CN111242831B - Zernike moment-based geometric attack resistant reversible robust watermarking method - Google Patents
Zernike moment-based geometric attack resistant reversible robust watermarking method Download PDFInfo
- Publication number
- CN111242831B CN111242831B CN202010066301.XA CN202010066301A CN111242831B CN 111242831 B CN111242831 B CN 111242831B CN 202010066301 A CN202010066301 A CN 202010066301A CN 111242831 B CN111242831 B CN 111242831B
- Authority
- CN
- China
- Prior art keywords
- zernike
- watermark
- image
- distortion
- watermark information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0065—Extraction of an embedded watermark; Reliable detection
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention discloses a Zernike moment anti-geometric attack reversible robust watermarking method, which comprises the following steps: calculating Zernike moments of an original image, embedding the watermark by adopting a quantitative watermarking method, processing distortion information existing in the positive and negative conversion processes of the Zernike, and judging whether the image is attacked or not; when the image is judged not to be attacked, distortion information is extracted by adopting a reversible watermarking method, and a quantization watermark is extracted by utilizing the Zernike moment of the image and the original image is recovered; and when the image is judged to be attacked, calculating the Zernike moment of the image with the watermark information after the image is attacked, and performing quantitative watermark extraction to obtain the watermark information. The invention solves the problem that reversible robust watermarking can not be realized due to a large amount of accumulated errors in the Zernike moment conversion process, can extract the watermark and restore the original image when not attacked, can effectively extract the watermark when attacked, and has stronger robustness on geometric attack and conventional signal processing.
Description
Technical Field
The invention relates to the technical field of digital watermarking, in particular to a Zernike matrix geometric attack resistant reversible robust watermarking method.
Background
In recent years, the existence of redundancy is discovered by researching the correlation relationship among image pixels, and by utilizing the redundancy, a reversible watermarking technology is provided, so that an original image can be accurately recovered after a watermark is extracted, however, in an actual application scene, a transmitted image is often attacked (such as noise, geometric attack and the like), and the reversible watermarking technology cannot resist the attack;
on the other hand, the existing Zernike matrix transformation technology has a large amount of accumulated errors in the implementation process and distortion in the processing process, so that the reversible robust watermarking technology cannot be realized through the Zernike matrix transformation.
Disclosure of Invention
In order to overcome the defects and shortcomings of the prior art, the invention provides a reversible robust watermarking method based on Zernike matrix anti-geometric attack, which solves the problem that the reversible robust watermarking can not be realized due to a large amount of accumulated errors in the Zernike matrix transformation process by processing the quantization distortion, the watermark distortion, the overflow distortion and the transformation distortion existing in the watermark embedding process, can extract the watermark and restore the image when not attacked, can effectively extract the watermark when attacked, has an important effect on the integrity authentication of digital media, and can effectively resist various attacks such as JPEG compression, stretching, rotation, gaussian noise, salt and pepper noise and the like.
In order to achieve the purpose, the invention adopts the following technical scheme:
the invention provides a Zernike moment anti-geometric attack reversible robust watermarking method, which comprises the following steps:
calculating the Zernike moment of the original image I to obtain the n-order m-fold Zernike moment A nm ;
Watermark embedding is carried out by adopting a quantization watermark method to obtain quantization distortion d q And watermark distortion d w ;
Zernike inverse transformation is carried out to obtain an image I with watermark information w Obtaining an image after a rounding operation
Processing the transformation distortion d existing in the positive and negative transformation process of Zernike t ;
Distortion of quantization d by reversible watermarking q Distortion d of watermark w Distortion of overflow d o And transformation distortion d t Embedding in imagesIn order to obtain an image
Generating imagesThe hash value H is processed by a reversible watermarking methodH embedding into imagesObtaining an image
Using reversible watermarking methods to extract images from imagesExtracts the hash value H 1 And restoring the imageGenerating an imageHash value of (H) 2 Judgment of H 1 And H 2 Judging whether the images are equal or not, and judging whether the images are attacked or not;
when the image is judged not to be attacked, a reversible watermarking method is adopted to extract the imageTo extract the quantization distortion d q Distortion d of watermark w Distortion of overflow d o And transformation distortion d t And restoring the image
Based on overflow distortion d o Compensating imagesRestoring imagesComputing imagesThe Zernike matrix is obtained to obtain the Zernike matrix containing the watermark information, and the quantitative watermark extraction is carried out to obtain and recover the watermark information wComplex Zernike moments;
performing Zernike inverse transformation to obtain an image I 1 By using transformation distortion d t For image I 1 Compensating and recovering an original image I;
when the image is judged to be attacked, calculating the image I with the watermark information after the image is attacked aw Obtaining the Zernike matrix containing the watermark information after the attack;
performing quantitative watermark extraction to obtain watermark information w a 。
As a preferred technical solution, the calculating Zernike moments of the original image I specifically includes:
determining the order N, taking the center of the original image I with the size of M multiplied by M as the center of a circle, making an inscribed circle, taking the inscribed circle as a unit circle, and solving the Zernike moment of the pixels in the unit circle. Constructing Zernike base V based on the inscribed circle nm (x, y) by the Zernike group V nm (x, y) calculating Zernike moments to obtain n-order m-fold Zernike moment A nm The specific calculation formula is as follows:
where Δ x and Δ y represent the step size of the unit circle of the image, f (x) i ,y j ) Representing the pixels within the unit circle.
As a preferred technical solution, the watermark embedding is performed by using a quantization watermark method to obtain quantization distortion d q And watermark distortion d w The method comprises the following specific steps:
selecting the Zernike moment A nm In which the Zernike moment A satisfies the predetermined conditions pq Regularization is carried out to obtain Zernike momentUsing quantization watermarking method to align Zernike matrixAbsolute value of (2)Embedding watermark to obtainThe specific formula is as follows:
the quantization distortion d q And watermark distortion d w The specific formula of (A) is as follows:
where s represents the step size in the quantized watermark and w represents the watermark information.
As a preferred technical solution, the image I with watermark information is obtained by performing inverse Zernike transformation w The method comprises the following specific steps:
calculating the Zernike matrix after embedding the quantization watermark by using the reciprocal of the absolute value ratio of the Zernike matrix before and after embedding the quantization watermark as a scale coefficientThe specific formula is as follows:
then, zernike inverse transformation is carried out to obtain the difference between the low-frequency reconstructed image with watermark information and the low-frequency reconstructed image without the watermark informationThe specific formula is as follows:
wherein L represents the length of watermark information, and L represents the length of watermark information in space domainAdding the original image I to obtain an image I with watermark information w The concrete formula is as follows:
as a preferred technical scheme, the transformation distortion d existing in the process of processing the positive and negative transformation of the Zernike is processed t The method comprises the following specific steps:
computing images with watermark informationM-fold Zernike moment of order nObtain the corresponding Zernike momentRegularization is carried out to obtain
Performing quantitative watermark extraction to obtain watermark information w;
using the quantization distortion d q And watermark distortion d w Recovering Zernike momentsThe specific formula is as follows:
calculating the restored Zernike moment based on the inverse of the absolute value ratio of the Zernike moments before and after the extraction of the quantized watermark as the scale coefficientThe specific formula is as follows:
performing Zernike inverse transformation to obtain the difference between the low-frequency reconstructed image without watermark information and with watermark informationThe specific formula is as follows:
wherein L represents the length of watermark information, and is to be applied in spatial domainAnd image I with watermark information w Performing an addition operation to obtain an image I 1 The concrete formula is as follows:
calculating the restored image I 1 The transformation distortion d existing between the original image I and the original image t The concrete formula is as follows:
d t =I-I 1 。
as a preferred technical solution, the quantization watermark extraction is performed to obtain watermark information w and recover Zernike moments, and the specific steps include:
Computing imagesM-fold Zernike moment of order nAnd selecting the Zernike momentsRegularizing to obtain Zernike moment
Extracting quantization watermark to obtain watermark information w, and based on the extracted quantization distortion d q And watermark distortion d w Recovering Zernike moments
As a preferred technical solution, the specific formula of the watermark information w is as follows:
where α = mod (s, 0.04)/0.04, s represents the step size in the quantized watermark.
As a preferred technical solution, the image I obtained by performing inverse Zernike transformation is described 1 The method comprises the following specific steps:
based on extracted quantization distortion d q And watermark distortion d w Recovering Zernike momentsThe concrete formula is as follows:
calculating the restored Zernike matrix by using the reciprocal of the absolute value ratio of the Zernike matrix before and after the extraction of the quantization watermark as a scale coefficientThe specific formula is as follows:
then, zernike inverse transformation is carried out to obtain the difference between the low-frequency reconstructed image without the watermark information and the low-frequency reconstructed image with the watermark informationThe concrete formula is as follows:
wherein L represents the length of watermark information, and L represents the length of watermark information in space domainAnd image I with watermark information w Performing an addition operation to obtain an image I 1 The concrete formula is as follows:
preferably, when it is determined that the image is under attack, the image I with the watermark information after the attack is calculated aw The Zernike moment of (2) comprises the following specific steps:
image I with watermark information after being attacked by calculation aw M-fold Zernike moment of order nSelecting according to preset conditionsRegularization is carried out to obtain Zernike matrix containing watermark information
As a preferred technical solution, the quantization watermark extraction is performed to obtain watermark information w a The specific calculation formula is as follows:
where α = mod (s, 0.04)/0.04, s represents the step size in quantizing the watermark.
Compared with the prior art, the invention has the following advantages and beneficial effects:
(1) The reversible robust watermarking method provided by the invention based on the Zernike moment mainly utilizes the characteristics of the Zernike moment, solves the distortion problem in the Zernike transformation process, can extract the watermark and recover the image when not attacked, can effectively extract the watermark when attacked (such as JPEG compression, stretching, rotation and the like), and has stronger robustness to geometric attack and conventional processing.
(2) The method utilizes the robustness of the quantization watermark, adopts the mode of the quantization watermark to embed the robust watermark in the original image, can resist the rotation attack of various angles based on the characteristic that the Zernike moment is invariable in rotation, has the characteristic that the expansion is invariable based on the regularization of the Zernike moment, can resist the stretching attack, and can effectively extract watermark information and restore the image.
(3) The invention can effectively extract watermark information under different signal processing, such as Gaussian noise, salt and pepper noise and other noise attacks, and meets the requirements of daily digital evidence collection and digital authentication; meanwhile, the method can be applied to different images, and a better effect can be achieved on the different images.
Drawings
Fig. 1 is a schematic flow chart of a reversible robust watermarking method based on Zernike moment geometric attack resistance in this embodiment;
fig. 2 is a schematic flow chart of the present embodiment for determining whether an image with watermark information is attacked;
fig. 3 is a schematic flow chart of extracting a watermark and recovering an original image when the embodiment is not attacked;
fig. 4 is a schematic flowchart of extracting a watermark under an attack in this embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Examples
As shown in fig. 1, the embodiment provides a reversible robust watermarking method based on Zernike moment geometric attack resistance, which includes a watermark embedding step, a watermark extraction and image recovery step when not attacked, and a watermark extraction step when attacked;
wherein the watermark embedding step comprises the steps of:
s1: calculating the Zernike moment of the original image I;
s11: the order N (N is more than or equal to 0) of the Zernike moment is determined, in the embodiment, N =30 is taken, and A is used nm The Zernike moments of each order are expressed, where n and m satisfy the following equations:
0≤n≤N
base V of Zernike moment nm (x, y) is a set of perfect orthonormal bases on a unit circle, n is the order of the transform, m is the number of multiples of the transformed coefficients, V nm The specific formula of (x, y) is as follows:
V nm (x,y)=R nm (ρ)e jmθ
wherein the content of the first and second substances,θ=tan -1 (y/x),R nm (ρ) is a Zernike polynomial as follows:
therefore, a unit circle of the image needs to be made first;
s12: taking the center of an original image I with the size of M multiplied by M as the center of a circle, making an inscribed circle, taking the inscribed circle as a unit circle, calculating the Zernike moment of pixels in the unit circle, setting the pixels in the inscribed circle as f (x, y), and then constructing a Zernike base V by using the inscribed circle nm (x, y) by the Zernike group V nm (x, y) calculating Zernike moments to obtain n-order m-fold Zernike moment A nm The specific formula is as follows:
wherein, V nm (x,y)=R nm (ρ)e jmθ Is a set of perfect orthonormal bases on a unit circle, R nm (ρ) is a Zernike polynomial, the specific expression being as follows:
Δ x and Δ y are steps of an image unit circle, and for an image of size M × M, specific expressions are as follows:
in this embodiment, M is equal to M =512;
s2: watermark embedding is carried out by utilizing a quantization watermark method to obtain quantization distortion d q And watermark distortion d w ;
S21: selecting the Zernike moment A nm Well satisfy (n > 0)&&(m>0)&&Zernike moments A of (m ≠ 4 i) pq Subjecting it to a regularization operation to obtainThe concrete formula is as follows:
s22: embedding watermark information w: the method for quantizing the watermark w with the length L is used for carrying out regularized Zernike momentsAbsolute value of (2)Embedding watermark to obtainThe specific formula is as follows:
where s is the step size in the quantized watermark, s =0.02 in this example, with 100 × s being an integer greater than 1, and then the moments that are quantized are subject to quantization distortion d q And watermark distortion d w Preservation of (d) q And d w The specific formula is as follows:
s3: performing Zernike inversionTransforming to obtain image I with watermark information w ;
S31: modifying part of Zernike matrix in the process of embedding the watermark, and calculating the Zernike matrix after embedding the quantized watermark by using the reciprocal of the absolute value ratio of the Zernike matrix before and after embedding the quantized watermark as a scale coefficientThe specific formula is as follows:
then, zernike inverse transformation is carried out to obtain the difference between the low-frequency reconstructed image with watermark information and the low-frequency reconstructed image without the watermark informationThe specific formula is as follows:
s32: in the spatial domainAdding the original image I to obtain an image I with watermark information w The concrete formula is as follows:
S4: processing the transformation distortion d existing in the positive and negative transformation process of Zernike t Although the Zernike moments are orthogonal transforms on the unit circles, due to computational accuracy problems,the more the number of the calculated orders is, the more the accumulated error is, and therefore, the distortion d needs to be converted t Carrying out treatment;
s41: similar to steps S11 and S12, the image with the watermark information is calculatedM-fold Zernike moment of order nObtain the Zernike moment of the corresponding transformationRegularizing the same to obtain
S42: and (3) performing quantitative watermark extraction to obtain watermark information w, wherein the specific formula is as follows:
where α = mod (s, 0.04)/0.04, and α =0.005 in this example, the quantization distortion d is reused q And watermark distortion d w Recovering Zernike momentsThe specific formula is as follows:
s43: calculating the restored Zernike moments by using the inverse of the absolute value ratio of the Zernike moments before and after the extraction of the quantized watermark as a proportionality coefficientThe specific formula is as follows:
then, zernike inverse transformation is carried out to obtain the difference between the low-frequency reconstructed image without the watermark information and the low-frequency reconstructed image with the watermark informationThe specific formula is as follows:
in the spatial domainAnd image I with watermark information w Performing an addition operation to obtain an image I 1 The concrete formula is as follows:
s44: calculating the restored image I 1 The transformation distortion d existing between the original image I and the original image t The concrete formula is as follows:
d t =I-I 1
s5: processing distortion by reversible watermarking method, and embedding the combined distortion information into the reversible watermarking methodThen obtainGeneratingEmbedding the hash value H into a reversible watermarking methodTo getTo the image
S51: for imagesCarrying out overflow saturation treatment, namely setting the value of the pixel value larger than 255 as 255 and setting the value of the pixel value smaller than 0 as 0 to obtain an imageSimultaneously preserving overflow distortion d possibly existing in overflow saturation treatment process o ;
S52: distortion d of quantization by reversible watermarking q Distortion d of watermark w Distortion of overflow d o And transformation distortion d t Embedding in imagesIn (1), obtaining an image
S53: generating an imageEmbedding the hash value H into the image by a reversible watermarking methodObtaining an image
As shown in fig. 2, the specific steps of determining whether the image is attacked or not are as follows:
s6: method for reversible watermarking from imagesExtracts the hash value H 1 And restoring the imageGenerating an imageHash value of (H) 2 Judgment of H 1 And H 2 Judging whether the images are equal or not, and judging whether the images are attacked or not;
image processing methodMethod for extracting hash value H by reversible watermark 1 And restoring the image
if H is present 1 And H 2 Equality, illustrate imagesRecovered images without attackAnd imagesTo match, to the imageExtracting the watermark and recovering the original image under the condition of not being attacked;
if H is present 1 And H 2 Inequality, indicating a pictureAttacked and restored imageAnd imagesInconsistency, pairWatermark extraction under the condition of attack is carried out;
as shown in fig. 3, the specific steps of extracting the watermark and recovering the image when the attack is not received are as follows:
s7: method for reversible watermarking from imagesExtracts distortion information therefrom, and restores the image
Specifically, the image is takenMethod for extracting quantization distortion d by reversible watermark q Distortion d of watermark w And overflow distortion d o And transformation distortion d t And recovering the image with the watermark information
S8: using overflow distortion d o Compensating imagesRestoring imagesComputing imagesThen, carrying out quantitative watermark extraction to obtain watermark information w and recovering the Zernike moment;
S82: similar to step S11 and step S12, an image is calculatedM-fold Zernike moment of order nSelected according to the same conditionsRegularizing the same to obtain
S83: similar to step S42, the quantization watermark extraction is carried out to obtain watermark information w, and the extracted quantization distortion d is utilized q And watermark distortion d w Recovering Zernike moments
The specific formula of the watermark information w is as follows:
wherein α =0.005;
s9: performing Zernike inverse transformation to obtain an image I 1 By transformation distortion d t For image I 1 Compensating and recovering an original image I;
s91: similar to step S43, zernike inverse transformation is performed to restore the image i 1 ;
By extractionThe quantization distortion d q And watermark distortion d w Recovering Zernike momentsThe concrete formula is as follows:
calculating the restored Zernike matrix by using the reciprocal of the absolute value ratio of the Zernike matrix before and after the extraction of the quantization watermark as a scale coefficientThe specific formula is as follows:
then, zernike inverse transformation is carried out to obtain the difference between the low-frequency reconstructed image without the watermark information and the low-frequency reconstructed image with the watermark informationThe concrete formula is as follows:
in the spatial domainAnd image I with watermark information w Performing an addition operation to obtain an image I 1 The concrete formula is as follows:
s92: using extracted transformation distortion d t Compensated image I 1 And thus recovering the image I, the specific formula is as follows:
I=I 1 +d t
as shown in fig. 4, the watermark extraction when attacked is as follows:
s10: image I with watermark information after being attacked by calculation aw Obtaining the Zernike matrix containing the watermark information after the attack;
specifically, similarly to steps S11 and S12, the image I with watermark information after being attacked is extracted aw M-fold Zernike moment of order nSelected under the same conditionsRegularizing it to obtain
S11: performing quantitative watermark extraction to obtain watermark information w a ;
Specifically, quantization watermark extraction is performed to obtain watermark information w a The concrete formula is as follows:
where α = mod (s, 0.04)/0.04, and α =0.005 is taken in this embodiment.
In this embodiment, for the reversible robust watermarking method, the error rate of an image with watermark information after being attacked is below 20%, which is considered as having better robustness, and the specific experimental results are as follows:
as shown in table 1 below, the robust watermark embedded in the table is 60bits, the error rate exceeding 20% is represented by "-", and the experimental result based on the picture Lena shows that the method of the present embodiment can resist JPEG compression with a quality factor of 10, JPEG2000 attack with a compression ratio of 100, rotational attack from 0 to 360 degrees, tensile attack with a tensile factor of 0.5 to 2.0, gaussian noise with a mean value of 0, variance of 0.01 to 0.03, and salt and pepper noise attack with a density of 0.01;
table 1: bit error rate result table (embedded robust watermark is 60 bits) when picture Lena is attacked
As shown in table 2 below, the experimental results based on the picture ae show that the present embodiment can resist JPEG compression with a quality factor of 10, JPEG2000 attack with a compression ratio of 100, rotational attack from 0 to 360 degrees, tensile attack with a tensile factor of 0.5 to 2.0, gaussian noise with a mean value of 0, a variance of 0.01 to 0.03, and salt and pepper noise attack with a density of 0.01 to 0.03;
table 2 bit error rate result table when picture Aerial is attacked (embedded robust watermark is 60 bits)
As shown in table 3 below, the experimental results based on the picture babon show that the present embodiment can resist JPEG compression with a quality factor of 10, JPEG2000 attack with a compression ratio of 100, rotational attack of 0 to 360 degrees, tensile attack with a tensile factor of 0.5 to 2.0, gaussian noise with a mean value of 0, variance of 0.01 to 0.03, and salt and pepper noise attack with a density of 0.01 to 0.03;
table 3 table of bit error rate results when picture babon is attacked (embedded robust watermark is 60 bits)
In this example, a Lena picture, an initial picture and a Baboon gray image are used as experimental objects, and the three groups of pictures have different characteristics, such as that the Lena picture includes flat blocks, clear and fine lines, gradually changing light and shadow, and color depth levels; the Aeriol picture has a sharp outline and is bright and dark; the picture Baboon has the characteristics of continuous pixel values, smooth edges and the like. Various pictures in daily life have the characteristics, so that the three groups of pictures are taken as experimental objects, so that the experimental result has popularization; the picture size selected by the embodiment is 512 × 512, and different images have small difference, so that the method can be popularized to various images.
The above embodiments are preferred embodiments of the present invention, but the present invention is not limited to the above embodiments, and any other changes, modifications, substitutions, combinations, and simplifications which do not depart from the spirit and principle of the present invention should be construed as equivalents thereof, and all such changes, modifications, substitutions, combinations, and simplifications are intended to be included in the scope of the present invention.
Claims (10)
1. A reversible robust watermarking method based on Zernike moment geometric attack resistance is characterized by comprising the following steps:
calculating the Zernike moment of the original image I to obtain the n-order m-fold Zernike moment A nm ;
Watermark embedding is carried out by adopting a quantization watermark method to obtain quantization distortion d q And watermark distortion d w ;
Zernike inverse transformation is carried out to obtain an image I with watermark information w Obtaining an image after a rounding operation
Processing the transformation distortion d existing in the positive and negative transformation process of Zernike t ;
Distortion of quantization d by reversible watermarking q Distortion d of watermark w Distortion of overflow d o And transformation distortion d t Embedding in imagesIn (1), obtaining an image
Generating imagesThe hash value H is embedded into the image by adopting a reversible watermarking methodObtaining an image
Using reversible watermarking methods to extract images from imagesExtracts the hash value H 1 And recovering the obtained imageGenerating imagesHash value of (H) 2 Judgment of H 1 And H 2 Judging whether the images are equal or not, and judging whether the images are attacked or not;
determining an imageWhen not attacked, the reversible watermarking method is adopted to extract imagesTo extract the quantization distortion d q Distortion d of watermark w Distortion of overflow d o And transformation distortion d t And restoring the image
Based on overflow distortion d o Compensating imagesRestoring imagesComputing imagesObtaining the Zernike matrix containing the watermark information by the Zernike matrix, and carrying out quantitative watermark extraction to obtain watermark information w and recover the Zernike matrix;
performing Zernike inverse transformation to obtain an image I 1 Applying transformation distortion dt to image I 1 Compensating and recovering an original image I;
determining an imageWhen the attack is received, calculating the Zernike moment of the image with the watermark information after the attack is received, and obtaining the Zernike moment containing the watermark information after the attack is received;
quantitative watermark extraction is carried out to obtain watermark information w a 。
2. The Zernike moment-based geometric attack resistant reversible robust watermarking method according to claim 1, wherein the Zernike moment of the original image I is calculated by the specific steps of:
determining the order N of the Zernike moment, taking the center of an original image I with the size of M multiplied by M as the center of a circle, making an inscribed circle, taking the inscribed circle as a unit circle, solving the Zernike moment of a pixel in the unit circle, and constructing a Zernike base V based on the inscribed circle nm (x, y) by the Zernike group V nm (x, y) calculating Zernike moments to obtain n-order m-fold Zernike moment A nm The specific calculation formula is as follows:
where Δ x and Δ y represent the step size of the image unit circle, f (x) i ,y j ) Representing the pixels within the unit circle.
3. The Zernike moment geometric attack resistant reversible robust watermarking method according to claim 2, wherein the watermark embedding is performed by using a quantization watermarking method to obtain quantization distortion d q And watermark distortion d w The method comprises the following specific steps:
selecting Zernike moment A nm In which the Zernike moment A satisfies the predetermined conditions pq Regularization is carried out to obtain Zernike momentUsing quantization watermarking method to align Zernike matrixAbsolute value of (2)Embedding watermark to obtainThe specific formula is as follows:
the quantization distortion d q And watermark distortion d w The specific formula of (A) is as follows:
where s represents the step size in the quantized watermark and w represents the watermark information.
4. The reversible robust watermarking method based on Zernike moment geometric attack resistance as claimed in claim 3, wherein the inverse Zernike transformation is performed to obtain image I with watermark information w The method comprises the following specific steps:
calculating the Zernike matrix after embedding the quantization watermark by using the reciprocal of the absolute value ratio of the Zernike matrix before and after embedding the quantization watermark as a scale coefficientThe concrete formula is as follows:
then, zernike inverse transformation is carried out to obtain the difference between the low-frequency reconstructed image with watermark information and the low-frequency reconstructed image without the watermark informationThe specific formula is as follows:
wherein L represents the length of watermark information, and is to be applied in spatial domainAdding the original image I to obtain an image I with watermark information w The concrete formula is as follows:
5. the Zernike moment geometric attack resistant reversible robust watermarking method according to claim 4, wherein the transformation distortion d existing in the Zernike positive and negative transformation process is processed t The method comprises the following specific steps:
computing images with watermark informationM-fold Zernike moment of order nObtaining the corresponding Zernike momentRegularization is carried out to obtain
Performing quantitative watermark extraction to obtain watermark information w;
using the quantization distortion d q And watermark distortion d w Recovering Zernike momentsThe specific formula is as follows:
calculating the restored Zernike moment based on the inverse of the absolute value ratio of the Zernike moments before and after the extraction of the quantized watermark as the scale coefficientThe specific formula is as follows:
performing Zernike inverse transformation to obtain the difference between the low-frequency reconstructed image without watermark information and with watermark informationThe concrete formula is as follows:
wherein L represents the length of watermark information, and is to be applied in spatial domainAnd image I with watermark information w Performing an addition operation to obtain an image I 1 The concrete formula is as follows:
calculating the restored image I 1 The transformation distortion dt existing between the original image I is specifically represented as follows:
d t =I-I 1 。
6. the Zernike moment anti-geometric attack reversible robust watermarking method according to claim 5, wherein the quantization watermark extraction is performed to obtain watermark information w and recover the Zernike moment, and the specific steps include:
Computing imagesM-fold Zernike moment of order nAnd selecting Zernike momentsRegularizing to obtain Zernike moment
8. The Zernike moment-based reversible robust watermarking method against geometric attacks according to claim 7, wherein the inverse Zernike transformation is performed to obtain an image I 1 The method comprises the following specific steps:
based on extracted quantization distortion d q And watermark distortion d w Recovering Zernike momentsThe specific formula is as follows:
calculating the restored Zernike matrix by using the reciprocal of the absolute value ratio of the Zernike matrix before and after the extraction of the quantization watermark as a scale coefficientThe specific formula is as follows:
then, zernike inverse transformation is carried out to obtain the difference between the low-frequency reconstructed image without the watermark information and the low-frequency reconstructed image with the watermark informationThe specific formula is as follows:
wherein L represents the length of watermark information, and is to be applied in spatial domainAnd image I with watermark information w Performing an addition operation to obtain an image I 1 The concrete formula is as follows:
9. the Zernike moment geometric attack resistant reversible robust watermarking method according to claim 1, wherein the decision is imageWhen the attack is received, the Zernike moment with the watermark information image after the attack is calculated, and the specific steps comprise:
10. The Zernike moment geometric attack resistant reversible robust watermarking method according to claim 9, wherein the quantization watermark extraction is performed to obtain watermark information w a The specific calculation formula is as follows:
where α = mod (s, 0.04)/0.04, s represents the step size in the quantized watermark.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010066301.XA CN111242831B (en) | 2020-01-20 | 2020-01-20 | Zernike moment-based geometric attack resistant reversible robust watermarking method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010066301.XA CN111242831B (en) | 2020-01-20 | 2020-01-20 | Zernike moment-based geometric attack resistant reversible robust watermarking method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111242831A CN111242831A (en) | 2020-06-05 |
CN111242831B true CN111242831B (en) | 2022-11-08 |
Family
ID=70872875
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010066301.XA Active CN111242831B (en) | 2020-01-20 | 2020-01-20 | Zernike moment-based geometric attack resistant reversible robust watermarking method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111242831B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111986067A (en) * | 2020-07-31 | 2020-11-24 | 重庆邮电大学 | Robust digital watermarking algorithm for non-subsampled contourlet transform |
CN112862656B (en) * | 2021-03-12 | 2024-02-02 | 中山大学 | Digital image watermarking method for resisting printing scanning shooting |
CN114363719B (en) * | 2022-01-07 | 2023-02-24 | 四川大学 | Content self-adaptive robustness video watermarking method based on Bessel-Fourier moment |
CN116193042A (en) * | 2023-02-21 | 2023-05-30 | 齐鲁工业大学(山东省科学院) | Robust reversible information hiding method and system based on polar harmonic Fourier moment |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2005100061A4 (en) * | 2005-01-26 | 2005-03-03 | Dutta, Roshena | Pen2Text |
US8385971B2 (en) * | 2008-08-19 | 2013-02-26 | Digimarc Corporation | Methods and systems for content processing |
CN101489133B (en) * | 2009-01-16 | 2010-10-13 | 华中科技大学 | Geometric attack resisting real-time video watermarking method |
EA017302B1 (en) * | 2011-10-07 | 2012-11-30 | Закрытое Акционерное Общество "Импульс" | Method of noise reduction of digital x-ray image series |
-
2020
- 2020-01-20 CN CN202010066301.XA patent/CN111242831B/en active Active
Non-Patent Citations (1)
Title |
---|
Embedding image watermarks in dc components;Jiwu Huang 等;《IEEE Transactions on Circuits and Systems for Video Technology》;20000930;第10卷(第6期);974-979 * |
Also Published As
Publication number | Publication date |
---|---|
CN111242831A (en) | 2020-06-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111242831B (en) | Zernike moment-based geometric attack resistant reversible robust watermarking method | |
Ernawan et al. | A robust image watermarking technique with an optimal DCT-psychovisual threshold | |
Li et al. | Adaptive DWT-SVD domain image watermarking using human visual model | |
WO2021103676A1 (en) | Self-adaptive reversible information hiding method based on integer wavelet transform | |
CN112907435B (en) | High-robustness holographic blind watermarking algorithm based on improved Bosch coding and data interval mapping | |
Patil et al. | DWT based invisible watermarking technique for digital images | |
Malonia et al. | Digital image watermarking using discrete wavelet transform and arithmetic progression technique | |
CN105512999A (en) | Dual-transform color image holographic watermarking method | |
CN115345768A (en) | Robust watermark attack method and system based on neural network | |
Chang et al. | Preserving robustness and removability for digital watermarks using subsampling and difference correlation | |
CN109754358B (en) | Image watermarking method and system based on significance detection and contourlet transformation | |
Mohan et al. | On the use of Schur decomposition for copyright protection of digital images | |
CN109829846B (en) | Digital image blind watermarking method based on two-dimensional discrete cosine transform | |
Hu et al. | A progressive QIM to cope with SVD-based blind image watermarking in DWT domain | |
CN116205776A (en) | Tamper positioning method based on semi-fragile reversible watermark | |
CN111242830B (en) | Image reversible robust data hiding method based on polar harmonic transformation | |
CN114170059A (en) | Two-stage image robust reversible information hiding method based on singular value decomposition | |
Al-Gindy et al. | DCT watermarking technique using image normalization | |
Yang et al. | Reversible data hiding in the spatial and frequency domains | |
Soheili | Blind wavelet based logo watermarking resisting to cropping | |
CN115861015A (en) | Pseudo Zernike moment based robust reversible watermark embedding method and extraction method | |
Das et al. | Digital Watermarking Using Discrete Wavelet Transform and Eigen Decomposition | |
Jin et al. | Robust Digital Watermarking for High-Definition Video using Steerable Pyramid Transform and Fast Fourier transformation | |
CN117217972A (en) | Robust reversible watermark embedding and extracting method based on fractional PECT moment | |
CN113139890A (en) | Space-domain blind watermarking algorithm based on subblock mean value |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |