当前位置:网站首页>Reversible digital watermarking method based on histogram modification
Reversible digital watermarking method based on histogram modification
2022-07-28 06:16:00 【zzuls】
0. I think the histogram of the image , It reflects the distribution of pixel values of the image , It tells you that the pixel value of this image is 0-255 How many pixels are there . The abscissa represents the pixel value , The ordinate represents the number of pixels corresponding to the pixel value in the image .ps: The pixel value of gray-scale image can also be said to be gray-scale value .

( Image source reference watermark )
1. Early foundation : You need to find the zero point of the histogram ( The corresponding pixel value is z) And peak point ( The corresponding pixel value is p). This zero point can be simply understood as the histogram ordinate 0 The point of , If there is no zero , Choose the minimum value instead of zero , Also record 0 The value corresponding to the point . The peak point is the point with the most pixels in the histogram , The reason for finding the peak value is that the secret message needs to be embedded into the pixel value p Of pixels , It can maximize the watermark capacity .

Embedding watermark steps ( Suppose there is ):
(1) First, calculate the histogram of the image , And find the zero point , That is, pixels without any gray value in the image are recorded as z; Then find the peak value of the gray value with the most pixels in the histogram , Write it down as p. For the convenience of narration , Hypothetical hypothesis p<z.
ps: The peak point may also be on the right of zero , But the actual steps of embedding watermark are similar
(2) From top to bottom 、 Scan each pixel in the image from left to right , The gray value of each pixel is
Express , When
>z or
<p when , The value of the pixel remains unchanged ; otherwise , The gray value of the pixel plus 1:
(3) Pixels in the image whose gray value is equal to the peak point , Is the point where secret information can be embedded , Convert secret information into binary streams , use
Express . Embed information sequentially have to
.
ps: How do you understand this , If p=128, There are... In the image 3 The gray value of points is 128 Respectively p1,p2,p3. If I want to embed watermark information as 101, Then I can make p1 = p1+1=129、p2 = p2+0 = 128、p3 = p3+1 = 129;
(4) The obtained image composed of gray value is the image after embedding secret information . meanwhile p、z Save in the form of a key .
Steps of extracting watermark information :
(1) Read key , obtain p、z Value ;
(2) Progressive image , When
when , It indicates that this point is a hidden information point , Extract information 0 And keep the gray value of this point unchanged ; When when , This point is also a hidden information point , Extract information 1 And reduce the pixel value 1.
ps: Why?
and Time is the point of hiding information ? Because in the original image
All points plus one
, therefore It must be a secret message 1 Only some
(3) When
or
when , The value of the pixel remains unchanged ; When
when , The gray value of the pixel is reduced 1.
(4) Get a new image composed of gray values , That is, the carrier image after extracting secret information .
边栏推荐
- Summary of command injection bypass methods
- 后门攻击与对抗样本攻击的比较研究
- 深度学习(二)走进机器学习与深度学习编程部分
- 使用PowerCli来创建自定义ESXi ISO镜像
- 无约束低分辨率人脸识别综述三:同质低分辨率人脸识别方法
- vSphere ESXi 7.0 Update 3 发行说明
- ESXi社区版NVMe驱动更新v1.1
- Cluster operation management system, to answer questions about the process
- Ssh/scp breakpoint resume Rsync
- How much does it cost to make a small program mall? What are the general expenses?
猜你喜欢

What are the general wechat applet development languages?

Deep learning (self supervision: Moco V2) -- improved bases with momentum contractual learning

Word2vec+ regression model to achieve classification tasks

深度学习——MetaFormer Is Actually What You Need for Vision

Model Inversion Attacks that Exploit Confidence Informati on and Basic Countermeasures 阅读心得

Neural network learning

Classification of iris based on Neural Network

Differences between processes and threads

基于选择性知识提取的野外低分辨率人脸识别的论文阅读笔记

Latex入门
随机推荐
Overview of unconstrained low resolution face recognition I: data sets for low resolution face recognition
ESXi on ARM v1.2 (2020年11月更新)
强化学习——价值学习中的DQN
强化学习——多智能体强化学习
ESXi社区版NVMe驱动更新v1.1
Deep learning (incremental learning) - iccv2022:continuous continuous learning
Wechat applet development and production should pay attention to these key aspects
Scenario solution of distributed cluster architecture: cluster clock synchronization
What about the app store on wechat?
Reinforcement learning - Strategic Learning
物联网互操作系统:分类、标准与未来发展方向综述
How much does it cost to make a small program mall? What are the general expenses?
Neural network learning
Deep learning (incremental learning) - (iccv) striking a balance between stability and plasticity for class incremental learning
Applet development
Reinforcement learning - continuous control
What are the general wechat applet development languages?
Deep learning pay attention to MLPs
深度学习(自监督:MoCo v2)——Improved Baselines with Momentum Contrastive Learning
深度学习(自监督:CPC v2)——Data-Efficient Image Recognition with Contrastive Predictive Coding