CN118840246B - Image pixel watermark embedding method, tracing method, system and electronic equipment - Google Patents
Image pixel watermark embedding method, tracing method, system and electronic equipment Download PDFInfo
- Publication number
- CN118840246B CN118840246B CN202411314327.6A CN202411314327A CN118840246B CN 118840246 B CN118840246 B CN 118840246B CN 202411314327 A CN202411314327 A CN 202411314327A CN 118840246 B CN118840246 B CN 118840246B
- Authority
- CN
- China
- Prior art keywords
- image block
- pixel
- watermark
- information
- embedding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 230000000903 blocking effect Effects 0.000 claims abstract description 23
- 230000007306 turnover Effects 0.000 claims description 8
- 229910002056 binary alloy Inorganic materials 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 9
- 230000008569 process Effects 0.000 description 9
- 238000004590 computer program Methods 0.000 description 5
- 238000013478 data encryption standard Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000000638 solvent extraction Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0065—Extraction of an embedded watermark; Reliable detection
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
本申请实施例提供了图像像素水印嵌入方法、追溯方法、系统及电子设备。本实施例中,通过调整图像中各像素的像素值来显示该图像块中的水印信息,而非现有常规的水印明文,增强了水印的隐藏性和安全性,也能有效防止水印对图像数据的遮挡,可以更好适用于各种不同的场景需求。
The embodiments of the present application provide an image pixel watermark embedding method, a tracing method, a system and an electronic device. In this embodiment, the watermark information in the image block is displayed by adjusting the pixel value of each pixel in the image, rather than the existing conventional watermark plain text, which enhances the concealment and security of the watermark, and can also effectively prevent the watermark from blocking the image data, which can be better applied to various scene requirements.
Description
Technical Field
The present application relates to the field of data security, and in particular, to an image pixel watermark embedding method, a tracing system, and an electronic device.
Background
At present, most of the commonly used digital watermarks are plaintext watermarks. After the user obtains the picture with the plaintext watermark, the plaintext watermark on the picture can be erased or tampered by the existing image editing technology such as PS, and at the moment, the plaintext watermark on the picture is destroyed, and the key data can be leaked.
It can be seen that the plaintext watermark is easy to be perceived by a user as the watermark exists and the watermark is easy to be tampered or erased, so that the watermark is added without a substantial precaution effect, and the security of the data is difficult to be effectively ensured.
Disclosure of Invention
The embodiment of the application provides an image pixel watermark embedding method, a tracing method, a system and electronic equipment, which are used for embedding watermarks by adjusting pixel values of image pixels and guaranteeing the safety of data.
The embodiment of the application provides an image pixel watermark embedding method, which is applied to electronic equipment and comprises the following steps:
blocking each single frame original image to be embedded with watermark to obtain N image blocks, wherein N is greater than 1, and any image block has corresponding blocking information for identifying the image block;
Determining a watermark embedding strategy corresponding to the blocking information of each image block, wherein the watermark embedding strategy of the image block indicates that watermark information is represented by adjusting pixel values of a plurality of pixels in the image block, and the watermark information comprises at least one watermark ciphertext which is obtained by encrypting a watermark original text;
The pixel values of a plurality of pixels in the image block are adjusted according to a watermark embedding strategy of the image block to characterize the watermark information by the pixels whose pixel values are adjusted.
The embodiment of the application provides an image pixel watermark tracing method, which is applied to electronic equipment and comprises the following steps:
blocking each single-frame original image with watermark information embedded according to the method to obtain N image blocks, wherein N is larger than 1;
Determining a reference embedding rule of at least one pixel in each image block according to the generation mode of the pixel embedding rule described in the method so as to identify watermark information embedded in the image block based on the reference embedding rule of the at least one pixel in the image block;
Determining, for each image block, a confidence of the image block based on a reference embedding rule of each reference image block except the image block and a shape and a proportion of each reference image block, wherein the confidence of the image block is used for indicating a similarity degree of watermark information identified by the image block and watermark information actually embedded by the image block;
Determining a target image block from the image blocks based on the confidence of each image block; and decrypting the watermark information in the target image block to obtain a watermark original text.
An embodiment of the application provides an electronic device comprising a processor and a machine-readable storage medium;
The machine-readable storage medium stores machine-executable instructions executable by the processor;
the processor is configured to execute machine-executable instructions to perform the steps of the methods disclosed above.
Embodiments of the present application provide a computer program product having a computer program stored therein, which when executed by a processor, implements the steps of the method disclosed above.
According to the technical scheme, in the embodiment, the watermark information in the image block is displayed by adjusting the pixel value of each pixel in the image instead of the conventional watermark plaintext, so that the concealment and safety of the watermark are enhanced, the shielding of the watermark on the image data can be effectively prevented, and the method can be better suitable for various different scene requirements.
Further, in this embodiment, for each image block into which a single frame original image to be embedded with a watermark is divided, a watermark embedding policy for embedding the watermark in the image block is dynamically and adaptively determined in combination with the block information of the image block, and the watermark information in the image block is displayed by adjusting the pixel values of a plurality of pixels in the image block according to the watermark embedding policy of the image block;
Furthermore, the embodiment does not need to rely on the original image data embedded with watermark information when tracing the watermark, but tracing the source by means of the currently received single-frame original image, thereby enhancing the concealment and security of the watermark.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flowchart of a watermark embedding method according to an embodiment of the present application;
FIG. 2 is a flowchart illustrating the implementation of step 102 according to an embodiment of the present application;
FIG. 3 is a flowchart of determining a rule for embedding pixels according to an embodiment of the present application;
FIG. 4 is a flowchart illustrating implementation of step 303 provided by an embodiment of the present application;
Fig. 5 is a flowchart of an image watermark tracing method provided by an embodiment of the present application;
FIG. 6 is a schematic image diagram according to an embodiment of the present application;
FIG. 7 is a flowchart showing a specific implementation of step 503 according to an embodiment of the present application;
fig. 8 is a schematic image diagram of watermark tracing according to an embodiment of the present application;
FIG. 9 is a block diagram of an apparatus according to an embodiment of the present application;
FIG. 10 is a block diagram of another apparatus according to an embodiment of the present application;
Fig. 11 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to better understand the technical solution provided by the embodiments of the present application and make the above objects, features and advantages of the embodiments of the present application more obvious, the technical solution in the embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a flowchart of a watermark embedding method according to an embodiment of the present application. The flow may be applied to an electronic device such as a terminal, and the embodiment is not particularly limited.
As shown in fig. 1, the process may include the steps of:
And 101, blocking each single-frame original image to be embedded with the watermark to obtain N image blocks, wherein N is larger than 1.
In this embodiment, streaming media data, such as a video stream, may be processed using ffmpeg or the like to obtain multiple single-frame raw images (which may be in YUV format). Here, the plurality of single-frame original images are the single-frame original images to be embedded with the watermark.
As an embodiment, for each single-frame original image to be watermarked, the embodiment may block the single-frame original image based on the set watermark redundancy, to obtain N image blocks. N is greater than 1. Optionally, the watermark redundancy here is used to indicate the number of watermarks N embedded in the single frame original image. For example, if the watermark redundancy indicates that the number of watermarks N embedded in the single frame original image is 9, the single frame original image may be divided into 9 image blocks.
In the present embodiment, each of the N image blocks has corresponding block information such as a block number or the like for uniquely identifying the image block, and the present embodiment is not particularly limited.
Step 102, for each image block, determining a watermark embedding strategy corresponding to the blocking information of the image block.
In this embodiment, the watermark embedding strategy corresponding to the blocking information of any image block indicates that the watermark information is characterized by adjusting the pixel values of a plurality of pixels in the image block. The watermark information here comprises at least one watermark ciphertext.
In this embodiment, the watermark ciphertext is a ciphertext obtained by encrypting the watermark ciphertext. As an example, the watermark original herein may include at least one of user ID, device universal unique identification code (UUID: universally Unique Identifier), time stamp, location, and the like. As another embodiment, the watermark text may be custom information, such as any character string, and the embodiment is not limited specifically.
As an embodiment, the watermark ciphertext may be obtained by encrypting the watermark original using a predetermined encryption algorithm, such as a symmetric encryption algorithm or an asymmetric encryption algorithm. Taking a symmetric encryption algorithm as an example, in this embodiment, watermark ciphertext is generated by processing the watermark original text as plaintext and the watermark encryption key together by, for example, advanced encryption standard (AES: advanced Encryption Standard), data encryption standard (DES: data Encryption Standard), triple data encryption algorithm (3 DES: triple DES) and the like in the symmetric encryption algorithm.
When it is to be noted, the watermark ciphertext obtained according to the foregoing short transmission is generally hexadecimal format data, and in this embodiment, the hexadecimal watermark ciphertext is further converted into a binary sequence, that is, a hexadecimal number is converted into four binary numbers. After the binary sequence of the watermark ciphertext is obtained, the subsequent watermark embedding process in this embodiment may be performed, which is described in detail below, and is not repeated here.
As can be seen from the foregoing, in this embodiment, the corresponding watermark embedding policy is determined for each image block based on the block information corresponding to each image block in the same single-frame original image, and since different image blocks have different block information, such as the block sequence numbers, the watermark embedding policies corresponding to at least two image blocks in the same single-frame original image are different. The watermark embedding strategy of each image block will be described below by way of example, and will not be described in detail here.
Step 103, adjusting pixel values of a plurality of pixels in the image block according to the watermark embedding strategy of the image block so as to characterize watermark information in the image block through each pixel with the adjusted pixel values.
If the watermark embedding strategy of the image block is as described above, then the pixel values of the pixels in the image block can be adjusted according to the watermark embedding strategy of the image block in step 103. After the pixel values of the pixels are adjusted, this means that the watermark information is embedded in the image block, and the image block corresponds to the watermark information. I.e. it is finally achieved that the watermark information in the image block is characterized by the pixels whose pixel values are adjusted.
Thus, the flow shown in fig. 1 is completed.
As can be seen from the flow shown in fig. 1, in this embodiment, the pixel values of each pixel in the image are adjusted to represent the watermark information in the image block, instead of the conventional watermark plaintext, so as to enhance the hiding performance and security of the watermark, effectively prevent the watermark from blocking the image data, and better adapt to various different scene requirements.
Furthermore, in this embodiment, for each image block into which a single frame original image to be watermarked is divided, a watermark embedding policy for embedding a watermark in the image block is dynamically determined in a self-adaptive manner, and the pixel values of a plurality of pixels in the image block are adjusted according to the watermark embedding policy of the image block to display watermark information in the image block.
The following is an example description of step 102 above:
Referring to fig. 2, fig. 2 is a flowchart of step 102 implementation provided in an embodiment of the present application. As shown in fig. 2, the process may include the steps of:
Step 201, obtaining the length L of watermark information to be embedded in the image block, wherein the length L of watermark information comprises the lengths of M watermark ciphertexts.
In this embodiment, the set watermark repetition redundancy of the image block may be multiplied by the binary sequence length of the watermark ciphertext to obtain the information length of the image block to be embedded.
Step 202, generating a watermark embedding strategy corresponding to the block information of the image block based on the watermark information length L, so that the pixel value of each pixel in the image block is adjusted based on the watermark embedding strategy, so as to characterize the watermark information with the watermark information length L in the image block by each pixel with the adjusted pixel value.
As one embodiment, the watermark embedding strategy of the image block comprises a pixel embedding rule of at least one pixel in the image block, wherein the pixel embedding rule of any pixel is used for indicating whether the value of each bit in the pixel value of the pixel needs to be adjusted or not and indicating the adjusted value of the bit when the value of any bit needs to be adjusted, so that watermark information with the length L of the watermark information in the image block is displayed by adjusting the pixel value of each pixel in the image block.
Optionally, in this embodiment, there are many implementations of the pixel embedding rule of at least one pixel in the image block when the pixel embedding rule is specifically implemented, and fig. 3 below illustrates one implementation, which is not described herein for brevity.
Thus, the flow shown in fig. 2 is completed.
How to determine the watermark embedding strategy corresponding to the blocking information of each image block is implemented by the flow shown in fig. 2.
The flow shown in fig. 3 is described below:
referring to fig. 3, fig. 3 is a flowchart of determining a pixel embedding rule according to an embodiment of the present application. As shown in fig. 3, the process may include the steps of:
Step 301, performing a mixing process on the key coded data and the block information corresponding to the image block to obtain mixed data.
In this embodiment, the key-encoded data is data obtained by encoding a watermark encryption key. As an example, the watermark encryption keys corresponding to different device types of electronic devices (which also have different security requirements) may be different. As an example, the watermark encryption key here may be a watermark encryption key generated for the present device, which is obtained by the above-described electronic device from an external source such as a server or the like. As another embodiment, the watermark encryption key may be a watermark encryption key that has been recorded locally on the electronic device (which is a watermark encryption key that has been previously obtained by the electronic device from an external source, such as a server, etc., and generated by the device).
As an embodiment, the watermark encryption key may be encoded by fixed-length encoding, such as ASCII. Alternatively, using fixed length coding, common watermark encryption keys consisting of letters and/or numbers may be conveniently encoded. As another embodiment, the watermark encryption key may be encoded by variable word length encoding, such as huffman encoding. The variable word length encoding is used to facilitate encoding of watermark encryption keys composed of any character, including but not limited to chinese and special symbols. The present embodiment is not particularly limited to the encoding method for encoding the watermark encryption key.
Alternatively, the above-described key-encoded data may be represented by binary.
Alternatively, the block information may be a block number, such as 1, indicating the first image block in the single frame original image. Based on this, in the embodiment, in the step 301, the mixing processing is performed on the key encoded data and the block information corresponding to the image block, so as to obtain the mixed data, where the binary representation of the key encoded data and the block number are subjected to a specified operation, and the obtained result is used as the mixed data. For example, a binary representation of key encoded data is directly multiplied by a block number such as [ m, n ] by a specified operation such as multiplication, and the result is taken as mixed data.
Step 302, the above mixed data is processed by using a cryptographic hash algorithm to obtain hash information.
For example, the mixed data is hashed by a cryptographic hash algorithm, and the obtained hash result is used as the hash information.
Step 303, assigning a corresponding watermark embedding mask to at least one pixel in the image block based on the hash information, and determining a pixel embedding rule of each pixel in the image block according to the assigned watermark embedding mask of each pixel in the image block.
As an embodiment, for convenience of management, the above-mentioned cryptographic hash algorithm may be a fixed-length cryptographic hash algorithm, such as a fixed-length cryptographic hash function, e.g., MD5, etc., and the embodiment is not particularly limited. Correspondingly, the hash information may be fixed-length hash information.
Based on this, as an embodiment, there may be various implementations of the implementation of this step 303, for example, the fixed-length hash information is converted into a binary sequence, the binary sequence or a number of binary bits specified in the binary sequence, for example, a numerical value on the first 32 bits, is grouped to obtain a plurality of binary groups, where any binary group includes P adjacent binary numbers, where P is greater than 1, and each binary group is allocated to each pixel in the image block in sequence as a watermark embedding mask of each pixel. It should be noted that, if the number K1 of binary groups is smaller than the number K2 of pixels to be allocated with the watermark embedding mask in the image block, the K1 binary groups may be sequentially allocated to the K1 pixels in the image block first, then the K1 binary groups may be sequentially allocated to other pixels in the image block again, and so on.
As one example, the watermark embedding mask to which any pixel is assigned indicates the watermark embedding rule for that pixel. Wherein each binary bit in the watermark embedding mask to which any pixel is assigned has a correspondence with each bit (referred to as a pixel bit) in the pixel value of that pixel, and the pixel value of any pixel is composed of a value on Q bits (i.e., the above-mentioned pixel bits). For example, the first binary bit in the watermark embedding mask allocated to any pixel corresponds to the first bit (denoted as the pixel bit) in the pixel value of the pixel, and so on, until the last binary bit in the watermark embedding mask allocated to the pixel corresponds to the G1 bit (denoted as the pixel bit) in the pixel value of the pixel, then returning to the first binary bit in the watermark embedding mask allocated to the pixel corresponds to the G1+1 bit (denoted as the pixel bit) in the pixel value of the pixel, and so on, until the last bit in the pixel value of the pixel.
In this embodiment, each binary bit in the binary sequence of the watermark ciphertext has a corresponding relationship with each pixel bit in the pixel value of any pixel, for example, the first binary bit in the binary sequence of the watermark ciphertext corresponds to the first bit (denoted as a pixel bit) in the pixel value of the pixel, and so on, until the last binary bit in the binary sequence of the watermark ciphertext corresponds to the G2 bit (denoted as a pixel bit) in the pixel value of the pixel, then the first binary bit in the binary sequence of the watermark ciphertext corresponds to the G2+1 bit (denoted as a pixel bit) in the pixel value of the pixel, and so on, until the last bit in the pixel value of the pixel is returned.
Based on this, in this embodiment, in the watermark embedding mask allocated to any pixel, if the value on one binary bit is a first value, for example, 1, it indicates that the value on the pixel bit corresponding to the binary bit in the pixel value of the pixel needs to be adjusted, and the adjusted value is the value on the binary bit corresponding to the pixel bit in the binary sequence of the watermark ciphertext.
For example, the watermark embedding mask to which any pixel is assigned is represented by a four-bit binary number, e.g., 0110, and if the first value is 1, it indicates that the value on the second bit in the pixel value of the pixel needs to be adjusted, and the value on the third bit in the binary sequence of the watermark ciphertext, where the value on the second bit is adjusted to the value on the second bit in the binary sequence of the watermark ciphertext, and the value on the third bit is adjusted to the value on the third bit in the binary sequence of the watermark ciphertext.
As another embodiment, fig. 4 illustrates step 303, which is not described herein in detail.
Since the block information of different image blocks, such as different numbers, causes different hash information of the above-mentioned mixed data, the pixel embedding rule of each pixel generated by the above-mentioned method also shows different states in each image block, which greatly reduces perceptibility of watermark information.
Thus, the flow shown in fig. 3 is completed.
By the flow shown in fig. 3, it is finally achieved how to determine the pixel embedding rule of at least one pixel in the image block.
Through the flow shown in fig. 3, the embodiment can implement discrete watermark embedding by adopting a cryptographic hash function according to the information such as the block numbers of the image blocks and the key code data, and implement the discrete watermark embedding and unidirectional watermark embedding, so that the same watermark information shows different states among different image blocks.
The flow shown in fig. 4 is described below:
Referring to fig. 4, fig. 4 is a flowchart of step 303 provided in an embodiment of the present application. The process may include the steps of:
Step 401, traversing pixels in the image block in sequence, and determining the traversed pixels as current pixels.
Such as traversing the pixels in the image block in a front-to-back, left-to-right order.
Step 402, traversing each binary number group in sequence, and taking the traversed binary number group as the current binary number group.
Each binary number group here is described as above, specifically, is obtained by converting the above-described hash information such as fixed-length hash information into a binary sequence and grouping the binary sequence or a specified number of binary numbers in the binary sequence in order, and any binary number group includes P adjacent binary numbers, with P being greater than 1.
Step 403, assigning the current binary number to the current pixel as the watermark embedding mask of the current pixel, and generating the pixel embedding rule of the current pixel according to the watermark embedding mask of the current pixel.
As one embodiment, each binary bit in the watermark embedding mask to which any pixel is assigned has a correspondence with each pixel bit in the pixel value of that pixel;
similarly, each binary bit in the binary sequence of the watermark ciphertext has a corresponding relationship with each pixel bit in the pixel value of the pixel;
Based on this, in step 403, the pixel embedding rule of the current pixel is generated according to the watermark embedding mask of the current pixel, and includes determining that the value on the pixel bit corresponding to the binary bit needs to be adjusted in the pixel value of the pixel if the value on the binary bit is a first value, such as 1, for each binary bit in the watermark embedding mask allocated to any pixel, and determining that the value on the pixel bit corresponding to the binary bit does not need to be adjusted in the pixel value of the pixel if the value on the binary bit is a second value, such as 0, different from the first value, in the binary sequence of the watermark ciphertext. I.e. the pixel embedding rule of the current pixel is determined.
Step 404, if it is determined that the watermark information of the image block is smaller than the L based on the pixel embedding rule of each pixel including the current pixel, the step of traversing the pixels in the image block in sequence is returned, and if the watermark information is equal to or greater than the L, the current flow is ended.
As can be seen from the flow shown in fig. 4, in this embodiment, the pixel embedding rule of the pixels in the image block is repeatedly determined only based on L, and once the watermark information embeddable in the image block is determined to reach L based on the pixel embedding rule of each pixel, the current flow is directly ended, and the flow shown in fig. 4 is not executed on other pixels in the image block, so that resources are saved and efficiency is improved.
Thus, the flow shown in fig. 4 is completed.
The above-described step 303 is realized by the flow shown in fig. 4.
In this embodiment, if the watermark information embedded in the image block based on the pixel embedding rule of all the pixels in the image block is found to be smaller than L, the hash information may be adjusted according to the preset flipping density requirement. And then returns to step 303 described above.
As an embodiment, herein, the hash information is adjusted according to the preset roll-over density requirement, for example, at least one second value, which is appeared in the hash information such as fixed-length hash information and has a density satisfying the preset roll-over density requirement, may be adjusted to be the first value. For example, taking the second value as 0 as an example, if the values of three consecutive binary bits in the fixed-length hash information are all 0 (satisfying the preset flip density requirement, for example, the values of three consecutive binary bits are all 0), one of the values may be adjusted from 0 to 1. And then returns to step 303 to satisfy the embedding of watermark information with length L in the image block.
In addition, in this embodiment, in order to ensure that the length of watermark information embedded in each image block is not required to be known during tracing, a watermark ending mark with a certain length may be embedded after each segment of watermark ciphertext is embedded, so as to express the completion of embedding a single segment of watermark ciphertext.
Optionally, the embodiment can further ensure the integrity of the watermark information by adding check information bits to the embedded watermark information.
Image watermark embedding is described above. The following describes an image watermark tracing method provided by the embodiment of the application:
Referring to fig. 5, fig. 5 is a flowchart of an image watermark tracing method provided by an embodiment of the present application. The method is applied to the electronic equipment and can comprise the following steps:
step 501, each single frame original image with watermark information embedded according to the method is segmented to obtain N image blocks, N is greater than 1, and any image block has corresponding blocking information for identifying the image block.
This step 501 is similar to the step 101 described above, and will not be described again here.
Step 502, determining a reference embedding rule of at least one pixel in each image block according to the generation mode of the pixel embedding rule described in the method, so as to identify the embedded target watermark information of the image block based on the reference embedding rule of at least one pixel in each image block, wherein the reference embedding rule of any pixel is used for indicating the value of the pixel, which is adjusted during watermark information embedding.
For example, for each image block, mixing the key coded data and the block information corresponding to the image block to obtain mixed data, processing the mixed data by using a cryptographic hash algorithm to obtain hash information, distributing a corresponding watermark embedding mask for at least one pixel in the image block based on the hash information, and determining a reference pixel embedding rule of each pixel in the image block according to the distributed watermark embedding mask of each pixel in the image block. For example, if the watermark embedding mask of one pixel is 1001, the values on the first pixel bit and the fourth pixel bit of the pixel are adjusted, and the watermark ciphertext data is watermark ciphertext data at this time, and so on, and finally the watermark ciphertext data is read from each image block. As described above, since the watermark redundancy causes a single image block to be embedded with multiple watermark ciphertexts, the number k of times read according to the watermark ending mark (for example, when the watermark redundancy is 5, it means that the single image block is embedded with 5 watermark ciphertexts, and when the watermark ending mark is read 5 times, the tracing of the watermark ciphertexts in the image block can be ended). And then obtaining the complete watermark ciphertext of each section of the embedded single image block according to the times k.
As an embodiment, the present embodiment may optionally select a watermark ciphertext from the watermark information as the watermark information identified in the step 502, may select a watermark ciphertext with the largest number of times of being embedded in the image block as the watermark information identified in the step 502, or may select all watermark ciphertext embedded in the image block as the watermark information identified in the step 502, which is not particularly limited.
Step 503, for each image block, determining a confidence of the image block based on the reference embedding rule of each reference image block except the image block and the shape and proportion of the reference image block, wherein the confidence of the image block is used for indicating the similarity degree of the watermark information identified by the image block and the watermark information actually embedded by the image block.
As an embodiment, reference image blocks herein refer to image blocks other than the image block.
It should be noted that, as shown in fig. 6A, the single-frame original image embedded with watermark information is different from the single-frame original image obtained after subsequent receiving, for example, by shooting or deforming, as shown in fig. 6B, and in order to improve the tracing accuracy, the embodiment calculates the confidence of each image block in the currently received single-frame original image, so as to select one image block for tracing based on the confidence, which is specifically see step 504.
As to how to determine the confidence of the image block, there are many implementations in specific implementation, and fig. 7 illustrates one implementation, which is not described herein in detail.
And step 504, determining a target image block from the image blocks based on the confidence of each image block, and decrypting watermark information in the target image block to obtain a watermark original text.
For example, an image block with the highest confidence is selected as a target image block, so that watermark information is traced more accurately, and the watermark information has higher robustness.
Watermark information in each image block is identified based on the description of step 502 above. Based on this, the watermark information in the target image block may be directly decrypted, for example, by using the decryption key corresponding to the watermark encryption key, to obtain the watermark original text.
Thus, the flow shown in fig. 5 is completed.
The image watermark tracing is realized through the flow shown in fig. 5.
The flow shown in fig. 7 is described below:
referring to fig. 7, fig. 7 is a flowchart of a specific implementation of step 503 provided in an embodiment of the present application. As shown in fig. 7, the process may include the steps of:
Step 701, for each image block, generating reference watermark information in each reference image block based on watermark information embedded in the image block and reference pixel embedding rules of pixels in each reference image block except the image block.
In this embodiment, the watermark information embedded in each reference image block is the same for different image blocks, and based on this, the present embodiment may generate, for each image block, the reference watermark information in each reference image block based on the watermark information embedded in the image block and the reference pixel embedding rule of each pixel in each reference image block except the image block, as described in step 502.
Step 702, displaying the reference watermark information in each reference image block in the image block template and adjusting the image block template to obtain a matching block corresponding to each reference image block, wherein the shape and proportion of each reference image block and the matching block corresponding to the reference image block meet the requirement of similarity.
For image block a in the image shown in fig. 6B described above and shown in fig. 6 as 8A in fig. 8, the reference watermark information in image block B is generated based on the watermark information in which image block a is embedded and the reference pixel embedding rule of each pixel in image block B other than the image block. The reference watermark information in the image block B is displayed in an image block template, and the image block template is adjusted to obtain a matching block corresponding to each reference image block, as shown in fig. 8B. The adjustment such as stretching, expanding and shrinking accords with almost transformation required by anisotropic filtering, and the embodiment is not particularly limited as long as the shape and proportion of each reference image block and the matching block corresponding to the reference image block can be finally ensured to meet the requirement of similarity.
Step 703, determining the confidence of each reference image block according to the matching degree between the reference image blocks and the matching blocks corresponding to each reference image block.
For example, for each reference image block, determining the matching degree between the reference image block and the pixels at the same position in the matching block corresponding to the reference image block, and determining the confidence degree of the image block according to the matching degree between each reference image block and the pixels at the same position in the matching block corresponding to each reference image block.
Still taking the image block a in the image shown in fig. 6B described above and shown in fig. 6 as an example in fig. 8A, for this image block a, the reference watermark information in the image block B is generated based on the watermark information in which this image block a is embedded and the reference pixel embedding rule of each pixel in the image block B other than this image block, as described in step 702. The reference watermark information in the image block B is displayed in an image block template (specifically, as shown by 8B in fig. 8. And the image block template shown by 8B in fig. 8 is adjusted to obtain a matching block corresponding to each reference image block, specifically, as shown by 8C in fig. 8. After that, the matching degree between the matching block shown by 8C in fig. 8 and the pixel at the same position in the image block B shown by 6B in fig. 6 (i.e. the image block shown by 8D in fig. 8) is calculated (for example, if the pixel values of the pixels at the same position are the same, the degree of matching between pixels at the same location is considered to be 100%, and otherwise, the other cases are correspondingly reduced), and then the confidence of the image block can be determined according to the degree of matching between each reference image block and pixels at the same location in the matching block corresponding to each reference image block.
Thus, the flow shown in fig. 7 is completed.
The above step 503 is finally achieved by the flow shown in fig. 7.
The method provided by the embodiment of the application is described above, and the system and the device provided by the embodiment of the application are described below:
an embodiment of the present application provides an image watermarking system, which includes means for performing the process shown in fig. 1, and means for performing the process shown in fig. 5.
Correspondingly, the embodiment of the application also provides a structure diagram of the device corresponding to the flow shown in fig. 1. Referring to fig. 9, fig. 9 is a block diagram of an apparatus according to an embodiment of the present application. As shown in fig. 9, the apparatus may include:
A determining unit for partitioning each single frame original image to be embedded with watermark to obtain N image blocks, wherein N is greater than 1, any image block has corresponding partitioning information for identifying the image block, and
Determining a watermark embedding strategy corresponding to the blocking information of each image block, wherein the watermark embedding strategy of the image block indicates that watermark information is represented by adjusting pixel values of a plurality of pixels in the image block, and the watermark information comprises at least one watermark ciphertext which is obtained by encrypting a watermark original text;
and the watermark embedding unit is used for adjusting pixel values of a plurality of pixels in the image block according to the watermark embedding strategy of the image block so as to characterize watermark information in the image block through each pixel with the adjusted pixel values.
Optionally, the determining the watermark embedding policy corresponding to the blocking information of the image block includes:
Obtaining the length L of watermark information to be embedded in the image block, wherein the length L of watermark information comprises the lengths of M watermark ciphertext;
And generating a watermark embedding strategy corresponding to the blocking information of the image block based on the watermark information length L, so that the pixel value of each pixel in the image block is adjusted based on the watermark embedding strategy, and the watermark information with the watermark information length L in the image block is represented by each pixel with the adjusted pixel value.
Optionally, the watermark embedding policy of the image block includes a pixel embedding rule of at least one pixel in the image block;
The pixel embedding rule of any pixel is used for indicating whether the value of each bit in the pixel value of the pixel needs to be adjusted or not, and indicating the adjusted value of the bit when the value of any bit is determined to need to be adjusted, so that watermark information with the length of the watermark information being L in the image block is displayed by adjusting the pixel value of each pixel in the image block.
Optionally, the pixel embedding rule of at least one pixel in the image block is determined by:
carrying out mixed processing on key coding data and block information corresponding to the image block to obtain mixed data, wherein the key coding data is data obtained after a watermark encryption key is coded;
processing the mixed data by using a password hash algorithm to obtain hash information;
And distributing a corresponding watermark embedding mask to at least one pixel in the image block based on the hash information, and determining a pixel embedding rule of each pixel in the image block according to the distributed watermark embedding mask of each pixel in the image block.
Optionally, the block information is a block number, and the key coded data is represented by binary;
The step of carrying out mixed processing on the key coding data and the blocking information corresponding to the image block to obtain mixed data comprises the following steps:
And carrying out specified operation on the binary representation of the key coding data and the block number, and taking the obtained result as the mixed data.
Optionally, the assigning a corresponding watermark embedding mask to at least one pixel in the image block based on the hash information, and determining the pixel embedding rule of each pixel in the image block according to the assigned watermark embedding mask of each pixel in the image block includes:
Traversing pixels in the image block in sequence, and determining the traversed pixels as current pixels, traversing each binary number group in sequence, and taking the traversed binary number group as the current binary number group, wherein each binary number group is obtained by converting the hash information into a binary sequence and grouping the binary sequence or the binary number of the appointed number in the binary sequence in sequence, and any binary number group comprises P adjacent binary numbers, wherein P is larger than 1;
the method comprises the steps of assigning a current binary number to a current pixel to serve as a watermark embedding mask of the current pixel, generating a pixel embedding rule of the current pixel according to the watermark embedding mask of the current pixel, and if the current pixel is not the last pixel and the watermark information of the image block is determined to be smaller than L based on the pixel embedding rule of each pixel including the current pixel which is traversed, returning to the step of traversing the pixels in the image block in sequence, and if the watermark information is equal to or larger than L, ending the current flow.
Optionally, each binary bit in the watermark embedding mask to which any pixel is assigned has a corresponding relationship with each pixel bit in the pixel value of the pixel;
Each binary bit in the binary sequence of the watermark ciphertext has a corresponding relation with each pixel bit in the pixel value of the pixel;
The generating the pixel embedding rule of the current pixel according to the watermark embedding mask of the current pixel includes:
For each binary bit in the watermark embedding mask allocated to any pixel, if the value on the binary bit is a first value, determining that the value on the pixel bit corresponding to the binary bit in the pixel value of the pixel needs to be adjusted, and if the value on the binary bit is a second value different from the first value, determining that the value on the pixel bit corresponding to the binary bit in the pixel value of the pixel does not need to be adjusted, wherein the adjusted value is the value on the binary bit corresponding to the pixel bit in the binary sequence of the watermark ciphertext.
Optionally, the determining unit further includes:
If the current pixel is the last pixel, when the watermark information of the image block is smaller than the L based on the pixel embedding rule of each pixel in the image block, adjusting the hash information according to the preset turnover density requirement, returning to the step of distributing a corresponding watermark embedding mask for at least one pixel in the image block based on the hash information, and determining the pixel embedding rule of each pixel in the image block according to the distributed watermark embedding mask of each pixel in the image block;
The step of adjusting the hash information according to the preset turnover density comprises the step of adjusting a second value, which appears in the hash information and meets the preset turnover density requirement, so as to adjust at least one second value, which appears in the hash information and meets the preset turnover density requirement, to be a first value.
Optionally, the image block is further embedded with a watermark end flag;
And a watermark ending mark is arranged behind each watermark ciphertext in the image block so as to trace the watermark information based on the watermark ending mark.
The structural description of the apparatus shown in fig. 9 is thus completed.
Referring to fig. 10, fig. 10 is a block diagram of another apparatus according to an embodiment of the present application. The device corresponds to the flow shown in fig. 5, and may include:
A processing unit for blocking each single frame original image embedded with watermark information according to the method to obtain N image blocks, N is greater than 1, and
Determining a reference embedding rule of at least one pixel in each image block according to the generation mode of the pixel embedding rule described in the method so as to identify the watermark information embedded in the image block based on the reference embedding rule of the at least one pixel in the image block, wherein the reference embedding rule of any pixel is used for indicating the value of the pixel, which is adjusted during the embedding of the watermark information, and
Determining, for each image block, a confidence of the image block based on a reference embedding rule of each reference image block except the image block and a shape and a proportion of each reference image block, wherein the confidence of the image block is used for indicating a similarity degree of watermark information identified by the image block and watermark information actually embedded by the image block;
the source tracing unit is used for determining a target image block from the image blocks based on the confidence of each image block, and decrypting watermark information in the target image block to obtain a watermark original text.
Optionally, for each image block, determining the confidence of the image block based on the reference embedding rule of other image blocks except the image block and the shape and proportion of the other image blocks includes:
Generating, for each image block, reference watermark information in each reference image block based on watermark information in which the image block is embedded and reference pixel embedding rules for pixels in each reference image block other than the image block;
Displaying the reference watermark information in each reference image block in an image block template and adjusting the image block template to obtain a matching block corresponding to each reference image block;
and determining the confidence coefficient of the image block according to the matching degree between each reference image block and the matching block corresponding to each reference image block.
Optionally, the determining the confidence level of the image block according to the matching level between each reference image block and the matching block corresponding to each reference image block includes:
For each reference image block, determining the matching degree between the reference image block and pixels at the same position in a matching block corresponding to the reference image block;
And determining the confidence coefficient of the image block according to the matching degree between the pixels in the same position in each reference image block and the matching block corresponding to each reference image block.
The structural description of the apparatus shown in fig. 10 is thus completed.
The embodiment of the application also provides a hardware structure of the device shown in fig. 9 or 10. Referring to fig. 11, fig. 11 is a block diagram of an electronic device according to an embodiment of the present application. As shown in FIG. 11, the hardware architecture may include a processor and a machine-readable storage medium storing machine-executable instructions executable by the processor for executing the machine-executable instructions to implement the methods disclosed in the above examples of the present application.
Based on the same application concept as the above method, the embodiment of the present application further provides a machine-readable storage medium, where a number of computer instructions are stored, where the computer instructions can implement the method disclosed in the above example of the present application when the computer instructions are executed by a processor.
Based on the same application concept as the above method, the embodiment of the present application further provides a computer program product, where a computer program is stored, and when the computer program is executed by a processor, the method disclosed in the above example of the present application is implemented.
By way of example, the machine-readable storage medium may be any electronic, magnetic, optical, or other physical storage device that can contain or store information, such as executable instructions, data, and the like. For example, the machine-readable storage medium may be RAM (Radom Access Memory, random access memory), volatile memory, non-volatile memory, flash memory, a storage drive (e.g., hard drive), a solid state disk, any type of storage disk (e.g., optical disk, dvd, etc.), or a similar storage medium, or a combination thereof.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.
Claims (12)
1. An image pixel watermark embedding method, which is applied to electronic equipment, is characterized by comprising the following steps:
blocking each single frame original image to be embedded with watermark to obtain N image blocks, wherein N is greater than 1, and any image block has corresponding blocking information for identifying the image block;
For each image block, determining a watermark embedding strategy corresponding to the blocking information of the image block; the watermark embedding strategy of the image block indicates that watermark information is represented by adjusting pixel values of a plurality of pixels in the image block, the watermark information comprises at least one watermark ciphertext, the watermark ciphertext is ciphertext obtained by encrypting watermark originals, watermark embedding strategies corresponding to at least two image blocks in the same single-frame original image are different, the watermark embedding strategy of the image block comprises pixel embedding rules of at least one pixel in the image block, the pixel embedding rules of any pixel are used for indicating whether a numerical value on each bit in a pixel value of the pixel needs to be adjusted or not, and indicating the numerical value which is adjusted on the bit when the numerical value on any bit is determined to be adjusted, so that watermark information with the length of the watermark information being L in the image block is displayed by adjusting the pixel value of each pixel in the image block, the pixel embedding rules of at least one pixel in the image block are determined by the steps of carrying out mixed processing on key coding data and block information corresponding to the image block, obtaining mixed data, the key coding data is obtained by carrying out mixed processing on the mixed block information corresponding to the hash key coding data, and the mixed key coding data is obtained by utilizing the hash code data, and the hash code data is obtained by utilizing the hash code information corresponding to the hash code information;
The pixel values of a plurality of pixels in the image block are adjusted according to a watermark embedding strategy of the image block to characterize the watermark information by the pixels whose pixel values are adjusted.
2. The method of claim 1, wherein determining a watermark embedding policy corresponding to the blocking information of the image block comprises:
Obtaining the length L of watermark information to be embedded in the image block, wherein the length L of watermark information comprises the lengths of M watermark ciphertext;
And generating a watermark embedding strategy corresponding to the blocking information of the image block based on the watermark information length L, so that the pixel value of each pixel in the image block is adjusted based on the watermark embedding strategy, and the watermark information with the watermark information length L in the image block is represented by each pixel with the adjusted pixel value.
3. The method according to claim 1, wherein the block information is a block number, and the key encoded data is represented by a binary system;
The step of carrying out mixed processing on the key coding data and the blocking information corresponding to the image block to obtain mixed data comprises the following steps:
And carrying out specified operation on the binary representation of the key coding data and the block number, and taking the obtained result as the mixed data.
4. The method of claim 1, wherein assigning a corresponding watermark embedding mask to at least one pixel in the image block based on the hash information, and determining the pixel embedding rule for each pixel in the image block based on the assigned watermark embedding mask for each pixel in the image block comprises:
Traversing pixels in the image block in sequence, and determining the traversed pixels as current pixels, traversing each binary number group in sequence, and taking the traversed binary number group as the current binary number group, wherein each binary number group is obtained by converting the hash information into a binary sequence and grouping the binary sequence or the binary number of the appointed number in the binary sequence in sequence, and any binary number group comprises P adjacent binary numbers, wherein P is larger than 1;
the method comprises the steps of assigning a current binary number to a current pixel to serve as a watermark embedding mask of the current pixel, generating a pixel embedding rule of the current pixel according to the watermark embedding mask of the current pixel, and if the current pixel is not the last pixel and the watermark information of the image block is determined to be smaller than L based on the pixel embedding rule of each pixel including the current pixel which is traversed, returning to the step of traversing the pixels in the image block in sequence, and if the watermark information is equal to or larger than L, ending the current flow.
5. The method of claim 4, wherein each binary bit in the watermark embedding mask to which any pixel is assigned has a correspondence with each pixel bit in the pixel value of that pixel;
Each binary bit in the binary sequence of the watermark ciphertext has a corresponding relation with each pixel bit in the pixel value of the pixel;
The generating the pixel embedding rule of the current pixel according to the watermark embedding mask of the current pixel includes:
For each binary bit in the watermark embedding mask allocated to any pixel, if the value on the binary bit is a first value, determining that the value on the pixel bit corresponding to the binary bit in the pixel value of the pixel needs to be adjusted, and if the value on the binary bit is a second value different from the first value, determining that the value on the pixel bit corresponding to the binary bit in the pixel value of the pixel does not need to be adjusted, wherein the adjusted value is the value on the binary bit corresponding to the pixel bit in the binary sequence of the watermark ciphertext.
6. The method according to claim 4, characterized in that the method further comprises:
If the current pixel is the last pixel, when the watermark information of the image block is smaller than the L based on the pixel embedding rule of each pixel in the image block, adjusting the hash information according to the preset turnover density requirement, returning to the step of distributing a corresponding watermark embedding mask for at least one pixel in the image block based on the hash information, and determining the pixel embedding rule of each pixel in the image block according to the distributed watermark embedding mask of each pixel in the image block;
The step of adjusting the hash information according to the preset turnover density comprises the step of adjusting a second value, which appears in the hash information and meets the preset turnover density requirement, so as to adjust at least one second value, which appears in the hash information and meets the preset turnover density requirement, to be a first value.
7. The method of claim 1, wherein the image block is further embedded with a watermark end flag;
And a watermark ending mark is arranged behind each watermark ciphertext in the image block so as to trace the watermark information based on the watermark ending mark.
8. The image watermark tracing method is characterized by being applied to electronic equipment and comprising the following steps:
Blocking each single-frame original image embedded with watermark information according to any one of the methods of claims 1 to 7 to obtain N image blocks, wherein N is greater than 1;
Determining a reference embedding rule of at least one pixel in each image block according to the generation method of the pixel embedding rule described in any one of claims 1 to 7 to identify watermark information embedded in the image block based on the reference embedding rule of the at least one pixel in the image block;
Determining, for each image block, a confidence of the image block based on a reference embedding rule of each reference image block except the image block and a shape and a proportion of each reference image block, wherein the confidence of the image block is used for indicating a similarity degree of watermark information identified by the image block and watermark information actually embedded by the image block;
Determining a target image block from the image blocks based on the confidence of each image block; and decrypting the watermark information in the target image block to obtain a watermark original text.
9. The method of claim 8, wherein for each image block, determining the confidence of the image block based on the reference embedding rules of the other image blocks except the image block and the shape and scale of the other image blocks comprises:
Generating, for each image block, reference watermark information in each reference image block based on watermark information in which the image block is embedded and reference pixel embedding rules for pixels in each reference image block other than the image block;
Displaying the reference watermark information in each reference image block in an image block template and adjusting the image block template to obtain a matching block corresponding to each reference image block;
and determining the confidence coefficient of the image block according to the matching degree between each reference image block and the matching block corresponding to each reference image block.
10. The method of claim 9, wherein determining the confidence level of each reference image block based on the degree of matching between the image block and the corresponding matching block of each reference image block comprises:
For each reference image block, determining the matching degree between the reference image block and pixels at the same position in a matching block corresponding to the reference image block;
And determining the confidence coefficient of the image block according to the matching degree between the pixels in the same position in each reference image block and the matching block corresponding to each reference image block.
11. An image watermarking system, the system comprising:
Apparatus for performing the method of any one of claims 1 to 7, and apparatus for performing the method of any one of claims 8 to 10.
12. An electronic device includes a processor and a machine-readable storage medium;
The machine-readable storage medium stores machine-executable instructions executable by the processor;
The processor is configured to execute machine executable instructions to implement the steps of any of the methods of claims 1 to 7 or the methods of any of claims 8 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202411314327.6A CN118840246B (en) | 2024-09-19 | 2024-09-19 | Image pixel watermark embedding method, tracing method, system and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202411314327.6A CN118840246B (en) | 2024-09-19 | 2024-09-19 | Image pixel watermark embedding method, tracing method, system and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN118840246A CN118840246A (en) | 2024-10-25 |
CN118840246B true CN118840246B (en) | 2025-01-07 |
Family
ID=93147759
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202411314327.6A Active CN118840246B (en) | 2024-09-19 | 2024-09-19 | Image pixel watermark embedding method, tracing method, system and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118840246B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105992072A (en) * | 2015-07-24 | 2016-10-05 | 乐视云计算有限公司 | Watermark processing method, watermark extracting method and corresponding devices |
CN111915472A (en) * | 2019-05-10 | 2020-11-10 | 浙江大学 | A watermark embedding method, extraction method and device |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3902863B2 (en) * | 1997-09-03 | 2007-04-11 | 株式会社日立製作所 | Data superimposing method and data reproducing method, information embedding method and information reading method |
JP4130503B2 (en) * | 1998-11-30 | 2008-08-06 | 株式会社東芝 | Digital watermark embedding device |
KR101428028B1 (en) * | 2013-01-11 | 2014-08-11 | 동국대학교 산학협력단 | Apparatus and method for steganography, apparatus and method for data restoration |
CN109767375B (en) * | 2018-12-06 | 2022-12-13 | 北京北信源信息安全技术有限公司 | Image watermark embedding and tracing method and system |
-
2024
- 2024-09-19 CN CN202411314327.6A patent/CN118840246B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105992072A (en) * | 2015-07-24 | 2016-10-05 | 乐视云计算有限公司 | Watermark processing method, watermark extracting method and corresponding devices |
CN111915472A (en) * | 2019-05-10 | 2020-11-10 | 浙江大学 | A watermark embedding method, extraction method and device |
Also Published As
Publication number | Publication date |
---|---|
CN118840246A (en) | 2024-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11010855B2 (en) | Method and apparatus for protecting digital photos from alteration | |
TW522722B (en) | Method of integrating a watermark into a compressed image | |
Parvez et al. | Vibrant color image steganography using channel differences and secret data distribution | |
CN109657769B (en) | Two-dimensional code information hiding method based on run length coding | |
US9082172B2 (en) | Device for generating watermark metadata, associated device for embedding watermark | |
JP4625841B2 (en) | System and method for digital content security | |
CN111010490A (en) | Watermark adding method, watermark adding device, electronic equipment and computer readable storage medium | |
JP4025283B2 (en) | Code embedding method, identification information restoring method and apparatus | |
CN108681982A (en) | A kind of embedding algorithm and extracting method and system based on singular value decomposition | |
US9319752B2 (en) | Robust watermark | |
CN118840246B (en) | Image pixel watermark embedding method, tracing method, system and electronic equipment | |
CN117528149A (en) | Key updating method, code stream encryption method, code stream decryption method and related devices | |
CN103957099A (en) | Media encryption and decryption method combined with watermark | |
Prabhakaran et al. | A new cryptic steganographic approach using video steganography | |
Pujari et al. | An image based steganography scheme implying pseudo-random mapping of text segments to logical region of cover image using a new block mapping function and randomization technique | |
US8681129B2 (en) | Associating auxiliary data with digital ink | |
JP4821200B2 (en) | Data conversion apparatus, data conversion method, data conversion program, and computer-readable recording medium on which data conversion program is recorded | |
CN115118835B (en) | Watermark embedding method, encrypted watermark extracting method and decryption method | |
Bilan et al. | Research of Methods of Steganographic Protection of Audio Information Based on Video Containers | |
Rathor et al. | Steganography Using Bit Plane Embedding and Cryptography | |
Al-Phalahi | Data concealment technique in background segmentation of color image based secure data transmission system | |
CN118611885A (en) | Encrypted image dual authentication method, system, device and medium | |
Chen et al. | Reversible data hiding in encrypted images based on histogram shifting and prediction error block coding | |
US20100146152A1 (en) | Method for accelerating the computational speed of a computer algorithm | |
CN115361237A (en) | Data encryption transmission method and system for cloud terminal interaction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |