The method of embedding and extracting copyright images of vector graphics

A technology of vector graphics and images, which is applied in the field of embedding and extraction of copyright images of vector graphics, and can solve problems such as no transformation domain, loss of copyright image fragments, difficulties, etc.

Inactive Publication Date: 2017-02-15
厦门合立道工程设计集团股份有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (2) There is no relatively stable transform domain for embedding copyrighted images;
[0010] (3) It is easy to perform geometric operations and cause loss of copyright image fragments;
[0011] Therefore, embedding copyright images in vector graphics is much more difficult than embedding copyright images in files such as bitmaps, videos, audios, grids, etc., especially feature (3) exacerbates the difficulty of copyright images resisting attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • The method of embedding and extracting copyright images of vector graphics
  • The method of embedding and extracting copyright images of vector graphics
  • The method of embedding and extracting copyright images of vector graphics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] 1. Embedding

[0056] Step 1.1

[0057] In this embodiment, the vector graphic to be embedded with the copyright image includes N graphic elements, and its length is N. by Figure 11 The discretized image represents the copyright owner, and the discretized image contains 42×42 pixels, and all the pixels constitute an image sequence. In order to prevent the image sequence from being illegally identified, the image sequence is encrypted, and the existing encryption algorithm (such as Arnold transformation) is preferably used as an input to obtain an encrypted image sequence. In this embodiment, the length of the encrypted image sequence remains unchanged, which is as long as the encrypted image sequence, that is, it consists of 42×42 image points. Divide the encrypted image sequence into L continuous digital fragments, that is, the image fragment e, and obtain e 1 ~e L The image sequence E, the number of bits of the image fragment e is its length t. For security rea...

Embodiment 2

[0146] 1. Embedding

[0147] Compared with Embodiment 1, this embodiment has the same steps 1.1 to 1.4; starting from step 1.5, the difference is that

[0148] The first embodiment is to modify the primitives in the first order of the primitive alignment, and this embodiment is to modify the primitives in the second order of the primitive alignment, and thus the extraction steps of this embodiment are different. When this embodiment embeds traversal, it also embeds one by one according to the image sequence E. After embedding a set of image sequence E, continue to embed the traversal point and continue to embed a new set of image sequence E, as in Embodiment 1. After the embedding of this embodiment is completed, The entire vector graphics contains G complete image sequences E.

[0149] This implementation intends to use Figure 10 The 12 primitives in the graph are exaggerated, and the schematic diagram changes before and after embedding. What this embodiment modifies is t...

Embodiment 3

[0154] This embodiment is not intended to exemplify embedding and extraction. This embodiment mainly explains how the present invention can resist geometric attacks and why it is robust to interference attacks.

[0155] 1. Resistance to geometric attacks

[0156] Geometry attacks refer to global scaling, rotation, translation, or the combination of the above operations on the entire vector graphics, in order to modify the primitive function parameters and intend to destroy the image fragments embedded in the function parameters; due to global scaling, rotation, translation Or after the combination operation, although the graph element function parameters are changed, the graph as a whole remains unchanged, which does not affect the reading, so this method is the first choice for attackers.

[0157] The present invention constructs a complex vector operator, calculates the complex ratio of the graph element pair, and embeds the image fragments into the complex ratio. Fragments...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for embedding and extracting a vector graph copyright images. A copyright image embedding method at present is difficult to resist geometrical attacks of translation, rotation, scaling and combination thereof, and is more difficult to resist interference attacks aimed at primitive addition, modification, deletion and combination thereof. The method for embedding and extracting the vector graph copyright images perform complex proportioning on a vector graph according to a handle value, copyright images are embedded in the complex proportion, resistance of the copyright images to geometrical attacks is guaranteed, a plurality of groups of copyright images are embedded in the vector graph, so that the method in the invention has robustness for interference attacks.

Description

technical field [0001] The invention relates to copyright encryption protection technology of vector graphics, in particular to a method for embedding and extracting copyright images of vector graphics. The method of the invention can embed the copyright image representing the copyright information into the vector graphics file in an invisible manner, and can extract the copyright image in a specific way to prove the copyright owner of the graphics. Background technique [0002] Vector graphics refer to the representation of computer graphics using geometric primitives based on mathematical expressions such as points, lines, curves, and polygons. Unlike bitmaps, since vector graphics are depicted with mathematical features, bitmap-style mosaic features will not appear after scaling. Vector graphics are widely used in construction, machinery, textile, electrical, civil engineering, artistic creation and other fields due to their undistorted scaling characteristics and accura...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00G06F21/10
Inventor 杜伟军
Owner 厦门合立道工程设计集团股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products