Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Watermark Embedding and Authentication Method for Digital Image

A technology of digital image and watermark embedding, applied in image coding, image data processing, image data processing and other directions, can solve the problems of watermark robustness to be further improved, feature vector computational complexity reduced, etc., to achieve good invisibility and authentication. Reliable and robust results

Inactive Publication Date: 2011-12-07
SUN YAT SEN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current authentication schemes all have room for improvement to varying degrees, mainly reflected in the fact that the computational complexity of the feature vector used for image authentication needs to be further reduced, and the robustness of the watermark to normal operations needs to be further improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Watermark Embedding and Authentication Method for Digital Image
  • A Watermark Embedding and Authentication Method for Digital Image
  • A Watermark Embedding and Authentication Method for Digital Image

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described below in conjunction with the accompanying drawings.

[0024] The processing flow of the present invention is as attached figure 1 As shown, it includes two steps of watermark embedding and watermark authentication, and the watermark embedding includes the following sub-steps:

[0025] (1) Divide the digital image into two non-overlapping regions by block—the feature region and the watermark region;

[0026] (2) extract the feature vector in the DWT-DCT double transform domain of feature area;

[0027] (3) the eigenvector quantization of the real number that step (2) obtains is watermark bit;

[0028] (4) Embedding the watermark into the watermark area;

[0029] The watermark authentication includes the following sub-steps:

[0030] (5) Divide the digital image into two non-overlapping regions using a partition method consistent with step (1);

[0031] (6) Calculate the feature vector of the feature area;

[0032] (7...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a watermark embedding and authentication method of a digital image, which divides the image into two non-overlapping areas by block—the feature area and the watermark area, and then extracts the feature vector in the DWT-DCT double transform domain of the feature area to generate The watermark is embedded in the watermark area, and when the authenticity of the image content is verified, the image to be detected is divided into two non-overlapping areas using a consistent partition method, and the features obtained by the watermark recovery are extracted by calculating the feature vector of the feature area and the watermark area Whether the error between the vectors is within the acceptable range, so as to judge whether the image content is real.

Description

technical field [0001] The invention belongs to the technical field of multimedia signal processing, and in particular relates to an image authentication method combining image double transform domain features and authentication watermarks. With the help of the semi-fragile feature of the feature vector, the method realizes the authenticity discrimination of the image content, and realizes the tampering location based on the block. technical background [0002] Authentication of authenticity and integrity of digital images is an important research field of multimedia information security. Because the watermark information in digital watermarking technology is integrated with the carrier image, does not need to be transmitted separately, is not affected by the format, and can assist in tampering and positioning. These are the advantages that digital signature technology does not have. Therefore, based on digital watermarking technology image authentication methods have recei...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00G06T9/00
Inventor 郭晓梅刘红梅黄继武
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products