CN117635408B - Copyright protection-oriented image zero-watermark method, device and medium - Google Patents
Copyright protection-oriented image zero-watermark method, device and medium Download PDFInfo
- Publication number
- CN117635408B CN117635408B CN202311571165.XA CN202311571165A CN117635408B CN 117635408 B CN117635408 B CN 117635408B CN 202311571165 A CN202311571165 A CN 202311571165A CN 117635408 B CN117635408 B CN 117635408B
- Authority
- CN
- China
- Prior art keywords
- image
- feature map
- tensor
- zero
- deep convolutional
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000001514 detection method Methods 0.000 claims abstract description 19
- 238000012549 training Methods 0.000 claims abstract description 18
- 230000006870 function Effects 0.000 claims description 13
- 238000012986 modification Methods 0.000 claims description 13
- 230000004048 modification Effects 0.000 claims description 13
- 235000002566 Capsicum Nutrition 0.000 claims description 11
- 239000006002 Pepper Substances 0.000 claims description 11
- 235000016761 Piper aduncum Nutrition 0.000 claims description 11
- 235000017804 Piper guineense Nutrition 0.000 claims description 11
- 235000008184 Piper nigrum Nutrition 0.000 claims description 11
- 150000003839 salts Chemical class 0.000 claims description 10
- 230000009466 transformation Effects 0.000 claims description 10
- 238000001914 filtration Methods 0.000 claims description 6
- 108091026890 Coding region Proteins 0.000 claims description 4
- 238000010276 construction Methods 0.000 claims description 3
- 244000203593 Piper nigrum Species 0.000 claims 1
- 238000000605 extraction Methods 0.000 abstract 1
- 238000012360 testing method Methods 0.000 description 15
- 241000722363 Piper Species 0.000 description 10
- 238000010586 diagram Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 9
- 230000008569 process Effects 0.000 description 5
- 102100028187 ATP-binding cassette sub-family C member 6 Human genes 0.000 description 4
- 101000986621 Homo sapiens ATP-binding cassette sub-family C member 6 Proteins 0.000 description 4
- 101001014572 Homo sapiens MARCKS-related protein Proteins 0.000 description 4
- 238000013527 convolutional neural network Methods 0.000 description 3
- 238000002474 experimental method Methods 0.000 description 3
- 102100028162 ATP-binding cassette sub-family C member 3 Human genes 0.000 description 2
- 101000986633 Homo sapiens ATP-binding cassette sub-family C member 3 Proteins 0.000 description 2
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 2
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000013135 deep learning Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- HPTJABJPZMULFH-UHFFFAOYSA-N 12-[(Cyclohexylcarbamoyl)amino]dodecanoic acid Chemical compound OC(=O)CCCCCCCCCCCNC(=O)NC1CCCCC1 HPTJABJPZMULFH-UHFFFAOYSA-N 0.000 description 1
- 101000827703 Homo sapiens Polyphosphoinositide phosphatase Proteins 0.000 description 1
- 102100023591 Polyphosphoinositide phosphatase Human genes 0.000 description 1
- 101100012902 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) FIG2 gene Proteins 0.000 description 1
- 101100233916 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) KAR5 gene Proteins 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001364 causal effect Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- LJRGBERXYNQPJI-UHFFFAOYSA-M sodium;3-nitrobenzenesulfonate Chemical compound [Na+].[O-][N+](=O)C1=CC=CC(S([O-])(=O)=O)=C1 LJRGBERXYNQPJI-UHFFFAOYSA-M 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
- G06Q50/184—Intellectual property management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/77—Processing image or video features in feature spaces; using data integration or data reduction, e.g. principal component analysis [PCA] or independent component analysis [ICA] or self-organising maps [SOM]; Blind source separation
- G06V10/774—Generating sets of training patterns; Bootstrap methods, e.g. bagging or boosting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/82—Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Evolutionary Computation (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Multimedia (AREA)
- Software Systems (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Tourism & Hospitality (AREA)
- Technology Law (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Primary Health Care (AREA)
- Marketing (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
本发明公开一种面向版权保护的图像零水印方法、装置及介质,所述方法包括:构建零水印生成网络;训练零水印生成网络;基于训练好的零水印生成网络,根据获取的待保护的图像和对应版权信息完成版权注册;基于训练好的零水印生成网络,根据获取的版权存疑图像和对应版权信息完成版权检测。本发明充分利用了自监督学习以及深度卷积网络在特征提取方面的特性,解决了相似版权导致的零水印碰撞性问题,使得相似版权针对同一幅图像生成的零水印具有较大的差异,同时也保证生成的零水印具有较强的鲁棒性,能够对遭受各类攻击的图像确定其版权归属。
The present invention discloses a zero-watermark method, device and medium for copyright protection of images, the method comprising: constructing a zero-watermark generation network; training the zero-watermark generation network; completing copyright registration based on the trained zero-watermark generation network according to the acquired image to be protected and the corresponding copyright information; completing copyright detection based on the trained zero-watermark generation network according to the acquired copyright-in doubtful image and the corresponding copyright information. The present invention makes full use of the characteristics of self-supervised learning and deep convolutional networks in feature extraction, solves the zero-watermark collision problem caused by similar copyrights, makes the zero-watermarks generated for the same image by similar copyrights have large differences, and also ensures that the generated zero-watermark has strong robustness, and can determine the copyright ownership of images subjected to various attacks.
Description
技术领域Technical Field
本发明属于图像版权保护技术领域,更具体地,涉及一种面向版权保护的图像零水印方法、装置及介质。The present invention belongs to the technical field of image copyright protection, and more specifically, relates to an image zero-watermark method, device and medium for copyright protection.
背景技术Background technique
图像版权保护是指对于拥有图像版权的个人或机构,为了保护其图像作品不被非法复制、传播或使用而采取的一系列措施。随着数字化技术的发展和互联网的普及,图像的传输和获取变得非常方便快捷。然而,这也带来了图像版权被侵犯的风险。非法拷贝、复制和盗用图像作品不仅损害了图像版权所有者的经济利益,还可能导致版权所有者的知识产权被侵犯,甚至会危害国家安全和国防安全。因此,保护图像版权的安全与知识产权已成为亟待解决的问题。Image copyright protection refers to a series of measures taken by individuals or institutions that own image copyrights to protect their image works from being illegally copied, disseminated or used. With the development of digital technology and the popularization of the Internet, the transmission and acquisition of images have become very convenient and fast. However, this also brings the risk of infringement of image copyrights. Illegal copying, reproduction and theft of image works not only damage the economic interests of the image copyright owner, but may also lead to infringement of the copyright owner's intellectual property rights and even endanger national security and national defense security. Therefore, protecting the security and intellectual property rights of image copyrights has become an issue that needs to be urgently addressed.
图像零水印技术是一种新兴的数字水印技术,它可以在不添加任何冗余信息的情况下,实现对图像的版权保护和身份认证。与传统的数字水印技术不同,图像零水印技术不需要在图像中嵌入任何额外的信息,也不会增加图像的存储空间和计算复杂度,为图像版权保护提供了一种切实可行的解决途径。数字零水印技术在图像、矢量地图、视频、音频等领域的安全保护方面取得了许多的应用,近几年在图像相关方面也取得了一定的研究和实验成果。Image zero watermark technology is an emerging digital watermark technology that can achieve copyright protection and identity authentication for images without adding any redundant information. Unlike traditional digital watermark technology, image zero watermark technology does not need to embed any additional information in the image, nor does it increase the image's storage space and computational complexity, providing a practical solution for image copyright protection. Digital zero watermark technology has achieved many applications in security protection in the fields of images, vector maps, videos, audio, etc., and has also achieved certain research and experimental results in image-related areas in recent years.
对于图像的零水印技术,国内外均有相当数量的研究。There has been a considerable amount of research on zero watermark technology for images both at home and abroad.
例如,文献《温泉,孙锬锋,王树勋.零水印的概念与应用[J].电子学报,2003(02):214-216.),之后也有学者对此做出改进(Jiang F,Gao T,Li D.Arobust zero-watermarking algorithm for color image based on tensor mode expansion[J].Multimedia Tools and Applications,2020,79:7599-7614.》首次提出图像零水印算法。For example, the document "Wenquan, Sun Bofeng, Wang Shuxun. Concept and Application of Zero Watermark [J]. Journal of Electronics, 2003(02):214-216.), and later some scholars made improvements to it (Jiang F, Gao T, Li D. Arobust zero-watermarking algorithm for color image based on tensor mode expansion [J]. Multimedia Tools and Applications, 2020, 79:7599-7614. " first proposed the image zero watermark algorithm.
基于深度学习图像零水印研究相对较少,《Fierro-Radilla A,Nakano-MiyatakeM,Cedillo-Hernandez M,et al.A robust image zero-watermarking usingconvolutional neural networks[C]//2019 7th International Workshop onBiometrics and Forensics(IWBF).IEEE,2019:1-5.》使用简单的二分类的网络中的全连接层张量作为图像鲁棒信息。There are relatively few studies on image zero-watermarking based on deep learning. "Fierro-Radilla A, Nakano-MiyatakeM, Cedillo-Hernandez M, et al. A robust image zero-watermarking using convolutional neural networks[C]//2019 7th International Workshop on Biometrics and Forensics(IWBF).IEEE, 2019:1-5." uses the fully connected layer tensor in a simple binary classification network as image robust information.
《李西明,蔡河鑫,陈志浩等.注意力机制和自编码器构造的零水印算法[J].计算机系统应用,2022,31(09):257-264.),Liu G等利用风格迁移网络实现零水印信息生成(Liu G,Xiang R,Liu J,et al.An invisible and robust watermarking scheme usingconvolutional neural networks[J].Expert Systems with Applications,2022,210:118529.》利用自编码器算法以及注意力机制进行了进一步的改进。"Li Ximing, Cai Hexin, Chen Zhihao, et al. Zero watermark algorithm based on attention mechanism and autoencoder construction [J]. Computer Systems and Applications, 2022, 31(09): 257-264.), Liu G et al. used style transfer network to generate zero watermark information (Liu G, Xiang R, Liu J, et al. An invisible and robust watermarking scheme using convolutional neural networks [J]. Expert Systems with Applications, 2022, 210: 118529. " Further improvements were made using the autoencoder algorithm and attention mechanism.
但是如上技术所提出的零水印方法存在如下的问题:However, the zero watermark method proposed by the above technology has the following problems:
1)水印的鲁棒性不佳:目前大多数零水印算法鲁棒性在裁剪攻击、旋转攻击和高强度的滤波攻击下鲁棒性效果较差。1) Poor robustness of watermarking: Currently, most zero-watermarking algorithms have poor robustness under cropping attacks, rotation attacks, and high-intensity filtering attacks.
2)水印生成的效率不高:传统水印算法利用各种复杂的数学或者图形变换,算法复杂度较高,且无法使用显卡进行并行加速。2) Low efficiency of watermark generation: Traditional watermark algorithms use various complex mathematical or graphic transformations, the algorithm complexity is high, and it is impossible to use graphics cards for parallel acceleration.
3)水印的抗碰撞性较低:版权信息相似但不相同时,现有的方法生成的零水印也趋于相同,容易导致零水印的碰撞和版权记录的混淆。3) The watermark has low anti-collision ability: When the copyright information is similar but not identical, the zero watermarks generated by the existing methods tend to be the same, which can easily lead to zero watermark collisions and confusion of copyright records.
4)水印生成网络的泛化性较差:部分深度学习零水印方法不仅需要对样本集进行训练,同时需要对保护内容的图像进行训练,对于未经训练的图像效果较差,因此泛化性低,难以实际应用。4) The generalization of the watermark generation network is poor: Some deep learning zero-watermark methods require not only training on the sample set, but also training on the images of the protected content. The effect is poor for untrained images, so the generalization is low and it is difficult to apply in practice.
发明内容Summary of the invention
提供了本发明以解决现有技术中存在的上述问题。因此,需要一种面向版权保护的图像零水印方法、装置及介质,针对目前图像零水印技术鲁棒性不佳、零水印生成效率不高、抗碰撞性低以及泛化性差等问题,采用了自监督和有监督分类相结合方式进行训练,有效提高了鲁棒性、效率和泛化性,降低了碰撞性。The present invention is provided to solve the above problems existing in the prior art. Therefore, a copyright protection-oriented image zero watermark method, device and medium are needed. In view of the problems of poor robustness, low efficiency of zero watermark generation, low anti-collision and poor generalization of current image zero watermark technology, a combination of self-supervision and supervised classification is adopted for training, which effectively improves robustness, efficiency and generalization, and reduces collision.
根据本发明的第一技术方案,提供一种面向版权保护的图像零水印方法,所述方法包括:According to a first technical solution of the present invention, a copyright protection-oriented image zero watermark method is provided, the method comprising:
构建零水印生成网络;Construct a zero watermark generation network;
训练零水印生成网络;Train the zero-watermark generation network;
基于训练好的零水印生成网络,根据获取的待保护的图像和对应版权信息完成版权注册;Based on the trained zero watermark generation network, copyright registration is completed according to the acquired image to be protected and the corresponding copyright information;
基于训练好的零水印生成网络,根据获取的版权存疑图像和对应版权信息完成版权检测。Based on the trained zero-watermark generation network, copyright detection is completed according to the acquired copyright-questionable images and corresponding copyright information.
进一步地,所述零水印生成网络包括一个弱噪声层、一个强噪声层、两个深度卷积网络以及两个多层感知机,所述两个深度卷积网络分别为第一深度卷积网络和第二深度卷积网络,所述两个多层感知机分别为第一多层感知机和第二多层感知机。Furthermore, the zero watermark generation network includes a weak noise layer, a strong noise layer, two deep convolutional networks and two multi-layer perceptrons, the two deep convolutional networks are respectively a first deep convolutional network and a second deep convolutional network, and the two multi-layer perceptrons are respectively a first multi-layer perceptron and a second multi-layer perceptron.
进一步地,所述弱噪声层和所述强噪声层用于依次对图像内容进行随机修改或变换操作,其中所述强噪声层对图像内容进行随机修改或变换操作的程度大于所述弱噪声层对图像内容进行随机修改或变换操作的程度,所述随机修改包括中的裁剪图像、旋转图像、椒盐噪声以及滤波中的一种及其组合;Further, the weak noise layer and the strong noise layer are used to perform random modification or transformation operations on the image content in sequence, wherein the degree of random modification or transformation operations performed by the strong noise layer on the image content is greater than the degree of random modification or transformation operations performed by the weak noise layer on the image content, and the random modification includes one of cropping the image, rotating the image, salt and pepper noise, and filtering, and a combination thereof;
进一步地,所述零水印生成网络的输入包括图像X和版权信息W,所述图像为任意格式的图像内容,所述版权信息为任意能标识版权来源、所有者信息的版权内容,所述版权信息包括编码序列、文本、图标、图像、视频以及语音中的任一形式;Furthermore, the input of the zero watermark generation network includes an image X and copyright information W, wherein the image is an image content in any format, and the copyright information is any copyright content that can identify the copyright source and owner information, and the copyright information includes any form of a coding sequence, text, icon, image, video, and voice;
所述图像X经过所述弱噪声层得到第一图像Xw,此后所述第一图像Xw有两个分支;The image X is passed through the weak noise layer to obtain a first image X w , and then the first image X w has two branches;
第一个分支将第一图像Xw输入所述第一深度卷积网络得到第一特征图Xw-N,将所述版权信息W输入第二深度卷积网络得到第二特征图W-N,将第一特征图Xw-N和第二特征图W-N进行张量连接,再输入所述第一多层感知机中得到第三特征图Pw,将所述第三特征图Pw再输入所述第二多层感知机得到版权编码Yw;The first branch inputs the first image Xw into the first deep convolutional network to obtain a first feature map Xw -N, inputs the copyright information W into the second deep convolutional network to obtain a second feature map WN, performs tensor connection on the first feature map Xw -N and the second feature map WN, and then inputs the first multi-layer perceptron to obtain a third feature map Pw , and then inputs the third feature map Pw into the second multi-layer perceptron to obtain a copyright code Yw ;
第二个分支将第一图像Xw输入所述强噪声层得到第二图像Xs,将所述第二图像Xs输入所述第一深度卷积网络得到第四特征图Xs-N,将所述第四特征图Xs-N和所述第二特征图W-N进行张量连接,再输入所述第一多层感知机中得到第五特征图Ps,将所述第五特征图Ps再输入所述第二多层感知机得到版权编码Ys。The second branch inputs the first image Xw into the strong noise layer to obtain a second image Xs , inputs the second image Xs into the first deep convolutional network to obtain a fourth feature map Xs -N, performs tensor connection on the fourth feature map Xs -N and the second feature map WN, and then inputs them into the first multi-layer perceptron to obtain a fifth feature map Ps , and then inputs the fifth feature map Ps into the second multi-layer perceptron to obtain the copyright code Ys .
进一步地,所述训练零水印生成网络,具体包括:Furthermore, the training of the zero watermark generation network specifically includes:
获取图像数据集和版权数据集;Obtain image datasets and copyright datasets;
基于所述图像数据集和版权数据集,通过如下损失函数对所述零水印生成网络进行训练:Based on the image dataset and the copyright dataset, the zero watermark generation network is trained using the following loss function:
Loss=Loss1*weight1+Loss2*weight2+Loss3*weight3Loss=Loss1*weight1+Loss2*weight2+Loss3*weight3
其中Loss1、Loss2和Loss3表示三个损失函数,weight1、weight2和weight3为三个损失函数的权重,在如下的约束下任意调整:Among them, Loss1, Loss2 and Loss3 represent three loss functions, weight1, weight2 and weight3 are the weights of the three loss functions, which can be adjusted arbitrarily under the following constraints:
weight1+weight2+weight3=1weight1+weight2+weight3=1
三个损失函数分别表示为:The three loss functions are expressed as:
其中i为张量的下标,N为张量的总长度,Yw、Ys、Y表示版权编码且三者长度相等,Pw和Ps两者长度相等。Where i is the subscript of the tensor, N is the total length of the tensor, Y w , Y s , and Y represent copyright codes and are of equal length, and P w and P s are of equal length.
进一步地,所述基于训练好的零水印生成网络,根据获取的待保护的图像和对应版权信息完成版权注册,具体包括:Furthermore, the zero watermark generation network based on the training completes the copyright registration according to the acquired image to be protected and the corresponding copyright information, specifically including:
获取待保护的图像和版权信息;Obtain the images and copyright information to be protected;
将所述待保护的图像输入第一深度卷积网络得到第一张量,将所述版权信息输入第二深度卷积网络得到第二张量,将所述第一张量和所述第二张量进行连接,并将连接后的第一张量和第二张量输入第一多层感知机,得到特征图;Inputting the image to be protected into a first deep convolutional network to obtain a first tensor, inputting the copyright information into a second deep convolutional network to obtain a second tensor, connecting the first tensor and the second tensor, and inputting the connected first tensor and the second tensor into a first multi-layer perceptron to obtain a feature map;
对所述特征图进行二值化,其中二值化的阈值设为所述所述特征图的平均值;Binarizing the feature map, wherein a binarization threshold is set to an average value of the feature map;
对二值化后的特征图进行置乱,置乱的密钥设为key,置乱后的结果ZW为生成的零水印;The binary feature map is scrambled, the scrambling key is set to key, and the scrambled result ZW is the generated zero watermark;
存储key和ZW作为版权记录,完成图像的版权注册。Store key and ZW as copyright records to complete the copyright registration of the image.
进一步地,所述基于训练好的零水印生成网络,根据获取的版权存疑图像和对应版权信息完成版权检测,具体包括:Furthermore, the copyright detection is completed based on the trained zero watermark generation network according to the acquired copyright-questionable image and corresponding copyright information, specifically including:
获取版权存疑图像和版权信息W;Get copyright-questionable images and copyright information W;
将所述版权存疑图像输入第一深度卷积网络得到第三张量,将版权信息输入第二深度卷积网络得到第四张量,将所述第三张量和所述第四张量连接,再将连接的第三张量和第四张量输入第一多层感知机,得到特征图;Inputting the copyright-questionable image into the first deep convolutional network to obtain a third tensor, inputting the copyright information into the second deep convolutional network to obtain a fourth tensor, connecting the third tensor and the fourth tensor, and then inputting the connected third tensor and fourth tensor into the first multi-layer perceptron to obtain a feature map;
对所述特征图进行二值化,其中二值化的阈值设为所述特征图的平均值;Binarizing the feature map, wherein a binarization threshold is set to an average value of the feature map;
对二值化后的特征图进行置乱,置乱的密钥采用版权注册时存储的key,置乱后的结果ZW2为生成的零水印。The binarized feature map is scrambled, and the scrambling key uses the key stored during copyright registration. The scrambled result ZW2 is the generated zero watermark.
计算版权注记录中的零水印ZW与生成的零水印ZW2的相关系数NC;Calculate the correlation coefficient NC between the zero watermark ZW in the copyright annotation record and the generated zero watermark ZW2;
将NC与预设阈值进行比较,若NC大于等于预设阈值,则确定所述版权存疑图像的版权归属版权信息W,若NC小于预设阈值,则确定所述版权存疑图像的版权不属于版权信息W。Compare NC with a preset threshold. If NC is greater than or equal to the preset threshold, determine that the copyright of the copyright-questionable image belongs to copyright information W. If NC is less than the preset threshold, determine that the copyright of the copyright-questionable image does not belong to copyright information W.
进一步地,通过如下公式计算版权注记录中的零水印ZW与生成的零水印ZW2的相关系数NC:Furthermore, the correlation coefficient NC between the zero watermark ZW in the copyright annotation record and the generated zero watermark ZW2 is calculated by the following formula:
其中,XNOR为同或运算,i为张量的下标,N为张量的总长度。Among them, XNOR is the exclusive OR operation, i is the subscript of the tensor, and N is the total length of the tensor.
根据本发明的第二技术方案,提供一种面向版权保护的图像零水印装置,所述装置包括:According to a second technical solution of the present invention, there is provided an image zero watermark device for copyright protection, the device comprising:
网络构建模块,被配置为构建零水印生成网络;A network construction module, configured to construct a zero-watermark generation network;
网络训练模块,被配置为训练零水印生成网络;A network training module, configured to train a zero-watermark generation network;
版权注册模块,被配置为基于训练好的零水印生成网络,根据获取的待保护的图像和对应版权信息完成版权注册;The copyright registration module is configured to complete copyright registration based on the trained zero watermark generation network and the acquired image to be protected and the corresponding copyright information;
版权检测模块,被配置为基于训练好的零水印生成网络,根据获取的版权存疑图像和对应版权信息完成版权检测。The copyright detection module is configured to complete copyright detection based on the trained zero-watermark generation network and the acquired copyright-questionable images and corresponding copyright information.
进一步地,所述零水印生成网络包括一个弱噪声层、一个强噪声层、两个深度卷积网络以及两个多层感知机,所述两个深度卷积网络分别为第一深度卷积网络和第二深度卷积网络,所述两个多层感知机分别为第一多层感知机和第二多层感知机。Furthermore, the zero watermark generation network includes a weak noise layer, a strong noise layer, two deep convolutional networks and two multi-layer perceptrons, the two deep convolutional networks are respectively a first deep convolutional network and a second deep convolutional network, and the two multi-layer perceptrons are respectively a first multi-layer perceptron and a second multi-layer perceptron.
进一步地,所述弱噪声层和所述强噪声层用于依次对图像内容进行随机修改或变换操作,其中所述强噪声层对图像内容进行随机修改或变换操作的程度大于所述弱噪声层对图像内容进行随机修改或变换操作的程度,所述随机修改包括中的裁剪图像、旋转图像、椒盐噪声以及滤波中的一种及其组合。Furthermore, the weak noise layer and the strong noise layer are used to perform random modification or transformation operations on the image content in sequence, wherein the degree to which the strong noise layer performs random modification or transformation operations on the image content is greater than the degree to which the weak noise layer performs random modification or transformation operations on the image content, and the random modification includes one of cropping the image, rotating the image, salt and pepper noise, and filtering, and a combination thereof.
进一步地,所述零水印生成网络的输入包括图像X和版权信息W,所述图像为任意格式的图像内容,所述版权信息为任意能标识版权来源、所有者信息的版权内容,所述版权信息包括编码序列、文本、图标、图像、视频以及语音中的任一形式;Furthermore, the input of the zero watermark generation network includes an image X and copyright information W, wherein the image is an image content in any format, and the copyright information is any copyright content that can identify the copyright source and owner information, and the copyright information includes any form of a coding sequence, text, icon, image, video, and voice;
所述网络构建模块被进一步配置为:The network building module is further configured to:
所述图像X经过所述弱噪声层得到第一图像Xw,此后所述第一图像Xw有两个分支;The image X is passed through the weak noise layer to obtain a first image X w , and then the first image X w has two branches;
第一个分支将第一图像Xw输入所述第一深度卷积网络得到第一特征图Xw-N,将所述版权信息W输入第二深度卷积网络得到第二特征图W-N,将第一特征图Xw-N和第二特征图W-N进行张量连接,再输入所述第一多层感知机中得到第三特征图Pw,将所述第三特征图Pw再输入所述第二多层感知机得到版权编码Yw;The first branch inputs the first image Xw into the first deep convolutional network to obtain a first feature map Xw -N, inputs the copyright information W into the second deep convolutional network to obtain a second feature map WN, performs tensor connection on the first feature map Xw -N and the second feature map WN, and then inputs the first multi-layer perceptron to obtain a third feature map Pw , and then inputs the third feature map Pw into the second multi-layer perceptron to obtain a copyright code Yw ;
第二个分支将第一图像Xw输入所述强噪声层得到第二图像Xs,将所述第二图像Xs输入所述第一深度卷积网络得到第四特征图Xs-N,将所述第四特征图Xs-N和所述第二特征图W-N进行张量连接,再输入所述第一多层感知机中得到第五特征图Ps,将所述第五特征图Ps再输入所述第二多层感知机得到版权编码Ys。The second branch inputs the first image Xw into the strong noise layer to obtain a second image Xs , inputs the second image Xs into the first deep convolutional network to obtain a fourth feature map Xs -N, performs tensor connection on the fourth feature map Xs -N and the second feature map WN, and then inputs them into the first multi-layer perceptron to obtain a fifth feature map Ps , and then inputs the fifth feature map Ps into the second multi-layer perceptron to obtain the copyright code Ys .
进一步地,所述网络训练模块被进一步配置为:Furthermore, the network training module is further configured as follows:
获取图像数据集和版权数据集;Obtain image datasets and copyright datasets;
基于所述图像数据集和版权数据集,通过如下损失函数对所述零水印生成网络进行训练:Based on the image dataset and the copyright dataset, the zero watermark generation network is trained using the following loss function:
Loss=Loss1*weight1+Loss2*weight2+Loss3*weight 3Loss=Loss1*weight1+Loss2*weight2+Loss3*weight 3
其中Loss1、Loss2和Loss3表示三个损失函数,weight1、weight2和weight3为三个损失函数的权重,在如下的约束下任意调整:Among them, Loss1, Loss2 and Loss3 represent three loss functions, weight1, weight2 and weight3 are the weights of the three loss functions, which can be adjusted arbitrarily under the following constraints:
weight1+weight2+weight3=1weight1+weight2+weight3=1
三个损失函数分别表示为:The three loss functions are expressed as:
其中i为张量的下标,N为张量的总长度,Yw、Ys、Y表示版权编码且三者长度相等,Pw和Ps两者长度相等。Where i is the subscript of the tensor, N is the total length of the tensor, Y w , Y s , and Y represent copyright codes and are of equal length, and P w and P s are of equal length.
进一步地,所述版权注册模块被进一步配置为:Furthermore, the copyright registration module is further configured to:
获取待保护的图像和版权信息;Obtain the images and copyright information to be protected;
将所述待保护的图像输入第一深度卷积网络得到第一张量,将所述版权信息输入第二深度卷积网络得到第二张量,将所述第一张量和所述第二张量进行连接,并将连接后的第一张量和第二张量输入第一多层感知机,得到特征图;Inputting the image to be protected into a first deep convolutional network to obtain a first tensor, inputting the copyright information into a second deep convolutional network to obtain a second tensor, connecting the first tensor and the second tensor, and inputting the connected first tensor and the second tensor into a first multi-layer perceptron to obtain a feature map;
对所述特征图进行二值化,其中二值化的阈值设为所述所述特征图的平均值;Binarizing the feature map, wherein a binarization threshold is set to an average value of the feature map;
对二值化后的特征图进行置乱,置乱的密钥设为key,置乱后的结果ZW为生成的零水印;The binary feature map is scrambled, the scrambling key is set to key, and the scrambled result ZW is the generated zero watermark;
存储key和ZW作为版权记录,完成图像的版权注册。Store key and ZW as copyright records to complete the copyright registration of the image.
进一步地,所述版权检测模块被进一步配置为:Furthermore, the copyright detection module is further configured to:
获取版权存疑图像和版权信息W;Get copyright-questionable images and copyright information W;
将所述版权存疑图像输入第一深度卷积网络得到第三张量,将版权信息输入第二深度卷积网络得到第四张量,将所述第三张量和所述第四张量连接,再将连接的第三张量和第四张量输入第一多层感知机,得到特征图;Inputting the copyright-questionable image into the first deep convolutional network to obtain a third tensor, inputting the copyright information into the second deep convolutional network to obtain a fourth tensor, connecting the third tensor and the fourth tensor, and then inputting the connected third tensor and fourth tensor into the first multi-layer perceptron to obtain a feature map;
对所述特征图进行二值化,其中二值化的阈值设为所述特征图的平均值;Binarizing the feature map, wherein a binarization threshold is set to an average value of the feature map;
对二值化后的特征图进行置乱,置乱的密钥采用版权注册时存储的key,置乱后的结果ZW2为生成的零水印。The binarized feature map is scrambled, and the scrambling key uses the key stored during copyright registration. The scrambled result ZW2 is the generated zero watermark.
计算版权注记录中的零水印ZW与生成的零水印ZW2的相关系数NC;Calculate the correlation coefficient NC between the zero watermark ZW in the copyright annotation record and the generated zero watermark ZW2;
将NC与预设阈值进行比较,若NC大于等于预设阈值,则确定所述版权存疑图像的版权归属版权信息W,若NC小于预设阈值,则确定所述版权存疑图像的版权不属于版权信息W。Compare NC with a preset threshold. If NC is greater than or equal to the preset threshold, determine that the copyright of the copyright-questionable image belongs to copyright information W. If NC is less than the preset threshold, determine that the copyright of the copyright-questionable image does not belong to copyright information W.
进一步地,所述版权检测模块被进一步配置为:通过如下公式计算版权注记录中的零水印ZW与生成的零水印ZW2的相关系数NC:Furthermore, the copyright detection module is further configured to calculate the correlation coefficient NC between the zero watermark ZW in the copyright annotation record and the generated zero watermark ZW2 by the following formula:
其中,XNOR为同或运算,i为张量的下标,N为张量的总长度。Among them, XNOR is the exclusive OR operation, i is the subscript of the tensor, and N is the total length of the tensor.
根据本发明的第三技术方案,提供一种可读存储介质,所述可读存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现如上所述的方法。According to a third technical solution of the present invention, a readable storage medium is provided, wherein the readable storage medium stores one or more programs, and the one or more programs can be executed by one or more processors to implement the method as described above.
本发明至少具有以下有益效果:The present invention has at least the following beneficial effects:
(1)零水印具有较高的鲁棒性。采用多层次的卷积神经网络作为主干网络提取特征,加入多种噪声进行训练,并采用自监督学习的方案,大大提高水印的抗攻击性。(1) Zero watermark has high robustness. It uses a multi-layer convolutional neural network as the backbone network to extract features, adds a variety of noises for training, and adopts a self-supervised learning scheme to greatly improve the watermark's anti-attack ability.
(2)零水印生成速度快。采用CUDA加速,在单卡A100-40G配置下,生成单张图片零水印的时间只有20ms,降低了时间开销。(2) Fast zero watermark generation speed. With CUDA acceleration, the time to generate a zero watermark for a single image is only 20ms on a single A100-40G card, which reduces time overhead.
(3)零水印碰撞性较低。在训练中引入Hash生成的版权编码,使得模型生成的零水印碰撞性较低,有效避免相似版权生成的零水印容易混淆的情形。(3) Low zero-watermark collision probability. Introducing hash-generated copyright codes during training makes the zero-watermarks generated by the model have low collision probability, effectively avoiding the situation where zero-watermarks generated by similar copyrights are easily confused.
(4)零水印存储空间小。本发明产生的零水印只有256bit,大大降低存储开销。(4) The zero watermark storage space is small. The zero watermark generated by the present invention is only 256 bits, which greatly reduces the storage overhead.
(5)零水印生成网络的泛化性强。本发明采用自监督学习与有监督分类相结合的方法训练模型,不需要将待保护的图像进行训练,直接输入网络即可产生输出,泛化性强。(5) The zero watermark generation network has strong generalization. The present invention uses a method combining self-supervised learning with supervised classification to train the model. It does not need to train the image to be protected. The output can be generated by directly inputting the network, which has strong generalization.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1示出了根据本发明实施例的一种面向版权保护的图像零水印方法的整体流程图;FIG1 shows an overall flow chart of an image zero watermark method for copyright protection according to an embodiment of the present invention;
图2示出了根据本发明实施例的待保护图像的示意图;FIG2 is a schematic diagram showing an image to be protected according to an embodiment of the present invention;
图3示出了根据本发明实施例的版权信息的示意图;FIG3 shows a schematic diagram of copyright information according to an embodiment of the present invention;
图4示出了根据本发明实施例的受到旋转攻击的图像的示意图;FIG4 is a schematic diagram showing an image subjected to a rotation attack according to an embodiment of the present invention;
图5示出了根据本发明实施例的在测试过程中受到椒盐噪声攻击的图像的示意图;FIG5 is a schematic diagram showing an image attacked by salt and pepper noise during a test according to an embodiment of the present invention;
图6示出了根据本发明实施例的在测试过程中受到高斯噪声攻击的图像的示意图;FIG6 is a schematic diagram showing an image attacked by Gaussian noise during a test according to an embodiment of the present invention;
图7示出了根据本发明实施例的在测试过程中受到随机裁剪攻击的图像的示意图;FIG7 is a schematic diagram showing an image subjected to a random cropping attack during a test according to an embodiment of the present invention;
图8示出了根据本发明实施例的在测试过程中受到左上角裁剪攻击的图像的示意图;FIG8 is a schematic diagram showing an image subjected to an upper left corner cropping attack during a test according to an embodiment of the present invention;
图9示出了根据本发明实施例的在测试过程中受到均值滤波攻击的图像的示意图;FIG9 is a schematic diagram showing an image subjected to a mean filter attack during a test according to an embodiment of the present invention;
图10示出了根据本发明实施例的在测试过程中受到高斯滤波攻击的图像的示意图;FIG10 is a schematic diagram showing an image attacked by Gaussian filtering during a test according to an embodiment of the present invention;
图11示出了根据本发明实施例的相似版权生成的零水印NC结果图。FIG. 11 shows a zero-watermark NC result diagram generated by similar copyright according to an embodiment of the present invention.
具体实施方式Detailed ways
为使本领域技术人员更好的理解本发明的技术方案,下面结合附图和具体实施方式对本发明作详细说明。下面结合附图和具体实施例对本发明的实施例作进一步详细描述,但不作为对本发明的限定。本文中所描述的各个步骤,如果彼此之间没有前后关系的必要性,则本文中作为示例对其进行描述的次序不应视为限制,本领域技术人员应知道可以对其进行顺序调整,只要不破坏其彼此之间的逻辑性导致整个流程无法实现即可。In order to enable those skilled in the art to better understand the technical solution of the present invention, the present invention is described in detail below in conjunction with the accompanying drawings and specific embodiments. The embodiments of the present invention are further described in detail below in conjunction with the accompanying drawings and specific embodiments, but are not intended to limit the present invention. For the various steps described herein, if there is no necessity for a causal relationship between each other, the order in which they are described as examples herein should not be regarded as a limitation, and those skilled in the art should know that they can be adjusted in order, as long as the logic between them is not destroyed, resulting in the inability to implement the entire process.
本发明实施例提供一种面向版权保护的图像零水印方法,如图1所示,其整体流程包括构建零水印生成网络、训练零水印生成网络、版权注册以及版权检测四个步骤。The embodiment of the present invention provides an image zero watermark method for copyright protection. As shown in FIG1 , the overall process includes four steps: constructing a zero watermark generation network, training the zero watermark generation network, copyright registration, and copyright detection.
本实例选择Lena作为待保护图像,如图2所示,选择南京财经大学校徽作为版权图片,如图3所示。针对本发明的构建零水印生成网络、训练零水印生成网络、版权注册和版权检测的整个过程,给出本发明的一个实施例,进一步详细说明本发明。In this example, Lena is selected as the image to be protected, as shown in Figure 2, and the emblem of Nanjing University of Finance and Economics is selected as the copyright image, as shown in Figure 3. With respect to the entire process of constructing a zero watermark generation network, training a zero watermark generation network, copyright registration, and copyright detection of the present invention, an embodiment of the present invention is given to further explain the present invention in detail.
1)构建零水印生成网络1) Construct a zero watermark generation network
(1)设定弱噪声层,包括裁剪四周0.0625、随机旋转10度、随机裁剪0.05-0.1部分的图像内容、0.02的椒盐噪声、0.01的高斯噪声,5*5的均值滤波和高斯滤波,每种噪声权重相同。(1) A weak noise layer is set, including cropping 0.0625 around, randomly rotating 10 degrees, randomly cropping 0.05-0.1 parts of the image content, 0.02 salt and pepper noise, 0.01 Gaussian noise, 5*5 mean filter and Gaussian filter, and each noise has the same weight.
(2)设定强噪声层,包括裁剪四周0.25、随机旋转180度、随机裁剪0.2-0.35部分的图像内容、0.3的椒盐噪声、0.3的高斯噪声,13*13的均值滤波和高斯滤波,每种噪声权重相同;(2) Setting a strong noise layer, including cropping 0.25 around, randomly rotating 180 degrees, randomly cropping 0.2-0.35 parts of the image content, 0.3 salt and pepper noise, 0.3 Gaussian noise, 13*13 mean filter and Gaussian filter, each noise weight is the same;
(3)设定深度卷积网络Net1的架构如表1所示。(3) The architecture of the deep convolutional network Net1 is set as shown in Table 1.
表1Net1网络结构Table 1Net1 network structure
(4)设定Net2的网络架构如表2所示。(4) Set the network architecture of Net2 as shown in Table 2.
表2 Net2网络结构Table 2 Net2 network structure
(5)设定MLP1和MLP2均为含有两层全连接层的神经网络。(5) Assume that both MLP1 and MLP2 are neural networks with two fully connected layers.
2)训练零水印生成网络2) Training the zero watermark generation network
(1)流程上,待保护图像X经过无参数的弱噪声层,随机经过某种弱噪声增强,得到Xw,Xw经过Net1生成1×768的张量,版权信息W输入Net2得到1×500的张量,将两个张量合并为一个1×1268的张量,输入MLP1中,输出1×256的张量PW,将PW输入MLP2中,输出1×15的张量YW。使用MD5计算版权信息W的Hash值并重构成1×15的张量Y。将Xw输入强噪声层得到Xs,采用如图1所示的类似流程得到1×256的张量Ps和1×15张量YS。(1) In terms of the process, the image to be protected X passes through a parameter-free weak noise layer and is randomly enhanced with some weak noise to obtain X w . X w passes through Net1 to generate a 1×768 tensor. The copyright information W is input into Net2 to obtain a 1×500 tensor. The two tensors are merged into a 1×1268 tensor and input into MLP1 to output a 1×256 tensor P W . P W is input into MLP2 to output a 1×15 tensor Y W . The hash value of the copyright information W is calculated using MD5 and reconstructed into a 1×15 tensor Y. X w is input into a strong noise layer to obtain X s . A similar process as shown in Figure 1 is used to obtain a 1×256 tensor P s and a 1×15 tensor Y S .
(2)训练的目标函数Loss为:(2) The objective function Loss of the training is:
其中i为张量的下标,N为张量的总长度,Yw、Ys、Y三者长度相等,Pw和Ps两者长度相等,三个Loss的权重均设为1/3。Where i is the subscript of the tensor, N is the total length of the tensor, Yw , Ys , and Y are of equal length, Pw and Ps are of equal length, and the weights of the three losses are all set to 1/3.
(3)该网络使用miniImageNet 30801张图片进行训练,1284张图片用来评估与测试,主要的硬件环境为NVDIA A100-40G显卡。(3) The network uses 30,801 images from miniImageNet for training and 1,284 images for evaluation and testing. The main hardware environment is the NVDIA A100-40G graphics card.
(4)训练使用AdaMax优化器,学习率设置为0.00001,epoch次数设置为200,batchsize设置为20。(4) The AdaMax optimizer is used for training, with the learning rate set to 0.00001, the number of epochs set to 200, and the batch size set to 20.
3)版权注册3) Copyright registration
版权注册包括如下步骤:Copyright registration includes the following steps:
步骤一:用户提交待保护的图像X(图2)和版权信息W(图3);Step 1: The user submits the image X to be protected (Figure 2) and copyright information W (Figure 3);
步骤二:将X输入Net1,将W输入Net2,将两个输出张量进行连接,再将其输入MLP1,得到1×256的张量Pw Step 2: Input X into Net1, input W into Net2, concatenate the two output tensors, and then input them into MLP1 to obtain a 1×256 tensor P w
步骤三:对Pw进行二值化,其中二值化的阈值可设为Pw的平均值;Step 3: Binarize P w , where the binarization threshold can be set to the average value of P w ;
步骤四:进行Arnold置乱,置乱的密钥设为key,置乱后的结果ZW即为生成的零水印。Step 4: Perform Arnold scrambling, set the scrambling key to key, and the scrambling result ZW is the generated zero watermark.
步骤五:存储key和ZW作为版权记录,完成图像X(图2)的版权注册。Step 5: Store key and ZW as copyright records to complete the copyright registration of image X (Figure 2).
4)版权检测4) Copyright detection
版权检测包括如下步骤:Copyright detection includes the following steps:
步骤一:用户提交遭受攻击的、版权存疑的图像X′(图4)和版权信息W(图3);Step 1: The user submits the attacked and copyright-questionable image X′ (Figure 4) and copyright information W (Figure 3);
步骤二:将X′输入Net1,将W输入Net2,将两个输出张量进行连接,再将其输入MLP1,得到Pw2;Step 2: Input X′ into Net1, input W into Net2, concatenate the two output tensors, and then input them into MLP1 to obtain P w 2;
步骤三:对Pw2进行二值化,其中二值化的阈值可设为Pw2的平均值;Step 3: Binarize P w 2, where the binarization threshold can be set to the average value of P w 2;
步骤四:进行Arnold置乱,置乱的密钥采用版权注册时存储的key,置乱后的结果ZW2即为生成的零水印。Step 4: Perform Arnold scrambling. The scrambling key uses the key stored during copyright registration. The scrambled result ZW2 is the generated zero watermark.
步骤五:计算ZW与ZW2的相关系数NC,计算公式如下:Step 5: Calculate the correlation coefficient NC between ZW and ZW2. The calculation formula is as follows:
其中,XNOR为同或运算,在本实施例中NC的计算结果为0.995。Wherein, XNOR is an exclusive OR operation, and in this embodiment, the calculation result of NC is 0.995.
步骤五:比较NC是否高于预先设置的阈值,从而判断版权归属。在本实施例中设置阈值为0.8,由于计算出的NC高于0.8,则认为版权存疑图像X′(图4)的版权归属为W(图3)。Step 5: Compare whether NC is higher than a preset threshold to determine the copyright ownership. In this embodiment, the threshold is set to 0.8. Since the calculated NC is higher than 0.8, it is considered that the copyright of the copyright-questionable image X′ (FIG. 4) belongs to W (FIG. 3).
本发明所提出的方法是基于卷积网络的零水印方法,为进一步验证本方法的性能,以下对本方法进行鲁棒性测试和抗碰撞性的测试,测试使用的待保护图像为图2,版权信息为图3。在鲁棒性测试中,首先对原始图像即图2生成零水印,再对图2进行旋转攻击、椒盐噪声攻击、高斯噪声攻击、裁剪攻击、滤波攻击等攻击方式,计算攻击后图像生成的零水印与原先零水印的差异从而验证鲁棒性。在抗碰撞性测试中,通过对比相似版权生成的零水印的差异,从而验证抗碰撞性,详细的实验结果如下。The method proposed in the present invention is a zero watermark method based on a convolutional network. To further verify the performance of the method, the following robustness test and anti-collision test are performed on the method. The image to be protected used in the test is Figure 2, and the copyright information is Figure 3. In the robustness test, a zero watermark is first generated for the original image, i.e., Figure 2. Then, a rotation attack, salt and pepper noise attack, Gaussian noise attack, cropping attack, filtering attack and other attack methods are performed on Figure 2. The difference between the zero watermark generated by the image after the attack and the original zero watermark is calculated to verify the robustness. In the anti-collision test, the anti-collision is verified by comparing the difference in zero watermarks generated by similar copyrights. The detailed experimental results are as follows.
(1)旋转攻击(1) Spin attack
对图2进行不同程度的旋转攻击,旋转10度的攻击示例如图4所示,实验结果如表3所示。Different degrees of rotation attacks are performed on Figure 2. An example of an attack with a rotation of 10 degrees is shown in Figure 4. The experimental results are shown in Table 3.
表3旋转攻击结果Table 3 Rotation attack results
由表3可见,水印检测的相关系数均高于0.995。由此可见,本方法能够有效抵抗各角度旋转攻击。As can be seen from Table 3, the correlation coefficients of watermark detection are all higher than 0.995. This shows that this method can effectively resist various angle rotation attacks.
(2)椒盐噪声攻击(2) Salt and pepper noise attack
对图2施加不同程度的椒盐噪声攻击,噪声参数为0.05的攻击示例如图5所示,实验结果如表4所示。Different degrees of salt and pepper noise attacks are applied to Figure 2. An attack example with a noise parameter of 0.05 is shown in Figure 5, and the experimental results are shown in Table 4.
表4椒盐攻击结果Table 4 Salt and pepper attack results
由表4可见,水印检测的相关系数均高于0.98,表明本方法可以抵抗椒盐噪声攻击。As can be seen from Table 4, the correlation coefficients of watermark detection are all higher than 0.98, indicating that this method can resist salt and pepper noise attacks.
(3)高斯噪声攻击(3) Gaussian noise attack
对图2施加不同程度的高斯噪声攻击,高斯噪声参数为0.05的攻击示例如图6所示,实验结果如表5所示。Different degrees of Gaussian noise attacks are applied to Figure 2. An attack example with a Gaussian noise parameter of 0.05 is shown in Figure 6. The experimental results are shown in Table 5.
表5高斯噪声攻击结果Table 5 Gaussian noise attack results
由表5可见,水印检测的相关系数均高于0.97,表明本方法有效抵抗高斯噪声攻击。As can be seen from Table 5, the correlation coefficients of watermark detection are all higher than 0.97, indicating that this method is effective in resisting Gaussian noise attacks.
(4)裁剪攻击(4) Clipping attack
对图2施加不同比例的随机裁剪攻击,裁剪比例为0.25的攻击示例如图7所示,实验结果如表6所示。Random cropping attacks of different ratios are applied to Figure 2. An attack example with a cropping ratio of 0.25 is shown in Figure 7. The experimental results are shown in Table 6.
表6随机裁剪攻击结果Table 6 Random cropping attack results
另外,对图片四个角施加不同比例的裁剪攻击,左上裁剪0.0625的攻击示例如图8所示,实验结果如表7所示。In addition, cropping attacks of different proportions are applied to the four corners of the image. An attack example of cropping 0.0625 in the upper left corner is shown in Figure 8. The experimental results are shown in Table 7.
表7裁剪攻击结果Table 7. Cropping attack results
由表6和表7可见,在不同程度的随机裁剪攻击或对四个角裁剪攻击实验中,提取的水印信息相关系数仍然高于0.97,大部分裁剪攻击水印相关系数为1。这表明裁剪攻击后,水印检测仍具有高可靠性。由此可见,本方法对于裁剪攻击具有强的抵抗性。As can be seen from Tables 6 and 7, in experiments with different degrees of random cropping attacks or cropping attacks on four corners, the correlation coefficient of the extracted watermark information is still higher than 0.97, and the correlation coefficient of most cropping attack watermarks is 1. This shows that after the cropping attack, the watermark detection still has high reliability. It can be seen that this method has strong resistance to cropping attacks.
(5)滤波攻击(5) Filter Attack
对测试图片进行均值滤波攻击,均值滤波为5的攻击示例如图9所示,结果如表8所示。The test image is subjected to a mean filter attack. An example of an attack with a mean filter of 5 is shown in Figure 9, and the results are shown in Table 8.
表8均值滤波攻击结果Table 8 Mean filter attack results
对测试图片进行高斯滤波攻击,高斯滤波为5的攻击示例如图10所示,结果如表9所示。The test image is subjected to a Gaussian filter attack. An attack example with a Gaussian filter of 5 is shown in Figure 10, and the results are shown in Table 9.
表9高斯滤波攻击结果Table 9 Gaussian filter attack results
由表8和表9可见,在不同程度均值滤波攻击或高斯滤波攻击实验中,提取的水印信息相关系数高于0.99,绝大多数攻击水印相关系数为1。由此可见,本方法对于滤波攻击的鲁棒性较高。It can be seen from Tables 8 and 9 that in the mean filter attack or Gaussian filter attack experiments of different degrees, the correlation coefficient of the extracted watermark information is higher than 0.99, and the correlation coefficient of most attack watermarks is 1. This shows that the method is highly robust to filter attacks.
(6)抗碰撞性实验(6) Collision resistance test
为验证本方法的抗碰撞性,将八个相近的版权信息与图2共同注册零水印,比较生成的零水印的相关系数,判断相互之间的相似性,实验结果如图11所示。In order to verify the anti-collision ability of this method, eight similar copyright information are registered with zero watermarks together with Figure 2, and the correlation coefficients of the generated zero watermarks are compared to judge the similarity between them. The experimental results are shown in Figure 11.
由图11可见,在抗碰撞性实验中,尽管各个版权信息风格相似,但是生成的零水印信息相关系数均低于0.8,表明零水印之间相关性较低,即很难产生重复的、非常相似的零水印,避免了版权混淆的情形。由此可见,本方法生成的零水印具有较好的抗碰撞性。As shown in Figure 11, in the anti-collision experiment, although the styles of the copyright information are similar, the correlation coefficients of the generated zero watermark information are all lower than 0.8, indicating that the correlation between the zero watermarks is low, that is, it is difficult to generate repeated and very similar zero watermarks, thus avoiding copyright confusion. It can be seen that the zero watermark generated by this method has good anti-collision performance.
此外,尽管已经在本文中描述了示例性实施例,其范围包括任何和所有基于本发明的具有等同元件、修改、省略、组合(例如,各种实施例交叉的方案)、改编或改变的实施例。权利要求书中的元件将被基于权利要求中采用的语言宽泛地解释,并不限于在本说明书中或本申请的实施期间所描述的示例,其示例将被解释为非排他性的。因此,本说明书和示例旨在仅被认为是示例,真正的范围和精神由以下权利要求以及其等同物的全部范围所指示。In addition, although exemplary embodiments have been described herein, the scope includes any and all embodiments based on the present invention with equivalent elements, modifications, omissions, combinations (e.g., various embodiments intersecting schemes), adaptations or changes. The elements in the claims will be interpreted broadly based on the language adopted in the claims, and are not limited to the examples described in this specification or during the implementation of this application, and the examples will be interpreted as non-exclusive. Therefore, this specification and examples are intended to be considered as examples only, and the true scope and spirit are indicated by the following claims and the full scope of their equivalents.
以上描述旨在是说明性的而不是限制性的。例如,上述示例(或其一个或更多方案)可以彼此组合使用。例如本领域普通技术人员在阅读上述描述时可以使用其它实施例。另外,在上述具体实施方式中,各种特征可以被分组在一起以简单化本发明。这不应解释为一种不要求保护的发明的特征对于任一权利要求是必要的意图。相反,本发明的主题可以少于特定的发明的实施例的全部特征。从而,以下权利要求书作为示例或实施例在此并入具体实施方式中,其中每个权利要求独立地作为单独的实施例,并且考虑这些实施例可以以各种组合或排列彼此组合。本发明的范围应参照所附权利要求以及这些权利要求赋权的等同形式的全部范围来确定。The above description is intended to be illustrative rather than restrictive. For example, the above examples (or one or more of them) can be used in combination with each other. For example, those of ordinary skill in the art can use other embodiments when reading the above description. In addition, in the above-mentioned specific embodiments, various features can be grouped together to simplify the present invention. This should not be interpreted as a feature of an invention that is not claimed for protection being necessary for any claim. On the contrary, the subject matter of the present invention may be less than all the features of the embodiments of a specific invention. Thus, the following claims are incorporated into the specific embodiments as examples or embodiments, wherein each claim is independently used as a separate embodiment, and it is considered that these embodiments can be combined with each other in various combinations or arrangements. The scope of the present invention should be determined with reference to the full scope of the equivalent forms of the attached claims and these claims.
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311571165.XA CN117635408B (en) | 2023-11-22 | 2023-11-22 | Copyright protection-oriented image zero-watermark method, device and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311571165.XA CN117635408B (en) | 2023-11-22 | 2023-11-22 | Copyright protection-oriented image zero-watermark method, device and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117635408A CN117635408A (en) | 2024-03-01 |
CN117635408B true CN117635408B (en) | 2024-07-19 |
Family
ID=90029687
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311571165.XA Active CN117635408B (en) | 2023-11-22 | 2023-11-22 | Copyright protection-oriented image zero-watermark method, device and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117635408B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118505479A (en) * | 2024-07-03 | 2024-08-16 | 南京财经大学 | Copyright protection-oriented image zero watermarking method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113643174A (en) * | 2021-08-23 | 2021-11-12 | 西安理工大学 | A method for copyright protection of digital images based on convolutional neural network |
CN113658030A (en) * | 2021-08-18 | 2021-11-16 | 辽宁工程技术大学 | Low False Alarm and Zero Watermark Algorithm Based on Subregional XOR |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105263024B (en) * | 2015-10-15 | 2018-06-29 | 宁波大学 | A kind of registration of HEVC video flowing zero watermarkings of anti-quantization transcoding and detection method |
CN109859093B (en) * | 2019-01-29 | 2022-12-27 | 中国民航大学 | Mixed transform domain image zero-watermarking method based on variable parameter chaotic mapping |
CN114170060A (en) * | 2021-11-19 | 2022-03-11 | 西安理工大学 | Zero watermark robust algorithm based on deep learning |
CN114549271A (en) * | 2022-02-24 | 2022-05-27 | 宁波大学科学技术学院 | Zero watermark generation and extraction method based on DCFERnet |
CN115908094A (en) * | 2022-11-17 | 2023-04-04 | 南京信息工程大学 | A Self-Supervised Lossless Zero-Watermarking Algorithm Based on Feature Comparison Learning |
-
2023
- 2023-11-22 CN CN202311571165.XA patent/CN117635408B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113658030A (en) * | 2021-08-18 | 2021-11-16 | 辽宁工程技术大学 | Low False Alarm and Zero Watermark Algorithm Based on Subregional XOR |
CN113643174A (en) * | 2021-08-23 | 2021-11-12 | 西安理工大学 | A method for copyright protection of digital images based on convolutional neural network |
Also Published As
Publication number | Publication date |
---|---|
CN117635408A (en) | 2024-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Concealed attack for robust watermarking based on generative model and perceptual loss | |
Fadl et al. | Robust copy–move forgery revealing in digital images using polar coordinate system | |
Abidin et al. | Copy-move image forgery detection using deep learning methods: a review | |
Xia et al. | Geometrically invariant color medical image null-watermarking based on precise quaternion polar harmonic Fourier moments | |
Liu et al. | An invisible and robust watermarking scheme using convolutional neural networks | |
CN115131188A (en) | Robust image watermarking method based on generation countermeasure network | |
Sisaudia et al. | A secure gray-scale image watermarking technique in fractional DCT domain using zig-zag scrambling | |
CN117635408B (en) | Copyright protection-oriented image zero-watermark method, device and medium | |
CN102930498B (en) | A kind of digital watermark embedding based on Lifting Wavelet and extracting method | |
Ying et al. | From image to imuge: Immunized image generation | |
Ren et al. | ESRNet: Efficient search and recognition network for image manipulation detection | |
Liu et al. | Image deblocking detection based on a convolutional neural network | |
Sun et al. | Robust Zero-Watermarking Algorithm for Medical Images Based on AGAST-LATCH and DCT | |
Ying et al. | Rwn: Robust watermarking network for image cropping localization | |
Liu et al. | BifPro: a bidirectional facial-data protection framework against deepfake | |
Isaac et al. | Copy-Move forgery detection based on Harris Corner points and BRISK | |
Qin et al. | CADW: CGAN-based attack on deep robust image watermarking | |
Wang et al. | Invisible Adversarial Watermarking: A Novel Security Mechanism for Enhancing Copyright Protection | |
CN118279995A (en) | Face deep forgery evidence obtaining method, system, equipment and storage medium | |
Sarker et al. | An efficient image watermarking scheme using BFS technique based on hadamard transform | |
Nesakumari et al. | Normalized image watermarking scheme using chaotic system | |
CN115908094A (en) | A Self-Supervised Lossless Zero-Watermarking Algorithm Based on Feature Comparison Learning | |
CN114549271A (en) | Zero watermark generation and extraction method based on DCFERnet | |
CN118505479A (en) | Copyright protection-oriented image zero watermarking method and device | |
CN118587568B (en) | Depth forging active evidence obtaining method based on separable perception hash enhancement |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |