085009.5A CN110097488B (en) | 2018-01-29 | 2018-01-29 | Invisible digital watermark generation and extraction method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110097488A true CN110097488A (en) | 2019-08-06 |
CN110097488B CN110097488B (en) | 2023-10-24 |
Family
ID=67442163
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810085009.5A Active CN110097488B (en) | 2018-01-29 | 2018-01-29 | Invisible digital watermark generation and extraction method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110097488B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110909322A (en) * | 2019-11-29 | 2020-03-24 | 杭州天谷信息科技有限公司 | Intelligent printing document processing system and method based on HVS |
CN111460399A (en) * | 2020-03-16 | 2020-07-28 | 平安科技(深圳)有限公司 | Watermark data processing method, device, computer equipment and storage medium |
CN112581549A (en) * | 2020-12-16 | 2021-03-30 | 合肥图溯信息技术有限公司 | Picture tracing method, storage medium, electronic device and host device |
WO2022116493A1 (en) * | 2020-12-04 | 2022-06-09 | 平安科技(深圳)有限公司 | Screen information protection method and apparatus, and computer device and readable storage medium |
CN114692214A (en) * | 2020-12-30 | 2022-07-01 | 南京南瑞继保工程技术有限公司 | A method, system and storage medium for preventing tampering and leakage of key data of power wiring diagram |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1889428A (en) * | 2006-08-01 | 2007-01-03 | 西南交通大学 | Biological characteristic data safety hidden transmitting method under network environment |
CN101149779A (en) * | 2007-11-06 | 2008-03-26 | 天津市阿波罗信息技术有限公司 | Method for embedding government application file content in paper medium |
TW200849135A (en) * | 2007-06-12 | 2008-12-16 | Univ Nat Chunghsing | A robust watermarking method for high dynamic range images |
CN103500350A (en) * | 2013-10-11 | 2014-01-08 | 北京邮电大学 | Chinese-sensible code and digital watermark-based anti-counterfeit method |
CN104408684A (en) * | 2014-12-13 | 2015-03-11 | 天津远目科技有限公司 | Digital watermarking method with high robustness |
CN107622470A (en) * | 2017-09-01 | 2018-01-23 | 杭州趣维科技有限公司 | A kind of real-time robust embedding algorithm and extracting method based on Quick Response Code |
-
2018
- 2018-01-29 CN CN201810085009.5A patent/CN110097488B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1889428A (en) * | 2006-08-01 | 2007-01-03 | 西南交通大学 | Biological characteristic data safety hidden transmitting method under network environment |
TW200849135A (en) * | 2007-06-12 | 2008-12-16 | Univ Nat Chunghsing | A robust watermarking method for high dynamic range images |
CN101149779A (en) * | 2007-11-06 | 2008-03-26 | 天津市阿波罗信息技术有限公司 | Method for embedding government application file content in paper medium |
CN103500350A (en) * | 2013-10-11 | 2014-01-08 | 北京邮电大学 | Chinese-sensible code and digital watermark-based anti-counterfeit method |
CN104408684A (en) * | 2014-12-13 | 2015-03-11 | 天津远目科技有限公司 | Digital watermarking method with high robustness |
CN107622470A (en) * | 2017-09-01 | 2018-01-23 | 杭州趣维科技有限公司 | A kind of real-time robust embedding algorithm and extracting method based on Quick Response Code |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110909322A (en) * | 2019-11-29 | 2020-03-24 | 杭州天谷信息科技有限公司 | Intelligent printing document processing system and method based on HVS |
CN110909322B (en) * | 2019-11-29 | 2020-12-11 | 杭州天谷信息科技有限公司 | Intelligent printing document processing system and method based on HVS |
CN111460399A (en) * | 2020-03-16 | 2020-07-28 | 平安科技(深圳)有限公司 | Watermark data processing method, device, computer equipment and storage medium |
CN111460399B (en) * | 2020-03-16 | 2025-01-10 | 平安科技(深圳)有限公司 | Watermark data processing method, device, computer equipment and storage medium |
WO2022116493A1 (en) * | 2020-12-04 | 2022-06-09 | 平安科技(深圳)有限公司 | Screen information protection method and apparatus, and computer device and readable storage medium |
CN112581549A (en) * | 2020-12-16 | 2021-03-30 | 合肥图溯信息技术有限公司 | Picture tracing method, storage medium, electronic device and host device |
CN114692214A (en) * | 2020-12-30 | 2022-07-01 | 南京南瑞继保工程技术有限公司 | A method, system and storage medium for preventing tampering and leakage of key data of power wiring diagram |
Also Published As
Publication number | Publication date |
---|---|
CN110097488B (en) | 2023-10-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110097488A (en) | The generation of stealthy digital watermarking and extracting method and device | |
CN111191414B (en) | Page watermark generation method, identification method, device, equipment and storage medium | |
US9177238B2 (en) | Techniques for generating customized two-dimensional barcodes | |
US9665817B2 (en) | Techniques for generating customized two-dimensional barcodes | |
CN106529633B (en) | Generation method, coding/decoding method and the device of two dimensional code | |
JP4515999B2 (en) | Mixed code decoding method and apparatus, and recording medium | |
CA2586274C (en) | Mixed code, and method and apparatus for generating the same, and method and apparatus for decoding the same | |
JP4557866B2 (en) | Mixed code, mixed code generation method and apparatus, and recording medium | |
CA2504299C (en) | System and method for decoding digital encoded images | |
CN110766594B (en) | Information hiding method and device, detection method and device and anti-counterfeiting tracing method | |
CN105447546A (en) | Two-dimensional code capable of being embedded with large-ratio graph as well as coding and decoding method and device therefor | |
US7551752B2 (en) | Systems and methods for authenticating objects using multiple-level image encoding and decoding | |
US9934457B2 (en) | Method of securing a two-dimensional barcode | |
CN111680273A (en) | Watermark embedding method, device, electronic equipment and readable storage medium | |
CN109816077A (en) | A kind of hidden method of two-dimensional barcode information, device, electronic equipment and storage medium | |
AU2010238503B2 (en) | Two dimensional information symbol | |
CN111160331A (en) | Anti-counterfeit label authentication method, device, medium and template graph generation method | |
CN103902711A (en) | Method and system for embedding two-dimension code images into webpages | |
Juan et al. | Graphic QR code with the second hidden QR code by codeword rearrangement | |
CN107798373B (en) | Two-dimensional code anti-copying method and system | |
Tsai et al. | Auto ROI & mask R-CNN model for QR code beautification (ARM-QR) | |
Appiah et al. | Performance Evaluation of Corrupted QR Code Scanners | |
CN112418371B (en) | Secure three-dimensional code for blockchains and methods of generating and decoding | |
CN114330621A (en) | Two-dimensional code anti-counterfeiting method and device based on identification information and storage medium | |
CN109829844B (en) | Information hiding method and device based on two-dimension code and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |