CN103310403B - Hand-written feature and digital document visible watermark fusion method - Google Patents
Hand-written feature and digital document visible watermark fusion method Download PDFInfo
- Publication number
- CN103310403B CN103310403B CN201310177196.7A CN201310177196A CN103310403B CN 103310403 B CN103310403 B CN 103310403B CN 201310177196 A CN201310177196 A CN 201310177196A CN 103310403 B CN103310403 B CN 103310403B
- Authority
- CN
- China
- Prior art keywords
- data
- user
- watermark
- signature
- embedded
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The present invention is applicable to digital watermark technology field, provide a kind of hand-written feature and digital document visible watermark fusion method and computing machine, described method comprises: the signature receiving first user, and the Format adjusting of being signed by first user is the data that picture format is signed as first user; By the data disorder that this first user is signed, using the data after scramble as the first watermark data, the size adjusting described first watermark data makes described first watermark data size occupy a part for described digital watermarking gross space; The image after adding watermark is obtained by watermarking algorithm; The signature of each reception subsequent user, by data disorder, using the data after scramble as this watermark data, the size of adjustment this watermark data described makes this watermark data described occupy a part for digital watermarking gross space; By watermarking algorithm, this watermark data is embedded in image last time.The present invention solves the problem of many person-times of multi-level watermarks.
Description
Technical field
The invention belongs to digital watermarking field, particularly relate to a kind of hand-written feature and digital document visible watermark fusion method.
Background technology
1954, there is first technical examples similar with " digital watermarking " method.At that time, the emailhemBrooke of U.S. Muzac company had applied for that a key name was the patent of " IdentificationofSoundandVideoSingles ".That patent describes a kind of by non for the identification code method being embedded into proof of possession in music.This is eletric watermark technology the earliest known up to now.The people such as trike in 1994 have delivered the article that exercise question is first section of Values watermark of " ADigitalWatermark " in once international Important Academic meeting, propose the concept of digital watermarking and possible application, and propose two kinds of algorithms to embed watermark in image least significant bit (LSB) for gray level image.Within 1996, hold first international information at Britain Camb Newtonian study and hidden scientific seminar, indicated the birth of Information hiding, and have also been obtained as the research of the digital watermark technology of one of Information hiding Main Branches and develop rapidly.Hide scientific seminar to the 3rd international information in 1999, digital watermarking becomes theme.
Digital watermarking refers to that digital signal may be audio frequency, picture or film etc. by specific information insertion digital signal.Have the signal of digital watermarking to copy, embedded information also can be copied in the lump.Digital watermarking can be divided into appears formula and concealed two kinds in one's mind, can by the watermark (Visiblewatermarking) seen, its information comprised can be seen when watching picture or film simultaneously.Digital watermarking can be divided into robust digital watermark and rapid wear digital watermarking two class by the characteristic of watermark.Robust watermarking (RobustWatermarking) is mainly used in identifying Copyright Information in copyright, utilize this digital watermark in the data of content of multimedia, embed founder, possessory beacon information, or embed the sign (i.e. sequence number) of buyer.When there is dispute over copyright, founder or possessory information are used for the copyright owner of unlabeled data, and sequence number is violated the agreement for following the trail of and provided the user of multi-medium data for piracy.Digital watermarking for copyright protection requires very strong robustness and security, except requiring except existence, also to need to resist some malicious attacks in general pattern process (as: filtering, plus noise, replacement, compression etc.).Fragile watermark (FragileWatermarking), contrary with the requirement of robust watermarking, rapid wear digital watermarking is mainly used in integrity protection, and this watermark is embed sightless information in content-data equally.When content changes, can there is corresponding change in these watermark informations, thus can identify whether raw data is tampered.Fragile watermark reply general pattern process (as: filtering, plus noise, replacement, compression etc.) has stronger immunocompetence (robustness), require again stronger susceptibility simultaneously, that is: both allowed distortion to a certain degree, and distortion situation can have been detected again.Must be very sensitive to the change of signal, according to the state of fragile watermark, people just can judge whether data were tampered.
The development of infotech, makes much traditional archive files all become with no paper, electronization.But because electronic document comes more easily modified compared with paper document, much important document still uses traditional papery to preserve scheme.People think that the document that signature authentication is crossed on paper can be subject to corresponding attention and protection.This creates some contradictions with the electronic information reached its maturity.At this, also slightly introduce the feature of digital watermark technology:
Robustness---refer to that digital watermarking can not cause because of certain " change " of digital document (comprising the interchannel noise in transmitting procedure, filtering operation, D/A or A/D conversion etc.) ability of losing that hides Info.
The transparency---point to embed watermark in works and protected works should do not caused significantly to degrade phenomenon.
Undetectability---refer to that hidden carrier and initial carrier have consistent characteristic, illicit interception person cannot be judged, and whether hidden carrier is loaded with digital watermarking.
Vindicability---watermarking algorithm can identify that to be embedded in protected object for information about possessory; as the Subscriber Number, product marking or significant word etc. of registration; and can be extracted when needs; thus differentiate whether object is protected, and the propagation of protected data, the true and false and illegal copies control etc. can be monitored.
Security---refer to that it must bear artificial attack to a certain degree, and make to hide Info and can not be destroyed.
Adjustable and compossibility---still can adjust it after referring to insert watermark in many embody rule, allow multiple watermark to coexist in a hidden object simultaneously.
Self-reparability---refer to that information hiding system only can recover hiding signal from by the fragment data that destroyed after operational transformation, and do not need the performance of host signal.
In image watermark, We conducted the investigation of related content, as shown in Figure 2, after classification tree, we are introduced existing Image Watermarking Technique algorithm the Image Watermarking Technique algorithm classification on basis.
Typical watermark is added algorithm and is divided into two large classes.When one is/and air space algorithm, as least significant bit (LSB) (LSB) algorithm, Patchwork algorithm.Another large class is transform domain watermarking algorithm, and classic is discrete cosine transform (DCT), also has wavelet transformation (DWT) in addition and these two kinds convert mainly based on Fourier transform (DFT).Except time/spatial transform algorithm and frequency domain mapping algorithm except, other also have the various interpolation algorithms such as such as compression and algorithm, NEC algorithm, physiological models algorithm.
<1> spatial-domain algorithm
Digital watermarking algorithm comparatively is early all essentially that in spatial domain, digital watermarking is directly carried in raw data, can also be subdivided into following several method:
(1) least significant bit (LSB) method (LSB) this be a kind of typical spatial domain data hidden algorithm, being the first digit watermarking algorithm that the people such as L.F.Turner and R.G.vanSchyndel propose, is a kind of typical Information-Hiding Algorithm in Spatial Domain.LSB algorithm uses specific key to produce random signal by m sequencer, is then regularly arranged into 2 dimension watermark signals by certain, and is inserted into minimum several of original image respective pixel values one by one.Because watermark signal is hidden in lowest order, be equivalent to superpose the faint signal of an energy, thus in vision be acoustically difficult to discover.Although LSB algorithm can hide more information, the information hidden can be removed easily, cannot meet the robustness requirement of digital watermarking, and therefore present digital watermarking software seldom adopts LSB algorithm.But, as a kind of information concealing method of big data quantity, LSB in covert communications still in occupation of considerable status.
(2) Patchwork method and these two kinds of methods of texture block mapping code method are all that Bender etc. proposes.Patchwork is a kind of digital watermarking of Corpus--based Method, and its embedding grammar selects arbitrarily N to picture point, while some brightness of increase, reduces the brightness value of another point.The hiding of this algorithm is better, and has resistivity to the operation such as the JPEG damaged and filtering, compression and rotation, but is only applicable to the image with a large amount of texture region arbitrarily, and can not completely automatically complete.
(3) people such as file structure microwave method Brassil first proposed the technology that three kinds are hidden specific binary messages in general file image, digital watermark information completes coding by the following structure slightly adjusted in document, comprises vertical mobile line-spacing, horizontal adjustment character-spacing, adjustment text feature (as font).Digital watermarking based on the method can resist some document functions, as photocopying and scanning copy, but is also easy to be destroyed, and is only applicable to file and picture class.
<2> transform-domain algorithm
Technology based on transform domain can embed a large amount of Bit data and can not cause perceptible defect, often adopts the technology of similar spread spectrum image to carry out hiding digital watermark information.This kind of technology is generally based on conventional image conversion, based on local or whole conversion, these conversion comprise discrete cosine transform (DCT), wavelet transformation (WT), Fourier transform (FT or FFT) and Hadamard transform (Hadamardtransform) etc.Wherein based on one of conversion that the DCT of piecemeal is the most frequently used.
(1) a kind of digital watermark technology scheme based on piecemeal DCT is the earliest selected some piecemeals of image randomly, the intermediate frequency of frequency domain changes a tlv triple slightly with hiding binary sequence information.Select intermediate frequency component coding be because high-frequency coding to be easy to destroy by various signal processing method, very sensitive to low frequency component in the vision of low frequency coding then due to people, be easy to be discovered to the change of low frequency component.This digital watermarking algorithm is sane to lossy compression method and low-pass filtering.
(2) another kind of DCT digital watermarking algorithm be first image is divided into 8 × 8 not overlaid pixel block, after block DCT transform, namely the frequency chunks be made up of DCT coefficient is obtained, then some frequency chunks of random selecting, by embedding for watermark signal people in some DCT coefficient selected by cipher controlled.This algorithm is by carrying out small conversion to meet specific relation to selected DCT coefficient, representing the information of a bit with this.When watermark information extracts, then choose identical DCT coefficient, and according to the Relation extraction bit information between coefficient.
(3) image overall dct algorithm first carries out discrete cosine transform to whole image I, then watermark to be loaded in DCT domain before amplitude maximum on k coefficient (removing DC component), to be generally the low frequency component of image.This algorithm not only visually has the imperceptibility of digital watermarking, and robustness is good, can stand to damage out EG compression, filtering, D/A and A/D conversion and the signal transacting such as re-quantization, also can stand general geometric transformation such as shearings, convergent-divergent, translation and rotation etc. and operate [17].Algorithm realization process is: the discrete cosine transform (DCT) of first computed image, in the DCT domain that then watermark is added to before amplitude maximum on k-factor (not comprising DC component), is generally the low frequency component of image.If front k largest component of DCT coefficient is expressed as D=, i=1 ..., k, watermark is random sequence of real numbers W=, the i=1 of Gaussian distributed ..., k, so the embedded mobile GIS of watermark is di=di (1+awi), and wherein constant a is scale factor, controls the intensity that watermark is added.Then do inverse transformation with new coefficient and obtain watermarking images I.Decoding functions then calculates the discrete cosine transform of original image I and watermarking images I* respectively, and extracts the watermark W* embedded, then does related check whether to determine the existence of watermark.
(4) abbreviation of DWT and discrete wavelet territory transform method, its main thought is that signal decomposition is become a series of small echos of original wavelet after displacement and convergent-divergent, original signal is reconstructed by these small echos, therefore small echo is the basis function of wavelet transformation, wavelet coefficient reflection be wavelet basis function shared proportion when reconstructing original function of different zoom yardstick and translation parameters.It and DCT method are all the methods belonging to transform domain.
(5) except above-mentioned representational transform-domain algorithm, also have some Digital Watermarking System in Transform Domain methods, have quite a few to be all improvement and the development of above-mentioned algorithm in the middle of them, this wherein representational algorithm be the algorithm that PodichukI. and ZengWen-Jun proposes.Their method is dct transform based on rest image or wavelet transformation, research vision mode module returns digital watermarking should be carried in where and the every place JND (JustNoticeableDifference that can bear, lucky discernable difference) the value upper intensity limit of digital watermarking (load), this watermarking algorithm is adaptive.
(6) based on the quantizing process that the core of the compression algorithms such as JPEG, MPEG is in the enterprising row data of dct transform domain.As a kind of Digital Watermark Scheme for MPEG-2 compressed video data stream that Hartung proposes.
<3> spread-spectrum watermark algorithm
Usual spread spectrum is used in communication, and mainly provide low detection string, jamproof means of communication, after spread spectrum is introduced Information hiding by Tirkel, spread spectrum develops into an important field gradually in Information hiding field.Spread spectrum information hidden algorithm uses direct sequence and frequency hop sequences spectrum spreading method usually, and ultimate principle is that secret information sheet rate is carried out DS, modulates, join in concealed carrier by pseudo random signal.
<4> physiological models algorithm
Physiological models algorithm mainly utilizes human visual system HVS and human auditory system HAS to the masking effect of information change, and the digital watermarking system realized in conjunction with other algorithm such as piecemeal DCT, wavelet decomposition and spatial domain carries out Information hiding and embed digital watermark.Consider that the algorithm of physiological models has the better transparency and robustness.
<5>NEC algorithm
This algorithm is proposed by the people such as Cox in NEC laboratory, this algorithm occupies critical role in digital watermarking algorithm, its implementation is: be first that seed is to produce pseudo-random sequence with key, this sequence has Gauss N(0,1) distribute, secondly dct transform is done to image, finally modulate the maximum DCT coefficient of except DC component 1000 of this image with pseudorandom gaussian sequence.This algorithm has stronger robustness, security, the transparency etc.Owing to adopting special key, therefore can prevent IBM from attacking, and this algorithm also proposed the cardinal principle strengthening watermark robustness and attack resistance algorithm, namely watermark signal should embed in source data and feel most important part to people, this watermark signal is made up of the random sequence of real numbers of independent same distribution, and this sequence of real numbers should have Gaussian distribution N(0,1) feature.Podilchuk etc. utilize visual model to improve this algorithm again subsequently, thus improve the robustness, the transparency etc. of this algorithm.
Weigh the major parameter of watermark quality
The most important performance of various different watermaking systems is robustness (resisting the various ability being not intended to or having a mind to remove embed watermark), and its robustness mainly relies on following important parameter:
(1) quantity of information is embedded: this is an important parameter, because it directly affects the robustness of watermark.For same water mark method, the information that embed is more, and the robustness of watermark is poorer.
(2) watermark embed strength: also exist between watermark embed strength (robustness corresponding to watermark) and the observability of watermark and trade off, increases robustness and will increase watermark embed strength, correspondingly can increase the observability of watermark.
(3) size of data and characteristic: data size is proportional to robustness.The few of commercial value of works containing watermark that data size is little.Embed watermark characteristic is apparent especially on the impact of robustness.That just watermaking system being widely used in dissimilar different size carrier that we pursue.
(4) secret information (as key): although the quantity of secret information does not directly affect observability and the robustness of watermark, it plays important effect to the security of system.The same with other security system, watermaking system key space (secret information allows the scope of value) is sufficiently large, loses efficacy to make exhaustive attack method.
Existing digital watermark is all generally based on single-layer watermark, or a watermark.Single-layer watermark, as the term suggests only add one deck watermark exactly on image, carrys out additional information according to different embedment strengths.Certainly, the intensity of embedding is larger, also can be larger on the impact of original image.And to a watermark, although can embed multilayer watermark, existing isolation technics is less-than-ideal for thing multilayer watermark, and high-rise watermark easily damages low layer watermark.And these two kinds of modes all can not carry out repeatedly watermark, namely carry out repeatedly watermark in the different time to image.So prior art cannot solve the problem of many person-times of multi-level watermarks.
Summary of the invention
The object of the embodiment of the present invention is to provide a kind of hand-written feature and digital document visible watermark fusion method, is intended to the problem that cannot solve many person-times of multi-level watermarks solving prior art.
The embodiment of the present invention is achieved in that a kind of hand-written feature and digital document visible watermark fusion method, and described method comprises:
Obtain the document of digital watermarking to be embedded, and the format conversion of the document is become picture format, using the picture format after conversion as original document;
Receive the signature of first user, the Format adjusting of being signed by first user is the data that picture format is signed as first user;
By the data disorder that this first user is signed, using the data after scramble as the first watermark data, the size adjusting described first watermark data makes described first watermark data size occupy a part for described digital watermarking gross space;
By watermarking algorithm, described first watermark data is embedded into described original document and obtains the image after adding watermark;
Receiving the signature of the second user, is the data of picture format as the second user's signature using the Format adjusting of the second user's signature; By the data disorder of the second user's signature, using the data after scramble as the second watermark data, the size adjusting described second watermark data makes described second watermark data size occupy the part in described digital watermarking space;
Intermediate water watermark image is obtained by the image after described second watermark data is embedded into added watermark by watermarking algorithm;
Perform follow-up embedding operation, described follow-up embedding operation comprises: each signature receiving a user in subsequent user, be the data of picture format as this user's signature using the signature Format adjusting of this user, by the data disorder of this user's signature, using the data after scramble as this watermark data, the size of adjustment this watermark data described makes this watermark data size described occupy a part for described digital watermarking gross space; By watermarking algorithm, this watermark data is embedded in image last time;
Repeat described follow-up embedding operation until all user's signatures are complete or embed quantity reach end operation when setting threshold value.
Optionally, described method, when being embedded in image last time by watermarking images, also comprises:
Obtain the coordinate figure of user's signature corresponding to this watermarking images, force value and signature speed, by described embedded mobile GIS, described coordinate figure, force value and signature speed are embedded in image last time as key.
Optionally, watermarking images is being embedded into after in image last time by described method, also comprises: added in this watermarking images to show as seen by signature image corresponding for this watermarking images.
On the other hand, provide a kind of computing machine, described computing machine comprises:
Obtaining converting unit, for obtaining the document of digital watermarking to be embedded, and the format conversion of the document being become picture format, using the picture format after conversion as original document; Receive the signature of first user, the Format adjusting of being signed by first user is the data that picture format is signed as first user;
Scramble adjustment unit, for the data disorder of being signed by this first user, using the data after scramble as the first watermark data, the size adjusting described first watermark data makes described first watermark data size occupy a part for described digital watermarking gross space;
Embedded unit, obtains the image after adding watermark for described first watermark data being embedded into described original document by watermarking algorithm;
The Format adjusting of the second user's signature, also for receiving the signature of the second user, is the data of picture format as the second user's signature by described acquisition converting unit;
Described scramble adjustment unit, also for the data disorder by the second user's signature, using the data after scramble as the second watermark data, the size adjusting described second watermark data makes described second watermark data size occupy the part in described digital watermarking space;
Described embedded unit, also obtains intermediate water watermark image for the image after described second watermark data being embedded into added watermark by watermarking algorithm;
This embedded unit, for receiving the signature of a user in subsequent user at every turn, be the data of picture format as this user's signature using the signature Format adjusting of this user, by the data disorder of this user's signature, using the data after scramble as this watermark data, the size of adjustment this watermark data described makes this watermark data size described occupy a part for described digital watermarking gross space; By watermarking algorithm, this watermark data is embedded in image last time;
Cycling element, for controlling this embedded unit cycling described until all user's signatures are complete or embed quantity reach end operation when setting threshold value.
Optionally, described acquisition converting unit, also for obtaining the coordinate figure of user's signature corresponding to this watermarking images, force value and signature speed; Described embedded unit, also for this coordinate figure, force value and signature speed being embedded in image last time as key by this embedded mobile GIS.
Optionally, described embedded unit, also for being added in this watermarking images to show as seen by signature image corresponding for this watermarking images.
The embodiment of the present invention compared with prior art, beneficial effect is: technical scheme of the present invention by multiple digital watermarking by adjustment size of data make it exist in the data space of a digital watermarking, do not affect between multiple like this digital watermarking, so which ensure that the authenticity and integrity of each watermark, so it solves the problem of many person-times of multi-level watermarks, and technical scheme provided by the invention directly uses signature on line to carry out watermark data embedding, it is true that it has embedding data, verifies simple advantage.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of a kind of hand-written feature that the embodiment of the present invention provides and digital document visible watermark fusion method;
Fig. 2 is a kind of document watermark Verification System framework map based on hand-written feature that the embodiment of the present invention provides;
Fig. 3 is the process flow diagram of the watermark embedment that the embodiment of the present invention provides;
Fig. 4 is the structural drawing of the computing machine that the embodiment of the present invention provides.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
The specific embodiment of the invention provides a kind of hand-written feature and digital document visible watermark fusion method, and the method is completed by computing machine, and the method as shown in Figure 1, comprising:
101, obtain the document of digital watermarking to be embedded, and the format conversion of the document is become picture format, using the picture format after conversion as original document;
102, receive the signature of first user, the Format adjusting of being signed by first user is the data that picture format is signed as first user;
103, by the data disorder that this first user is signed, using the data after scramble as the first watermark data, the size adjusting described first watermark data makes described first watermark data size occupy a part for described digital watermarking gross space;
104, by watermarking algorithm, described first watermark data is embedded into described original document and obtains the image after adding watermark;
105, receiving the signature of the second user, is the data of picture format as the second user's signature using the Format adjusting of the second user's signature; By the data disorder of the second user's signature, using the data after scramble as the second watermark data, the size adjusting described second watermark data makes described second watermark data size occupy the part in described digital watermarking space;
106, intermediate water watermark image is obtained by the image after described second watermark data is embedded into added watermark by watermarking algorithm;
107, each signature receiving a user in subsequent user, be the data of picture format as this user's signature using the signature Format adjusting of this user, by the data disorder of this user's signature, using the data after scramble as this watermark data, the size of adjustment this watermark data described makes this watermark data size described occupy a part for described digital watermarking remaining space; By watermarking algorithm, this watermark data is embedded in image last time;
108, the operation repeating 107 reaches end operation when setting threshold value until all user's signatures are complete or embed quantity.
Multiple digital watermarking makes it exist in the data space of a digital watermarking by adjustment size of data by technical scheme provided by the invention, do not affect between multiple like this digital watermarking, so which ensure that the authenticity and integrity of each watermark, so it solves the problem of many person-times of multi-level watermarks, and technical scheme provided by the invention directly uses signature on line to carry out watermark data embedding, it is true that it has embedding data, verifies simple advantage.
Optionally, an above-mentioned part is specifically as follows 1/2nd, 1/3rd, 1/4th, 1/5th or 1/6th etc.
It should be noted that, above-mentioned embedded mobile GIS can, for any one algorithm introduced in prior art, also can be the Digital Watermarking Embedded Algorithm introduced in non-prior art certainly in actual applications.
Optionally, said method, when being embedded in image last time by watermarking images, also comprises:
Obtain the coordinate figure of user's signature corresponding to this watermarking images, force value and signature speed, by this embedded mobile GIS, this coordinate figure, force value and signature speed are embedded in image last time as key.This kind of technical scheme can guarantee the authenticity of each signature.
Optionally, watermarking images is being embedded into after in image last time by said method, also comprises: added in this watermarking images to show as seen by signature image corresponding for this watermarking images.This kind of mode adds the signature of visible form, obtains double protection.
As shown in Figure 2, the flow process of above-mentioned watermark embedment as shown in Figure 3 for the above-mentioned document watermark Verification System framework map based on hand-written feature.
Optionally, said method can also arrange embedding amount threshold, and each user's signature configures an ID, and each new user's signature once, embeds quantity and adds 1, as embedding data reaches embedding amount threshold, and direct end operation.
The specific embodiment of the invention also provides a kind of computing machine 400, and computing machine 400 as shown in Figure 4, comprising:
Obtaining converting unit 401, for obtaining the document of digital watermarking to be embedded, and the format conversion of the document being become picture format, using the picture format after conversion as original document; Receive the signature of first user, the Format adjusting of being signed by first user is the data that picture format is signed as first user;
Scramble adjustment unit 402, for the data disorder that this first user is signed, using the data after scramble as the first watermark data, the size adjusting described first watermark data makes described first watermark data size occupy a part for described digital watermarking gross space;
Embedded unit 403, obtains the image after adding watermark for described first watermark data being embedded into described original document by watermarking algorithm;
Obtaining converting unit 401, also for receiving the signature of the second user, is the data of picture format as the second user's signature using the Format adjusting of the second user's signature;
Scramble adjustment unit 402, also for the data disorder by the second user's signature, using the data after scramble as the second watermark data, the size adjusting described second watermark data makes described second watermark data size occupy the part in described digital watermarking space;
Embedded unit 403, also obtains intermediate water watermark image for the image after described second watermark data being embedded into added watermark by watermarking algorithm;
This embedded unit 404, for receiving the signature of a user in subsequent user at every turn, be the data of picture format as this user's signature using the signature Format adjusting of this user, by the data disorder of this user's signature, using the data after scramble as this watermark data, the size of adjustment this watermark data described makes this watermark data size described occupy a part for described digital watermarking; By watermarking algorithm, this watermark data is embedded in image last time;
Cycling element 405, for controlling this embedded unit 404 cycling until all user's signatures are complete or embed quantity reach end operation when setting threshold value.
Optionally, obtain converting unit 401, also for obtaining the coordinate figure of user's signature corresponding to this watermarking images, force value and signature speed; Embedded unit 402, also for this coordinate figure, force value and signature speed being embedded in image last time as key by this embedded mobile GIS.
Optionally, embedded unit 402, also for being added in this watermarking images to show as seen by signature image corresponding for this watermarking images.
In said units and system embodiment, included unit just carries out dividing according to function logic, but is not limited to above-mentioned division, as long as can realize corresponding function; In addition, the concrete title of each functional unit, also just for the ease of mutual differentiation, is not limited to protection scope of the present invention.
It will be understood by those skilled in the art that all or part of step of technical scheme that the embodiment of the present invention provides can have been come by the hardware that programmed instruction is relevant.Such as can be come by computer run journey.This program can be stored in read/write memory medium, such as, and random access memory, disk, CD etc.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.
Claims (6)
1. hand-written feature and a digital document visible watermark fusion method, is characterized in that, described method comprises:
Obtain the document of digital watermarking to be embedded, and the format conversion of the document is become picture format, using the picture format after conversion as original document;
Receive the signature of first user, the Format adjusting of being signed by first user is the data that picture format is signed as first user;
By the data disorder that this first user is signed, using the data after scramble as the first watermark data, the size adjusting described first watermark data makes described first watermark data size occupy a part for described digital watermarking gross space;
By watermarking algorithm, described first watermark data is embedded into described original document and obtains the image after adding watermark;
Receiving the signature of the second user, is the data of picture format as the second user's signature using the Format adjusting of the second user's signature; By the data disorder of the second user's signature, using the data after scramble as the second watermark data, the size adjusting described second watermark data makes described second watermark data size occupy the part in described digital watermarking space;
Intermediate water watermark image is obtained by the image after described second watermark data is embedded into added watermark by watermarking algorithm;
Perform follow-up embedding operation, described follow-up embedding operation comprises: each signature receiving a user in subsequent user, be the data of picture format as this user's signature using the signature Format adjusting of this user, by the data disorder of this user's signature, using the data after scramble as this watermark data, the size of adjustment this watermark data described makes this watermark data size described occupy a part for described digital watermarking gross space; By watermarking algorithm, this watermark data is embedded in image last time; A part described above is specifically as follows 1/2nd, 1/3rd, 1/4th, 1/5th or 1/6th;
Repeat described follow-up embedding operation until all user's signatures are complete or embed quantity reach end operation when setting threshold value.
2. method according to claim 1, is characterized in that, described method, when being embedded in image last time by watermarking images, also comprises:
Obtain the coordinate figure of user's signature corresponding to this watermarking images, force value and signature speed, by described embedded mobile GIS, described coordinate figure, force value and signature speed are embedded in image last time as key.
3. method according to claim 1 and 2, is characterized in that, watermarking images is being embedded into after in image last time by described method, also comprises: added in this watermarking images to show as seen by signature image corresponding for this watermarking images.
4. a computing machine, is characterized in that, described computing machine comprises:
Obtaining converting unit, for obtaining the document of digital watermarking to be embedded, and the format conversion of the document being become picture format, using the picture format after conversion as original document; Receive the signature of first user, the Format adjusting of being signed by first user is the data that picture format is signed as first user;
Scramble adjustment unit, for the data disorder of being signed by this first user, using the data after scramble as the first watermark data, the size adjusting described first watermark data makes described first watermark data size occupy a part for described digital watermarking gross space;
Embedded unit, obtains the image after adding watermark for described first watermark data being embedded into described original document by watermarking algorithm;
The Format adjusting of the second user's signature, also for receiving the signature of the second user, is the data of picture format as the second user's signature by described acquisition converting unit;
Described scramble adjustment unit, also for the data disorder by the second user's signature, using the data after scramble as the second watermark data, the size adjusting described second watermark data makes described second watermark data size occupy the part in described digital watermarking space;
Described embedded unit, also obtains intermediate water watermark image for the image after described second watermark data being embedded into added watermark by watermarking algorithm;
This embedded unit, for receiving the signature of a user in subsequent user at every turn, be the data of picture format as this user's signature using the signature Format adjusting of this user, by the data disorder of this user's signature, using the data after scramble as this watermark data, the size of adjustment this watermark data described makes this watermark data size described occupy a part for described digital watermarking gross space; By watermarking algorithm, this watermark data is embedded in image last time; A part described above is specifically as follows 1/2nd, 1/3rd, 1/4th, 1/5th or 1/6th;
Cycling element, for controlling this embedded unit cycling described until all user's signatures are complete or embed quantity reach end operation when setting threshold value.
5. computing machine according to claim 4, is characterized in that, described acquisition converting unit, also for obtaining the coordinate figure of user's signature corresponding to this watermarking images, force value and signature speed; Described embedded unit, also for this coordinate figure, force value and signature speed being embedded in image last time as key by this embedded mobile GIS.
6. computing machine according to claim 4, is characterized in that, described embedded unit, also for being added in this watermarking images to show as seen by signature image corresponding for this watermarking images.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310177196.7A CN103310403B (en) | 2013-05-14 | 2013-05-14 | Hand-written feature and digital document visible watermark fusion method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310177196.7A CN103310403B (en) | 2013-05-14 | 2013-05-14 | Hand-written feature and digital document visible watermark fusion method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103310403A CN103310403A (en) | 2013-09-18 |
CN103310403B true CN103310403B (en) | 2016-03-09 |
Family
ID=49135581
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310177196.7A Active CN103310403B (en) | 2013-05-14 | 2013-05-14 | Hand-written feature and digital document visible watermark fusion method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103310403B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105405091A (en) * | 2015-11-03 | 2016-03-16 | 浪潮(北京)电子信息产业有限公司 | Digital watermark realization method and device under cloud environment |
TWI668594B (en) * | 2018-05-11 | 2019-08-11 | 雲想科技股份有限公司 | Electronic signature generation and verification method with digital watermark and electronic device |
CN109325898B (en) * | 2018-09-30 | 2020-08-28 | 阿里巴巴集团控股有限公司 | Method and device for writing and reading digital watermark |
CN111160335B (en) * | 2020-01-02 | 2023-07-04 | 腾讯科技(深圳)有限公司 | Image watermark processing method and device based on artificial intelligence and electronic equipment |
CN112434319B (en) * | 2020-11-27 | 2024-07-12 | 无锡卡尔曼导航技术有限公司 | Data encryption method and device for electronic file |
CN112579994A (en) * | 2020-12-23 | 2021-03-30 | 陈子祺 | Digital product content protection system and method based on artificial intelligence |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101661608A (en) * | 2009-08-31 | 2010-03-03 | 重庆大学 | Diginal image blind watermark adding, extracting and removing method suitable for internet |
CN102122385A (en) * | 2011-02-28 | 2011-07-13 | 北京工业大学 | Digital watermark method capable of simultaneously resisting various attacks |
CN102156956A (en) * | 2011-04-19 | 2011-08-17 | 南京航空航天大学 | High robustness watermark method based on singular value decomposition and discrete cosine transform |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3137022B2 (en) * | 1997-02-24 | 2001-02-19 | 日本電気株式会社 | Video encoding device |
-
2013
- 2013-05-14 CN CN201310177196.7A patent/CN103310403B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101661608A (en) * | 2009-08-31 | 2010-03-03 | 重庆大学 | Diginal image blind watermark adding, extracting and removing method suitable for internet |
CN102122385A (en) * | 2011-02-28 | 2011-07-13 | 北京工业大学 | Digital watermark method capable of simultaneously resisting various attacks |
CN102156956A (en) * | 2011-04-19 | 2011-08-17 | 南京航空航天大学 | High robustness watermark method based on singular value decomposition and discrete cosine transform |
Also Published As
Publication number | Publication date |
---|---|
CN103310403A (en) | 2013-09-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xuehua | Digital watermarking and its application in image copyright protection | |
CN103310403B (en) | Hand-written feature and digital document visible watermark fusion method | |
Vasudev | A review on digital image watermarking and its techniques | |
CN102930498B (en) | A kind of digital watermark embedding based on Lifting Wavelet and extracting method | |
Rao et al. | R,“Digital watermarking: applications, techniques and attacks” | |
Mehta et al. | Digital image watermarking: A review | |
Verma | Review of steganography techniques | |
Hiran et al. | Robust & secure digital image watermarking technique using concatenation process | |
Jamal et al. | Digital watermarking techniques and its application towards digital halal certificate: A survey | |
Ishtiaq et al. | Robust and imperceptible watermarking of video streams for low power devices | |
Goel et al. | Improved digital watermarking techniques and data embedding in multimedia | |
Hu et al. | A blind watermarking algorithm for color image based on wavelet transform and Fourier transform | |
Liao et al. | A novel digital image watermarking approach based on image blocks similarity | |
Rajoriya et al. | SVD and Frequency Domain based Composite Robust Data hiding scheme for image watermarking | |
Adimoolam et al. | Anti-piracy for movies using forensic watermarking | |
Zhang et al. | Watermarking scheme capable of resisting attacks based on availability of inserter | |
Soni et al. | Digital watermarking of wavelet transforms based on coding and decoding techniques | |
Kavadia et al. | A literature review on water marking techniques | |
Zeki et al. | Investigating Digital Watermark Dynamics on Carrier File by Feed-Forward Neural Network | |
Singhal et al. | Digital watermarking algorithms: a review | |
Ma | Research on Information Hiding Technology Based on Digital Watermarking | |
Bedi et al. | A design of secure watermarking scheme for images in spatial domain | |
Jiang et al. | Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing | |
Ahmadi et al. | Image Watermarking: Blind Linear Correlation Technique | |
Liang et al. | A DCT-domain system for digital watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP02 | Change in the address of a patent holder | ||
CP02 | Change in the address of a patent holder |
Address after: 518000, 2nd Floor, Building B2, Zhanfeng Industrial Park, Hangcheng Industrial Zone, Taoyuan Community, Xixiang Street, Bao'an District, Shenzhen City, Guangdong Province Patentee after: SHENZHEN WAVE MULTIMEDIA Co.,Ltd. Address before: 518102 Guangdong Shenzhen Baoan District Xixiang Street Fenggang community Xitong 2 plant four floor Patentee before: SHENZHEN WAVE MULTIMEDIA Co.,Ltd. |