Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

DWT-SVD robust blind watermark method based on Zernike moments

A blind watermarking and robust technology, applied in the field of information security, can solve the problem of weak ability to resist geometric attacks

Active Publication Date: 2014-07-30
HANGZHOU DIANZI UNIV
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Existing algorithms are highly resistant to common signal processing, but weak against geometric attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DWT-SVD robust blind watermark method based on Zernike moments
  • DWT-SVD robust blind watermark method based on Zernike moments
  • DWT-SVD robust blind watermark method based on Zernike moments

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Below in conjunction with embodiment the present invention is further described.

[0026] A DWT-SVD robust blind watermarking method based on Zernike moments includes watermark embedding and watermark extraction.

[0027] The specific implementation steps of the first part of watermark embedding are as follows:

[0028] Step1: Select Lena with 512×512 pixels as the original carrier image, perform one-level DWT transformation on the watermark embedding area X of the carrier image, and divide the low-frequency sub-band LL into a 4×4 matrix, A i Represents the i-th matrix block, and performs SVD decomposition on each block matrix Order Y i =[λ 1 ,λ 2 ,...λ r ],λ j Represents the singular value matrix S i The jth non-zero singular value of , where j=1,2,...r, r is the matrix A i The rank of i=1,2,...32×32.

[0029] Step2: Select the 32×32 pixel binary image "information security" as the watermark, denote it as W, and perform chaotic encryption on the watermark to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a DWT-SVD robust blind watermark method based on Zernike moments. The method comprises a watermark embedding method and a watermark extraction method. The watermark embedding method includes the steps that discrete waterlet transformation is conducted on an original image, a low-frequency sub-band of the original image is divided into small blocks, singular value decomposition is conducted on each small block, chaotic encryption is conducted on watermarks to be embedded, the multiple Zernike moments of a watermark image are stored as secret keys by quantizing Euclidean norm embedded watermarks of a singular value matrix of each small block, the types of geometric attacks are judged according to the secret keys, and correction is conducted. The watermark extraction method is the inverse process of the watermark embedding method and includes the steps of correction of attacked images, watermark extraction and watermark decryption and restoration. According to the method, by the combination of the advantages of DWT and SVD on the digital watermark respect and the utilization of the rotation and zoom invariance of the Zernike moments, conventional signal processing can be well resisted.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a Zernike moment-based discrete wavelet transform and singular value decomposition (DWT-SVD) robust blind watermarking method. Background technique [0002] Because of its important application value in copyright protection and content authentication, digital watermarking technology has become a research hotspot in information hiding technology. Digital watermarking technology embeds information such as numbers, serial numbers, text, and image logos into the media, and modifies the carrier as little as possible during the embedding process to achieve the strongest robustness. When the watermarked media is attacked After that, the watermark can still be recovered or the existence of the watermark can be detected. With the rapid development of information security requirements, invisible watermarking is getting more and more researchers' attention. [0003] Image inv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 叶学义邓猛宋倩倩陈华华张维笑赵知劲
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products